/hostap-latest/src/crypto/ |
D | sha1-internal.c | 144 #define R0(v,w,x,y,z,i) \ argument 145 z += ((w & (x ^ y)) ^ y) + blk0(i) + 0x5A827999 + rol(v, 5); \ 146 w = rol(w, 30); 147 #define R1(v,w,x,y,z,i) \ argument 148 z += ((w & (x ^ y)) ^ y) + blk(i) + 0x5A827999 + rol(v, 5); \ 149 w = rol(w, 30); 150 #define R2(v,w,x,y,z,i) \ argument 151 z += (w ^ x ^ y) + blk(i) + 0x6ED9EBA1 + rol(v, 5); w = rol(w, 30); 152 #define R3(v,w,x,y,z,i) \ argument 153 z += (((w | x) & y) | (w & x)) + blk(i) + 0x8F1BBCDC + rol(v, 5); \ [all …]
|
D | random.c | 85 u32 w; in random_mix_pool() local 90 w = __ROL32(*pos++, input_rotate & 31); in random_mix_pool() 93 w ^= pool[pool_pos]; in random_mix_pool() 94 w ^= pool[(pool_pos + POOL_TAP1) & POOL_WORDS_MASK]; in random_mix_pool() 95 w ^= pool[(pool_pos + POOL_TAP2) & POOL_WORDS_MASK]; in random_mix_pool() 96 w ^= pool[(pool_pos + POOL_TAP3) & POOL_WORDS_MASK]; in random_mix_pool() 97 w ^= pool[(pool_pos + POOL_TAP4) & POOL_WORDS_MASK]; in random_mix_pool() 98 w ^= pool[(pool_pos + POOL_TAP5) & POOL_WORDS_MASK]; in random_mix_pool() 99 pool[pool_pos] = (w >> 3) ^ twist[w & 7]; in random_mix_pool()
|
D | md5-internal.c | 200 #define MD5STEP(f, w, x, y, z, data, s) \ argument 201 ( w += f(x, y, z) + data, w = w<<s | w>>(32-s), w += x )
|
D | md4-internal.c | 189 #define MD4STEP(f, w, x, y, z, data, s) \ argument 190 ( w += f(x, y, z) + data, w = w<<s | w>>(32-s) )
|
D | crypto_module_tests.c | 2043 u8 w[] = { in test_fips186_2_prf() local 2055 os_memcmp(w, buf, sizeof(w)) != 0) { in test_fips186_2_prf()
|
D | tls_openssl.c | 743 int w; in ssl_info_cb() local 746 w = where & ~SSL_ST_MASK; in ssl_info_cb() 747 if (w & SSL_ST_CONNECT) in ssl_info_cb() 749 else if (w & SSL_ST_ACCEPT) in ssl_info_cb()
|
/hostap-latest/wpa_supplicant/wpa_gui-qt4/ |
D | main.cpp | 22 w = NULL; in WpaGuiApp() 29 w->saveState(); in saveState() 48 WpaGui w(&app); in main() local 58 app.w = &w; in main()
|
D | wpagui.h | 29 WpaGui *w; variable
|
/hostap-latest/wlantest/ |
D | wep.c | 75 struct wlantest_wep *w; in wep_decrypt() local 88 dl_list_for_each(w, &wt->wep, struct wlantest_wep, list) { in wep_decrypt() 90 os_memcpy(key + 3, w->key, w->key_len); in wep_decrypt() 91 if (try_wep(key, 3 + w->key_len, data + 4, data_len - 4, plain) in wep_decrypt()
|
D | wlantest.c | 262 struct wlantest_wep *w; in add_wep() local 269 w = os_zalloc(sizeof(*w)); in add_wep() 270 if (w == NULL) in add_wep() 272 if (hexstr2bin(key, w->key, len / 2) < 0) { in add_wep() 273 os_free(w); in add_wep() 277 w->key_len = len / 2; in add_wep() 278 dl_list_add(&wt->wep, &w->list); in add_wep()
|
/hostap-latest/tests/hwsim/ |
D | test_macsec.py | 236 for w in wpa: 237 secured = w.get_status_field("Secured") 238 live_peers = w.get_status_field("live_peers") 248 w.dump_monitor() 265 for w in wpa: 266 logger.info("%s STATUS:\n%s" % (w.ifname, w.request("STATUS"))) 267 addr = w.get_status_field("address") 268 prio = int(w.get_status_field("Actor Priority")) 271 key_server = w 278 for w in wpa: [all …]
|
D | test_fst_config.py | 126 w = wpasupplicant.WpaSupplicant(global_iface='/tmp/wpas-wlan5') 127 resp = w.global_request("FST-MANAGER TEST_REQUEST IS_SUPPORTED")
|
D | remotehost.py | 165 [r, w, e] = select.select([proc.stdout], [], [], timeout)
|
/hostap-latest/wpaspy/ |
D | wpaspy.py | 94 [r, w, e] = select.select([self.s], [], [], timeout) 138 [r, w, e] = select.select([self.s], [], [], timeout)
|
/hostap-latest/tests/hwsim/auth_serv/ |
D | dh.conf | 4 +9OXrBwpYatW8npTRGF83TqQ/wJgjfr3Cl580Qp2Tv9XjGWHjqDmJI8xVmmOjn/w
|
D | server-eku-client-server.pem | 78 AQBmV4h+W/w/XdCt8LdTiY+nR2iJkKHfcgpsA9iytWjleNUwXqmguo21CE9J/Af6
|
/hostap-latest/src/drivers/ |
D | driver_nl80211.c | 834 struct nl80211_wiphy_data *w) in nl80211_register_beacons() argument 844 nla_put_u32(msg, NL80211_ATTR_WIPHY, w->wiphy_idx)) { in nl80211_register_beacons() 849 ret = send_and_recv(drv->global, w->nl_beacons, msg, NULL, NULL, in nl80211_register_beacons() 862 struct nl80211_wiphy_data *w = eloop_ctx; in nl80211_recv_beacons() local 867 res = nl_recvmsgs(handle, w->nl_cb); in nl80211_recv_beacons() 877 struct nl80211_wiphy_data *w = arg; in process_beacon_event() local 895 dl_list_for_each(drv, &w->drvs, struct wpa_driver_nl80211_data, in process_beacon_event() 911 struct nl80211_wiphy_data *w; in nl80211_get_wiphy_data_ap() local 921 dl_list_for_each(w, &nl80211_wiphys, struct nl80211_wiphy_data, list) { in nl80211_get_wiphy_data_ap() 922 if (w->wiphy_idx == wiphy_idx) in nl80211_get_wiphy_data_ap() [all …]
|
/hostap-latest/hs20/server/ |
D | hs20-osu-server.txt | 85 sudo chmod g+w /home/user/hs20-server/AS/DB 88 sudo chmod g+w /home/user/hs20-server/AS/DB/eap_user.db
|
/hostap-latest/tests/hwsim/auth_serv/iCA-server/ |
D | server-revoked.pem | 83 zoQkEtp/qKsV/SSbzxyuL48TKCcJHlcryh/IvKSVCCdOxCFopUWfWkIcfzdZ1+0w
|
D | server-revoked_and_ica.pem | 164 zoQkEtp/qKsV/SSbzxyuL48TKCcJHlcryh/IvKSVCCdOxCFopUWfWkIcfzdZ1+0w
|
/hostap-latest/hostapd/ |
D | ChangeLog | 618 * atheros: Add support for IEEE 802.11w configuration. 727 * add SA Query Request processing in AP mode (IEEE 802.11w) 728 * fix IGTK PN in group rekeying (IEEE 802.11w) 784 standard when using CCMP (for IEEE 802.11r and IEEE 802.11w) 793 * updated management frame protection to use IEEE Std 802.11w-2009 821 * updated management frame protection to use IEEE 802.11w/D7.0 853 * updated management frame protection to use IEEE 802.11w/D6.0 857 (IEEE 802.11w) 965 * updated to use IEEE 802.11w/D2.0 for management frame protection 987 * added preliminary implementation of IEEE 802.11w/D1.0 (management [all …]
|
/hostap-latest/wpa_supplicant/dbus/ |
D | dbus_new.h | 300 #define wpas_dbus_signal_state_changed(w, n, o) do { } while (0) argument
|
/hostap-latest/wpa_supplicant/ |
D | ChangeLog | 770 - MFP (IEEE 802.11w) information for nl80211 command API 1096 * atheros: Add support for IEEE 802.11w configuration. 1349 standard when using CCMP (for IEEE 802.11r and IEEE 802.11w) 1366 * updated management frame protection to use IEEE Std 802.11w-2009 1405 * updated management frame protection to use IEEE 802.11w/D7.0 1437 * updated management frame protection to use IEEE 802.11w/D6.0 1439 (IEEE 802.11w) 1472 * removed '-w' command line parameter (wait for interface to be added, 1591 * updated to use IEEE 802.11w/D2.0 for management frame protection 1613 * added preliminary implementation of IEEE 802.11w/D1.0 (management [all …]
|
D | p2p_supplicant.c | 8986 struct wpa_supplicant *w; in wpas_p2p_remove_client() local 9001 for (w = wpa_s->global->ifaces; w; w = w->next) in wpas_p2p_remove_client() 9002 wpas_p2p_remove_client_go(w, peer, iface_addr); in wpas_p2p_remove_client()
|