/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_parse.c | 18 static int p2p_parse_attribute(u8 id, const u8 *data, u16 len, argument 32 msg->capability = data; 35 data[0], data[1]); 43 msg->device_id = data; 53 msg->go_intent = data; 55 "Tie breaker %u", data[0] >> 1, data[0] & 0x01); 63 msg->status = data; 64 wpa_printf(MSG_DEBUG, "P2P: * Status: %d", data[ 404 p2p_parse_ies(const u8 *data, size_t len, struct p2p_message *msg) argument 455 p2p_parse(const u8 *data, size_t len, struct p2p_message *msg) argument 660 p2p_attr_text(struct wpabuf *data, char *buf, char *end) argument [all...] |
H A D | p2p_pd.c | 146 const u8 *data, size_t len, int rx_freq) 154 if (p2p_parse(data, len, &msg)) 166 if (p2p_add_device(p2p, sa, rx_freq, NULL, 0, data + 1, len - 1, 263 const u8 *data, size_t len) 270 if (p2p_parse(data, len, &msg)) 145 p2p_process_prov_disc_req(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len, int rx_freq) argument 262 p2p_process_prov_disc_resp(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len) argument
|
H A D | p2p_sd.c | 236 const u8 *data, size_t len, 256 wpabuf_put_data(buf, data, len); 311 const u8 *data, size_t len, int rx_freq) 313 const u8 *pos = data; 314 const u8 *end = data + len; 456 const u8 *data, size_t len, int rx_freq) 458 const u8 *pos = data; 459 const u8 *end = data + len; 528 p2p_dbg(p2p, "Not enough Query Response data"); 595 const u8 *data, size_ 233 p2p_build_gas_comeback_resp(u8 dialog_token, u16 status_code, u16 update_indic, const u8 *data, size_t len, u8 frag_id, u8 more, u16 total_len) argument 310 p2p_rx_gas_initial_req(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len, int rx_freq) argument 455 p2p_rx_gas_initial_resp(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len, int rx_freq) argument 594 p2p_rx_gas_comeback_req(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len, int rx_freq) argument 660 p2p_rx_gas_comeback_resp(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len, int rx_freq) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.c | 99 * The caller is responsible for freeing the returned data with 610 const u8 *data, size_t data_len) 633 wpabuf_put_data(msg->buf, data, data_len); 644 * @data: RADIUS message to be parsed 645 * @len: Length of data buffer in octets 648 * This parses a RADIUS message and makes a copy of its data. The caller is 649 * responsible for freeing the returned data with radius_msg_free(). 651 struct radius_msg * radius_msg_parse(const u8 *data, size_t len) argument 659 if (data == NULL || len < sizeof(*hdr)) 662 hdr = (struct radius_hdr *) data; 609 radius_msg_add_attr(struct radius_msg *msg, u8 type, const u8 *data, size_t data_len) argument 714 radius_msg_add_eap(struct radius_msg *msg, const u8 *data, size_t data_len) argument 886 radius_msg_make_authenticator(struct radius_msg *msg, const u8 *data, size_t len) argument 915 u8 *data, *pos; local 1235 radius_msg_add_wfa(struct radius_msg *msg, u8 subtype, const u8 *data, size_t len) argument 1262 radius_user_password_hide(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len, u8 *buf, size_t buf_len) argument 1316 radius_msg_add_attr_user_password(struct radius_msg *msg, const u8 *data, size_t data_len, const u8 *secret, size_t secret_len) argument 1414 const u8 *data; local 1498 const u8 *data; local [all...] |
H A D | radius.h | 234 const u8 *data, size_t data_len); 235 struct radius_msg * radius_msg_parse(const u8 *data, size_t len); 236 int radius_msg_add_eap(struct radius_msg *msg, const u8 *data, 247 const u8 *data, size_t len); 259 int radius_msg_add_wfa(struct radius_msg *msg, u8 subtype, const u8 *data, 262 const u8 *data, size_t data_len, 267 const u8 *data, size_t data_len, 300 u8 *data; member in struct:radius_attr_data
|
H A D | radius_client.c | 56 * This data structure is used internally inside the RADIUS client module to 69 void *data); 72 * data - Context data for the handler 74 void *data; member in struct:radius_rx_handler 81 * This data structure is used internally inside the RADIUS client module to 147 * struct radius_client_data - Internal RADIUS client data 149 * This data structure is used internally inside the RADIUS client module. 151 * calling radius_client_deinit(). The pointer to this opaque data is used in 253 * @data 264 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument [all...] |
H A D | radius_server.c | 67 * struct radius_session - Internal RADIUS server data for a session 95 * struct radius_client - Internal RADIUS server data for a client 112 * struct radius_server_data - Internal RADIUS server data 167 * PAC-Opaque data. It can be set to %NULL if EAP-FAST is not used. If 259 * context data. Normally, this can be set to %NULL. 282 * @ctx: Context data from conf_ctx 292 * password data and RADIUS server will free it after use. 298 * eap_req_id_text - Optional data for EAP-Request/Identity 315 * msg_ctx - Context data for wpa_msg() calls 394 radius_server_get_client(struct radius_server_data *data, struc argument 448 radius_server_session_free(struct radius_server_data *data, struct radius_session *sess) argument 464 radius_server_session_remove(struct radius_server_data *data, struct radius_session *sess) argument 493 struct radius_server_data *data = eloop_ctx; local 502 struct radius_server_data *data = eloop_ctx; local 511 radius_server_new_session(struct radius_server_data *data, struct radius_client *client) argument 604 radius_server_get_new_session(struct radius_server_data *data, struct radius_client *client, struct radius_msg *msg, const char *from_addr) argument 696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 909 radius_server_reject(struct radius_server_data *data, struct radius_client *client, struct radius_msg *request, struct sockaddr *from, socklen_t fromlen, const char *from_addr, int from_port) argument 970 radius_server_request(struct radius_server_data *data, struct radius_msg *msg, struct sockaddr *from, socklen_t fromlen, struct radius_client *client, const char *from_addr, int from_port, struct radius_session *force_sess) argument 1169 struct radius_server_data *data = eloop_ctx; local 1279 struct radius_server_data *data = eloop_ctx; local 1480 radius_server_free_sessions(struct radius_server_data *data, struct radius_session *sessions) argument 1494 radius_server_free_clients(struct radius_server_data *data, struct radius_client *clients) argument 1677 struct radius_server_data *data; local 1808 radius_server_deinit(struct radius_server_data *data) argument 1850 radius_server_get_mib(struct radius_server_data *data, char *buf, size_t buflen) argument 1990 struct radius_server_data *data = sess->server; local 2007 struct radius_server_data *data = sess->server; local 2036 radius_server_eap_pending_cb(struct radius_server_data *data, void *ctx) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 32 static u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len) argument 38 os_memcpy(pos, data, data_len); 251 "WPA: Failed to get random data for PNonce"); 364 "RSN: Failed to get random data for INonce (STK)"); 671 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", key_data, key_data_len); 685 "RSN: Failed to get random data for PNonce"); 774 wpa_hexdump(MSG_DEBUG, "RSN: msg 2/4 key data", key_data, key_data_len); 823 wpa_hexdump(MSG_DEBUG, "RSN: msg 3/4 key data", key_data, key_data_len); 825 wpa_printf(MSG_DEBUG, "RSN: Failed to parse key data in " 902 * @sm: Pointer to WPA state machine data fro [all...] |
H A D | tdls.c | 392 u8 data[3 * ETH_ALEN]; local 421 os_memcpy(data, own_addr, ETH_ALEN); 422 os_memcpy(data + ETH_ALEN, peer->addr, ETH_ALEN); 424 os_memcpy(data, peer->addr, ETH_ALEN); 425 os_memcpy(data + ETH_ALEN, own_addr, ETH_ALEN); 427 os_memcpy(data + 2 * ETH_ALEN, bssid, ETH_ALEN); 428 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data)); 430 sha256_prf(key_input, SHA256_MAC_LEN, "TDLS PMK", data, sizeof(data), [all...] |
H A D | wpa.c | 28 * @sm: Pointer to WPA state machine data from wpa_sm_init() 77 * @sm: Pointer to WPA state machine data from wpa_sm_init() 265 * @sm: Pointer to WPA state machine data from wpa_sm_init() 405 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", 427 "WPA: Failed to get random data for SNonce"); 513 * possible race condition between the data receive and key 687 * data connection does not work because wpa_supplicant 1025 * @sm: Pointer to WPA state machine data from wpa_sm_init() 1089 "WPA: GTK IE in unencrypted key data"); 1095 "WPA: IGTK KDE in unencrypted key data"); 2621 wpa_sm_parse_own_wpa_ie(struct wpa_sm *sm, struct wpa_ie_data *data) argument [all...] |
H A D | wpa.h | 38 u8 * (*alloc_eapol)(void *ctx, u8 type, const void *data, u16 data_len, 134 struct wpa_ie_data *data); 139 int wpa_sm_parse_own_wpa_ie(struct wpa_sm *sm, struct wpa_ie_data *data); 258 struct wpa_ie_data *data) 274 struct wpa_ie_data *data) 257 wpa_parse_wpa_ie(const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ie_data *data) argument 273 wpa_sm_parse_own_wpa_ie(struct wpa_sm *sm, struct wpa_ie_data *data) argument
|
H A D | wpa_i.h | 19 * struct wpa_sm - Internal WPA state machine data 193 const void *data, u16 data_len, 197 return sm->ctx->alloc_eapol(sm->ctx->ctx, type, data, data_len, 192 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
H A D | wpa_ie.c | 23 * @data: Pointer to data area for parsing results 26 * Parse the contents of WPA or RSN IE and write the parsed data into data. 29 struct wpa_ie_data *data) 32 return wpa_parse_wpa_ie_rsn(wpa_ie, wpa_ie_len, data); 34 return wpa_parse_wpa_ie_wpa(wpa_ie, wpa_ie_len, data); 286 * @sm: Pointer to WPA state machine data from wpa_sm_init() 318 * @ie: Pointer to parsed IE data 354 * @ie: Pointer to parsed IE data 28 wpa_parse_wpa_ie(const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ie_data *data) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs8.c | 127 u8 *data; local 177 data = pkcs5_decrypt(enc_alg, enc_alg_len, hdr.payload, hdr.length, 179 if (data) { 181 key = pkcs8_key_import(data, data_len); 182 os_free(data);
|
H A D | tlsv1_client.c | 129 * @conn: TLSv1 client connection data from tlsv1_client_init() 130 * @in_data: Input data from TLS peer 131 * @in_len: Input data length 133 * @appl_data: Pointer to application data pointer, or %NULL if dropped 135 * @need_more_data: Set to 1 if more data would be needed to complete 137 * Returns: Pointer to output data, %NULL on failure 194 wpa_printf(MSG_DEBUG, "TLSv1: Need more data"); 262 * tlsv1_client_encrypt - Encrypt data into TLS tunnel 263 * @conn: TLSv1 client connection data from tlsv1_client_init() 264 * @in_data: Pointer to plaintext data t 648 tlsv1_client_hello_ext(struct tlsv1_client *conn, int ext_type, const u8 *data, size_t data_len) argument [all...] |
H A D | tlsv1_common.c | 105 * Returns: Pointer to the cipher data or %NULL if not found 402 const u8 *data, size_t data_len, 422 wpa_hexdump(MSG_MSGDUMP, "Additional data after Signature", 485 os_memcmp_const(decrypted, data, data_len) != 0) { 401 tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, const u8 *data, size_t data_len, const u8 *pos, size_t len, u8 *alert) argument
|
H A D | tlsv1_record.c | 21 * @rl: Pointer to TLS record layer data 34 const struct tls_cipher_data *data; local 55 data = tls_get_cipher_data(suite->cipher); 56 if (data == NULL) 59 rl->key_material_len = data->key_material; 60 rl->iv_size = data->block_size; 61 rl->cipher_alg = data->alg; 69 * @rl: Pointer to TLS record layer data 103 * @rl: Pointer to TLS record layer data 137 * @rl: Pointer to TLS record layer data [all...] |
H A D | x509v3.c | 1135 wpa_printf(MSG_DEBUG, "X509: Unexpected ASN.1 data for " 1199 wpa_printf(MSG_DEBUG, "X509: Unexpected ASN.1 data " 1395 "Extensions data which are only allowed for " 1406 "X509: Ignored extra tbsCertificate data", 1512 wpa_hexdump(MSG_MSGDUMP, "X509: Ignoring extra data after DER " 1586 u8 *data; local 1608 data = os_malloc(data_len); 1609 if (data == NULL) { 1615 cert->sign_value_len, data, 1619 os_free(data); [all...] |
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | browser-android.c | 32 struct browser_data *data = ctx; local 41 data->success = 1; 44 data->success = atoi(url + 5); 58 eloop_register_timeout(0, 500000, browser_timeout, &data, NULL); 71 struct browser_data data; local 75 os_memset(&data, 0, sizeof(data)); 90 http = http_server_init(&addr, 12345, http_req, &data); 105 eloop_register_timeout(30, 0, browser_timeout, &data, NULL); 107 eloop_cancel_timeout(browser_timeout, &data, NUL [all...] |
H A D | browser-system.c | 32 struct browser_data *data = ctx; local 41 data->success = 1; 44 data->success = atoi(url + 5); 58 eloop_register_timeout(0, 500000, browser_timeout, &data, NULL); 71 struct browser_data data; local 75 os_memset(&data, 0, sizeof(data)); 88 http = http_server_init(&addr, 12345, http_req, &data); 103 eloop_register_timeout(120, 0, browser_timeout, &data, NULL); 105 eloop_cancel_timeout(browser_timeout, &data, NUL [all...] |
H A D | browser-wpadebug.c | 32 struct browser_data *data = ctx; local 41 data->success = 1; 44 data->success = atoi(url + 5); 59 eloop_register_timeout(0, 500000, browser_timeout, &data, NULL); 72 struct browser_data data; local 76 os_memset(&data, 0, sizeof(data)); 93 http = http_server_init(&addr, 12345, http_req, &data); 108 eloop_register_timeout(300, 0, browser_timeout, &data, NULL); 110 eloop_cancel_timeout(browser_timeout, &data, NUL [all...] |
H A D | common.c | 122 * hexstr2bin - Convert ASCII hex string into binary data 124 * @buf: Buffer for the binary data 187 static inline int _wpa_snprintf_hex(char *buf, size_t buf_size, const u8 *data, argument 197 data[i]); 209 * wpa_snprintf_hex - Print data as a hex string into a buffer 212 * @data: Data to be printed 213 * @len: Length of data in bytes 216 int wpa_snprintf_hex(char *buf, size_t buf_size, const u8 *data, size_t len) argument 218 return _wpa_snprintf_hex(buf, buf_size, data, len, 0); 223 * wpa_snprintf_hex_uppercase - Print data a 230 wpa_snprintf_hex_uppercase(char *buf, size_t buf_size, const u8 *data, size_t len) argument 347 printf_encode(char *txt, size_t maxlen, const u8 *data, size_t len) argument 569 is_hex(const u8 *data, size_t len) argument [all...] |
H A D | ext_password.c | 39 struct ext_password_data *data; local 42 data = os_zalloc(sizeof(*data)); 43 if (data == NULL) 48 data->backend = backends[i]; 53 if (!data->backend) { 54 os_free(data); 58 data->priv = data->backend->init(params); 59 if (data 68 ext_password_deinit(struct ext_password_data *data) argument 76 ext_password_get(struct ext_password_data *data, const char *name) argument [all...] |
H A D | ext_password_test.c | 22 struct ext_password_test_data *data; local 24 data = os_zalloc(sizeof(*data)); 25 if (data == NULL) 29 data->params = os_strdup(params); 31 return data; 37 struct ext_password_test_data *data = ctx; local 39 str_clear_free(data->params); 40 os_free(data); 46 struct ext_password_test_data *data local [all...] |
H A D | http-utils.h | 16 u8 *data; member in struct:http_othername 51 char * http_post(struct http_ctx *ctx, const char *url, const char *data,
|