Searched refs:bit (Results 1 – 25 of 58) sorted by relevance
123
/hostap-latest/src/utils/ |
D | bitfield.c | 40 void bitfield_set(struct bitfield *bf, size_t bit) in bitfield_set() argument 42 if (bit >= bf->max_bits) in bitfield_set() 44 bf->bits[bit / 8] |= BIT(bit % 8); in bitfield_set() 48 void bitfield_clear(struct bitfield *bf, size_t bit) in bitfield_clear() argument 50 if (bit >= bf->max_bits) in bitfield_clear() 52 bf->bits[bit / 8] &= ~BIT(bit % 8); in bitfield_clear() 56 int bitfield_is_set(struct bitfield *bf, size_t bit) in bitfield_is_set() argument 58 if (bit >= bf->max_bits) in bitfield_is_set() 60 return !!(bf->bits[bit / 8] & BIT(bit % 8)); in bitfield_is_set()
|
D | bitfield.h | 16 void bitfield_set(struct bitfield *bf, size_t bit); 17 void bitfield_clear(struct bitfield *bf, size_t bit); 18 int bitfield_is_set(struct bitfield *bf, size_t bit);
|
/hostap-latest/hostapd/ |
D | hlr_auc_gw.milenage_db | 10 # Example using truncated 32-bit RES instead of 64-bit default 13 # These values are from Test Set 19 which has the AMF separation bit set to 1
|
D | README | 203 option (5 for 40-bit WEP or 13 for 104-bit WEP). In addition, 246 for protecting wireless networks. WEP uses RC4 with 40-bit keys, 247 24-bit initialization vector (IV), and CRC32 to protect against packet 252 protection, and non-keyed authentication does not protect against bit 307 # This field is a bit field that can be used to enable WPA (IEEE 802.11i/D3.0) 313 # WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit
|
D | hostapd.wpa_psk | 5 # characters or as a 256-bit hex PSK (64 hex digits).
|
/hostap-latest/tests/hwsim/auth_serv/ |
D | ec-user.pem | 6 Issuer: C=FI, L=Helsinki, O=w1.fi, CN=Suite B 128-bit Root CA 13 Public-Key: (256 bit)
|
D | ec-server.pem | 6 Issuer: C=FI, L=Helsinki, O=w1.fi, CN=Suite B 128-bit Root CA 13 Public-Key: (256 bit)
|
D | ec2-user-p256.pem | 6 Issuer: C=FI, L=Helsinki, O=w1.fi, CN=Suite B 192-bit Root CA 13 Public-Key: (256 bit)
|
D | ec2-user.pem | 6 Issuer: C=FI, L=Helsinki, O=w1.fi, CN=Suite B 192-bit Root CA 13 Public-Key: (384 bit)
|
D | ec2-server.pem | 6 Issuer: C=FI, L=Helsinki, O=w1.fi, CN=Suite B 192-bit Root CA 13 Public-Key: (384 bit)
|
D | hlr_auc_gw.milenage_db | 14 # These values are from Test Set 19 which has the AMF separation bit set to 1
|
D | ca.pem | 14 RSA Public-Key: (2048 bit)
|
D | server.pem | 14 Public-Key: (2048 bit)
|
D | user.pem | 14 Public-Key: (2048 bit)
|
D | ocsp-responder.pem | 14 Public-Key: (2048 bit)
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_background.sgml | 39 40-bit keys, 24-bit initialization vector (IV), and CRC32 to 45 authentication does not protect against bit flipping packet
|
D | wpa_passphrase.sgml | 30 and SSID are used to generate a 256-bit PSK.</para>
|
/hostap-latest/eap_example/ |
D | ca.pem | 13 Public-Key: (1024 bit)
|
D | server.pem | 13 Public-Key: (1024 bit)
|
/hostap-latest/tests/hwsim/auth_serv/iCA-server/ |
D | ca-and-root.pem | 14 RSA Public-Key: (2048 bit) 95 RSA Public-Key: (2048 bit)
|
D | server-revoked_and_ica.pem | 14 RSA Public-Key: (2048 bit) 95 RSA Public-Key: (2048 bit)
|
D | server_and_ica.pem | 14 RSA Public-Key: (2048 bit) 95 RSA Public-Key: (2048 bit)
|
/hostap-latest/tests/hwsim/auth_serv/iCA-user/ |
D | ca-and-root.pem | 14 RSA Public-Key: (2048 bit) 95 RSA Public-Key: (2048 bit)
|
D | user_and_ica.pem | 14 RSA Public-Key: (2048 bit) 99 RSA Public-Key: (2048 bit)
|
/hostap-latest/tests/hwsim/auth_serv/test-ca/ |
D | cacert.pem | 14 RSA Public-Key: (2048 bit)
|
123