Home
last modified time | relevance | path

Searched refs:l (Results 1 – 25 of 48) sorted by relevance

12

/hostap-latest/wlantest/
Dtkip.c191 #define michael_block(l, r) \ argument
193 r ^= rotl(l, 17); \
194 l += r; \
195 r ^= xswap(l); \
196 l += r; \
197 r ^= rotl(l, 3); \
198 l += r; \
199 r ^= rotr(l, 2); \
200 l += r; \
207 u32 l, r; in michael_mic() local
[all …]
/hostap-latest/src/crypto/
Ddes-internal.c275 u32 i, j, l, m, n, kn[32]; in deskey() local
279 l = (u32) pc1[j]; in deskey()
280 m = l & 7; in deskey()
282 ((key[l >> 3U] & bytebit[m]) == bytebit[m] ? 1 : 0); in deskey()
293 l = j + (u32) totrot[i]; in deskey()
294 if (l < 28) in deskey()
295 pcr[j] = pc1m[l]; in deskey()
297 pcr[j] = pc1m[l - 28]; in deskey()
300 l = j + (u32) totrot[i]; in deskey()
301 if (l < 56) in deskey()
[all …]
Dsha1-internal.c135 #define blk0(i) (block->l[i] = (rol(block->l[i], 24) & 0xFF00FF00) | \
136 (rol(block->l[i], 8) & 0x00FF00FF))
138 #define blk0(i) block->l[i]
140 #define blk(i) (block->l[i & 15] = rol(block->l[(i + 13) & 15] ^ \
141 block->l[(i + 8) & 15] ^ block->l[(i + 2) & 15] ^ block->l[i & 15], 1))
181 u32 l[16]; in SHA1Transform() member
Drandom.h15 #define random_add_randomness(b, l) do { } while (0) argument
16 #define random_get_bytes(b, l) os_get_random((b), (l)) argument
/hostap-latest/tests/hwsim/
Dtest_erp.py387 for l in f.readlines():
388 if "EAP-TTLS: Derived key - hexdump" in l:
389 val = l.strip().split(':')[3].replace(' ', '')
391 if "EAP-TTLS: Derived EMSK - hexdump" in l:
392 val = l.strip().split(':')[3].replace(' ', '')
394 if "EAP: ERP rRK - hexdump" in l:
395 val = l.strip().split(':')[3].replace(' ', '')
397 if "EAP: ERP rIK - hexdump" in l:
398 val = l.strip().split(':')[3].replace(' ', '')
400 if "WPA: PMK - hexdump" in l:
[all …]
Dwpasupplicant.py397 for l in lines:
398 if "network id" in l:
400 [id, ssid, bssid, flags] = l.split('\t')
516 for l in lines:
518 [name, value] = l.split('=', 1)
521 logger.info(self.ifname + ": Ignore unexpected STATUS line: " + l)
538 for l in lines:
540 [name, value] = l.split('=', 1)
542 logger.info(self.ifname + ": Ignore unexpected status line: " + l)
562 for l in lines:
[all …]
Dhostapd.py344 for l in lines:
345 [name, value] = l.split('=', 1)
359 for l in lines:
360 [name, value] = l.split('=', 1)
374 for l in lines:
375 [name, value] = l.split('=', 1)
422 for l in lines:
423 if first and '=' not in l:
424 vals['addr'] = l
427 [name, value] = l.split('=', 1)
[all …]
Drfkill.py78 l = RFKill.list()
79 for r, s, h in l:
Dtest_ap_config.py150 for l in iface_params:
151 f.write(l + "\n")
156 for l in bss_params:
157 f.write(l + "\n")
Drun-tests.py141 l = self._trace_cmd.stdout.read(7)
142 while self._trace_cmd.poll() is None and b'STARTED' not in l:
143 l += self._trace_cmd.stdout.read(1)
183 while l := kmemleak.read():
184 leaks.append(l)
Dtest_ap_vlan.py628 for l in lines:
629 is_protected = int(l, 16)
646 for l in lines:
647 is_protected = int(l, 16)
Dutils.py23 for l in lines:
24 val = l.split(':', 1)
Dtest_sae.py598 for l in f.readlines():
599 if "SAE: k - hexdump" in l:
600 val = l.strip().split(':')[3].replace(' ', '')
602 if "SAE: keyseed - hexdump" in l:
603 val = l.strip().split(':')[3].replace(' ', '')
605 if "SAE: KCK - hexdump" in l:
606 val = l.strip().split(':')[3].replace(' ', '')
608 if "SAE: PMK - hexdump" in l:
609 val = l.strip().split(':')[3].replace(' ', '')
611 if "WPA: PTK - hexdump" in l:
[all …]
Dtest_wpas_ap.py1115 for l in f.readlines():
1116 if "WPA: PTK - hexdump" in l:
1117 val = l.strip().split(':')[3].replace(' ', '')
1119 if "WPA: Group Key - hexdump" in l:
1120 val = l.strip().split(':')[3].replace(' ', '')
/hostap-latest/src/utils/
Dwpa_debug.h30 #define wpa_hexdump(l,t,b,le) do { } while (0) argument
31 #define wpa_hexdump_buf(l,t,b) do { } while (0) argument
32 #define wpa_hexdump_key(l,t,b,le) do { } while (0) argument
33 #define wpa_hexdump_buf_key(l,t,b) do { } while (0) argument
34 #define wpa_hexdump_ascii(l,t,b,le) do { } while (0) argument
35 #define wpa_hexdump_ascii_key(l,t,b,le) do { } while (0) argument
Dwpa_debug_zephyr.h47 #define wpa_hexdump(l, t, b, le) do { } while (0) argument
48 #define wpa_hexdump_buf(l, t, b) do { } while (0) argument
49 #define wpa_hexdump_key(l, t, b, le) do { } while (0) argument
50 #define wpa_hexdump_buf_key(l, t, b) do { } while (0) argument
51 #define wpa_hexdump_ascii(l, t, b, le) do { } while (0) argument
52 #define wpa_hexdump_ascii_key(l, t, b, le) do { } while (0) argument
Dlist.h20 #define DL_LIST_HEAD_INIT(l) { &(l), &(l) } argument
Dpcsc_funcs.h33 #define scard_get_imsi(s, i, l) -1 argument
/hostap-latest/tests/hwsim/vm/
Dparallel-vm.py489 for l in lst.stdout.readlines():
490 name = l.decode().split(' ')[0]
503 for l in long_tests:
504 if l in tests:
505 tests.remove(l)
506 tests.insert(0, l)
/hostap-latest/wpa_supplicant/
Dbss.c1576 struct mld_link *l; in wpa_bss_parse_ml_rnr_ap_info() local
1579 l = &bss->mld_links[link_id]; in wpa_bss_parse_ml_rnr_ap_info()
1580 os_memcpy(l->bssid, pos + 1, ETH_ALEN); in wpa_bss_parse_ml_rnr_ap_info()
1581 l->freq = neigh_bss->freq; in wpa_bss_parse_ml_rnr_ap_info()
1582 l->disabled = mld_params[2] & in wpa_bss_parse_ml_rnr_ap_info()
1639 struct mld_link *l; in wpa_bss_parse_basic_ml_element() local
1726 l = &bss->mld_links[link_id]; in wpa_bss_parse_basic_ml_element()
1727 os_memcpy(l->bssid, bss->bssid, ETH_ALEN); in wpa_bss_parse_basic_ml_element()
1728 l->freq = bss->freq; in wpa_bss_parse_basic_ml_element()
Devents.c3146 int l, len; in wpa_supplicant_use_own_rsne_params() local
3157 l = data->assoc_info.req_ies_len; in wpa_supplicant_use_own_rsne_params()
3159 while (p && l >= 2) { in wpa_supplicant_use_own_rsne_params()
3161 if (len > l) { in wpa_supplicant_use_own_rsne_params()
3163 p, l); in wpa_supplicant_use_own_rsne_params()
3174 l -= len; in wpa_supplicant_use_own_rsne_params()
3185 p, l); in wpa_supplicant_use_own_rsne_params()
3375 int l, len, found = 0, found_x = 0, wpa_found, rsn_found; in wpa_supplicant_event_associnfo() local
3473 l = data->assoc_info.req_ies_len; in wpa_supplicant_event_associnfo()
3476 while (p && l >= 2) { in wpa_supplicant_event_associnfo()
[all …]
/hostap-latest/tests/hwsim/auth_serv/
Dserver-no-dnsname.key24 l/TJ74LjygPCnIUAE2x55xeVmk7MdBSIIMrgVx1LZQKBgDFj79Q2LNKZ9OpCs/X6
Dsha384-server.key6 k0NbdKffehDDxXUtb4O1U6i/H1NFA0/l/oN0IuhwXkdkv8ikdpPke+FqCp8H6CZM
/hostap-latest/src/wps/
Dwps_upnp_ssdp.c92 static int line_length(const char *l) in line_length() argument
94 const char *lp = l; in line_length()
99 return lp - l; in line_length()
/hostap-latest/wpa_supplicant/examples/
Ddpp-nfc.py151 for l in lines:
153 [name, value] = l.split('=', 1)
155 summary("Ignore unexpected status line: %s" % l)
1074 for l in ['nfc.clf.rcs380',
1080 log = logging.getLogger(l)

12