Home
last modified time | relevance | path

Searched refs:bit (Results 1 – 25 of 58) sorted by relevance

123

/hostap-latest/src/utils/
Dbitfield.c40 void bitfield_set(struct bitfield *bf, size_t bit) in bitfield_set() argument
42 if (bit >= bf->max_bits) in bitfield_set()
44 bf->bits[bit / 8] |= BIT(bit % 8); in bitfield_set()
48 void bitfield_clear(struct bitfield *bf, size_t bit) in bitfield_clear() argument
50 if (bit >= bf->max_bits) in bitfield_clear()
52 bf->bits[bit / 8] &= ~BIT(bit % 8); in bitfield_clear()
56 int bitfield_is_set(struct bitfield *bf, size_t bit) in bitfield_is_set() argument
58 if (bit >= bf->max_bits) in bitfield_is_set()
60 return !!(bf->bits[bit / 8] & BIT(bit % 8)); in bitfield_is_set()
Dbitfield.h16 void bitfield_set(struct bitfield *bf, size_t bit);
17 void bitfield_clear(struct bitfield *bf, size_t bit);
18 int bitfield_is_set(struct bitfield *bf, size_t bit);
/hostap-latest/hostapd/
Dhlr_auc_gw.milenage_db10 # Example using truncated 32-bit RES instead of 64-bit default
13 # These values are from Test Set 19 which has the AMF separation bit set to 1
DREADME203 option (5 for 40-bit WEP or 13 for 104-bit WEP). In addition,
246 for protecting wireless networks. WEP uses RC4 with 40-bit keys,
247 24-bit initialization vector (IV), and CRC32 to protect against packet
252 protection, and non-keyed authentication does not protect against bit
307 # This field is a bit field that can be used to enable WPA (IEEE 802.11i/D3.0)
313 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit
Dhostapd.wpa_psk5 # characters or as a 256-bit hex PSK (64 hex digits).
/hostap-latest/tests/hwsim/auth_serv/
Dec-user.pem6 Issuer: C=FI, L=Helsinki, O=w1.fi, CN=Suite B 128-bit Root CA
13 Public-Key: (256 bit)
Dec-server.pem6 Issuer: C=FI, L=Helsinki, O=w1.fi, CN=Suite B 128-bit Root CA
13 Public-Key: (256 bit)
Dec2-user-p256.pem6 Issuer: C=FI, L=Helsinki, O=w1.fi, CN=Suite B 192-bit Root CA
13 Public-Key: (256 bit)
Dec2-user.pem6 Issuer: C=FI, L=Helsinki, O=w1.fi, CN=Suite B 192-bit Root CA
13 Public-Key: (384 bit)
Dec2-server.pem6 Issuer: C=FI, L=Helsinki, O=w1.fi, CN=Suite B 192-bit Root CA
13 Public-Key: (384 bit)
Dhlr_auc_gw.milenage_db14 # These values are from Test Set 19 which has the AMF separation bit set to 1
Dca.pem14 RSA Public-Key: (2048 bit)
Dserver.pem14 Public-Key: (2048 bit)
Duser.pem14 Public-Key: (2048 bit)
Docsp-responder.pem14 Public-Key: (2048 bit)
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_background.sgml39 40-bit keys, 24-bit initialization vector (IV), and CRC32 to
45 authentication does not protect against bit flipping packet
Dwpa_passphrase.sgml30 and SSID are used to generate a 256-bit PSK.</para>
/hostap-latest/eap_example/
Dca.pem13 Public-Key: (1024 bit)
Dserver.pem13 Public-Key: (1024 bit)
/hostap-latest/tests/hwsim/auth_serv/iCA-server/
Dca-and-root.pem14 RSA Public-Key: (2048 bit)
95 RSA Public-Key: (2048 bit)
Dserver-revoked_and_ica.pem14 RSA Public-Key: (2048 bit)
95 RSA Public-Key: (2048 bit)
Dserver_and_ica.pem14 RSA Public-Key: (2048 bit)
95 RSA Public-Key: (2048 bit)
/hostap-latest/tests/hwsim/auth_serv/iCA-user/
Dca-and-root.pem14 RSA Public-Key: (2048 bit)
95 RSA Public-Key: (2048 bit)
Duser_and_ica.pem14 RSA Public-Key: (2048 bit)
99 RSA Public-Key: (2048 bit)
/hostap-latest/tests/hwsim/auth_serv/test-ca/
Dcacert.pem14 RSA Public-Key: (2048 bit)

123