/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_tls.c | 197 size_t len; local 202 &len); 206 &len); 209 respData, &len); 210 if (pos == NULL || len < 1) { 251 static u8 * eap_tls_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 263 *len = EAP_TLS_KEY_LEN; 274 static u8 * eap_tls_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument 295 *len = EAP_EMSK_LEN;
|
H A D | eap_server_tls_common.c | 101 char *label, size_t len) 106 out = os_malloc(len); 110 if (tls_connection_prf(sm->ssl_ctx, data->conn, label, 0, out, len) == 130 keys.server_random_len, out, len)) 217 const u8 *buf, size_t len) 220 if (len > wpabuf_tailroom(data->tls_in)) { 225 wpabuf_put_data(data->tls_in, buf, len); 227 "bytes more", (unsigned long) len, 236 const u8 *buf, size_t len) 256 if (len > message_lengt 100 eap_server_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, char *label, size_t len) argument 216 eap_server_tls_process_cont(struct eap_ssl_data *data, const u8 *buf, size_t len) argument 234 eap_server_tls_process_fragment(struct eap_ssl_data *data, u8 flags, u32 message_length, const u8 *buf, size_t len) argument [all...] |
H A D | eap_server_tnc.c | 328 size_t len; local 331 &len); 337 if (len == 0 && data->state != WAIT_FRAG_ACK) { 342 if (len == 0) 398 const u8 *buf, size_t len) 401 if (len > wpabuf_tailroom(data->in_buf)) { 407 wpabuf_put_data(data->in_buf, buf, len); 409 "bytes more", (unsigned long) len, 418 const u8 *buf, size_t len) 435 wpabuf_put_data(data->in_buf, buf, len); 397 eap_tnc_process_cont(struct eap_tnc_data *data, const u8 *buf, size_t len) argument 416 eap_tnc_process_fragment(struct eap_tnc_data *data, u8 flags, u32 message_length, const u8 *buf, size_t len) argument 451 size_t len; local [all...] |
H A D | eap_server_ttls.c | 78 int mandatory, size_t len) 96 ((u32) (hdrlen + len))); 172 "(len=%d, left=%d) - dropped", 303 struct eap_ttls_data *data, size_t len) 306 len); 486 size_t len; local 488 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TTLS, respData, &len); 489 if (pos == NULL || len < 1) { 537 "(challenge len %lu password len 77 eap_ttls_avp_hdr(u8 *avphdr, u32 avp_code, u32 vendor_id, int mandatory, size_t len) argument 302 eap_ttls_implicit_challenge(struct eap_sm *sm, struct eap_ttls_data *data, size_t len) argument 907 size_t len; local 1154 eap_ttls_getKey(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_vendor_test.c | 95 size_t len; local 97 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, respData, &len); 98 if (pos == NULL || len < 1) { 112 size_t len; local 114 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, respData, &len); 115 if (pos == NULL || len < 1) 140 static u8 * eap_vendor_test_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 155 *len = key_len;
|
H A D | eap_server_wsc.c | 277 size_t len; local 280 respData, &len); 281 if (pos == NULL || len < 2) { 291 const u8 *buf, size_t len, u8 op_code) 302 if (len > wpabuf_tailroom(data->in_buf)) { 308 wpabuf_put_data(data->in_buf, buf, len); 310 "bytes more", (unsigned long) len, 319 const u8 *buf, size_t len) 337 wpabuf_put_data(data->in_buf, buf, len); 340 (unsigned long) len, 290 eap_wsc_process_cont(struct eap_wsc_data *data, const u8 *buf, size_t len, u8 op_code) argument 317 eap_wsc_process_fragment(struct eap_wsc_data *data, u8 flags, u8 op_code, u16 message_length, const u8 *buf, size_t len) argument 353 size_t len; local [all...] |
H A D | eap_sim_db.c | 809 size_t len) 813 if (send(data->sock, msg, len, 0) < 0) { 827 if (send(data->sock, msg, len, 0) < 0) { 875 int len, ret; local 926 len = os_snprintf(msg, sizeof(msg), "SIM-REQ-AUTH "); 927 if (len < 0 || len + imsi_len >= sizeof(msg)) 929 os_memcpy(msg + len, imsi, imsi_len); 930 len += imsi_len; 931 ret = os_snprintf(msg + len, sizeo 808 eap_sim_db_send(struct eap_sim_db_data *data, const char *msg, size_t len) argument 1340 int len; local 1450 int len, ret; local [all...] |
H A D | ikev2.c | 45 size_t len[2]; local 91 len[0] = pad_len; 93 len[1] = wpabuf_len(shared); 95 2, addr, len, skeyseed) < 0) { 801 wpa_printf(MSG_MSGDUMP, "IKEV2: Received message (len %lu)",
|
H A D | tncs.c | 514 const u8 *msg, size_t len) 519 wpa_hexdump_ascii(MSG_MSGDUMP, "TNC: Message to IMV(s)", msg, len); 529 (TNC_BufferReference) msg, len, 598 size_t len = 0; local 601 len += tncs->imv_data[i].imv_send_len; 603 len += os_strlen(tncs->tncs_message); 604 return len; 625 size_t len = os_strlen(tncs->tncs_message); local 626 os_memcpy(pos, tncs->tncs_message, len); 627 pos += len; 513 tncs_send_to_imvs(struct tncs_data *tncs, unsigned int type, const u8 *msg, size_t len) argument 780 tncs_process_if_tnccs(struct tncs_data *tncs, const u8 *msg, size_t len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 1015 static const char * eapol_sm_get_eap_req_id_text(void *ctx, size_t *len) argument 1018 *len = sm->eapol->conf.eap_req_id_text_len;
|
/external/wpa_supplicant_8/hostapd/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 673 wpa_printf(MSG_DEBUG, "EAPOL: RX IEEE 802.1X ver=%d type=%d len=%d " 775 "len %d", 1093 int len, ret; local 1097 len = os_snprintf(buf, buflen, 1102 if (len < 0 || (size_t) len >= buflen) 1106 ret = os_snprintf(buf + len, buflen - len, 1119 if (ret < 0 || (size_t) ret >= buflen - len) 1120 return len; 1151 size_t len; local 1219 eapol_sm_rx_eapol(struct eapol_sm *sm, const u8 *src, const u8 *buf, size_t len) argument 1523 eapol_sm_get_key(struct eapol_sm *sm, u8 *key, size_t len) argument 1577 eapol_sm_get_session_id(struct eapol_sm *sm, size_t *len) argument 1971 eapol_sm_set_anon_id(void *ctx, const u8 *id, size_t len) argument 2099 eapol_sm_get_eap_proxy_imsi(struct eapol_sm *sm, char *imsi, size_t *len) argument [all...] |
H A D | eapol_supp_sm.h | 145 * @len: Length of the EAPOL payload 148 int (*eapol_send)(void *ctx, int type, const u8 *buf, size_t len); 264 * @len: Length of anonymous identity in octets 266 void (*set_anon_id)(void *ctx, const u8 *id, size_t len); 283 size_t len); 292 int eapol_sm_get_key(struct eapol_sm *sm, u8 *key, size_t len); 293 const u8 * eapol_sm_get_session_id(struct eapol_sm *sm, size_t *len); 308 int eapol_sm_get_eap_proxy_imsi(struct eapol_sm *sm, char *imsi, size_t *len); 337 const u8 *buf, size_t len) 364 static inline int eapol_sm_get_key(struct eapol_sm *sm, u8 *key, size_t len) argument 336 eapol_sm_rx_eapol(struct eapol_sm *sm, const u8 *src, const u8 *buf, size_t len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/l2_packet/ |
H A D | l2_packet_freebsd.c | 41 const u8 *buf, size_t len); 56 const u8 *buf, size_t len) 60 struct l2_ethhdr *eth = os_malloc(sizeof(*eth) + len); 66 os_memcpy(eth + 1, buf, len); 67 ret = pcap_inject(l2->pcap, (u8 *) eth, len + sizeof(*eth)); 71 return pcap_inject(l2->pcap, buf, len); 83 size_t len; local 93 len = hdr.caplen; 96 len = hdr.caplen - sizeof(*ethhdr); 98 l2->rx_callback(l2->rx_callback_ctx, ethhdr->h_source, buf, len); 55 l2_packet_send(struct l2_packet_data *l2, const u8 *dst_addr, u16 proto, const u8 *buf, size_t len) argument 227 l2_packet_init( const char *ifname, const u8 *own_addr, unsigned short protocol, void (*rx_callback)(void *ctx, const u8 *src_addr, const u8 *buf, size_t len), void *rx_callback_ctx, int l2_hdr) argument 272 l2_packet_get_ip_addr(struct l2_packet_data *l2, char *buf, size_t len) argument [all...] |
H A D | l2_packet_linux.c | 25 const u8 *buf, size_t len); 40 const u8 *buf, size_t len) 46 ret = send(l2->fd, buf, len, 0); 58 ret = sendto(l2->fd, buf, len, 0, (struct sockaddr *) &ll, 94 const u8 *buf, size_t len), 169 int l2_packet_get_ip_addr(struct l2_packet_data *l2, char *buf, size_t len) argument 195 res = os_strlcpy(buf, inet_ntoa(saddr->sin_addr), len); 196 if (res >= len) 39 l2_packet_send(struct l2_packet_data *l2, const u8 *dst_addr, u16 proto, const u8 *buf, size_t len) argument 91 l2_packet_init( const char *ifname, const u8 *own_addr, unsigned short protocol, void (*rx_callback)(void *ctx, const u8 *src_addr, const u8 *buf, size_t len), void *rx_callback_ctx, int l2_hdr) argument
|
H A D | l2_packet_ndis.c | 71 const u8 *buf, size_t len); 92 const u8 *buf, size_t len) 113 res = WriteFile(driver_ndis_get_ndisuio_handle(), buf, len, 116 size_t mlen = sizeof(*eth) + len; 124 os_memcpy(eth + 1, buf, len); 351 const u8 *buf, size_t len), 508 int l2_packet_get_ip_addr(struct l2_packet_data *l2, char *buf, size_t len) argument 91 l2_packet_send(struct l2_packet_data *l2, const u8 *dst_addr, u16 proto, const u8 *buf, size_t len) argument 348 l2_packet_init( const char *ifname, const u8 *own_addr, unsigned short protocol, void (*rx_callback)(void *ctx, const u8 *src_addr, const u8 *buf, size_t len), void *rx_callback_ctx, int l2_hdr) argument
|
H A D | l2_packet_none.c | 22 const u8 *buf, size_t len); 38 const u8 *buf, size_t len) 70 const u8 *buf, size_t len), 108 int l2_packet_get_ip_addr(struct l2_packet_data *l2, char *buf, size_t len) argument 37 l2_packet_send(struct l2_packet_data *l2, const u8 *dst_addr, u16 proto, const u8 *buf, size_t len) argument 67 l2_packet_init( const char *ifname, const u8 *own_addr, unsigned short protocol, void (*rx_callback)(void *ctx, const u8 *src_addr, const u8 *buf, size_t len), void *rx_callback_ctx, int l2_hdr) argument
|
H A D | l2_packet_pcap.c | 36 const u8 *buf, size_t len); 78 const u8 *buf, size_t len) 88 ret = pcap_sendpacket(l2->pcap, buf, len); 90 ret = eth_send(l2->eth, buf, len); 93 size_t mlen = sizeof(*eth) + len; 101 os_memcpy(eth + 1, buf, len); 125 size_t len; local 135 len = hdr.caplen; 138 len = hdr.caplen - sizeof(*ethhdr); 140 l2->rx_callback(l2->rx_callback_ctx, ethhdr->h_source, buf, len); 77 l2_packet_send(struct l2_packet_data *l2, const u8 *dst_addr, u16 proto, const u8 *buf, size_t len) argument 152 size_t len; local 278 l2_packet_init( const char *ifname, const u8 *own_addr, unsigned short protocol, void (*rx_callback)(void *ctx, const u8 *src_addr, const u8 *buf, size_t len), void *rx_callback_ctx, int l2_hdr) argument 332 l2_packet_get_ip_addr(struct l2_packet_data *l2, char *buf, size_t len) argument [all...] |
H A D | l2_packet_privsep.c | 21 const u8 *buf, size_t len); 63 const u8 *buf, size_t len) 76 io[3].iov_len = len; 129 const u8 *buf, size_t len), 135 size_t len; local 150 len = os_strlen(own_dir) + 50; 151 l2->own_socket_path = os_malloc(len); 156 os_snprintf(l2->own_socket_path, len, "%s/wpa_privsep-l2-%d-%d", 212 "(len=%d)", res); 251 int l2_packet_get_ip_addr(struct l2_packet_data *l2, char *buf, size_t len) argument 62 l2_packet_send(struct l2_packet_data *l2, const u8 *dst_addr, u16 proto, const u8 *buf, size_t len) argument 126 l2_packet_init( const char *ifname, const u8 *own_addr, unsigned short protocol, void (*rx_callback)(void *ctx, const u8 *src_addr, const u8 *buf, size_t len), void *rx_callback_ctx, int l2_hdr) argument [all...] |
H A D | l2_packet_winpcap.c | 53 const u8 *buf, size_t len); 73 const u8 *buf, size_t len) 82 ret = pcap_sendpacket(l2->pcap, buf, len); 84 size_t mlen = sizeof(*eth) + len; 92 os_memcpy(eth + 1, buf, len); 201 const u8 *buf, size_t len), 295 int l2_packet_get_ip_addr(struct l2_packet_data *l2, char *buf, size_t len) argument 317 len); 72 l2_packet_send(struct l2_packet_data *l2, const u8 *dst_addr, u16 proto, const u8 *buf, size_t len) argument 198 l2_packet_init( const char *ifname, const u8 *own_addr, unsigned short protocol, void (*rx_callback)(void *ctx, const u8 *src_addr, const u8 *buf, size_t len), void *rx_callback_ctx, int l2_hdr) argument
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p.c | 24 const u8 *sa, const u8 *data, size_t len, 28 size_t len); 617 u8 id, len; local 624 for (pos = ies; pos + 1 < end; pos += len) { 626 len = *pos++; 628 if (pos + len > end) 631 if (id != WLAN_EID_VENDOR_SPECIFIC || len < 3) 634 if (len >= 4) { 646 if (wpabuf_resize(&dev->info.vendor_elems, 2 + len) < 0) 648 wpabuf_put_data(dev->info.vendor_elems, pos - 2, 2 + len); 1692 p2p_rx_p2p_action(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len, int rx_freq) argument 1739 p2p_rx_action_public(struct p2p_data *p2p, const u8 *da, const u8 *sa, const u8 *bssid, const u8 *data, size_t len, int freq) argument 1776 p2p_rx_action(struct p2p_data *p2p, const u8 *da, const u8 *sa, const u8 *bssid, u8 category, const u8 *data, size_t len, int freq) argument 2009 u8 *len; local 2252 p2p_assoc_req_ie_wlan_ap(struct p2p_data *p2p, const u8 *bssid, u8 *buf, size_t len, struct wpabuf *p2p_ie) argument 2302 p2p_assoc_req_ie(struct p2p_data *p2p, const u8 *bssid, u8 *buf, size_t len, int p2p_group, struct wpabuf *p2p_ie) argument 2936 u8 *len; local 2966 size_t len = 100; local 3777 u8 *len; local 3842 u8 *len; local 3863 p2p_process_presence_req(struct p2p_data *p2p, const u8 *da, const u8 *sa, const u8 *data, size_t len, int rx_freq) argument 3929 p2p_process_presence_resp(struct p2p_data *p2p, const u8 *da, const u8 *sa, const u8 *data, size_t len) argument 4151 p2p_set_ssid_postfix(struct p2p_data *p2p, const u8 *postfix, size_t len) argument 4303 p2p_send_action(struct p2p_data *p2p, unsigned int freq, const u8 *dst, const u8 *src, const u8 *bssid, const u8 *buf, size_t len, unsigned int wait_time) argument 4849 p2p_set_passphrase_len(struct p2p_data *p2p, unsigned int len) argument [all...] |
H A D | p2p_build.c | 43 u8 *len; local 47 len = wpabuf_put(buf, 1); /* IE length to be filled */ 50 return len; 54 void p2p_buf_update_ie_hdr(struct wpabuf *buf, u8 *len) argument 57 *len = (u8 *) wpabuf_put(buf, 0) - len - 1; 115 u8 *len; local 120 len = wpabuf_put(buf, 2); /* IE length to be filled */ 131 WPA_PUT_LE16(len, (u8 *) wpabuf_put(buf, 0) - len 150 u8 *len; local 348 size_t len; local 378 u8 *len; local [all...] |
H A D | p2p_dev_disc.c | 22 u8 *len; local 33 len = p2p_buf_add_ie_hdr(buf); 37 p2p_buf_update_ie_hdr(buf, len); 113 u8 *len; local 121 len = p2p_buf_add_ie_hdr(buf); 123 p2p_buf_update_ie_hdr(buf, len); 162 const u8 *data, size_t len, int rx_freq) 170 if (p2p_parse(data, len, &msg)) 215 const u8 *data, size_t len) 231 if (p2p_parse(data, len, 161 p2p_process_dev_disc_req(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len, int rx_freq) argument 214 p2p_process_dev_disc_resp(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len) argument 309 p2p_process_go_disc_req(struct p2p_data *p2p, const u8 *da, const u8 *sa, const u8 *data, size_t len, int rx_freq) argument [all...] |
H A D | p2p_go_neg.c | 136 u8 *len; local 155 len = p2p_buf_add_ie_hdr(buf); 181 p2p_buf_update_ie_hdr(buf, len); 266 u8 *len; local 287 len = p2p_buf_add_ie_hdr(buf); 332 p2p_buf_update_ie_hdr(buf, len); 538 const u8 *data, size_t len, int rx_freq) 550 if (p2p_parse(data, len, &msg)) 847 u8 *len; local 868 len 537 p2p_process_go_neg_req(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len, int rx_freq) argument 913 p2p_process_go_neg_resp(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len, int rx_freq) argument 1161 p2p_process_go_neg_conf(struct p2p_data *p2p, const u8 *sa, const u8 *data, size_t len) argument [all...] |
H A D | p2p_group.c | 178 size_t len; local 183 len = wpabuf_len(subelems) + 100; 185 ie = wpabuf_alloc(len); 210 u8 *len; local 236 len = p2p_buf_add_ie_hdr(ie); 240 p2p_buf_update_ie_hdr(ie, len); 301 u16 len; local 304 len = WPA_GET_BE16(pos); 306 if (pos + len > end) 311 if (len < 357 u8 *len; local 599 p2p_group_notif_assoc(struct p2p_group *group, const u8 *addr, const u8 *ie, size_t len) argument [all...] |
H A D | p2p_i.h | 146 size_t len; member in struct:p2p_pending_action_tx 148 /* Followed by len octets of the frame */ 603 int p2p_random(char *buf, size_t len); 625 int p2p_parse_ies(const u8 *data, size_t len, struct p2p_message *msg); 626 int p2p_parse(const u8 *data, size_t len, struct p2p_message *msg); 667 void p2p_buf_update_ie_hdr(struct wpabuf *buf, u8 *len); 699 const u8 *data, size_t len, int rx_freq); 701 const u8 *data, size_t len, int rx_freq); 703 const u8 *data, size_t len, int rx_freq); 705 const u8 *data, size_t len, in [all...] |