Searched defs:data (Results 176 - 200 of 7161) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/p2p/
H A Dp2p_parse.c18 static int p2p_parse_attribute(u8 id, const u8 *data, u16 len, argument
32 msg->capability = data;
35 data[0], data[1]);
43 msg->device_id = data;
53 msg->go_intent = data;
55 "Tie breaker %u", data[0] >> 1, data[0] & 0x01);
63 msg->status = data;
64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[
404 p2p_parse_ies(const u8 *data, size_t len, struct p2p_message *msg) argument
455 p2p_parse(const u8 *data, size_t len, struct p2p_message *msg) argument
660 p2p_attr_text(struct wpabuf *data, char *buf, char *end) argument
[all...]
H A Dp2p_pd.c146 const u8 *data, size_t len, int rx_freq)
154 if (p2p_parse(data, len, &msg))
166 if (p2p_add_device(p2p, sa, rx_freq, NULL, 0, data + 1, len - 1,
263 const u8 *data, size_t len)
270 if (p2p_parse(data, len, &msg))
145 p2p_process_prov_disc_req(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len, int rx_freq) argument
262 p2p_process_prov_disc_resp(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len) argument
H A Dp2p_sd.c236 const u8 *data, size_t len,
256 wpabuf_put_data(buf, data, len);
311 const u8 *data, size_t len, int rx_freq)
313 const u8 *pos = data;
314 const u8 *end = data + len;
456 const u8 *data, size_t len, int rx_freq)
458 const u8 *pos = data;
459 const u8 *end = data + len;
528 p2p_dbg(p2p, "Not enough Query Response data");
595 const u8 *data, size_
233 p2p_build_gas_comeback_resp(u8 dialog_token, u16 status_code, u16 update_indic, const u8 *data, size_t len, u8 frag_id, u8 more, u16 total_len) argument
310 p2p_rx_gas_initial_req(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len, int rx_freq) argument
455 p2p_rx_gas_initial_resp(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len, int rx_freq) argument
594 p2p_rx_gas_comeback_req(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len, int rx_freq) argument
660 p2p_rx_gas_comeback_resp(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len, int rx_freq) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius.c99 * The caller is responsible for freeing the returned data with
610 const u8 *data, size_t data_len)
633 wpabuf_put_data(msg->buf, data, data_len);
644 * @data: RADIUS message to be parsed
645 * @len: Length of data buffer in octets
648 * This parses a RADIUS message and makes a copy of its data. The caller is
649 * responsible for freeing the returned data with radius_msg_free().
651 struct radius_msg * radius_msg_parse(const u8 *data, size_t len) argument
659 if (data == NULL || len < sizeof(*hdr))
662 hdr = (struct radius_hdr *) data;
609 radius_msg_add_attr(struct radius_msg *msg, u8 type, const u8 *data, size_t data_len) argument
714 radius_msg_add_eap(struct radius_msg *msg, const u8 *data, size_t data_len) argument
886 radius_msg_make_authenticator(struct radius_msg *msg, const u8 *data, size_t len) argument
915 u8 *data, *pos; local
1235 radius_msg_add_wfa(struct radius_msg *msg, u8 subtype, const u8 *data, size_t len) argument
1262 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) argument
1316 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument
1414 const u8 *data; local
1498 const u8 *data; local
[all...]
H A Dradius.h234 const u8 *data, size_t data_len);
235 struct radius_msg * radius_msg_parse(const u8 *data, size_t len);
236 int radius_msg_add_eap(struct radius_msg *msg, const u8 *data,
247 const u8 *data, size_t len);
259 int radius_msg_add_wfa(struct radius_msg *msg, u8 subtype, const u8 *data,
262 const u8 *data, size_t data_len,
267 const u8 *data, size_t data_len,
300 u8 *data; member in struct:radius_attr_data
H A Dradius_client.c56 * This data structure is used internally inside the RADIUS client module to
69 void *data);
72 * data - Context data for the handler
74 void *data; member in struct:radius_rx_handler
81 * This data structure is used internally inside the RADIUS client module to
147 * struct radius_client_data - Internal RADIUS client data
149 * This data structure is used internally inside the RADIUS client module.
151 * calling radius_client_deinit(). The pointer to this opaque data is used in
253 * @data
264 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument
[all...]
H A Dradius_server.c67 * struct radius_session - Internal RADIUS server data for a session
95 * struct radius_client - Internal RADIUS server data for a client
112 * struct radius_server_data - Internal RADIUS server data
167 * PAC-Opaque data. It can be set to %NULL if EAP-FAST is not used. If
259 * context data. Normally, this can be set to %NULL.
282 * @ctx: Context data from conf_ctx
292 * password data and RADIUS server will free it after use.
298 * eap_req_id_text - Optional data for EAP-Request/Identity
315 * msg_ctx - Context data for wpa_msg() calls
394 radius_server_get_client(struct radius_server_data *data, struc argument
448 radius_server_session_free(struct radius_server_data *data, struct radius_session *sess) argument
464 radius_server_session_remove(struct radius_server_data *data, struct radius_session *sess) argument
493 struct radius_server_data *data = eloop_ctx; local
502 struct radius_server_data *data = eloop_ctx; local
511 radius_server_new_session(struct radius_server_data *data, struct radius_client *client) argument
604 radius_server_get_new_session(struct radius_server_data *data, struct radius_client *client, struct radius_msg *msg, const char *from_addr) argument
696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument
829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument
909 radius_server_reject(struct radius_server_data *data, struct radius_client *client, struct radius_msg *request, struct sockaddr *from, socklen_t fromlen, const char *from_addr, int from_port) argument
970 radius_server_request(struct radius_server_data *data, struct radius_msg *msg, struct sockaddr *from, socklen_t fromlen, struct radius_client *client, const char *from_addr, int from_port, struct radius_session *force_sess) argument
1169 struct radius_server_data *data = eloop_ctx; local
1279 struct radius_server_data *data = eloop_ctx; local
1480 radius_server_free_sessions(struct radius_server_data *data, struct radius_session *sessions) argument
1494 radius_server_free_clients(struct radius_server_data *data, struct radius_client *clients) argument
1677 struct radius_server_data *data; local
1808 radius_server_deinit(struct radius_server_data *data) argument
1850 radius_server_get_mib(struct radius_server_data *data, char *buf, size_t buflen) argument
1990 struct radius_server_data *data = sess->server; local
2007 struct radius_server_data *data = sess->server; local
2036 radius_server_eap_pending_cb(struct radius_server_data *data, void *ctx) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dpeerkey.c32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument
38 os_memcpy(pos, data, data_len);
251 "WPA: Failed to get random data for PNonce");
364 "RSN: Failed to get random data for INonce (STK)");
671 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len);
685 "RSN: Failed to get random data for PNonce");
774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len);
823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len);
825 wpa_printf(MSG_DEBUG, "RSN: Failed to parse key data in "
902 * @sm: Pointer to WPA state machine data fro
[all...]
H A Dtdls.c392 u8 data[3 * ETH_ALEN]; local
421 os_memcpy(data, own_addr, ETH_ALEN);
422 os_memcpy(data + ETH_ALEN, peer->addr, ETH_ALEN);
424 os_memcpy(data, peer->addr, ETH_ALEN);
425 os_memcpy(data + ETH_ALEN, own_addr, ETH_ALEN);
427 os_memcpy(data + 2 * ETH_ALEN, bssid, ETH_ALEN);
428 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data));
430 sha256_prf(key_input, SHA256_MAC_LEN, "TDLS PMK", data, sizeof(data),
[all...]
H A Dwpa.c28 * @sm: Pointer to WPA state machine data from wpa_sm_init()
77 * @sm: Pointer to WPA state machine data from wpa_sm_init()
265 * @sm: Pointer to WPA state machine data from wpa_sm_init()
405 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data",
427 "WPA: Failed to get random data for SNonce");
513 * possible race condition between the data receive and key
687 * data connection does not work because wpa_supplicant
1025 * @sm: Pointer to WPA state machine data from wpa_sm_init()
1089 "WPA: GTK IE in unencrypted key data");
1095 "WPA: IGTK KDE in unencrypted key data");
2621 wpa_sm_parse_own_wpa_ie(struct wpa_sm *sm, struct wpa_ie_data *data) argument
[all...]
H A Dwpa.h38 u8 * (*alloc_eapol)(void *ctx, u8 type, const void *data, u16 data_len,
134 struct wpa_ie_data *data);
139 int wpa_sm_parse_own_wpa_ie(struct wpa_sm *sm, struct wpa_ie_data *data);
258 struct wpa_ie_data *data)
274 struct wpa_ie_data *data)
257 wpa_parse_wpa_ie(const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ie_data *data) argument
273 wpa_sm_parse_own_wpa_ie(struct wpa_sm *sm, struct wpa_ie_data *data) argument
H A Dwpa_i.h19 * struct wpa_sm - Internal WPA state machine data
193 const void *data, u16 data_len,
197 return sm->ctx->alloc_eapol(sm->ctx->ctx, type, data, data_len,
192 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
H A Dwpa_ie.c23 * @data: Pointer to data area for parsing results
26 * Parse the contents of WPA or RSN IE and write the parsed data into data.
29 struct wpa_ie_data *data)
32 return wpa_parse_wpa_ie_rsn(wpa_ie, wpa_ie_len, data);
34 return wpa_parse_wpa_ie_wpa(wpa_ie, wpa_ie_len, data);
286 * @sm: Pointer to WPA state machine data from wpa_sm_init()
318 * @ie: Pointer to parsed IE data
354 * @ie: Pointer to parsed IE data
28 wpa_parse_wpa_ie(const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ie_data *data) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dpkcs8.c127 u8 *data; local
177 data = pkcs5_decrypt(enc_alg, enc_alg_len, hdr.payload, hdr.length,
179 if (data) {
181 key = pkcs8_key_import(data, data_len);
182 os_free(data);
H A Dtlsv1_client.c129 * @conn: TLSv1 client connection data from tlsv1_client_init()
130 * @in_data: Input data from TLS peer
131 * @in_len: Input data length
133 * @appl_data: Pointer to application data pointer, or %NULL if dropped
135 * @need_more_data: Set to 1 if more data would be needed to complete
137 * Returns: Pointer to output data, %NULL on failure
194 wpa_printf(MSG_DEBUG, "TLSv1: Need more data");
262 * tlsv1_client_encrypt - Encrypt data into TLS tunnel
263 * @conn: TLSv1 client connection data from tlsv1_client_init()
264 * @in_data: Pointer to plaintext data t
648 tlsv1_client_hello_ext(struct tlsv1_client *conn, int ext_type, const u8 *data, size_t data_len) argument
[all...]
H A Dtlsv1_common.c105 * Returns: Pointer to the cipher data or %NULL if not found
402 const u8 *data, size_t data_len,
422 wpa_hexdump(MSG_MSGDUMP, "Additional data after Signature",
485 os_memcmp_const(decrypted, data, data_len) != 0) {
401 tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, const u8 *data, size_t data_len, const u8 *pos, size_t len, u8 *alert) argument
H A Dtlsv1_record.c21 * @rl: Pointer to TLS record layer data
34 const struct tls_cipher_data *data; local
55 data = tls_get_cipher_data(suite->cipher);
56 if (data == NULL)
59 rl->key_material_len = data->key_material;
60 rl->iv_size = data->block_size;
61 rl->cipher_alg = data->alg;
69 * @rl: Pointer to TLS record layer data
103 * @rl: Pointer to TLS record layer data
137 * @rl: Pointer to TLS record layer data
[all...]
H A Dx509v3.c1135 wpa_printf(MSG_DEBUG, "X509: Unexpected ASN.1 data for "
1199 wpa_printf(MSG_DEBUG, "X509: Unexpected ASN.1 data "
1395 "Extensions data which are only allowed for "
1406 "X509: Ignored extra tbsCertificate data",
1512 wpa_hexdump(MSG_MSGDUMP, "X509: Ignoring extra data after DER "
1586 u8 *data; local
1608 data = os_malloc(data_len);
1609 if (data == NULL) {
1615 cert->sign_value_len, data,
1619 os_free(data);
[all...]
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dbrowser-android.c32 struct browser_data *data = ctx; local
41 data->success = 1;
44 data->success = atoi(url + 5);
58 eloop_register_timeout(0, 500000, browser_timeout, &data, NULL);
71 struct browser_data data; local
75 os_memset(&data, 0, sizeof(data));
90 http = http_server_init(&addr, 12345, http_req, &data);
105 eloop_register_timeout(30, 0, browser_timeout, &data, NULL);
107 eloop_cancel_timeout(browser_timeout, &data, NUL
[all...]
H A Dbrowser-system.c32 struct browser_data *data = ctx; local
41 data->success = 1;
44 data->success = atoi(url + 5);
58 eloop_register_timeout(0, 500000, browser_timeout, &data, NULL);
71 struct browser_data data; local
75 os_memset(&data, 0, sizeof(data));
88 http = http_server_init(&addr, 12345, http_req, &data);
103 eloop_register_timeout(120, 0, browser_timeout, &data, NULL);
105 eloop_cancel_timeout(browser_timeout, &data, NUL
[all...]
H A Dbrowser-wpadebug.c32 struct browser_data *data = ctx; local
41 data->success = 1;
44 data->success = atoi(url + 5);
59 eloop_register_timeout(0, 500000, browser_timeout, &data, NULL);
72 struct browser_data data; local
76 os_memset(&data, 0, sizeof(data));
93 http = http_server_init(&addr, 12345, http_req, &data);
108 eloop_register_timeout(300, 0, browser_timeout, &data, NULL);
110 eloop_cancel_timeout(browser_timeout, &data, NUL
[all...]
H A Dcommon.c122 * hexstr2bin - Convert ASCII hex string into binary data
124 * @buf: Buffer for the binary data
187 static inline int _wpa_snprintf_hex(char *buf, size_t buf_size, const u8 *data, argument
197 data[i]);
209 * wpa_snprintf_hex - Print data as a hex string into a buffer
212 * @data: Data to be printed
213 * @len: Length of data in bytes
216 int wpa_snprintf_hex(char *buf, size_t buf_size, const u8 *data, size_t len) argument
218 return _wpa_snprintf_hex(buf, buf_size, data, len, 0);
223 * wpa_snprintf_hex_uppercase - Print data a
230 wpa_snprintf_hex_uppercase(char *buf, size_t buf_size, const u8 *data, size_t len) argument
347 printf_encode(char *txt, size_t maxlen, const u8 *data, size_t len) argument
569 is_hex(const u8 *data, size_t len) argument
[all...]
H A Dext_password.c39 struct ext_password_data *data; local
42 data = os_zalloc(sizeof(*data));
43 if (data == NULL)
48 data->backend = backends[i];
53 if (!data->backend) {
54 os_free(data);
58 data->priv = data->backend->init(params);
59 if (data
68 ext_password_deinit(struct ext_password_data *data) argument
76 ext_password_get(struct ext_password_data *data, const char *name) argument
[all...]
H A Dext_password_test.c22 struct ext_password_test_data *data; local
24 data = os_zalloc(sizeof(*data));
25 if (data == NULL)
29 data->params = os_strdup(params);
31 return data;
37 struct ext_password_test_data *data = ctx; local
39 str_clear_free(data->params);
40 os_free(data);
46 struct ext_password_test_data *data local
[all...]
H A Dhttp-utils.h16 u8 *data; member in struct:http_othername
51 char * http_post(struct http_ctx *ctx, const char *url, const char *data,

Completed in 586 milliseconds

1234567891011>>