/hostap-latest/tests/hwsim/ |
D | test_cert_check.py | 149 for match in tests: 150 check_connect(dev[0], domain_suffix_match=match) 156 for match in tests: 159 domain_suffix_match=match) 166 for match in tests: 167 check_connect(dev[0], domain_match=match) 175 for match in tests: 178 domain_match=match) 206 for match in tests: 207 check_connect(dev[0], domain_suffix_match=match) [all …]
|
D | test_scs.py | 16 match = "1300" 17 if "OK" not in hapd.request("REGISTER_FRAME %04x %s" % (type, match)):
|
D | check_kernel.py | 29 if issue.match(line):
|
/hostap-latest/src/wps/ |
D | wps_upnp_web.c | 864 const char *match; in web_get_action() local 878 match = urn_wfawlanconfig; in web_get_action() 880 if (os_strncasecmp(b, match, match_len)) in web_get_action() 991 char *match; in web_connection_parse_subscribe() local 1033 match = "NT:"; in web_connection_parse_subscribe() 1034 match_len = os_strlen(match); in web_connection_parse_subscribe() 1035 if (os_strncasecmp(h, match, match_len) == 0) { in web_connection_parse_subscribe() 1039 match = "upnp:event"; in web_connection_parse_subscribe() 1040 match_len = os_strlen(match); in web_connection_parse_subscribe() 1041 if (os_strncasecmp(h, match, match_len) != 0) { in web_connection_parse_subscribe() [all …]
|
D | upnp_xml.c | 192 const char *match = item; in xml_get_first_item() local 206 if (!os_strncasecmp(tagname, match, match_len) && in xml_get_first_item()
|
/hostap-latest/src/utils/ |
D | edit.c | 178 struct edit_history *h, *match = NULL, *last = NULL; in history_add() local 186 match = h; in history_add() 193 if (match) { in history_add() 891 char *match = search_find(); in search_redraw() local 893 search_buf, match ? match : ""); in search_redraw() 917 char *match = search_find(); in search_stop() local 920 if (match) { in search_stop() 921 os_strlcpy(cmdbuf, match, CMD_BUF_LEN); in search_stop()
|
D | xml-utils.c | 110 xml_node_t *match; in get_child_node() local 114 match = get_node(ctx, node, path); in get_child_node() 115 if (match) in get_child_node() 116 return match; in get_child_node()
|
D | os_unix.c | 557 int match; in testing_test_fail() local 597 match = 0; in testing_test_fail() 632 match = 1; in testing_test_fail() 638 if (!match) in testing_test_fail()
|
/hostap-latest/wlantest/ |
D | sta.c | 332 bool match = false; in sta_new_ptk() local 338 match = true; in sta_new_ptk() 339 for (link_id = 0; !match && link_id < MAX_NUM_MLD_LINKS; in sta_new_ptk() 343 match = true; in sta_new_ptk() 346 if (!match) in sta_new_ptk()
|
/hostap-latest/src/crypto/ |
D | tls_wolfssl.c | 628 static int tls_match_alt_subject(WOLFSSL_X509 *cert, const char *match) in tls_match_alt_subject() argument 634 pos = match; in tls_match_alt_subject() 672 static int domain_suffix_match(const char *val, size_t len, const char *match, in domain_suffix_match() argument 689 if (os_strncasecmp(val + len - match_len, match, match_len) != 0) in domain_suffix_match() 703 static int tls_match_suffix_helper(WOLFSSL_X509 *cert, const char *match, in tls_match_suffix_helper() argument 714 full ? "" : "suffix ", match); in tls_match_suffix_helper() 728 wolfSSL_ASN1_STRING_length(gen->d.ia5), match, in tls_match_suffix_helper() 761 match, match_len, full) == 1) { in tls_match_suffix_helper() 774 static int tls_match_suffix(WOLFSSL_X509 *cert, const char *match, int full) in tls_match_suffix() argument 779 while ((token = cstr_token(match, ";", &last))) { in tls_match_suffix() [all …]
|
D | tls_mbedtls_alt.c | 2673 static int tls_mbedtls_match_altsubject(mbedtls_x509_crt *crt, const char *match) in tls_mbedtls_match_altsubject() argument 2678 …if (os_strncmp(match, "EMAIL:", 6) != 0 && os_strncmp(match, "DNS:", 4) != 0 && os_strncmp(match, … in tls_mbedtls_match_altsubject() 2680 wpa_printf(MSG_INFO, "MTLS: Invalid altSubjectName match '%s'", match); in tls_mbedtls_match_altsubject() 2683 for (const char *s = match, *tok; *s; s = tok ? tok + 1 : "") in tls_mbedtls_match_altsubject() 2693 wpa_printf(MSG_INFO, "MTLS: excessive altSubjectName match '%s'", match); in tls_mbedtls_match_altsubject() 2752 static int tls_mbedtls_match_suffixes(mbedtls_x509_crt *crt, const char *match, int full) in tls_mbedtls_match_suffixes() argument 2757 for (const char *s = match, *tok; *s; s = tok ? tok + 1 : "") in tls_mbedtls_match_suffixes() 2764 wpa_printf(MSG_INFO, "MTLS: excessive suffix match '%s'", match); in tls_mbedtls_match_suffixes() 2799 static int tls_mbedtls_match_dn_field(mbedtls_x509_crt *crt, const char *match) in tls_mbedtls_match_dn_field() argument 2812 for (const char *s = match, *tok, *e; *s; s = tok ? tok + 1 : "") in tls_mbedtls_match_dn_field() [all …]
|
D | tls_gnutls.c | 1089 static int tls_match_suffix_helper(gnutls_x509_crt_t cert, const char *match, in tls_match_suffix_helper() argument 1097 cert, match, in tls_match_suffix_helper() 1101 res = gnutls_x509_crt_check_hostname(cert, match); in tls_match_suffix_helper() 1104 full ? "": "suffix ", match, res); in tls_match_suffix_helper() 1109 static int tls_match_suffix(gnutls_x509_crt_t cert, const char *match, in tls_match_suffix() argument 1115 if (!os_strchr(match, ';')) in tls_match_suffix() 1116 return tls_match_suffix_helper(cert, match, full); in tls_match_suffix() 1118 values = os_strdup(match); in tls_match_suffix()
|
D | tls_openssl.c | 1868 static int tls_match_altsubject(X509 *cert, const char *match) in tls_match_altsubject() argument 1874 pos = match; in tls_match_altsubject() 1912 static int domain_suffix_match(const u8 *val, size_t len, const char *match, in domain_suffix_match() argument 1928 if (os_strncasecmp((const char *) val + len - match_len, match, in domain_suffix_match() 2125 static int tls_match_dn_field(X509 *cert, const char *match) in tls_match_dn_field() argument 2136 while ((token = cstr_token(match, "/", &last))) { in tls_match_dn_field() 2140 match); in tls_match_dn_field() 2158 static int tls_match_suffix_helper(X509 *cert, const char *match, in tls_match_suffix_helper() argument 2169 full ? "": "suffix ", match); in tls_match_suffix_helper() 2183 match, match_len, full) == 1) { in tls_match_suffix_helper() [all …]
|
/hostap-latest/src/ap/ |
D | pmksa_cache_auth.c | 575 int match = 0; in das_attr_match() local 580 match++; in das_attr_match() 592 match++; in das_attr_match() 601 match++; in das_attr_match() 610 match++; in das_attr_match() 613 return match; in das_attr_match()
|
/hostap-latest/tests/hwsim/auth_serv/ |
D | ec-ca-openssl.cnf | 42 countryName = match 44 organizationName = match
|
D | openssl2.cnf | 38 countryName = match 40 organizationName = match
|
/hostap-latest/wpa_supplicant/wpa_gui-qt4/ |
D | peers.cpp | 428 QModelIndexList lst = model.match(model.index(0, 0), in add_station() 566 QModelIndexList lst = model.match(model.index(0, 0), peer_role_bss_id, in remove_bss() 786 QModelIndexList lst = model.match(model.index(0, 0), peer_role_address, in find_addr() 799 QModelIndexList lst = model.match(model.index(0, 0), peer_role_address, in find_addr_type() 815 QModelIndexList lst = model.match(model.index(0, 0), peer_role_uuid, in find_uuid() 885 QModelIndexList lst = model.match(model.index(0, 0), in event_notify() 1000 QModelIndexList lst = model.match(model.index(0, 0), in event_notify() 1156 QModelIndexList lst = model.match(model.index(0, 0), in event_notify() 1574 QModelIndexList lst = model.match(model.index(0, 0), in remove_enrollee_uuid() 1776 lst = model.match(model.index(0, 0), in ctx_hide_ap() [all …]
|
/hostap-latest/wpa_supplicant/ |
D | README-HS20 | 46 and none of the enabled network blocks match with the scan results. This 89 # specified Access Network Type (0..15; with 15 indicating wildcard match). 183 # If set, this FQDN is used as a suffix match requirement for the AAA 187 # using same suffix match comparison. Suffix match here means that the 193 # For example, domain_suffix_match=example.com would match 194 # test.example.com but would not match test-example.com. 206 # parameter. When using Home OIs to match the network, the EAP parameters 226 # Consortium to match the network, the EAP parameters need to be 240 # one. A match between the Roaming Consortium OIs advertised by an AP and 264 # <FQDN>,<0/1 exact match>,<priority>,<* or country code> [all …]
|
/hostap-latest/hs20/server/ca/ |
D | openssl-root.cnf | 48 countryName = match 50 organizationName = match
|
D | openssl.cnf | 59 countryName = match 61 organizationName = match
|
/hostap-latest/src/common/ |
D | hw_features_common.c | 209 int match; in check_40mhz_5g() local 238 match = 0; in check_40mhz_5g() 244 match = 1; in check_40mhz_5g() 248 if (!match) { in check_40mhz_5g()
|
/hostap-latest/src/drivers/ |
D | driver_zephyr.h | 298 u16 type, const u8 *match, size_t match_len, 347 size_t match_len, const u8 *match);
|
/hostap-latest/tests/remote/ |
D | run-tests.py | 169 m = re.match(r'(test_.*)\.py$', t) 181 m = re.match(r'(test_.*)\.py$', t) 223 m = re.match(r'(test_.*)\.py$', t)
|
/hostap-latest/wpa_supplicant/utils/ |
D | log2pcap.py | 42 m = frame_re.match(line)
|
/hostap-latest/hs20/server/ |
D | hs20-osu-server.txt | 89 # add example configuration (note: need to update URLs to match the system) 145 # Note: Change the URL to match the setup 162 # Note: Modify to match the setup
|