/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_pax.c | 93 static struct wpabuf * eap_pax_alloc_resp(const struct eap_pax_hdr *req, argument 107 pax->mac_id = req->mac_id; 108 pax->dh_group_id = req->dh_group_id; 109 pax->public_key_id = req->public_key_id; 117 const struct eap_pax_hdr *req, 134 if (req->flags & EAP_PAX_FLAGS_CE) { 141 left = req_plen - sizeof(*req); 150 pos = (const u8 *) (req + 1); 180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e, 191 resp = eap_pax_alloc_resp(req, i 115 eap_pax_process_std_1(struct eap_pax_data *data, struct eap_method_ret *ret, u8 id, const struct eap_pax_hdr *req, size_t req_plen) argument 231 eap_pax_process_std_3(struct eap_pax_data *data, struct eap_method_ret *ret, u8 id, const struct eap_pax_hdr *req, size_t req_plen) argument 327 const struct eap_pax_hdr *req; local [all...] |
H A D | eap_sake.c | 366 const struct eap_sake_hdr *req; local 378 req = (const struct eap_sake_hdr *) pos; 380 subtype = req->subtype; 381 session_id = req->session_id; 382 pos = (const u8 *) (req + 1);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_gpsk.c | 106 struct wpabuf *req; local 120 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, 122 if (req == NULL) { 129 wpabuf_put_u8(req, EAP_GPSK_OPCODE_GPSK_1); 130 wpabuf_put_be16(req, sm->server_id_len); 131 wpabuf_put_data(req, sm->server_id, sm->server_id_len); 132 wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN); 133 wpabuf_put_be16(req, 135 wpabuf_put_data(req, data->csuite_list, 138 return req; 148 struct wpabuf *req; local [all...] |
H A D | eap_server_ikev2.c | 136 struct wpabuf *req; local 171 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen, 173 if (req == NULL) 176 wpabuf_put_u8(req, flags); /* Flags */ 178 wpabuf_put_be32(req, wpabuf_len(data->out_buf)); 180 wpabuf_put_data(req, wpabuf_head_u8(data->out_buf) + data->out_used, 185 const u8 *msg = wpabuf_head(req); 186 size_t len = wpabuf_len(req); 190 msg, len, wpabuf_put(req, icv_len)); 208 return req; [all...] |
H A D | eap_server_pax.c | 74 struct wpabuf *req; local 86 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, 89 if (req == NULL) { 96 pax = wpabuf_put(req, sizeof(*pax)); 103 wpabuf_put_be16(req, EAP_PAX_RAND_LEN); 104 wpabuf_put_data(req, data->rand.r.x, EAP_PAX_RAND_LEN); 108 pos = wpabuf_put(req, EAP_PAX_MAC_LEN); 110 wpabuf_mhead(req), wpabuf_len(req) - EAP_PAX_ICV_LEN, 114 return req; 121 struct wpabuf *req; local [all...] |
H A D | eap_server_psk.c | 57 struct wpabuf *req; local 70 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, 73 if (req == NULL) { 80 psk = wpabuf_put(req, sizeof(*psk)); 83 wpabuf_put_data(req, sm->server_id, sm->server_id_len); 85 return req; 92 struct wpabuf *req; local 99 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, 101 if (req == NULL) { 108 psk = wpabuf_put(req, sizeo [all...] |
H A D | eap_server_tls_common.c | 146 struct wpabuf *req; local 171 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id); 172 if (req == NULL) 175 wpabuf_put_u8(req, flags); /* Flags */ 177 wpabuf_put_be32(req, wpabuf_len(data->tls_out)); 179 wpabuf_put_data(req, wpabuf_head_u8(data->tls_out) + data->tls_out_pos, 199 return req; 205 struct wpabuf *req; local 207 req = eap_tls_msg_alloc(eap_type, 1, EAP_CODE_REQUEST, id); 208 if (req [all...] |
H A D | eap_server_wsc.c | 168 struct wpabuf *req; local 170 req = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, 2, 172 if (req == NULL) { 179 wpabuf_put_u8(req, WSC_Start); /* Op-Code */ 180 wpabuf_put_u8(req, 0); /* Flags */ 182 return req; 188 struct wpabuf *req; local 205 req = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen, 207 if (req == NULL) { 213 wpabuf_put_u8(req, dat [all...] |
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_go_neg.c | 207 struct wpabuf *req; local 236 req = p2p_build_go_neg_req(p2p, dev); 237 if (req == NULL) 247 wpabuf_head(req), wpabuf_len(req), 500) < 0) { 254 wpabuf_free(req);
|
H A D | p2p_invitation.c | 489 struct wpabuf *req; local 502 req = p2p_build_invitation_req(p2p, dev, go_dev_addr, dev_pw_id); 503 if (req == NULL) 514 wpabuf_head(req), wpabuf_len(req), 500) < 0) { 522 wpabuf_free(req);
|
H A D | p2p_sd.c | 188 struct wpabuf *req; local 190 req = gas_build_comeback_req(dialog_token); 191 if (req == NULL) 196 wpabuf_head(req), wpabuf_len(req), 200) < 0) 199 wpabuf_free(req); 265 struct wpabuf *req; local 286 req = p2p_build_sd_query(p2p->srv_update_indic, query->tlvs); 287 if (req == NULL) 299 wpabuf_head(req), wpabuf_le 899 p2p_sd_cancel_request(struct p2p_data *p2p, void *req) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | http_client.c | 24 struct wpabuf *req; member in struct:http_client 92 (unsigned long) wpabuf_len(c->req), 93 (unsigned long) wpabuf_len(c->req) - c->req_pos); 95 res = send(c->sd, wpabuf_head_u8(c->req) + c->req_pos, 96 wpabuf_len(c->req) - c->req_pos, 0); 105 if ((size_t) res < wpabuf_len(c->req) - c->req_pos) { 108 res, (unsigned long) wpabuf_len(c->req), 109 (unsigned long) wpabuf_len(c->req) - c->req_pos - 118 wpabuf_free(c->req); 119 c->req 130 http_client_addr(struct sockaddr_in *dst, struct wpabuf *req, size_t max_response, void (*cb)(void *ctx, struct http_client *c, enum http_client_event event), void *cb_ctx) argument 242 http_client_url(const char *url, struct wpabuf *req, size_t max_response, void (*cb)(void *ctx, struct http_client *c, enum http_client_event event), void *cb_ctx) argument [all...] |
H A D | http_server.c | 30 void (*cb)(void *ctx, struct http_request *req); 44 struct http_request *req = cookie; local 45 struct http_server *srv = req->srv; 49 inet_ntoa(req->cli.sin_addr), 50 ntohs(req->cli.sin_port)); 51 srv->cb(srv->cb_ctx, req); 55 "completely", inet_ntoa(req->cli.sin_addr), 56 ntohs(req->cli.sin_port)); 57 http_request_deinit(req); 64 struct http_request *req; local 91 http_request_deinit(struct http_request *req) argument 121 http_request_free_all(struct http_request *req) argument 132 http_request_send(struct http_request *req, struct wpabuf *resp) argument 155 http_request_send_and_deinit(struct http_request *req, struct wpabuf *resp) argument 163 http_request_get_type(struct http_request *req) argument 169 http_request_get_uri(struct http_request *req) argument 175 http_request_get_hdr(struct http_request *req) argument 181 http_request_get_data(struct http_request *req) argument 187 http_request_get_hdr_line(struct http_request *req, const char *tag) argument 193 http_request_get_cli_addr(struct http_request *req) argument 205 struct http_request *req; local 228 http_server_init(struct in_addr *addr, int port, void (*cb)(void *ctx, struct http_request *req), void *cb_ctx) argument [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_11_auth.c | 422 struct radius_msg *req, 436 req, i); 469 * @req: RADIUS request message 477 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, argument 500 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { 545 msg, req, cache); 418 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_pax.c | 93 static struct wpabuf * eap_pax_alloc_resp(const struct eap_pax_hdr *req, argument 107 pax->mac_id = req->mac_id; 108 pax->dh_group_id = req->dh_group_id; 109 pax->public_key_id = req->public_key_id; 117 const struct eap_pax_hdr *req, 134 if (req->flags & EAP_PAX_FLAGS_CE) { 141 left = req_plen - sizeof(*req); 150 pos = (const u8 *) (req + 1); 180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e, 191 resp = eap_pax_alloc_resp(req, i 115 eap_pax_process_std_1(struct eap_pax_data *data, struct eap_method_ret *ret, u8 id, const struct eap_pax_hdr *req, size_t req_plen) argument 231 eap_pax_process_std_3(struct eap_pax_data *data, struct eap_method_ret *ret, u8 id, const struct eap_pax_hdr *req, size_t req_plen) argument 327 const struct eap_pax_hdr *req; local [all...] |
H A D | eap_sake.c | 366 const struct eap_sake_hdr *req; local 378 req = (const struct eap_sake_hdr *) pos; 380 subtype = req->subtype; 381 session_id = req->session_id; 382 pos = (const u8 *) (req + 1);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_gpsk.c | 106 struct wpabuf *req; local 120 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, 122 if (req == NULL) { 129 wpabuf_put_u8(req, EAP_GPSK_OPCODE_GPSK_1); 130 wpabuf_put_be16(req, sm->server_id_len); 131 wpabuf_put_data(req, sm->server_id, sm->server_id_len); 132 wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN); 133 wpabuf_put_be16(req, 135 wpabuf_put_data(req, data->csuite_list, 138 return req; 148 struct wpabuf *req; local [all...] |
H A D | eap_server_ikev2.c | 136 struct wpabuf *req; local 171 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen, 173 if (req == NULL) 176 wpabuf_put_u8(req, flags); /* Flags */ 178 wpabuf_put_be32(req, wpabuf_len(data->out_buf)); 180 wpabuf_put_data(req, wpabuf_head_u8(data->out_buf) + data->out_used, 185 const u8 *msg = wpabuf_head(req); 186 size_t len = wpabuf_len(req); 190 msg, len, wpabuf_put(req, icv_len)); 208 return req; [all...] |
H A D | eap_server_pax.c | 74 struct wpabuf *req; local 86 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, 89 if (req == NULL) { 96 pax = wpabuf_put(req, sizeof(*pax)); 103 wpabuf_put_be16(req, EAP_PAX_RAND_LEN); 104 wpabuf_put_data(req, data->rand.r.x, EAP_PAX_RAND_LEN); 108 pos = wpabuf_put(req, EAP_PAX_MAC_LEN); 110 wpabuf_mhead(req), wpabuf_len(req) - EAP_PAX_ICV_LEN, 114 return req; 121 struct wpabuf *req; local [all...] |
H A D | eap_server_psk.c | 57 struct wpabuf *req; local 70 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, 73 if (req == NULL) { 80 psk = wpabuf_put(req, sizeof(*psk)); 83 wpabuf_put_data(req, sm->server_id, sm->server_id_len); 85 return req; 92 struct wpabuf *req; local 99 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, 101 if (req == NULL) { 108 psk = wpabuf_put(req, sizeo [all...] |
H A D | eap_server_tls_common.c | 146 struct wpabuf *req; local 171 req = eap_tls_msg_alloc(eap_type, plen, EAP_CODE_REQUEST, id); 172 if (req == NULL) 175 wpabuf_put_u8(req, flags); /* Flags */ 177 wpabuf_put_be32(req, wpabuf_len(data->tls_out)); 179 wpabuf_put_data(req, wpabuf_head_u8(data->tls_out) + data->tls_out_pos, 199 return req; 205 struct wpabuf *req; local 207 req = eap_tls_msg_alloc(eap_type, 1, EAP_CODE_REQUEST, id); 208 if (req [all...] |
H A D | eap_server_wsc.c | 168 struct wpabuf *req; local 170 req = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, 2, 172 if (req == NULL) { 179 wpabuf_put_u8(req, WSC_Start); /* Op-Code */ 180 wpabuf_put_u8(req, 0); /* Flags */ 182 return req; 188 struct wpabuf *req; local 205 req = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen, 207 if (req == NULL) { 213 wpabuf_put_u8(req, dat [all...] |
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_go_neg.c | 207 struct wpabuf *req; local 236 req = p2p_build_go_neg_req(p2p, dev); 237 if (req == NULL) 247 wpabuf_head(req), wpabuf_len(req), 500) < 0) { 254 wpabuf_free(req);
|
H A D | p2p_invitation.c | 489 struct wpabuf *req; local 502 req = p2p_build_invitation_req(p2p, dev, go_dev_addr, dev_pw_id); 503 if (req == NULL) 514 wpabuf_head(req), wpabuf_len(req), 500) < 0) { 522 wpabuf_free(req);
|
H A D | p2p_sd.c | 188 struct wpabuf *req; local 190 req = gas_build_comeback_req(dialog_token); 191 if (req == NULL) 196 wpabuf_head(req), wpabuf_len(req), 200) < 0) 199 wpabuf_free(req); 265 struct wpabuf *req; local 286 req = p2p_build_sd_query(p2p->srv_update_indic, query->tlvs); 287 if (req == NULL) 299 wpabuf_head(req), wpabuf_le 899 p2p_sd_cancel_request(struct p2p_data *p2p, void *req) argument [all...] |