/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | preauth_auth.c | 42 const u8 *buf, size_t len) 52 if (len < sizeof(*ethhdr) + sizeof(*hdr)) { 54 "(len=%lu)", (unsigned long) len); 93 len - sizeof(*ethhdr)); 199 size_t len; local 204 key = ieee802_1x_get_key(sta->eapol_sm, &len); 205 if (len > PMK_LEN) 206 len = PMK_LEN; 208 if (wpa_auth_pmksa_add_preauth(hapd->wpa_auth, key, len, 41 rsn_preauth_receive(void *ctx, const u8 *src_addr, const u8 *buf, size_t len) argument 231 rsn_preauth_send(struct hostapd_data *hapd, struct sta_info *sta, u8 *buf, size_t len) argument [all...] |
H A D | preauth_auth.h | 19 u8 *buf, size_t len); 41 u8 *buf, size_t len) 39 rsn_preauth_send(struct hostapd_data *hapd, struct sta_info *sta, u8 *buf, size_t len) argument
|
H A D | vlan_init.c | 614 vlan_read_ifnames(struct nlmsghdr *h, size_t len, int del, argument 621 if (len < sizeof(*ifi)) 681 int len, plen; local 683 len = h->nlmsg_len; 684 plen = len - sizeof(*h); 685 if (len > left || plen < 0) { 687 "message: len=%d left=%d plen=%d", 688 len, left, plen); 701 len = NLMSG_ALIGN(len); [all...] |
H A D | wmm.c | 100 int hostapd_eid_wmm_valid(struct hostapd_data *hapd, const u8 *eid, size_t len) argument 104 wpa_hexdump(MSG_MSGDUMP, "WMM IE", eid, len); 106 if (len < sizeof(struct wmm_information_element)) { 107 wpa_printf(MSG_DEBUG, "Too short WMM IE (len=%lu)", 108 (unsigned long) len); 135 int len; local 151 len = ((u8 *) (t + 1)) - buf; 153 if (hostapd_drv_send_mlme(hapd, m, len, 0) < 0) 233 struct wmm_tspec_element *tspec, size_t len) 235 const u8 *end = ((const u8 *) mgmt) + len; 231 wmm_addts_req(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, struct wmm_tspec_element *tspec, size_t len) argument 256 hostapd_wmm_action(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len) argument [all...] |
H A D | wnm_ap.c | 51 size_t len; local 73 wnmsleep_ie.len = wnmsleep_ie_len - 2; 139 len = 1 + sizeof(mgmt->u.action.u.wnm_sleep_resp) + gtk_elem_len + 145 mgmt->da, &mgmt->u.action.category, len); 191 const u8 *addr, const u8 *frm, int len) 203 while (pos + 1 < frm + len) { 205 if (pos + 2 + ie_len > frm + len) 255 size_t url_len, len; local 293 len = pos - &mgmt->u.action.category; 295 mgmt->da, &mgmt->u.action.category, len); 190 ieee802_11_rx_wnmsleep_req(struct hostapd_data *hapd, const u8 *addr, const u8 *frm, int len) argument 301 ieee802_11_rx_bss_trans_mgmt_query(struct hostapd_data *hapd, const u8 *addr, const u8 *frm, size_t len) argument 330 ieee802_11_rx_bss_trans_mgmt_resp(struct hostapd_data *hapd, const u8 *addr, const u8 *frm, size_t len) argument 369 ieee802_11_rx_wnm_action_ap(struct hostapd_data *hapd, const struct ieee80211_mgmt *mgmt, size_t len) argument [all...] |
H A D | wpa_auth.c | 98 const u8 *addr, u8 *msk, size_t *len) 102 return wpa_auth->cb.get_msk(wpa_auth->cb.ctx, addr, msk, len); 1287 size_t len; local 1294 len = sizeof(struct ieee802_1x_hdr) + sizeof(struct wpa_eapol_key); 1330 len += key_data_len; 1332 hdr = os_zalloc(len); 1337 hdr->length = host_to_be16(len - sizeof(*hdr)); 1423 wpa_eapol_key_mic(sm->PTK.kck, version, (u8 *) hdr, len, 1439 wpa_auth_send_eapol(wpa_auth, sm->addr, (u8 *) hdr, len, 1716 size_t len local 97 wpa_auth_get_msk(struct wpa_authenticator *wpa_auth, const u8 *addr, u8 *msk, size_t *len) argument 1925 size_t len; local 1939 size_t len = wpa_cipher_key_len(sm->wpa_auth->conf.group_mgmt_cipher); local 2468 size_t len; local 2594 size_t len = wpa_cipher_key_len(sm->wpa_auth->conf.group_mgmt_cipher); local 2671 size_t len; local 2843 int len = 0, ret; local 2932 int len = 0, ret; local 3041 wpa_auth_get_wpa_ie(struct wpa_authenticator *wpa_auth, size_t *len) argument 3066 wpa_auth_pmksa_add_preauth(struct wpa_authenticator *wpa_auth, const u8 *pmk, size_t len, const u8 *sta_addr, int session_timeout, struct eapol_state_machine *eapol) argument [all...] |
H A D | wpa_auth_ft.c | 75 int wpa_write_mdie(struct wpa_auth_config *conf, u8 *buf, size_t len) argument 79 if (len < 2 + sizeof(struct rsn_mdie)) 98 u8 *buf, size_t len, const u8 *subelem, 104 if (len < 2 + sizeof(*hdr) + 2 + FT_R1KH_ID_LEN + 2 + r0kh_id_len + 417 static u8 * wpa_ft_gtk_subelem(struct wpa_state_machine *sm, size_t *len) argument 468 *len = subelem_len; 474 static u8 * wpa_ft_igtk_subelem(struct wpa_state_machine *sm, size_t *len) argument 501 *len = subelem_len; 1139 int wpa_ft_action_rx(struct wpa_state_machine *sm, const u8 *data, size_t len) argument 1155 if (len < 1 95 wpa_write_ftie(struct wpa_auth_config *conf, const u8 *r0kh_id, size_t r0kh_id_len, const u8 *anonce, const u8 *snonce, u8 *buf, size_t len, const u8 *subelem, size_t subelem_len) argument 1222 wpa_ft_rrb_rx_request(struct wpa_authenticator *wpa_auth, const u8 *current_ap, const u8 *sta_addr, const u8 *body, size_t len) argument [all...] |
H A D | wpa_auth_glue.c | 244 size_t *len) 259 if (keylen > *len) 260 keylen = *len; 262 *len = keylen; 506 size_t len) 510 if (len < sizeof(*ethhdr)) 516 len - sizeof(*ethhdr)); 243 hostapd_wpa_auth_get_msk(void *ctx, const u8 *addr, u8 *msk, size_t *len) argument 505 hostapd_rrb_receive(void *ctx, const u8 *src_addr, const u8 *buf, size_t len) argument
|
H A D | wpa_auth_ie.c | 27 static int wpa_write_wpa_ie(struct wpa_auth_config *conf, u8 *buf, size_t len) argument 85 hdr->len = (pos - buf) - 2; 91 int wpa_write_rsn_ie(struct wpa_auth_config *conf, u8 *buf, size_t len, argument 244 if (pos + 2 + PMKID_LEN > buf + len) 255 if (pos + 2 + 4 > buf + len) 310 hdr->len = (pos - buf) - 2; 318 u8 *len; local 322 len = eid++; /* to be filled */ 359 *len = eid - len 848 wpa_parse_kde_ies(const u8 *buf, size_t len, struct wpa_eapol_ie_parse *ie) argument [all...] |
H A D | wps_hostapd.c | 176 int len; local 181 len = os_snprintf(txt, sizeof(txt), WPS_EVENT_PIN_NEEDED 188 if (len > 0 && len < (int) sizeof(txt)) 402 size_t len, i; local 468 len = os_strlen(hapd->iface->config_fname) + 5; 469 tmp_fname = os_malloc(len); 472 os_snprintf(tmp_fname, len, "%s-new", hapd->iface->config_fname); 1088 wps->network_key = os_malloc(conf->ssid.wep.len[0]); 1092 conf->ssid.wep.len[ 1611 size_t len; local [all...] |
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | common_module_tests.c | 18 size_t len; member in struct:ieee802_11_parse_test_data 64 res = ieee802_11_parse_elems(test->data, test->len, &elems, 1); 66 ieee802_11_ie_count(test->data, test->len) != test->count) { 86 size_t len; member in struct:rsn_ie_parse_test_data 150 if (wpa_parse_wpa_ie_rsn(test->data, test->len, &data) !=
|
H A D | gas.c | 221 u8 *len; local 244 len = wpabuf_mhead_u8(buf) + offset; 245 WPA_PUT_LE16(len, (u8 *) wpabuf_put(buf, 0) - len - 2);
|
H A D | ieee802_11_common.c | 29 "information element ignored (len=%lu)", 52 "(len=%lu)", 75 "(subtype=%d len=%lu)", 88 "(type=%d len=%lu)", 119 "(type=%d len=%lu)", 134 "(type=%d len=%lu)", 143 "%02x:%02x:%02x len=%lu)", 155 * @len: Length of IE buffer in octets 160 ParseRes ieee802_11_parse_elems(const u8 *start, size_t len, argument 164 size_t left = len; 381 get_hdr_bssid(const struct ieee80211_hdr *hdr, size_t len) argument [all...] |
H A D | ieee802_11_defs.h | 1222 u8 len; member in struct:wnm_sleep_element
|
H A D | sae.c | 105 static void buf_shift_right(u8 *buf, size_t len, size_t bits) argument 108 for (i = len - 1; i > 0; i--) 297 size_t len[2]; local 321 len[0] = password_len; 323 len[1] = sizeof(counter); 341 if (hmac_sha256_vector(addrs, sizeof(addrs), 2, addr, len, 373 size_t len[2]; local 393 len[0] = password_len; 395 len[1] = sizeof(counter); 408 if (hmac_sha256_vector(addrs, sizeof(addrs), 2, addr, len, 893 sae_parse_commit(struct sae_data *sae, const u8 *data, size_t len, const u8 **token, size_t *token_len, int *allowed_groups) argument 928 size_t len[5]; local 1025 sae_check_confirm(struct sae_data *sae, const u8 *data, size_t len) argument [all...] |
H A D | wpa_common.c | 28 * @len: Length of the EAPOL frame (from EAPOL header to the end of the frame) 41 int wpa_eapol_key_mic(const u8 *key, int ver, const u8 *buf, size_t len, argument 49 return hmac_md5(key, 16, buf, len, mic); 52 if (hmac_sha1(key, 16, buf, len, hash)) 58 return omac1_aes_128(key, buf, len, mic); 63 return omac1_aes_128(key, buf, len, mic); 461 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu", 469 hdr->len != rsn_ie_len - 2 || 643 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu", 651 hdr->len ! 746 size_t len[2]; local 797 size_t len[4]; local 855 size_t len[6]; local 914 const size_t len[3] = { 8, ETH_ALEN, ETH_ALEN }; local [all...] |
H A D | wpa_common.h | 228 u8 len; member in struct:wpa_ie_hdr 260 u8 len; member in struct:rsn_ie_hdr 330 int wpa_eapol_key_mic(const u8 *key, int ver, const u8 *buf, size_t len,
|
H A D | wpa_ctrl.c | 281 size_t len; local 414 len = sizeof(buf) - 1; 415 if (wpa_ctrl_request(ctrl, "GET_COOKIE", 10, buf, &len, NULL) == 0) { 416 buf[len] = '\0'; 420 if (wpa_ctrl_request(ctrl, "IFNAME", 6, buf, &len, NULL) == 0) { 421 buf[len] = '\0'; 454 void (*msg_cb)(char *msg, size_t len)) 555 size_t len = 10; local 558 buf, &len, NULL); 561 if (len 452 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument 689 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument 709 DWORD len = *reply_len; local [all...] |
H A D | wpa_helpers.c | 39 size_t len; local 45 len = sizeof(buf); 46 if (wpa_ctrl_request(ctrl, cmd, strlen(cmd), buf, &len, NULL) < 0) { 52 buf[len] = '\0'; 65 size_t len; local 71 len = resp_size; 72 if (wpa_ctrl_request(ctrl, cmd, strlen(cmd), resp, &len, NULL) < 0) { 78 resp[len] = '\0'; 116 size_t len; local 131 len 169 size_t len, flen; local [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-ccm.c | 64 static void aes_ccm_auth(void *aes, const u8 *data, size_t len, u8 *x) argument 66 size_t last = len % AES_BLOCK_SIZE; 69 for (i = 0; i < len / AES_BLOCK_SIZE; i++) { 92 static void aes_ccm_encr(void *aes, size_t L, const u8 *in, size_t len, u8 *out, argument 95 size_t last = len % AES_BLOCK_SIZE; 99 for (i = 1; i <= len / AES_BLOCK_SIZE; i++) {
|
H A D | aes-ctr.c | 28 size_t j, len, left = data_len; local 41 len = (left < AES_BLOCK_SIZE) ? left : AES_BLOCK_SIZE; 42 for (j = 0; j < len; j++) 44 pos += len; 45 left -= len;
|
H A D | aes-gcm.c | 197 /* Prepare block J_0 = IV || 0^31 || 1 [len(IV) = 96] */ 203 * s = 128 * ceil(len(IV)/128) - len(IV) 204 * J_0 = GHASH_H(IV || 0^(s+64) || [len(IV)]_64) 215 static void aes_gcm_gctr(void *aes, const u8 *J0, const u8 *in, size_t len, argument 220 if (len == 0) 225 aes_gctr(aes, J0inc, in, len, out); 235 * u = 128 * ceil[len(C)/128] - len(C) 236 * v = 128 * ceil[len( [all...] |
H A D | aes-internal-dec.c | 59 void * aes_decrypt_init(const u8 *key, size_t len) argument 66 res = rijndaelKeySetupDec(rk, key, len * 8);
|
H A D | aes-internal-enc.c | 98 void * aes_encrypt_init(const u8 *key, size_t len) argument 105 res = rijndaelKeySetupEnc(rk, key, len * 8);
|
H A D | aes-omac1.c | 34 * @len: Lengths of the data blocks 43 const u8 *addr[], const size_t *len, u8 *mac) 57 total_len += len[e]; 62 end = pos + len[0]; 70 end = pos + len[e]; 88 end = pos + len[e]; 42 omac1_aes_128_vector(const u8 *key, size_t num_elem, const u8 *addr[], const size_t *len, u8 *mac) argument
|