Replace "dummy" with "stub" in comments/documentation

Replace the word "dummy" with the inclusive word "stub".

Signed-off-by: Arowa Suliman <arowa@chromium.org>
This commit is contained in:
Arowa Suliman 2021-09-18 23:24:29 -07:00 committed by Jouni Malinen
parent 3955d2af73
commit ed5e1b7223
13 changed files with 14 additions and 14 deletions

View file

@ -130,7 +130,7 @@ with with hostapd. The following C files are currently used:
Definition of TLS library wrapper Definition of TLS library wrapper
\ref tls_none.c \ref tls_none.c
Dummy implementation of TLS library wrapper for cases where TLS Stub implementation of TLS library wrapper for cases where TLS
functionality is not included. functionality is not included.
\ref tls_openssl.c \ref tls_openssl.c

View file

@ -3,7 +3,7 @@
# 4.3.20 Test Set 20. SQN is the last used SQN value. # 4.3.20 Test Set 20. SQN is the last used SQN value.
# These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM) # These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM)
# authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but # authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but
# dummy values will need to be included in this file. # stub values will need to be included in this file.
# IMSI Ki OPc AMF SQN [RES_len] # IMSI Ki OPc AMF SQN [RES_len]
232010000000000 90dca4eda45b53cf0f12d7c9c3bc6a89 cb9cccc4b9258e6dca4760379fb82581 61df 000000000000 232010000000000 90dca4eda45b53cf0f12d7c9c3bc6a89 cb9cccc4b9258e6dca4760379fb82581 61df 000000000000

View file

@ -14,7 +14,7 @@
#include "tls/pkcs1.h" #include "tls/pkcs1.h"
#include "tls/pkcs8.h" #include "tls/pkcs8.h"
/* Dummy structures; these are just typecast to struct crypto_rsa_key */ /* Stub structures; these are just typecast to struct crypto_rsa_key */
struct crypto_public_key; struct crypto_public_key;
struct crypto_private_key; struct crypto_private_key;

View file

@ -5160,7 +5160,7 @@ static int wpa_driver_nl80211_sta_add(void *priv,
/* /*
* cfg80211 validates that AID is non-zero, so we have * cfg80211 validates that AID is non-zero, so we have
* to make this a non-zero value for the TDLS case where * to make this a non-zero value for the TDLS case where
* a dummy STA entry is used for now and for a station * a stub STA entry is used for now and for a station
* that is still not associated. * that is still not associated.
*/ */
wpa_printf(MSG_DEBUG, " * aid=1 (%s workaround)", wpa_printf(MSG_DEBUG, " * aid=1 (%s workaround)",

View file

@ -1,5 +1,5 @@
/* /*
* EAP proxy - dummy implementation for build testing * EAP proxy - stub implementation for build testing
* Copyright (c) 2013 Qualcomm Atheros, Inc. * Copyright (c) 2013 Qualcomm Atheros, Inc.
* *
* This software may be distributed under the terms of the BSD license. * This software may be distributed under the terms of the BSD license.

View file

@ -92,7 +92,7 @@ struct eap_ssl_data {
/* could be up to 128 bytes, but only the first 64 bytes are used */ /* could be up to 128 bytes, but only the first 64 bytes are used */
#define EAP_TLS_KEY_LEN 64 #define EAP_TLS_KEY_LEN 64
/* dummy type used as a flag for UNAUTH-TLS */ /* stub type used as a flag for UNAUTH-TLS */
#define EAP_UNAUTH_TLS_TYPE 255 #define EAP_UNAUTH_TLS_TYPE 255
#define EAP_WFA_UNAUTH_TLS_TYPE 254 #define EAP_WFA_UNAUTH_TLS_TYPE 254

View file

@ -68,7 +68,7 @@ struct eap_ssl_data {
/* could be up to 128 bytes, but only the first 64 bytes are used */ /* could be up to 128 bytes, but only the first 64 bytes are used */
#define EAP_TLS_KEY_LEN 64 #define EAP_TLS_KEY_LEN 64
/* dummy type used as a flag for UNAUTH-TLS */ /* stub type used as a flag for UNAUTH-TLS */
#define EAP_UNAUTH_TLS_TYPE 255 #define EAP_UNAUTH_TLS_TYPE 255
#define EAP_WFA_UNAUTH_TLS_TYPE 254 #define EAP_WFA_UNAUTH_TLS_TYPE 254

View file

@ -1,5 +1,5 @@
/* /*
* WPA Supplicant - Layer2 packet handling example with dummy functions * WPA Supplicant - Layer2 packet handling example with stub functions
* Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi> * Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
* *
* This software may be distributed under the terms of the BSD license. * This software may be distributed under the terms of the BSD license.

View file

@ -658,7 +658,7 @@ static int subscription_first_event(struct subscription *s)
/* /*
* There has been no events before the subscription. However, * There has been no events before the subscription. However,
* UPnP device architecture specification requires all the * UPnP device architecture specification requires all the
* evented variables to be included, so generate a dummy event * evented variables to be included, so generate a stub event
* for this particular case using a WSC_ACK and all-zeros * for this particular case using a WSC_ACK and all-zeros
* nonces. The ER (UPnP control point) will ignore this, but at * nonces. The ER (UPnP control point) will ignore this, but at
* least it will learn that WLANEvent variable will be used in * least it will learn that WLANEvent variable will be used in

View file

@ -3,7 +3,7 @@
# 4.3.20 Test Set 20. SQN is the last used SQN value. # 4.3.20 Test Set 20. SQN is the last used SQN value.
# These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM) # These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM)
# authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but # authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but
# dummy values will need to be included in this file. # stub values will need to be included in this file.
# IMSI Ki OPc AMF SQN # IMSI Ki OPc AMF SQN
232010000000000 90dca4eda45b53cf0f12d7c9c3bc6a89 cb9cccc4b9258e6dca4760379fb82581 61df 000000000000 232010000000000 90dca4eda45b53cf0f12d7c9c3bc6a89 cb9cccc4b9258e6dca4760379fb82581 61df 000000000000

View file

@ -53,7 +53,7 @@ ln -s /proc/self/fd/2 /dev/stderr
echo "VM has started up" > /dev/ttyS0 echo "VM has started up" > /dev/ttyS0
# create dummy sudo - everything runs as uid 0 # create stub sudo - everything runs as uid 0
mkdir /tmp/bin mkdir /tmp/bin
cat > /tmp/bin/sudo << EOF cat > /tmp/bin/sudo << EOF
#!/bin/bash #!/bin/bash

View file

@ -703,7 +703,7 @@ static void rx_data_eapol_key_3_of_4(struct wlantest *wt, const u8 *dst,
decrypted, decrypted_len); decrypted, decrypted_len);
} }
if ((wt->write_pcap_dumper || wt->pcapng) && decrypted != key_data) { if ((wt->write_pcap_dumper || wt->pcapng) && decrypted != key_data) {
/* Fill in a dummy Data frame header */ /* Fill in a stub Data frame header */
u8 buf[24 + 8 + sizeof(*eapol) + sizeof(*hdr) + 64]; u8 buf[24 + 8 + sizeof(*eapol) + sizeof(*hdr) + 64];
struct ieee80211_hdr *h; struct ieee80211_hdr *h;
struct wpa_eapol_key *k; struct wpa_eapol_key *k;
@ -926,7 +926,7 @@ static void rx_data_eapol_key_1_of_2(struct wlantest *wt, const u8 *dst,
wpa_hexdump(MSG_DEBUG, "Decrypted EAPOL-Key Key Data", wpa_hexdump(MSG_DEBUG, "Decrypted EAPOL-Key Key Data",
decrypted, decrypted_len); decrypted, decrypted_len);
if (wt->write_pcap_dumper || wt->pcapng) { if (wt->write_pcap_dumper || wt->pcapng) {
/* Fill in a dummy Data frame header */ /* Fill in a stub Data frame header */
u8 buf[24 + 8 + sizeof(*eapol) + sizeof(*hdr) + 64]; u8 buf[24 + 8 + sizeof(*eapol) + sizeof(*hdr) + 64];
struct ieee80211_hdr *h; struct ieee80211_hdr *h;
struct wpa_eapol_key *k; struct wpa_eapol_key *k;

View file

@ -5,7 +5,7 @@
* This software may be distributed under the terms of the BSD license. * This software may be distributed under the terms of the BSD license.
* See README for more details. * See README for more details.
* *
* This file implements dummy example of a configuration backend. None of the * This file implements stub example of a configuration backend. None of the
* functions are actually implemented so this can be used as a simple * functions are actually implemented so this can be used as a simple
* compilation test or a starting point for a new configuration backend. * compilation test or a starting point for a new configuration backend.
*/ */