/hostap-latest/wpa_supplicant/ |
D | ctrl_iface_named_pipe.c | 89 static VOID WINAPI ctrl_iface_read_completed(DWORD err, DWORD bytes, 96 static VOID WINAPI global_iface_read_completed(DWORD err, DWORD bytes, 254 static VOID WINAPI ctrl_iface_write_completed(DWORD err, DWORD bytes, in ctrl_iface_write_completed() argument 259 "err=%d bytes=%d", dst, (int) err, (int) bytes); in ctrl_iface_write_completed() 345 static VOID WINAPI ctrl_iface_read_completed(DWORD err, DWORD bytes, in ctrl_iface_read_completed() argument 350 "bytes=%d", dst, (int) err, (int) bytes); in ctrl_iface_read_completed() 351 if (err == 0 && bytes > 0) in ctrl_iface_read_completed() 352 wpa_supplicant_ctrl_iface_rx(dst, bytes); in ctrl_iface_read_completed() 360 DWORD bytes; in wpa_supplicant_ctrl_iface_receive() local 365 if (!GetOverlappedResult(dst->pipe, &dst->overlap, &bytes, FALSE)) { in wpa_supplicant_ctrl_iface_receive() [all …]
|
D | eap_testing.txt | 240 1328 bytes of EAP-Message and this may go beyond the fragmentation
|
D | ChangeLog | 1330 byte result buffer (previously, limited to 32768 bytes) 1420 not bytes
|
/hostap-latest/tests/hwsim/ |
D | test_dscp.py | 82 s = bytes(domain_name, 'utf-8') 204 …frame_classifier = bytes(frame_classifier_start) + ipv4_src_addr + ipv4_dest_addr + bytes(frame_cl… 213 …frame_classifier = bytes(frame_classifier_start) + ipv6_src_addr + ipv6_dest_addr + bytes(frame_cl… 266 …frame_classifier = bytes(frame_classifier_start) + ipv4_src_addr + ipv4_dest_addr + bytes(frame_cl… 281 …frame_classifier = bytes(frame_classifier_start) + ipv4_src_addr + ipv4_dest_addr + bytes(frame_cl… 335 …frame_classifier = bytes(frame_classifier_start) + ipv4_src_addr + ipv4_dest_addr + bytes(frame_cl…
|
D | netlink.py | 116 self.payload = bytes()
|
D | test_p2p_discovery.py | 789 cli = bytes()
|
D | test_radius.py | 1196 cc_all = bytes() 1205 data = b'\x00' + a + bytes(cc_all)
|
D | test_ap_wps.py | 6485 _payload = payload if type(payload) == bytes else payload.encode()
|
/hostap-latest/src/ap/ |
D | accounting.c | 272 u64 bytes; in accounting_sta_report() local 307 bytes = data.rx_bytes; in accounting_sta_report() 309 bytes = ((u64) sta->last_rx_bytes_hi << 32) | in accounting_sta_report() 313 (u32) bytes)) { in accounting_sta_report() 319 (u32) (bytes >> 32))) { in accounting_sta_report() 324 bytes = data.tx_bytes; in accounting_sta_report() 326 bytes = ((u64) sta->last_tx_bytes_hi << 32) | in accounting_sta_report() 330 (u32) bytes)) { in accounting_sta_report() 336 (u32) (bytes >> 32))) { in accounting_sta_report()
|
/hostap-latest/src/drivers/ |
D | driver_wext.c | 250 int bytes; in wpa_driver_wext_event_wireless_custom() local 255 bytes = strspn(spos, "0123456789abcdefABCDEF"); in wpa_driver_wext_event_wireless_custom() 256 if (!bytes || (bytes & 1)) in wpa_driver_wext_event_wireless_custom() 258 bytes /= 2; in wpa_driver_wext_event_wireless_custom() 260 req_ies = os_malloc(bytes); in wpa_driver_wext_event_wireless_custom() 262 hexstr2bin(spos, req_ies, bytes) < 0) in wpa_driver_wext_event_wireless_custom() 265 data.assoc_info.req_ies_len = bytes; in wpa_driver_wext_event_wireless_custom() 267 spos += bytes * 2; in wpa_driver_wext_event_wireless_custom() 275 bytes = strspn(spos, "0123456789abcdefABCDEF"); in wpa_driver_wext_event_wireless_custom() 276 if (!bytes || (bytes & 1)) in wpa_driver_wext_event_wireless_custom() [all …]
|
/hostap-latest/src/crypto/ |
D | random.c | 162 u8 *bytes = buf; in random_get_bytes() local 183 *bytes++ ^= tmp[i]; in random_get_bytes() 189 bytes = buf; in random_get_bytes() 203 *bytes++ ^= tmp[i]; in random_get_bytes()
|
D | tls_openssl_ocsp.c | 487 ResponseBytes *bytes; in check_ocsp_resp() local 534 bytes = resp->responseBytes; in check_ocsp_resp() 536 if (!bytes || in check_ocsp_resp() 537 OBJ_obj2nid(bytes->responseType) != NID_id_pkix_OCSP_basic) { in check_ocsp_resp() 543 basic_data = ASN1_STRING_data(bytes->response); in check_ocsp_resp() 544 basic_len = ASN1_STRING_length(bytes->response); in check_ocsp_resp()
|
/hostap-latest/src/tls/ |
D | asn1.c | 559 u8 bytes[8]; in asn1_put_oid() local 563 bytes[idx] = (idx ? 0x80 : 0x00) | (val & 0x7f); in asn1_put_oid() 568 bytes[idx] = 0; in asn1_put_oid() 573 wpabuf_put_u8(buf, bytes[idx]); in asn1_put_oid()
|
/hostap-latest/tests/ |
D | cipher-and-key-mgmt-testing.txt | 93 PING 192.168.1.2 (192.168.1.2) 56(84) bytes of data. 94 64 bytes from 192.168.1.2: icmp_seq=1 ttl=64 time=43.7 ms 95 64 bytes from 192.168.1.2: icmp_seq=2 ttl=64 time=67.9 ms 96 64 bytes from 192.168.1.2: icmp_seq=3 ttl=64 time=900 ms 97 64 bytes from 192.168.1.2: icmp_seq=4 ttl=64 time=5.81 ms 98 64 bytes from 192.168.1.2: icmp_seq=5 ttl=64 time=135 ms 107 PING 192.168.1.2 (192.168.1.2) 56(84) bytes of data.
|
/hostap-latest/src/common/ |
D | common_module_tests.c | 552 size_t bytes = (bits + 7) / 8; in sae_pk_tests() local 570 if (res_len != bytes || os_memcmp(val, res, res_len) != 0) { in sae_pk_tests() 577 val, bytes); in sae_pk_tests()
|
/hostap-latest/doc/ |
D | testing_tools.doxygen | 162 MEMLEAK: total 128 bytes
|
D | dbus.doxygen | 671 <tr><td>rx-bytes</td><td>i</td><td>Bytes recieved</td><td>No</td> 672 <tr><td>tx-bytes</td><td>i</td><td>Bytes sent</td><td>No</td> 1143 …ization. Possible keys are "scan", "sched_scan", and "pno". Values must be an array of 6 bytes.</p>
|
/hostap-latest/wpa_supplicant/examples/ |
D | dpp-nfc.py | 319 return bytes(msg)
|
/hostap-latest/hostapd/ |
D | ChangeLog | 774 * driver_nl80211: fixed STA accounting data collection (TX/RX bytes
|