/hostap-latest/src/p2p/ |
D | p2p_sd.c | 53 struct p2p_sd_query *q; in p2p_pending_sd_req() local 64 for (q = p2p->sd_queries; q; q = q->next) { in p2p_pending_sd_req() 66 if (q->wsd && !wsd) in p2p_pending_sd_req() 69 if (q->for_all_peers) { in p2p_pending_sd_req() 81 if (!q->for_all_peers && in p2p_pending_sd_req() 82 ether_addr_equal(q->peer, dev->info.p2p_device_addr)) in p2p_pending_sd_req() 95 return q; in p2p_pending_sd_req() 119 struct p2p_sd_query *q, *prev; in p2p_unlink_sd_query() local 122 q = p2p->sd_queries; in p2p_unlink_sd_query() 124 while (q) { in p2p_unlink_sd_query() [all …]
|
/hostap-latest/src/tls/ |
D | libtommath.c | 1544 mp_digit q; in mp_count_bits() local 1555 q = a->dp[a->used - 1]; in mp_count_bits() 1556 while (q > ((mp_digit) 0)) { in mp_count_bits() 1558 q >>= ((mp_digit) 1); in mp_count_bits() 1603 mp_int ta, tb, tq, q; in mp_div() local 1625 if ((res = mp_init_multi(&ta, &tb, &tq, &q, NULL)) != MP_OKAY) { in mp_div() 1642 ((res = mp_add(&q, &tq, &q)) != MP_OKAY)) { in mp_div() 1656 mp_exch(c, &q); in mp_div() 1664 mp_clear_multi(&ta, &tb, &tq, &q, NULL); in mp_div() 1685 mp_int q, x, y, t1, t2; in mp_div() local [all …]
|
D | rsa.c | 24 struct bignum *q; /* prime q (factor of n) */ member 161 key->q = bignum_init(); in crypto_rsa_import_private_key() 167 key->p == NULL || key->q == NULL || key->dmp1 == NULL || in crypto_rsa_import_private_key() 212 pos = crypto_rsa_parse_integer(pos, end, key->q); in crypto_rsa_import_private_key() 301 if (bignum_exptmod(tmp, key->dmq1, key->q, b) < 0) in crypto_rsa_exptmod() 310 if (bignum_mul(tmp, key->q, tmp) < 0 || in crypto_rsa_exptmod() 360 bignum_deinit(key->q); in crypto_rsa_free()
|
/hostap-latest/src/crypto/ |
D | crypto_internal-modexp.c | 62 struct bignum *p, *q, *tmp; in crypto_dh_derive_secret() local 67 q = bignum_init(); in crypto_dh_derive_secret() 69 failed = !p || !q || !tmp || in crypto_dh_derive_secret() 71 bignum_set_unsigned_bin(q, order, order_len) < 0 || in crypto_dh_derive_secret() 72 bignum_exptmod(pub, q, p, tmp) < 0 || in crypto_dh_derive_secret() 75 bignum_deinit(q); in crypto_dh_derive_secret()
|
D | crypto_nettle.c | 353 mpz_t p, q, tmp; in crypto_dh_derive_secret() local 357 mpz_inits(p, q, tmp, NULL); in crypto_dh_derive_secret() 359 mpz_import(q, order_len, 1, 1, 1, 0, order); in crypto_dh_derive_secret() 360 mpz_powm(tmp, pub, q, p); in crypto_dh_derive_secret() 362 mpz_clears(p, q, tmp, NULL); in crypto_dh_derive_secret()
|
D | crypto_gnutls.c | 332 gcry_mpi_t p = NULL, q = NULL, tmp; in crypto_dh_derive_secret() local 340 gcry_mpi_scan(&q, GCRYMPI_FMT_USG, order, order_len, in crypto_dh_derive_secret() 343 gcry_mpi_powm(tmp, pub, q, p); in crypto_dh_derive_secret() 347 gcry_mpi_release(q); in crypto_dh_derive_secret()
|
D | crypto_openssl.c | 783 BIGNUM *q, *tmp; in crypto_dh_derive_secret() local 787 q = BN_bin2bn(order, order_len, NULL); in crypto_dh_derive_secret() 790 failed = !q || !ctx || !tmp || in crypto_dh_derive_secret() 791 !BN_mod_exp(tmp, pub, q, p, ctx) || in crypto_dh_derive_secret() 793 BN_clear_free(q); in crypto_dh_derive_secret() 990 dh->q = get_group5_order(); in dh5_init() 991 if (!dh->q) in dh5_init() 1073 BIGNUM *p, *g, *q; in dh5_init() 1086 q = get_group5_order(); in dh5_init() 1087 if (!g || BN_set_word(g, 2) != 1 || !p || !q || in dh5_init() [all …]
|
/hostap-latest/hs20/server/www/ |
D | est.php | 42 $q = $db->query($sql); variable 43 if (!$q) { 47 $row = $q->fetch(); 79 $q = $db->query($sql); variable 80 if (!$q) { 84 $row = $q->fetch();
|
/hostap-latest/src/fst/ |
D | fst_ctrl_iface.c | 213 char *p, *q; in session_set() local 225 if (*p != ' ' || !(q = os_strchr(p + 1, '='))) in session_set() 229 if (os_strncasecmp(p, FST_CSS_PNAME_OLD_IFNAME, q - p) == 0) { in session_set() 230 ret = fst_session_set_str_ifname(s, q + 1, true); in session_set() 231 } else if (os_strncasecmp(p, FST_CSS_PNAME_NEW_IFNAME, q - p) == 0) { in session_set() 232 ret = fst_session_set_str_ifname(s, q + 1, false); in session_set() 233 } else if (os_strncasecmp(p, FST_CSS_PNAME_OLD_PEER_ADDR, q - p) == 0) { in session_set() 234 ret = fst_session_set_str_peer_addr(s, q + 1, true); in session_set() 235 } else if (os_strncasecmp(p, FST_CSS_PNAME_NEW_PEER_ADDR, q - p) == 0) { in session_set() 236 ret = fst_session_set_str_peer_addr(s, q + 1, false); in session_set() [all …]
|
/hostap-latest/src/ap/ |
D | gas_query_ap.c | 186 struct gas_query_pending *q; in gas_query_get_pending() local 187 dl_list_for_each(q, &gas->pending, struct gas_query_pending, list) { in gas_query_get_pending() 188 if (ether_addr_equal(q->addr, addr) && in gas_query_get_pending() 189 q->dialog_token == dialog_token) in gas_query_get_pending() 190 return q; in gas_query_get_pending() 619 struct gas_query_pending *q; in gas_query_dialog_token_available() local 620 dl_list_for_each(q, &gas->pending, struct gas_query_pending, list) { in gas_query_dialog_token_available() 621 if (ether_addr_equal(dst, q->addr) && in gas_query_dialog_token_available() 622 dialog_token == q->dialog_token) in gas_query_dialog_token_available()
|
D | ieee802_11.c | 1677 struct hostapd_sae_commit_queue *q; in auth_sae_process_commit() local 1680 q = dl_list_first(&hapd->sae_commit_queue, in auth_sae_process_commit() 1682 if (!q) in auth_sae_process_commit() 1686 dl_list_del(&q->list); in auth_sae_process_commit() 1687 handle_auth(hapd, (const struct ieee80211_mgmt *) q->msg, q->len, in auth_sae_process_commit() 1688 q->rssi, 1); in auth_sae_process_commit() 1689 os_free(q); in auth_sae_process_commit() 1703 struct hostapd_sae_commit_queue *q, *q2; in auth_sae_queue() local 1718 q = os_zalloc(sizeof(*q) + len); in auth_sae_queue() 1719 if (!q) in auth_sae_queue() [all …]
|
D | hostapd.c | 592 struct hostapd_sae_commit_queue *q; in hostapd_free_hapd_data() local 594 while ((q = dl_list_first(&hapd->sae_commit_queue, in hostapd_free_hapd_data() 597 dl_list_del(&q->list); in hostapd_free_hapd_data() 598 os_free(q); in hostapd_free_hapd_data()
|
/hostap-latest/wpa_supplicant/ |
D | gas_query.c | 201 struct gas_query_pending *q; in gas_query_get_pending() local 204 dl_list_for_each(q, &gas->pending, struct gas_query_pending, list) { in gas_query_get_pending() 205 if (ether_addr_equal(q->addr, addr) && in gas_query_get_pending() 206 q->dialog_token == dialog_token) in gas_query_get_pending() 207 return q; in gas_query_get_pending() 210 wpas_ap_link_address(wpa_s, q->addr)) in gas_query_get_pending() 211 return q; in gas_query_get_pending() 675 struct gas_query_pending *q; in gas_query_dialog_token_available() local 676 dl_list_for_each(q, &gas->pending, struct gas_query_pending, list) { in gas_query_dialog_token_available() 677 if (ether_addr_equal(dst, q->addr) && in gas_query_dialog_token_available() [all …]
|
D | p2p_supplicant_sd.c | 682 const u8 q[] = { 1, (const u8) '*', 0 }; in wpas_sd_all_asp() local 685 wpas_sd_req_asp(wpa_s, resp, srv_trans_id, q, sizeof(q)); in wpas_sd_all_asp()
|
/hostap-latest/src/common/ |
D | dpp_crypto.c | 1060 const struct crypto_bignum *q; in dpp_auth_derive_l_responder() local 1070 q = crypto_ec_get_order(ec); in dpp_auth_derive_l_responder() 1077 if (!q || !BI || !bR || !pR || !sum || !L || !lx || in dpp_auth_derive_l_responder() 1078 crypto_bignum_addmod(bR, pR, q, sum) || in dpp_auth_derive_l_responder() 1689 const struct crypto_bignum *q; in dpp_reconfig_derive_ke_responder() local 1734 q = crypto_ec_get_order(ec); in dpp_reconfig_derive_ke_responder() 1739 if (!sum || !q || !M || !cR || !pR || !CI || in dpp_reconfig_derive_ke_responder() 1740 crypto_bignum_addmod(cR, pR, q, sum) || in dpp_reconfig_derive_ke_responder() 2233 const struct crypto_bignum *q; in dpp_gen_reconfig_id() local 2254 q = crypto_ec_get_order(ec); in dpp_gen_reconfig_id() [all …]
|
D | wpa_common.c | 2196 size_t q, r0_key_data_len; in wpa_derive_pmk_r0() local 2202 q = xxkey_len; in wpa_derive_pmk_r0() 2204 q = SHA384_MAC_LEN; in wpa_derive_pmk_r0() 2206 q = SHA256_MAC_LEN; in wpa_derive_pmk_r0() 2207 r0_key_data_len = q + 16; in wpa_derive_pmk_r0() 2222 wpa_printf(MSG_DEBUG, "FT: Derive PMK-R0 using KDF-SHA%zu", q * 8); in wpa_derive_pmk_r0() 2242 if (q == SHA512_MAC_LEN) { in wpa_derive_pmk_r0() 2254 if (q == SHA384_MAC_LEN) { in wpa_derive_pmk_r0() 2265 if (q == SHA256_MAC_LEN) { in wpa_derive_pmk_r0() 2277 os_memcpy(pmk_r0, r0_key_data, q); in wpa_derive_pmk_r0() [all …]
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_gui.sgml | 25 <arg>-q</arg> 76 <term>-q</term>
|
/hostap-latest/tests/build/ |
D | build-wpa_supplicant-openssl-1.0.2.config | 2 OPENSSLDIR=/usr/local/openssl/1.0.2q
|
/hostap-latest/tests/hwsim/auth_serv/ |
D | sha512-ca.pem | 13 vVE1IXyN8CTqSxhHx4nixwg5fEmIoxE/oRRU2IlNY4+LEIwHmPFZwu/7ZoyaQo+q
|
D | server.key | 17 q+j8bFz5NmL/6TkAZp7Clp95wMh0Qeg0yznDNUOKG48yHJuUp8TuUTXE39u5CTki
|
D | sha384-server.key | 4 OLI6cxSSSz02yspRkcN1hDlERfjIrMrJq5M5GgoT1F2zQ0Wc+inXDetgIG1QOb+q
|
D | sha512-ca.key | 11 8kqJqrkR61fwZ3H7G5ErMw/q/jR9tuqcTuRvQjh1LEtv2UxzNg68L73nhqT4UQRO
|
/hostap-latest/tests/ |
D | README | 49 {"a":[[]],"b":1,"c":"q","d":{"e":[{}]}} 58 {"a":[[]],"b":1,"c":"q","d":{"e":[{}]}}
|
/hostap-latest/doc/ |
D | dbus.doxygen | 1488 <tr><td>manufacturer</td><td>q</td> 1494 <tr><td>config_error</td><td>q</td> 1495 <tr><td>dev_password_id</td><td>q</td> 2004 <h3>GONegotiationRequest ( o : path, q : dev_passwd_id, y : device_go_intent )</h3> 2051 <tr><td>update_indicator</td><td>q</td><td></td></tr> 2067 <tr><td>update_indicator</td><td>q</td><td></td></tr> 2208 <h3>Frequency - q - (read)</h3> 2329 <h3>config_method - q - (read)</h3> 2423 <h3>Frequency - q - (read)</h3>
|
/hostap-latest/tests/hwsim/ |
D | README | 172 verbose debug output) and -q (less verbose output) on the command
|