/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_upnp_web.c | 697 size_t len; local 699 wpabuf_len(reply), &len); 924 int len; local 999 len = end - h; 1001 callback_urls = dup_binstr(h, len);
|
H A D | wps_validate.c | 302 static int wps_validate_manufacturer(const u8 *manufacturer, size_t len, argument 313 if (len > 0 && manufacturer[len - 1] == 0) { 315 "attribute value", manufacturer, len); 322 static int wps_validate_model_name(const u8 *model_name, size_t len, argument 333 if (len > 0 && model_name[len - 1] == 0) { 335 "attribute value", model_name, len); 342 static int wps_validate_model_number(const u8 *model_number, size_t len, argument 353 if (len > 362 wps_validate_serial_number(const u8 *serial_number, size_t len, int mandatory) argument 383 wps_validate_dev_name(const u8 *dev_name, size_t len, int mandatory) argument 523 wps_validate_authorized_macs(const u8 *authorized_macs, size_t len, int mandatory) argument 610 wps_validate_public_key(const u8 *public_key, size_t len, int mandatory) argument 834 wps_validate_encr_settings(const u8 *encr_settings, size_t len, int mandatory) argument 1026 wps_validate_cred(const u8 *cred, size_t len) argument 1058 wps_validate_credential(const u8 *cred[], size_t len[], size_t num, int mandatory) argument [all...] |
/external/wpa_supplicant_8/hs20/client/ |
H A D | est.c | 28 size_t len, char *pem_file, char *der_file) 36 p7 = d2i_PKCS7(NULL, &p, len); 619 size_t buflen, resp_len, len, pkcs7_len; local 627 req = os_readfile("Cert/est-req.b64", &len); 632 req2 = os_realloc(req, len + 1); 637 req2[len] = '\0'; 27 pkcs7_to_cert(struct hs20_osu_client *ctx, const u8 *pkcs7, size_t len, char *pem_file, char *der_file) argument
|
H A D | osu_client.c | 275 size_t len; local 315 cert = os_readfile(TMP_CERT_DL_FILE, &len); 320 if (sha256_vector(1, (const u8 **) &cert, &len, digest2) < 0) { 332 b64 = base64_encode((unsigned char *) cert, len, NULL); 481 size_t match_len, len, i; local 491 len = os_strlen(val); 493 if (match_len > len) 496 if (os_strncasecmp(val + len - match_len, fqdn, match_len) != 0) 499 if (match_len == len) 502 if (val[len 1352 int len, i; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | accounting.c | 39 size_t len; local 82 val = ieee802_1x_get_identity(sta->eapol_sm, &len); 87 len = os_strlen(sta->identity); 96 len = os_strlen(buf); 100 len)) { 112 val = ieee802_1x_get_radius_class(sta->eapol_sm, &len, 118 val, len)) {
|
H A D | ap_config.c | 210 int line = 0, ret = 0, len, ok; local 268 len = os_strlen(pos); 269 if (len == 64 && hexstr2bin(pos, psk->psk, PMK_LEN) == 0) 271 else if (len >= 8 && len < 64) { 391 bin_clear_free(keys->key[i], keys->len[i]); 899 if (bss->ssid.wep.len[0] >= 13)
|
H A D | ap_config.h | 38 size_t len[NUM_WEP_KEYS]; member in struct:hostapd_wep_keys 155 u8 len; member in struct:hostapd_roaming_consortium
|
H A D | ap_drv_ops.c | 336 u16 seq, u16 status, const u8 *ie, size_t len) 341 seq, status, ie, len); 346 int reassoc, u16 status, const u8 *ie, size_t len) 351 reassoc, status, ie, len); 414 int hostapd_get_ssid(struct hostapd_data *hapd, u8 *buf, size_t len) argument 418 return hapd->driver->hapd_get_ssid(hapd->drv_priv, buf, len); 422 int hostapd_set_ssid(struct hostapd_data *hapd, const u8 *buf, size_t len) argument 426 return hapd->driver->hapd_set_ssid(hapd->drv_priv, buf, len); 700 const void *msg, size_t len, int noack) 704 return hapd->driver->send_mlme(hapd->drv_priv, msg, len, noac 335 hostapd_sta_auth(struct hostapd_data *hapd, const u8 *addr, u16 seq, u16 status, const u8 *ie, size_t len) argument 345 hostapd_sta_assoc(struct hostapd_data *hapd, const u8 *addr, int reassoc, u16 status, const u8 *ie, size_t len) argument 699 hostapd_drv_send_mlme(struct hostapd_data *hapd, const void *msg, size_t len, int noack) argument 738 hostapd_drv_send_action(struct hostapd_data *hapd, unsigned int freq, unsigned int wait, const u8 *dst, const u8 *data, size_t len) argument [all...] |
H A D | beacon.c | 35 static u8 * hostapd_eid_bss_load(struct hostapd_data *hapd, u8 *eid, size_t len) argument 39 if (2 + 5 > len) 254 static u8 * hostapd_eid_wpa(struct hostapd_data *hapd, u8 *eid, size_t len) argument 260 if (ie == NULL || ielen > len) 504 const struct ieee80211_mgmt *mgmt, size_t len, 517 if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.probe_req)) 519 ie_len = len - (IEEE80211_HDRLEN + sizeof(mgmt->u.probe_req)); 503 handle_probe_req(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len, int ssi_signal) argument
|
H A D | ctrl_iface_ap.c | 87 int len, res, ret, i; local 92 len = 0; 93 ret = os_snprintf(buf + len, buflen - len, MACSTR "\nflags=", 95 if (ret < 0 || (size_t) ret >= buflen - len) 96 return len; 97 len += ret; 99 ret = ap_sta_flags_txt(sta->flags, buf + len, buflen - len); 101 return len; 395 int len = 0, ret; local [all...] |
H A D | drv_callbacks.c | 771 size_t len, u16 stype, int ok) 775 hapd = get_hapd_bssid(hapd->iface, get_hdr_bssid(hdr, len)); 778 ieee802_11_mgmt_cb(hapd, buf, len, stype, ok); 770 hostapd_mgmt_tx_cb(struct hostapd_data *hapd, const u8 *buf, size_t len, u16 stype, int ok) argument
|
H A D | eap_user_db.c | 105 size_t len; local 117 len = os_strlen(argv[id]); 118 if (len <= user->identity_len && 119 os_memcmp(argv[id], user->identity, len) == 0 && 120 (user->password == NULL || len > user->password_len)) {
|
H A D | gas_serv.c | 143 u8 *len; local 145 len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC); 165 gas_anqp_set_element_len(buf, len); 173 u8 *len; local 175 len = gas_anqp_add_element(buf, ANQP_CAPABILITY_LIST); 194 gas_anqp_set_element_len(buf, len); 201 u8 *len; local 203 len = gas_anqp_add_element(buf, ANQP_VENUE_NAME); 213 gas_anqp_set_element_len(buf, len); 234 u8 *len; local 395 u8 *len; local 454 u8 *len; local 478 u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC); local 493 u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC); local 509 u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC); local 525 u8 *len, *len2, *count; local 603 u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC); local 634 u8 *len; local 693 size_t len; local 1018 gas_serv_rx_gas_initial_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot) argument 1127 gas_serv_rx_gas_comeback_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot) argument 1211 gas_serv_rx_public_action(void *ctx, const u8 *buf, size_t len, int freq) argument [all...] |
H A D | hs20.c | 44 u8 *len; local 51 len = eid++; /* to be filled */ 88 *len = eid - len - 1; 98 size_t len = 0; local 105 len = 1 + os_strlen(url); 106 if (5 + len > 255) { 113 buf = wpabuf_alloc(4 + 7 + len); 124 wpabuf_put_u8(buf, 5 + len); 128 wpabuf_put_u8(buf, len [all...] |
H A D | iapp.c | 91 be16 len; /* 6 */ member in struct:iapp_layer2_update 223 msg.len = host_to_be16(6); 266 struct iapp_hdr *hdr, int len) 271 if (len != sizeof(*add)) { 273 len, (unsigned long) sizeof(*add)); 310 int len, hlen; local 319 len = recvfrom(iapp->udp_sock, buf, sizeof(buf), 0, 321 if (len < 0) { 333 len, inet_ntoa(from.sin_addr), 334 len < (in 264 iapp_process_add_notify(struct iapp_data *iapp, struct sockaddr_in *from, struct iapp_hdr *hdr, int len) argument [all...] |
H A D | ieee802_11.c | 289 " auth_alg=%d auth_transaction=%d resp=%d (IE len=%lu)", 444 const struct ieee80211_mgmt *mgmt, size_t len, 466 ((const u8 *) mgmt) + len - 505 ((u8 *) mgmt) + len - 544 const struct ieee80211_mgmt *mgmt, size_t len) 560 if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) { 561 wpa_printf(MSG_INFO, "handle_auth - too short payload (len=%lu)", 562 (unsigned long) len); 581 if (len >= IEEE80211_HDRLEN + sizeof(mgmt->u.auth) + 631 res = hostapd_allowed_address(hapd, mgmt->sa, (u8 *) mgmt, len, 443 handle_auth_sae(struct hostapd_data *hapd, struct sta_info *sta, const struct ieee80211_mgmt *mgmt, size_t len, u8 auth_transaction) argument 543 handle_auth(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len) argument 1274 handle_assoc(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len, int reassoc) argument 1456 handle_disassoc(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len) argument 1504 handle_deauth(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len) argument 1541 handle_beacon(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len, struct hostapd_frame_info *fi) argument 1564 hostapd_sa_query_action(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len) argument 1593 handle_action(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len) argument 1731 ieee802_11_mgmt(struct hostapd_data *hapd, const u8 *buf, size_t len, struct hostapd_frame_info *fi) argument 1822 handle_auth_cb(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len, int ok) argument 1887 handle_assoc_cb(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len, int reassoc, int ok) argument 2026 handle_deauth_cb(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len, int ok) argument 2050 handle_disassoc_cb(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len, int ok) argument 2083 ieee802_11_mgmt_cb(struct hostapd_data *hapd, const u8 *buf, size_t len, u16 stype, int ok) argument 2146 hostapd_tx_status(struct hostapd_data *hapd, const u8 *addr, const u8 *buf, size_t len, int ack) argument 2176 hostapd_eapol_tx_status(struct hostapd_data *hapd, const u8 *dst, const u8 *data, size_t len, int ack) argument [all...] |
H A D | ieee802_11_auth.c | 220 * @len: Length of msg in octets 233 const u8 *msg, size_t len, u32 *session_timeout, 317 query->auth_msg = os_malloc(len); 324 os_memcpy(query->auth_msg, msg, len); 325 query->auth_msg_len = len; 523 size_t len; local 548 &buf, &len, NULL) == 0) { 549 cache->identity = os_zalloc(len + 1); 551 os_memcpy(cache->identity, buf, len); 555 &buf, &len, NUL 232 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument [all...] |
H A D | ieee802_11_ht.c | 207 const struct ieee80211_mgmt *mgmt, size_t len) 223 if (len < IEEE80211_HDRLEN + 1) 206 hostapd_2040_coex_action(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len) argument
|
H A D | ieee802_11_shared.c | 220 u8 len = 0, i; local 223 len = 5; 224 if (len < 4 && hapd->conf->interworking) 225 len = 4; 226 if (len < 3 && hapd->conf->wnm_sleep_mode) 227 len = 3; 228 if (len < 1 && hapd->iconf->obss_interval) 229 len = 1; 230 if (len < 7 && hapd->conf->ssid.utf8_ssid) 231 len 270 u8 len = hapd->conf->qos_map_set_len; local 288 u8 *len; local 347 u8 *len; local 412 size_t len; local [all...] |
H A D | ieee802_1x.c | 47 size_t len; local 50 len = sizeof(*xhdr) + datalen; 51 buf = os_zalloc(len); 54 "ieee802_1x_send(len=%lu)", 55 (unsigned long) len); 70 rsn_preauth_send(hapd, sta, buf, len); 73 hapd, sta->addr, buf, len, 122 size_t len, ekey_len; local 128 len = sizeof(*key) + key_len; 129 buf = os_zalloc(sizeof(*hdr) + len); 279 ieee802_1x_learn_identity(struct hostapd_data *hapd, struct eapol_state_machine *sm, const u8 *eap, size_t len) argument 536 ieee802_1x_encapsulate_radius(struct hostapd_data *hapd, struct sta_info *sta, const u8 *eap, size_t len) argument 668 handle_eap_response(struct hostapd_data *hapd, struct sta_info *sta, struct eap_hdr *eap, size_t len) argument 701 handle_eap(struct hostapd_data *hapd, struct sta_info *sta, u8 *buf, size_t len) argument 776 ieee802_1x_receive(struct hostapd_data *hapd, const u8 *sa, const u8 *buf, size_t len) argument 1201 size_t len = keys->send_len + keys->recv_len; local 1288 size_t len; local 1322 size_t len; local 1342 ieee802_1x_hs20_sub_rem(struct sta_info *sta, u8 *pos, size_t len) argument 1366 ieee802_1x_hs20_deauth_req(struct hostapd_data *hapd, struct sta_info *sta, u8 *pos, size_t len) argument 1387 ieee802_1x_hs20_session_info(struct hostapd_data *hapd, struct sta_info *sta, u8 *pos, size_t len, int session_timeout) argument 1438 size_t len; local 2068 ieee802_1x_tx_status(struct hostapd_data *hapd, struct sta_info *sta, const u8 *buf, size_t len, int ack) argument 2095 ieee802_1x_eapol_tx_status(struct hostapd_data *hapd, struct sta_info *sta, const u8 *buf, int len, int ack) argument 2149 ieee802_1x_get_identity(struct eapol_state_machine *sm, size_t *len) argument 2159 ieee802_1x_get_radius_class(struct eapol_state_machine *sm, size_t *len, int idx) argument 2179 ieee802_1x_get_key(struct eapol_state_machine *sm, size_t *len) argument 2237 int len = 0, ret; local 2399 size_t len; local [all...] |
H A D | preauth_auth.c | 42 const u8 *buf, size_t len) 52 if (len < sizeof(*ethhdr) + sizeof(*hdr)) { 54 "(len=%lu)", (unsigned long) len); 93 len - sizeof(*ethhdr)); 199 size_t len; local 204 key = ieee802_1x_get_key(sta->eapol_sm, &len); 205 if (len > PMK_LEN) 206 len = PMK_LEN; 208 if (wpa_auth_pmksa_add_preauth(hapd->wpa_auth, key, len, 41 rsn_preauth_receive(void *ctx, const u8 *src_addr, const u8 *buf, size_t len) argument 231 rsn_preauth_send(struct hostapd_data *hapd, struct sta_info *sta, u8 *buf, size_t len) argument [all...] |
H A D | preauth_auth.h | 19 u8 *buf, size_t len); 41 u8 *buf, size_t len) 39 rsn_preauth_send(struct hostapd_data *hapd, struct sta_info *sta, u8 *buf, size_t len) argument
|
H A D | vlan_init.c | 614 vlan_read_ifnames(struct nlmsghdr *h, size_t len, int del, argument 621 if (len < sizeof(*ifi)) 681 int len, plen; local 683 len = h->nlmsg_len; 684 plen = len - sizeof(*h); 685 if (len > left || plen < 0) { 687 "message: len=%d left=%d plen=%d", 688 len, left, plen); 701 len = NLMSG_ALIGN(len); [all...] |
H A D | wmm.c | 100 int hostapd_eid_wmm_valid(struct hostapd_data *hapd, const u8 *eid, size_t len) argument 104 wpa_hexdump(MSG_MSGDUMP, "WMM IE", eid, len); 106 if (len < sizeof(struct wmm_information_element)) { 107 wpa_printf(MSG_DEBUG, "Too short WMM IE (len=%lu)", 108 (unsigned long) len); 135 int len; local 151 len = ((u8 *) (t + 1)) - buf; 153 if (hostapd_drv_send_mlme(hapd, m, len, 0) < 0) 233 struct wmm_tspec_element *tspec, size_t len) 235 const u8 *end = ((const u8 *) mgmt) + len; 231 wmm_addts_req(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, struct wmm_tspec_element *tspec, size_t len) argument 256 hostapd_wmm_action(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len) argument [all...] |
H A D | wnm_ap.c | 51 size_t len; local 73 wnmsleep_ie.len = wnmsleep_ie_len - 2; 139 len = 1 + sizeof(mgmt->u.action.u.wnm_sleep_resp) + gtk_elem_len + 145 mgmt->da, &mgmt->u.action.category, len); 191 const u8 *addr, const u8 *frm, int len) 203 while (pos + 1 < frm + len) { 205 if (pos + 2 + ie_len > frm + len) 255 size_t url_len, len; local 293 len = pos - &mgmt->u.action.category; 295 mgmt->da, &mgmt->u.action.category, len); 190 ieee802_11_rx_wnmsleep_req(struct hostapd_data *hapd, const u8 *addr, const u8 *frm, int len) argument 301 ieee802_11_rx_bss_trans_mgmt_query(struct hostapd_data *hapd, const u8 *addr, const u8 *frm, size_t len) argument 330 ieee802_11_rx_bss_trans_mgmt_resp(struct hostapd_data *hapd, const u8 *addr, const u8 *frm, size_t len) argument 369 ieee802_11_rx_wnm_action_ap(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len) argument [all...] |