/hostap-latest/tests/ |
D | test-aes.c | 339 int ok = 0; in test_nist_key_wrap_ae() local 442 ok++; in test_nist_key_wrap_ae() 454 printf("%d test vectors OK\n", ok); in test_nist_key_wrap_ae() 467 int ok = 0; in test_nist_key_wrap_ad() local 576 ok++; in test_nist_key_wrap_ad() 589 ok++; in test_nist_key_wrap_ad() 601 printf("%d test vectors OK\n", ok); in test_nist_key_wrap_ad()
|
D | test-sha1.c | 23 int ok = 0; in cavp_shavs() local 94 ok++; in cavp_shavs() 103 printf("%d test vectors OK\n", ok); in cavp_shavs()
|
D | test-sha256.c | 23 int ok = 0; in cavp_shavs() local 94 ok++; in cavp_shavs() 103 printf("%d test vectors OK\n", ok); in cavp_shavs()
|
D | test-rsa-sig-ver.c | 27 int ok = 0; in cavp_rsa_sig_ver() local 172 ok++; in cavp_rsa_sig_ver() 181 printf("%d test vectors OK\n", ok); in cavp_rsa_sig_ver()
|
/hostap-latest/wpa_supplicant/binder/ |
D | supplicant.cpp | 75 status = android::binder::Status::ok(); in CreateInterface() 99 return android::binder::Status::ok(); in RemoveInterface() 124 return android::binder::Status::ok(); in GetInterface()
|
/hostap-latest/src/ap/ |
D | dpp_hostapd.h | 25 const u8 *data, size_t data_len, int ok); 30 void hostapd_dpp_gas_status_handler(struct hostapd_data *hapd, int ok);
|
D | gas_query_ap.c | 209 const u8 *data, size_t data_len, int ok) in gas_query_ap_tx_status() argument 216 " ok=%d - no query in progress", MAC2STR(dst), ok); in gas_query_ap_tx_status() 225 MAC2STR(dst), ok, query, query->dialog_token, dur); in gas_query_ap_tx_status() 233 if (!ok) { in gas_query_ap_tx_status()
|
D | rrm.h | 31 size_t len, int ok);
|
D | gas_query_ap.h | 41 const u8 *data, size_t data_len, int ok);
|
D | ieee802_11.c | 6374 size_t len, int ok) in handle_auth_cb() argument 6401 if (!ok) { in handle_auth_cb() 6465 bool ok) in ieee80211_ml_link_sta_assoc_cb() argument 6469 if (!ok) { in ieee80211_ml_link_sta_assoc_cb() 6507 struct sta_info *sta, bool ok) in hostapd_ml_handle_assoc_cb() argument 6535 ok); in hostapd_ml_handle_assoc_cb() 6545 size_t len, int reassoc, int ok) in handle_assoc_cb() argument 6583 if (!ok) { in handle_assoc_cb() 6713 hostapd_ml_handle_assoc_cb(hapd, sta, ok); in handle_assoc_cb() 6719 size_t len, int ok) in handle_deauth_cb() argument [all …]
|
D | dpp_hostapd.c | 464 const u8 *data, size_t data_len, int ok) in hostapd_dpp_pkex_tx_status() argument 492 const u8 *data, size_t data_len, int ok) in hostapd_dpp_tx_status() argument 497 MAC2STR(dst), ok); in hostapd_dpp_tx_status() 499 " result=%s", MAC2STR(dst), ok ? "SUCCESS" : "FAILED"); in hostapd_dpp_tx_status() 504 ok); in hostapd_dpp_tx_status() 552 if (!is_broadcast_ether_addr(dst) && !ok) { in hostapd_dpp_tx_status() 579 if (!is_broadcast_ether_addr(dst) && auth->waiting_auth_resp && ok) { in hostapd_dpp_tx_status() 3125 void hostapd_dpp_gas_status_handler(struct hostapd_data *hapd, int ok) in hostapd_dpp_gas_status_handler() argument 3136 if (auth->waiting_new_key && ok) { in hostapd_dpp_gas_status_handler() 3143 ok); in hostapd_dpp_gas_status_handler() [all …]
|
D | ap_config.c | 333 int line = 0, ret = 0, len, ok; in hostapd_config_read_wpa_psk() local 426 ok = 0; in hostapd_config_read_wpa_psk() 430 ok = 1; in hostapd_config_read_wpa_psk() 434 ok = 1; in hostapd_config_read_wpa_psk() 435 if (!ok) { in hostapd_config_read_wpa_psk()
|
/hostap-latest/src/crypto/ |
D | tls_wolfssl.c | 200 static void wcFipsCb(int ok, int err, const char *hash) in wcFipsCb() argument 204 ok, err); in wcFipsCb() 533 int ok = 0; in tls_connection_private_key() local 561 ok = 1; in tls_connection_private_key() 564 ok = 1; in tls_connection_private_key() 566 if (ok) in tls_connection_private_key() 570 if (!ok && private_key) { in tls_connection_private_key() 582 ok = 1; in tls_connection_private_key() 585 ok = 1; in tls_connection_private_key() 588 if (ok) in tls_connection_private_key() [all …]
|
D | tls_openssl.c | 3963 int ok; in tls_connection_private_key() local 3968 ok = 0; in tls_connection_private_key() 3975 ok = 1; in tls_connection_private_key() 3984 ok = 1; in tls_connection_private_key() 3994 ok = 1; in tls_connection_private_key() 4005 ok = 1; in tls_connection_private_key() 4022 ok = 1; in tls_connection_private_key() 4037 ok = 1; in tls_connection_private_key() 4044 while (!ok && private_key) { in tls_connection_private_key() 4047 ok = 1; in tls_connection_private_key() [all …]
|
/hostap-latest/tests/hwsim/ |
D | test_wmediumd.py | 270 def _test_wmediumd_path_ttl(dev, ok): argument 289 "mesh_element_ttl=" + ("4" if ok else "3")]) 298 hwsim_utils.test_connectivity(dev[0], dev[4], success_expected=ok) 304 if ok:
|
D | test_ap_open.py | 516 ok = False 521 ok = True 525 if not ok: 625 ok = False 628 ok = True 631 if not ok:
|
D | test_ap_ht.py | 1008 ok = False 1016 ok = True 1018 if not ok: 1030 ok = False 1035 ok = True 1037 if not ok:
|
D | run-tests.py | 47 ok = True 54 ok = False 80 ok = False 81 return ok
|
D | test_eap_proto.py | 6393 ok = False 6397 ok = True 6400 if not ok: 6418 ok = False 6422 ok = True 6425 if not ok: 6451 ok = False 6455 ok = True 6458 if not ok: 6481 ok = False [all …]
|
/hostap-latest/src/eap_common/ |
D | eap_pwd_common.c | 411 int ok = 1; in eap_pwd_element_coord_ok() local 416 ok = 0; in eap_pwd_element_coord_ok() 418 return ok; in eap_pwd_element_coord_ok()
|
/hostap-latest/src/common/ |
D | hw_features_common.c | 115 int ok, first; in allowed_ht40_channel_pair() local 162 ok = 0; in allowed_ht40_channel_pair() 165 ok = 1; in allowed_ht40_channel_pair() 169 if (!ok) { in allowed_ht40_channel_pair()
|
D | gas_server.h | 31 int ok),
|
D | gas_server.c | 31 void (*status_cb)(void *ctx, struct wpabuf *resp, int ok); 600 int ok), in gas_server_register() argument
|
/hostap-latest/src/drivers/ |
D | driver_nl80211_monitor.c | 26 static void handle_tx_callback(void *ctx, u8 *buf, size_t len, int ok) in handle_tx_callback() argument 41 event.tx_status.ack = ok; in handle_tx_callback()
|
/hostap-latest/wpa_supplicant/ |
D | ap.h | 67 void ap_mgmt_tx_cb(void *ctx, const u8 *buf, size_t len, u16 stype, int ok);
|