/hostap-latest/src/utils/ |
D | edit.c | 178 struct edit_history *h, *match = NULL, *last = NULL; in history_add() local 189 last = h; in history_add() 200 if (count >= HISTORY_MAX && last) { in history_add() 201 dl_list_del(&last->list); in history_add() 202 os_free(last); in history_add() 561 static enum edit_key_code esc_seq_to_key1_no(char last) in esc_seq_to_key1_no() argument 563 switch (last) { in esc_seq_to_key1_no() 578 static enum edit_key_code esc_seq_to_key1_shift(char last) in esc_seq_to_key1_shift() argument 580 switch (last) { in esc_seq_to_key1_shift() 595 static enum edit_key_code esc_seq_to_key1_alt(char last) in esc_seq_to_key1_alt() argument [all …]
|
D | common.c | 1061 const char * cstr_token(const char *str, const char *delim, const char **last) in cstr_token() argument 1065 if (!str || !delim || !last) in cstr_token() 1068 if (*last) in cstr_token() 1069 token = *last; in cstr_token() 1082 *last = end; in cstr_token()
|
/hostap-latest/hs20/client/ |
D | osu_client.c | 2019 struct osu_data *osu = NULL, *last = NULL; in parse_osu_providers() local 2036 last = realloc(osu, (osu_count + 1) * sizeof(*osu)); in parse_osu_providers() 2037 if (last == NULL) in parse_osu_providers() 2039 osu = last; in parse_osu_providers() 2040 last = &osu[osu_count++]; in parse_osu_providers() 2041 memset(last, 0, sizeof(*last)); in parse_osu_providers() 2042 res = os_snprintf(last->bssid, sizeof(last->bssid), in parse_osu_providers() 2044 if (os_snprintf_error(sizeof(last->bssid), res)) in parse_osu_providers() 2048 if (!last) in parse_osu_providers() 2052 res = os_snprintf(last->url, sizeof(last->url), in parse_osu_providers() [all …]
|
/hostap-latest/tests/ |
D | test-x509v3.c | 20 struct x509_certificate *certs = NULL, *last = NULL, *cert; in main() local 50 last->next = cert; in main() 51 last = cert; in main() 55 if (x509_certificate_chain_validate(last, certs, &reason, 0) < 0) { in main()
|
D | cipher-and-key-mgmt-testing.txt | 368 In the sniffer capture, find the last Reassociation Request frame from 371 it). Look at the last used PN in a unicast Data frame from the AP to the 372 test station before the last Reassociation Request frame and the PN in 373 the following unicast Data frame after the last Reassociation Request
|
/hostap-latest/src/crypto/ |
D | aes-gcm.c | 125 size_t last = x + xlen - xpos; in ghash() local 126 os_memcpy(tmp, xpos, last); in ghash() 127 os_memset(tmp + last, 0, sizeof(tmp) - last); in ghash() 145 size_t i, n, last; in aes_gctr() local 165 last = x + xlen - xpos; in aes_gctr() 166 if (last) { in aes_gctr() 169 for (i = 0; i < last; i++) in aes_gctr()
|
D | aes-ccm.c | 66 size_t last = len % AES_BLOCK_SIZE; in aes_ccm_auth() local 75 if (last) { in aes_ccm_auth() 77 for (i = 0; i < last; i++) in aes_ccm_auth() 95 size_t last = len % AES_BLOCK_SIZE; in aes_ccm_encr() local 107 if (last) { in aes_ccm_encr() 111 for (i = 0; i < last; i++) in aes_ccm_encr()
|
/hostap-latest/src/eap_server/ |
D | eap_server_methods.c | 110 struct eap_method *m, *last = NULL; in eap_server_method_register() local 125 last = m; in eap_server_method_register() 128 if (last) in eap_server_method_register() 129 last->next = method; in eap_server_method_register()
|
D | tncs.c | 1020 struct tnc_if_imv *imv, *last; in tncs_read_config() local 1023 last = NULL; in tncs_read_config() 1047 if (last == NULL) in tncs_read_config() 1050 last->next = imv; in tncs_read_config() 1051 last = imv; in tncs_read_config()
|
/hostap-latest/src/eap_peer/ |
D | tncc.c | 885 struct tnc_if_imc *imc, *last; in tncc_read_config_reg() local 888 last = tncc->imc; in tncc_read_config_reg() 889 while (last && last->next) in tncc_read_config_reg() 890 last = last->next; in tncc_read_config_reg() 979 if (last == NULL) in tncc_read_config_reg() 982 last->next = imc; in tncc_read_config_reg() 983 last = imc; in tncc_read_config_reg() 1072 struct tnc_if_imc *imc, *last; in tncc_read_config() local 1074 last = NULL; in tncc_read_config() 1100 if (last == NULL) in tncc_read_config() [all …]
|
D | eap_methods.c | 320 struct eap_method *m, *last = NULL; in eap_peer_method_register() local 335 last = m; in eap_peer_method_register() 338 if (last) in eap_peer_method_register() 339 last->next = method; in eap_peer_method_register()
|
D | eap_ttls.c | 116 const char *token, *last = NULL; in eap_ttls_init() local 118 while ((token = cstr_token(config->phase2, " \t", &last))) { in eap_ttls_init() 123 if (last - token == 8 && in eap_ttls_init() 127 } else if (last - token == 6 && in eap_ttls_init() 131 } else if (last - token == 3 && in eap_ttls_init() 135 } else if (last - token == 4 && in eap_ttls_init()
|
/hostap-latest/wlantest/ |
D | process.c | 183 struct ieee80211_hdr *last = (struct ieee80211_hdr *) wt->last_hdr; in rx_ack() local 186 if (wt->last_len < 24 || (last->addr1[0] & 0x01) || in rx_ack() 187 !ether_addr_equal(hdr->addr1, last->addr2)) { in rx_ack() 194 fc = le_to_host16(last->frame_control); in rx_ack() 196 rx_mgmt_ack(wt, last); in rx_ack()
|
D | tkip.c | 208 int i, blocks, last; in michael_mic() local 225 last = data_len % 4; in michael_mic() 232 switch (last) { in michael_mic()
|
/hostap-latest/wpa_supplicant/wpa_gui-qt4/icons/ |
D | README | 24 last change: April 20, 2008 10:32 pm (File added) 37 last change: May 18, 2008 07:04 pm (File added)
|
/hostap-latest/src/drivers/ |
D | driver_common.c | 224 int last; in wpa_get_wowlan_triggers() local 251 last = *end == '\0'; in wpa_get_wowlan_triggers() 269 if (last) in wpa_get_wowlan_triggers()
|
/hostap-latest/ |
D | CODEOWNERS | 4 # Order is important; the last matching pattern takes the most
|
/hostap-latest/src/common/ |
D | dpp_backup.c | 1103 struct dpp_asymmetric_key *first = NULL, *last = NULL, *key; in dpp_parse_dpp_asymmetric_key_package() local 1120 if (!last) { in dpp_parse_dpp_asymmetric_key_package() 1121 first = last = key; in dpp_parse_dpp_asymmetric_key_package() 1123 last->next = key; in dpp_parse_dpp_asymmetric_key_package() 1124 last = key; in dpp_parse_dpp_asymmetric_key_package()
|
/hostap-latest/wpa_supplicant/ |
D | config.c | 673 int val = 0, last, errors = 0; in wpa_config_parse_proto() local 689 last = *end == '\0'; in wpa_config_parse_proto() 704 if (last) in wpa_config_parse_proto() 774 int val = 0, last, errors = 0; in wpa_config_parse_key_mgmt() local 790 last = *end == '\0'; in wpa_config_parse_key_mgmt() 872 if (last) in wpa_config_parse_key_mgmt() 1334 int val = 0, last, errors = 0; in wpa_config_parse_auth_alg() local 1350 last = *end == '\0'; in wpa_config_parse_auth_alg() 1364 if (last) in wpa_config_parse_auth_alg() 1571 int last, errors = 0; in wpa_config_parse_eap() local [all …]
|
/hostap-latest/tests/hwsim/auth_serv/ |
D | hlr_auc_gw.milenage_db | 3 # 4.3.20 Test Set 20. SQN is the last used SQN value.
|
/hostap-latest/hostapd/ |
D | hlr_auc_gw.milenage_db | 3 # 4.3.20 Test Set 20. SQN is the last used SQN value.
|
/hostap-latest/wpa_supplicant/wpa_gui-qt4/ |
D | wpagui.cpp | 541 bool last = false; in updateStatus() local 544 last = true; in updateStatus() 585 if (last) in updateStatus() 673 bool last = false; in updateNetworks() local 676 last = true; in updateNetworks() 698 if (last) in updateNetworks()
|
/hostap-latest/hs20/server/www/ |
D | spp.php | 144 $last = exec("$osu_root/spp/hs20_spp_server -r$osu_root -f/tmp/hs20_spp_server.log", $output, $ret); variable
|
/hostap-latest/src/tls/ |
D | tlsv1_server_read.c | 402 struct x509_certificate *chain = NULL, *last = NULL, *cert; in tls_process_certificate() local 536 if (last == NULL) in tls_process_certificate() 539 last->next = cert; in tls_process_certificate() 540 last = cert; in tls_process_certificate()
|
/hostap-latest/tests/hwsim/ |
D | test_p2p_channel.py | 136 last = None 140 last = l 141 if last is None: 143 if "Operating Class 81" not in last: 144 raise Exception("Unexpected operating class: " + last.strip())
|