/hostap-latest/wlantest/ |
D | tkip.c | 191 #define michael_block(l, r) \ argument 193 r ^= rotl(l, 17); \ 194 l += r; \ 195 r ^= xswap(l); \ 196 l += r; \ 197 r ^= rotl(l, 3); \ 198 l += r; \ 199 r ^= rotr(l, 2); \ 200 l += r; \ 207 u32 l, r; in michael_mic() local [all …]
|
/hostap-latest/src/crypto/ |
D | des-internal.c | 275 u32 i, j, l, m, n, kn[32]; in deskey() local 279 l = (u32) pc1[j]; in deskey() 280 m = l & 7; in deskey() 282 ((key[l >> 3U] & bytebit[m]) == bytebit[m] ? 1 : 0); in deskey() 293 l = j + (u32) totrot[i]; in deskey() 294 if (l < 28) in deskey() 295 pcr[j] = pc1m[l]; in deskey() 297 pcr[j] = pc1m[l - 28]; in deskey() 300 l = j + (u32) totrot[i]; in deskey() 301 if (l < 56) in deskey() [all …]
|
D | sha1-internal.c | 135 #define blk0(i) (block->l[i] = (rol(block->l[i], 24) & 0xFF00FF00) | \ 136 (rol(block->l[i], 8) & 0x00FF00FF)) 138 #define blk0(i) block->l[i] 140 #define blk(i) (block->l[i & 15] = rol(block->l[(i + 13) & 15] ^ \ 141 block->l[(i + 8) & 15] ^ block->l[(i + 2) & 15] ^ block->l[i & 15], 1)) 181 u32 l[16]; in SHA1Transform() member
|
D | random.h | 15 #define random_add_randomness(b, l) do { } while (0) argument 16 #define random_get_bytes(b, l) os_get_random((b), (l)) argument
|
/hostap-latest/tests/hwsim/ |
D | test_erp.py | 387 for l in f.readlines(): 388 if "EAP-TTLS: Derived key - hexdump" in l: 389 val = l.strip().split(':')[3].replace(' ', '') 391 if "EAP-TTLS: Derived EMSK - hexdump" in l: 392 val = l.strip().split(':')[3].replace(' ', '') 394 if "EAP: ERP rRK - hexdump" in l: 395 val = l.strip().split(':')[3].replace(' ', '') 397 if "EAP: ERP rIK - hexdump" in l: 398 val = l.strip().split(':')[3].replace(' ', '') 400 if "WPA: PMK - hexdump" in l: [all …]
|
D | wpasupplicant.py | 397 for l in lines: 398 if "network id" in l: 400 [id, ssid, bssid, flags] = l.split('\t') 516 for l in lines: 518 [name, value] = l.split('=', 1) 521 logger.info(self.ifname + ": Ignore unexpected STATUS line: " + l) 538 for l in lines: 540 [name, value] = l.split('=', 1) 542 logger.info(self.ifname + ": Ignore unexpected status line: " + l) 562 for l in lines: [all …]
|
D | hostapd.py | 344 for l in lines: 345 [name, value] = l.split('=', 1) 359 for l in lines: 360 [name, value] = l.split('=', 1) 374 for l in lines: 375 [name, value] = l.split('=', 1) 422 for l in lines: 423 if first and '=' not in l: 424 vals['addr'] = l 427 [name, value] = l.split('=', 1) [all …]
|
D | rfkill.py | 78 l = RFKill.list() 79 for r, s, h in l:
|
D | test_ap_config.py | 150 for l in iface_params: 151 f.write(l + "\n") 156 for l in bss_params: 157 f.write(l + "\n")
|
D | run-tests.py | 141 l = self._trace_cmd.stdout.read(7) 142 while self._trace_cmd.poll() is None and b'STARTED' not in l: 143 l += self._trace_cmd.stdout.read(1) 183 while l := kmemleak.read(): 184 leaks.append(l)
|
D | test_ap_vlan.py | 628 for l in lines: 629 is_protected = int(l, 16) 646 for l in lines: 647 is_protected = int(l, 16)
|
D | utils.py | 23 for l in lines: 24 val = l.split(':', 1)
|
D | test_sae.py | 598 for l in f.readlines(): 599 if "SAE: k - hexdump" in l: 600 val = l.strip().split(':')[3].replace(' ', '') 602 if "SAE: keyseed - hexdump" in l: 603 val = l.strip().split(':')[3].replace(' ', '') 605 if "SAE: KCK - hexdump" in l: 606 val = l.strip().split(':')[3].replace(' ', '') 608 if "SAE: PMK - hexdump" in l: 609 val = l.strip().split(':')[3].replace(' ', '') 611 if "WPA: PTK - hexdump" in l: [all …]
|
D | test_wpas_ap.py | 1115 for l in f.readlines(): 1116 if "WPA: PTK - hexdump" in l: 1117 val = l.strip().split(':')[3].replace(' ', '') 1119 if "WPA: Group Key - hexdump" in l: 1120 val = l.strip().split(':')[3].replace(' ', '')
|
/hostap-latest/src/utils/ |
D | wpa_debug.h | 30 #define wpa_hexdump(l,t,b,le) do { } while (0) argument 31 #define wpa_hexdump_buf(l,t,b) do { } while (0) argument 32 #define wpa_hexdump_key(l,t,b,le) do { } while (0) argument 33 #define wpa_hexdump_buf_key(l,t,b) do { } while (0) argument 34 #define wpa_hexdump_ascii(l,t,b,le) do { } while (0) argument 35 #define wpa_hexdump_ascii_key(l,t,b,le) do { } while (0) argument
|
D | wpa_debug_zephyr.h | 47 #define wpa_hexdump(l, t, b, le) do { } while (0) argument 48 #define wpa_hexdump_buf(l, t, b) do { } while (0) argument 49 #define wpa_hexdump_key(l, t, b, le) do { } while (0) argument 50 #define wpa_hexdump_buf_key(l, t, b) do { } while (0) argument 51 #define wpa_hexdump_ascii(l, t, b, le) do { } while (0) argument 52 #define wpa_hexdump_ascii_key(l, t, b, le) do { } while (0) argument
|
D | list.h | 20 #define DL_LIST_HEAD_INIT(l) { &(l), &(l) } argument
|
D | pcsc_funcs.h | 33 #define scard_get_imsi(s, i, l) -1 argument
|
/hostap-latest/tests/hwsim/vm/ |
D | parallel-vm.py | 489 for l in lst.stdout.readlines(): 490 name = l.decode().split(' ')[0] 503 for l in long_tests: 504 if l in tests: 505 tests.remove(l) 506 tests.insert(0, l)
|
/hostap-latest/wpa_supplicant/ |
D | bss.c | 1576 struct mld_link *l; in wpa_bss_parse_ml_rnr_ap_info() local 1579 l = &bss->mld_links[link_id]; in wpa_bss_parse_ml_rnr_ap_info() 1580 os_memcpy(l->bssid, pos + 1, ETH_ALEN); in wpa_bss_parse_ml_rnr_ap_info() 1581 l->freq = neigh_bss->freq; in wpa_bss_parse_ml_rnr_ap_info() 1582 l->disabled = mld_params[2] & in wpa_bss_parse_ml_rnr_ap_info() 1639 struct mld_link *l; in wpa_bss_parse_basic_ml_element() local 1726 l = &bss->mld_links[link_id]; in wpa_bss_parse_basic_ml_element() 1727 os_memcpy(l->bssid, bss->bssid, ETH_ALEN); in wpa_bss_parse_basic_ml_element() 1728 l->freq = bss->freq; in wpa_bss_parse_basic_ml_element()
|
D | events.c | 3146 int l, len; in wpa_supplicant_use_own_rsne_params() local 3157 l = data->assoc_info.req_ies_len; in wpa_supplicant_use_own_rsne_params() 3159 while (p && l >= 2) { in wpa_supplicant_use_own_rsne_params() 3161 if (len > l) { in wpa_supplicant_use_own_rsne_params() 3163 p, l); in wpa_supplicant_use_own_rsne_params() 3174 l -= len; in wpa_supplicant_use_own_rsne_params() 3185 p, l); in wpa_supplicant_use_own_rsne_params() 3375 int l, len, found = 0, found_x = 0, wpa_found, rsn_found; in wpa_supplicant_event_associnfo() local 3473 l = data->assoc_info.req_ies_len; in wpa_supplicant_event_associnfo() 3476 while (p && l >= 2) { in wpa_supplicant_event_associnfo() [all …]
|
/hostap-latest/tests/hwsim/auth_serv/ |
D | server-no-dnsname.key | 24 l/TJ74LjygPCnIUAE2x55xeVmk7MdBSIIMrgVx1LZQKBgDFj79Q2LNKZ9OpCs/X6
|
D | sha384-server.key | 6 k0NbdKffehDDxXUtb4O1U6i/H1NFA0/l/oN0IuhwXkdkv8ikdpPke+FqCp8H6CZM
|
/hostap-latest/src/wps/ |
D | wps_upnp_ssdp.c | 92 static int line_length(const char *l) in line_length() argument 94 const char *lp = l; in line_length() 99 return lp - l; in line_length()
|
/hostap-latest/wpa_supplicant/examples/ |
D | dpp-nfc.py | 151 for l in lines: 153 [name, value] = l.split('=', 1) 155 summary("Ignore unexpected status line: %s" % l) 1074 for l in ['nfc.clf.rcs380', 1080 log = logging.getLogger(l)
|