/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | os_win32.c | 131 int os_get_random(unsigned char *buf, size_t len) argument 140 ret = CryptGenRandom(prov, len, buf); 192 char * os_readfile(const char *name, size_t *len) argument 202 *len = ftell(f); 205 buf = malloc(*len); 211 fread(buf, 1, *len, f); 249 int os_memcmp_const(const void *a, const void *b, size_t len) argument 256 for (res = 0, i = 0; i < len; i++)
|
H A D | pcsc_funcs.c | 30 * GET RESPONSE: C0 00 00 <len> 31 * RUN GSM ALG: 88 00 00 00 <RAND len = 10> 32 * RUN UMTS ALG: 88 00 81 <len=0x22> data: 0x10 | RAND | 0x10 | AUTN 35 * READ BINARY: B0 <offset high> <offset low> <len> 36 * READ RECORD: B2 <record number> <mode> <len> 254 unsigned char *data, size_t len, 285 wpa_printf(MSG_MSGDUMP, "SCARD: file header TLV 0x%02x len=%d", 441 "template (len=%d rlen=%d)", 499 unsigned long len, pos; local 526 ret = SCardListReaders(scard->ctx, NULL, NULL, &len); 791 size_t len, rlen; local 905 scard_read_record(struct scard_data *scard, unsigned char *data, size_t len, unsigned char recnum, unsigned char mode) argument 952 scard_read_file(struct scard_data *scard, unsigned char *data, size_t len) argument 1001 size_t len; local 1033 size_t len; local 1082 scard_get_imsi(struct scard_data *scard, char *imsi, size_t *len) argument 1223 size_t len; local 1324 size_t len; local [all...] |
H A D | trace.c | 32 int len; local 34 len = readlink(exe, fname, sizeof(fname) - 1); 35 if (len < 0 || len >= (int) sizeof(fname)) { 39 fname[len] = '\0';
|
H A D | utils_module_tests.c | 19 size_t len; member in struct:printf_test_data 50 printf_encode(buf, sizeof(buf), test->data, test->len); 54 if (binlen != test->len || 62 if (binlen != test->len || 186 int len; local 195 len = int_array_len(test3_res); 196 if (int_array_len(test3) != len) 198 else if (os_memcmp(test3, test3_res, len * sizeof(int)) != 0)
|
H A D | uuid.c | 51 int len; local 52 len = os_snprintf(str, max_len, "%02x%02x%02x%02x-%02x%02x-%02x%02x-" 58 if (len < 0 || (size_t) len >= max_len)
|
H A D | wpa_debug.c | 252 size_t len, int show) 259 WPAS_TRACE_PFX "%s - hexdump(len=%lu):", 260 level, title, (unsigned long) len); 266 for (i = 0; i < len; i++) 280 size_t slen = len; 283 } else if (len == 0) { 285 } else if (show && len) { 307 "%s - hexdump(len=%lu):%s%s", 308 title, (long unsigned int) len, display, 309 len > sle 251 _wpa_hexdump(int level, const char *title, const u8 *buf, size_t len, int show) argument 378 wpa_hexdump(int level, const char *title, const void *buf, size_t len) argument 384 wpa_hexdump_key(int level, const char *title, const void *buf, size_t len) argument 390 _wpa_hexdump_ascii(int level, const char *title, const void *buf, size_t len, int show) argument 498 wpa_hexdump_ascii(int level, const char *title, const void *buf, size_t len) argument 505 wpa_hexdump_ascii_key(int level, const char *title, const void *buf, size_t len) argument 600 int len; local 638 int len; local 666 int len; local 693 int len; local 721 int len; local 760 int len; local [all...] |
H A D | wpabuf.c | 30 static void wpabuf_overflow(const struct wpabuf *buf, size_t len) argument 39 wpa_printf(MSG_ERROR, "wpabuf %p (size=%lu used=%lu) overflow len=%lu", 41 (unsigned long) len); 110 * @len: Length for the allocated buffer 113 struct wpabuf * wpabuf_alloc(size_t len) argument 117 sizeof(struct wpabuf) + len); 124 struct wpabuf *buf = os_zalloc(sizeof(struct wpabuf) + len); 129 buf->size = len; 135 struct wpabuf * wpabuf_alloc_ext_data(u8 *data, size_t len) argument 151 buf->size = len; 160 wpabuf_alloc_copy(const void *data, size_t len) argument 208 wpabuf_put(struct wpabuf *buf, size_t len) argument 231 size_t len = 0; local 268 wpabuf_zeropad(struct wpabuf *buf, size_t len) argument [all...] |
H A D | wpabuf.h | 30 struct wpabuf * wpabuf_alloc(size_t len); 31 struct wpabuf * wpabuf_alloc_ext_data(u8 *data, size_t len); 32 struct wpabuf * wpabuf_alloc_copy(const void *data, size_t len); 35 void * wpabuf_put(struct wpabuf *buf, size_t len); 37 struct wpabuf * wpabuf_zeropad(struct wpabuf *buf, size_t len); 138 size_t len) 141 os_memcpy(wpabuf_put(buf, len), data, len); local 150 static inline void wpabuf_set(struct wpabuf *buf, const void *data, size_t len) argument 154 buf->size = buf->used = len; 137 wpabuf_put_data(struct wpabuf *buf, const void *data, size_t len) argument [all...] |
H A D | xml-utils.c | 127 size_t len; local 129 buf = os_readfile(name, &len); 132 buf2 = os_realloc(buf, len + 1); 138 buf[len] = '\0'; 212 size_t len; local 218 len = os_strlen(prev) + 1 + os_strlen(leaf) + 1; 219 new_uri = os_malloc(len); 221 os_snprintf(new_uri, len, "%s/%s", prev, leaf);
|
H A D | xml_libxml2.c | 26 size_t len; member in struct:str_buf 36 int len; local 38 n = os_realloc(str->buf, str->len + MAX_STR + 2); 44 len = vsnprintf(str->buf + str->len, MAX_STR, fmt, ap); 46 if (len >= MAX_STR) 47 len = MAX_STR - 1; 48 str->len += len; 49 str->buf[str->len] 404 size_t len; local [all...] |
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | http_client.c | 326 size_t len; local 341 len = os_strlen(url) + 1 + os_strlen(base) + 1; 342 n = os_malloc(len); 349 os_snprintf(n, len, "%s%s", base, url); 357 os_snprintf(n, len, "%s/%s", base, url);
|
H A D | ndef.c | 81 int len = wpabuf_len(buf); local 84 while (len > 0) { 85 if (ndef_parse_record(data, len, &record) < 0) { 93 len -= record.total_length;
|
H A D | upnp_xml.c | 121 void xml_data_encode(struct wpabuf *buf, const char *data, int len) argument 124 for (i = 0; i < len; i++) { 230 size_t len; local 238 decoded = base64_decode((unsigned char *) msg, os_strlen(msg), &len); 245 buf = wpabuf_alloc_ext_data(decoded, len);
|
H A D | wps.c | 419 u8 *len; local 428 len = wpabuf_put(ie, 1); 438 *len = wpabuf_len(ie) - 2; 453 u8 *len; local 462 len = wpabuf_put(ie, 1); 472 *len = wpabuf_len(ie) - 2;
|
H A D | wps_attr_build.c | 162 size_t len[2]; local 174 len[0] = wpabuf_len(wps->last_msg); 176 len[1] = wpabuf_len(msg); 177 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash); 208 u8 *len; local 220 len = wpabuf_put(msg, 2); /* to be filled */ 247 WPA_PUT_BE16(len, (u8 *) wpabuf_put(msg, 0) - len - 2);
|
H A D | wps_attr_parse.c | 21 u8 id, u8 len, const u8 *pos) 23 wpa_printf(MSG_EXCESSIVE, "WPS: WFA subelement id=%u len=%u", 24 id, len); 27 if (len != 1) { 29 "%u", len); 36 attr->authorized_macs_len = len; 39 if (len != 1) { 41 "Shareable length %u", len); 47 if (len != 1) { 49 "length %u", len); 20 wps_set_vendor_ext_wfa_subelem(struct wps_parse_attr *attr, u8 id, u8 len, const u8 *pos) argument 80 wps_parse_vendor_ext_wfa(struct wps_parse_attr *attr, const u8 *pos, u16 len) argument 100 wps_parse_vendor_ext(struct wps_parse_attr *attr, const u8 *pos, u16 len) argument 141 wps_set_attr(struct wps_parse_attr *attr, u16 type, const u8 *pos, u16 len) argument 553 u16 type, len; local [all...] |
H A D | wps_attr_process.c | 21 size_t len[2]; local 39 len[0] = wpabuf_len(wps->last_msg); 41 len[1] = wpabuf_len(msg) - 4 - WPS_AUTHENTICATOR_LEN; 42 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash); 58 size_t len; local 66 len = wpabuf_len(msg) - 4 - WPS_KWA_LEN; 67 if (head + len != key_wrap_auth - 4) { 73 hmac_sha256(wps->authkey, WPS_AUTHKEY_LEN, head, len, hash);
|
H A D | wps_common.c | 29 size_t len[4]; local 37 len[0] = sizeof(i_buf); 39 len[1] = label_prefix_len; 41 len[2] = os_strlen(label); 43 len[3] = sizeof(key_bits); 51 hmac_sha256_vector(key, SHA256_MAC_LEN, 4, addr, len, hash); 67 size_t len[3]; local 100 len[0] = wpabuf_len(dh_shared); 101 sha256_vector(1, addr, len, dhkey); 107 len[ 258 size_t len; local 502 size_t len[2]; local 700 void *len; local 779 void *len; local [all...] |
H A D | wps_dev_attr.c | 18 size_t len; local 21 len = dev->manufacturer ? os_strlen(dev->manufacturer) : 0; 23 if (len == 0) { 34 wpabuf_put_be16(msg, len); 35 wpabuf_put_data(msg, dev->manufacturer, len); 42 size_t len; local 45 len = dev->model_name ? os_strlen(dev->model_name) : 0; 47 if (len == 0) { 58 wpabuf_put_be16(msg, len); 59 wpabuf_put_data(msg, dev->model_name, len); 66 size_t len; local 90 size_t len; local 160 size_t len; local [all...] |
H A D | wps_enrollee.c | 39 size_t len[4]; local 59 len[0] = WPS_SECRET_NONCE_LEN; 61 len[1] = WPS_PSK_LEN; 63 len[2] = wpabuf_len(wps->dh_pubkey_e); 65 len[3] = wpabuf_len(wps->dh_pubkey_r); 66 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 4, addr, len, hash); 76 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 4, addr, len, hash); 285 wpa_printf(MSG_DEBUG, "WPS: * Network Key (len=%u)", 299 wpa_printf(MSG_DEBUG, "WPS: * Network Key (len=%u)", 597 size_t len[ local 637 size_t len[4]; local [all...] |
H A D | wps_er.c | 1280 size_t len = end - pos; local 1281 os_strlcpy(er->ifname, pos, len < sizeof(er->ifname) ? 1282 len + 1 : sizeof(er->ifname));
|
H A D | wps_module_tests.c | 273 size_t len; local 277 len = os_strlen(test->data) / 2; 278 buf = wpabuf_alloc(len); 281 if (hexstr2bin(test->data, wpabuf_put(buf, len), len) < 0) {
|
H A D | wps_registrar.c | 1418 size_t len[4]; local 1438 len[0] = WPS_SECRET_NONCE_LEN; 1440 len[1] = WPS_PSK_LEN; 1442 len[2] = wpabuf_len(wps->dh_pubkey_e); 1444 len[3] = wpabuf_len(wps->dh_pubkey_r); 1445 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 4, addr, len, hash); 1455 hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 4, addr, len, hash); 1534 wpa_printf(MSG_DEBUG, "WPS: * Network Key (len=%d)", 2200 size_t len[4]; local 2212 len[ 2240 size_t len[4]; local 3472 int len = 0, ret; local [all...] |
H A D | wps_upnp.c | 842 size_t len; local 845 if (sysctl(mib, 6, NULL, &len, NULL, 0) < 0) 847 if ((buf = os_malloc(len)) == NULL) 849 if (sysctl(mib, 6, buf, &len, NULL, 0) < 0) { 853 for (p = buf; p < buf + len; p += ifm->ifm_msglen) { 867 if (p >= buf + len) {
|
H A D | wps_upnp_event.c | 378 unsigned int len; local 380 len = dl_list_len(&s->event_queue); 381 if (len >= MAX_EVENTS_QUEUED) { 394 if (s->last_event_failed && probereq && len > 0) { 419 "(queue len %u)", e, s, len + 1);
|