Replace "dummy" with "stub" in comments/documentation
Replace the word "dummy" with the inclusive word "stub". Signed-off-by: Arowa Suliman <arowa@chromium.org>
This commit is contained in:
parent
3955d2af73
commit
ed5e1b7223
13 changed files with 14 additions and 14 deletions
|
@ -130,7 +130,7 @@ with with hostapd. The following C files are currently used:
|
||||||
Definition of TLS library wrapper
|
Definition of TLS library wrapper
|
||||||
|
|
||||||
\ref tls_none.c
|
\ref tls_none.c
|
||||||
Dummy implementation of TLS library wrapper for cases where TLS
|
Stub implementation of TLS library wrapper for cases where TLS
|
||||||
functionality is not included.
|
functionality is not included.
|
||||||
|
|
||||||
\ref tls_openssl.c
|
\ref tls_openssl.c
|
||||||
|
|
|
@ -3,7 +3,7 @@
|
||||||
# 4.3.20 Test Set 20. SQN is the last used SQN value.
|
# 4.3.20 Test Set 20. SQN is the last used SQN value.
|
||||||
# These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM)
|
# These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM)
|
||||||
# authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but
|
# authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but
|
||||||
# dummy values will need to be included in this file.
|
# stub values will need to be included in this file.
|
||||||
|
|
||||||
# IMSI Ki OPc AMF SQN [RES_len]
|
# IMSI Ki OPc AMF SQN [RES_len]
|
||||||
232010000000000 90dca4eda45b53cf0f12d7c9c3bc6a89 cb9cccc4b9258e6dca4760379fb82581 61df 000000000000
|
232010000000000 90dca4eda45b53cf0f12d7c9c3bc6a89 cb9cccc4b9258e6dca4760379fb82581 61df 000000000000
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
#include "tls/pkcs1.h"
|
#include "tls/pkcs1.h"
|
||||||
#include "tls/pkcs8.h"
|
#include "tls/pkcs8.h"
|
||||||
|
|
||||||
/* Dummy structures; these are just typecast to struct crypto_rsa_key */
|
/* Stub structures; these are just typecast to struct crypto_rsa_key */
|
||||||
struct crypto_public_key;
|
struct crypto_public_key;
|
||||||
struct crypto_private_key;
|
struct crypto_private_key;
|
||||||
|
|
||||||
|
|
|
@ -5160,7 +5160,7 @@ static int wpa_driver_nl80211_sta_add(void *priv,
|
||||||
/*
|
/*
|
||||||
* cfg80211 validates that AID is non-zero, so we have
|
* cfg80211 validates that AID is non-zero, so we have
|
||||||
* to make this a non-zero value for the TDLS case where
|
* to make this a non-zero value for the TDLS case where
|
||||||
* a dummy STA entry is used for now and for a station
|
* a stub STA entry is used for now and for a station
|
||||||
* that is still not associated.
|
* that is still not associated.
|
||||||
*/
|
*/
|
||||||
wpa_printf(MSG_DEBUG, " * aid=1 (%s workaround)",
|
wpa_printf(MSG_DEBUG, " * aid=1 (%s workaround)",
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
/*
|
/*
|
||||||
* EAP proxy - dummy implementation for build testing
|
* EAP proxy - stub implementation for build testing
|
||||||
* Copyright (c) 2013 Qualcomm Atheros, Inc.
|
* Copyright (c) 2013 Qualcomm Atheros, Inc.
|
||||||
*
|
*
|
||||||
* This software may be distributed under the terms of the BSD license.
|
* This software may be distributed under the terms of the BSD license.
|
||||||
|
|
|
@ -92,7 +92,7 @@ struct eap_ssl_data {
|
||||||
/* could be up to 128 bytes, but only the first 64 bytes are used */
|
/* could be up to 128 bytes, but only the first 64 bytes are used */
|
||||||
#define EAP_TLS_KEY_LEN 64
|
#define EAP_TLS_KEY_LEN 64
|
||||||
|
|
||||||
/* dummy type used as a flag for UNAUTH-TLS */
|
/* stub type used as a flag for UNAUTH-TLS */
|
||||||
#define EAP_UNAUTH_TLS_TYPE 255
|
#define EAP_UNAUTH_TLS_TYPE 255
|
||||||
#define EAP_WFA_UNAUTH_TLS_TYPE 254
|
#define EAP_WFA_UNAUTH_TLS_TYPE 254
|
||||||
|
|
||||||
|
|
|
@ -68,7 +68,7 @@ struct eap_ssl_data {
|
||||||
/* could be up to 128 bytes, but only the first 64 bytes are used */
|
/* could be up to 128 bytes, but only the first 64 bytes are used */
|
||||||
#define EAP_TLS_KEY_LEN 64
|
#define EAP_TLS_KEY_LEN 64
|
||||||
|
|
||||||
/* dummy type used as a flag for UNAUTH-TLS */
|
/* stub type used as a flag for UNAUTH-TLS */
|
||||||
#define EAP_UNAUTH_TLS_TYPE 255
|
#define EAP_UNAUTH_TLS_TYPE 255
|
||||||
#define EAP_WFA_UNAUTH_TLS_TYPE 254
|
#define EAP_WFA_UNAUTH_TLS_TYPE 254
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
/*
|
/*
|
||||||
* WPA Supplicant - Layer2 packet handling example with dummy functions
|
* WPA Supplicant - Layer2 packet handling example with stub functions
|
||||||
* Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
|
* Copyright (c) 2003-2005, Jouni Malinen <j@w1.fi>
|
||||||
*
|
*
|
||||||
* This software may be distributed under the terms of the BSD license.
|
* This software may be distributed under the terms of the BSD license.
|
||||||
|
|
|
@ -658,7 +658,7 @@ static int subscription_first_event(struct subscription *s)
|
||||||
/*
|
/*
|
||||||
* There has been no events before the subscription. However,
|
* There has been no events before the subscription. However,
|
||||||
* UPnP device architecture specification requires all the
|
* UPnP device architecture specification requires all the
|
||||||
* evented variables to be included, so generate a dummy event
|
* evented variables to be included, so generate a stub event
|
||||||
* for this particular case using a WSC_ACK and all-zeros
|
* for this particular case using a WSC_ACK and all-zeros
|
||||||
* nonces. The ER (UPnP control point) will ignore this, but at
|
* nonces. The ER (UPnP control point) will ignore this, but at
|
||||||
* least it will learn that WLANEvent variable will be used in
|
* least it will learn that WLANEvent variable will be used in
|
||||||
|
|
|
@ -3,7 +3,7 @@
|
||||||
# 4.3.20 Test Set 20. SQN is the last used SQN value.
|
# 4.3.20 Test Set 20. SQN is the last used SQN value.
|
||||||
# These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM)
|
# These values can be used for both UMTS (EAP-AKA) and GSM (EAP-SIM)
|
||||||
# authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but
|
# authentication. In case of GSM/EAP-SIM, AMF and SQN values are not used, but
|
||||||
# dummy values will need to be included in this file.
|
# stub values will need to be included in this file.
|
||||||
|
|
||||||
# IMSI Ki OPc AMF SQN
|
# IMSI Ki OPc AMF SQN
|
||||||
232010000000000 90dca4eda45b53cf0f12d7c9c3bc6a89 cb9cccc4b9258e6dca4760379fb82581 61df 000000000000
|
232010000000000 90dca4eda45b53cf0f12d7c9c3bc6a89 cb9cccc4b9258e6dca4760379fb82581 61df 000000000000
|
||||||
|
|
|
@ -53,7 +53,7 @@ ln -s /proc/self/fd/2 /dev/stderr
|
||||||
|
|
||||||
echo "VM has started up" > /dev/ttyS0
|
echo "VM has started up" > /dev/ttyS0
|
||||||
|
|
||||||
# create dummy sudo - everything runs as uid 0
|
# create stub sudo - everything runs as uid 0
|
||||||
mkdir /tmp/bin
|
mkdir /tmp/bin
|
||||||
cat > /tmp/bin/sudo << EOF
|
cat > /tmp/bin/sudo << EOF
|
||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
|
@ -703,7 +703,7 @@ static void rx_data_eapol_key_3_of_4(struct wlantest *wt, const u8 *dst,
|
||||||
decrypted, decrypted_len);
|
decrypted, decrypted_len);
|
||||||
}
|
}
|
||||||
if ((wt->write_pcap_dumper || wt->pcapng) && decrypted != key_data) {
|
if ((wt->write_pcap_dumper || wt->pcapng) && decrypted != key_data) {
|
||||||
/* Fill in a dummy Data frame header */
|
/* Fill in a stub Data frame header */
|
||||||
u8 buf[24 + 8 + sizeof(*eapol) + sizeof(*hdr) + 64];
|
u8 buf[24 + 8 + sizeof(*eapol) + sizeof(*hdr) + 64];
|
||||||
struct ieee80211_hdr *h;
|
struct ieee80211_hdr *h;
|
||||||
struct wpa_eapol_key *k;
|
struct wpa_eapol_key *k;
|
||||||
|
@ -926,7 +926,7 @@ static void rx_data_eapol_key_1_of_2(struct wlantest *wt, const u8 *dst,
|
||||||
wpa_hexdump(MSG_DEBUG, "Decrypted EAPOL-Key Key Data",
|
wpa_hexdump(MSG_DEBUG, "Decrypted EAPOL-Key Key Data",
|
||||||
decrypted, decrypted_len);
|
decrypted, decrypted_len);
|
||||||
if (wt->write_pcap_dumper || wt->pcapng) {
|
if (wt->write_pcap_dumper || wt->pcapng) {
|
||||||
/* Fill in a dummy Data frame header */
|
/* Fill in a stub Data frame header */
|
||||||
u8 buf[24 + 8 + sizeof(*eapol) + sizeof(*hdr) + 64];
|
u8 buf[24 + 8 + sizeof(*eapol) + sizeof(*hdr) + 64];
|
||||||
struct ieee80211_hdr *h;
|
struct ieee80211_hdr *h;
|
||||||
struct wpa_eapol_key *k;
|
struct wpa_eapol_key *k;
|
||||||
|
|
|
@ -5,7 +5,7 @@
|
||||||
* This software may be distributed under the terms of the BSD license.
|
* This software may be distributed under the terms of the BSD license.
|
||||||
* See README for more details.
|
* See README for more details.
|
||||||
*
|
*
|
||||||
* This file implements dummy example of a configuration backend. None of the
|
* This file implements stub example of a configuration backend. None of the
|
||||||
* functions are actually implemented so this can be used as a simple
|
* functions are actually implemented so this can be used as a simple
|
||||||
* compilation test or a starting point for a new configuration backend.
|
* compilation test or a starting point for a new configuration backend.
|
||||||
*/
|
*/
|
||||||
|
|
Loading…
Reference in a new issue