/external/wpa_supplicant_8/hostapd/ |
H A D | ctrl_iface.c | 404 struct wpabuf *req, *sel; local 430 req = wpabuf_alloc(len); 431 if (req == NULL) 433 if (hexstr2bin(pos, wpabuf_put(req, len), len) < 0) { 434 wpabuf_free(req); 440 wpabuf_free(req); 447 wpabuf_free(req); 451 wpabuf_free(req); 457 ret = hostapd_wps_nfc_report_handover(hapd, req, sel); 463 wpabuf_free(req); 653 struct wpabuf *req; local [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | accounting.c | 391 * @req: RADIUS request message 398 accounting_receive(struct radius_msg *msg, struct radius_msg *req, argument 407 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) {
|
H A D | beacon.c | 334 const struct ieee80211_mgmt *req, 361 if (req) 362 os_memcpy(resp->da, req->sa, ETH_ALEN); 332 hostapd_gen_probe_resp(struct hostapd_data *hapd, struct sta_info *sta, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) argument
|
H A D | ieee802_11_auth.c | 422 struct radius_msg *req, 436 req, i); 469 * @req: RADIUS request message 477 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, argument 500 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) { 545 msg, req, cache); 418 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) argument
|
H A D | ieee802_1x.c | 1188 struct radius_msg *req, 1197 keys = radius_msg_get_ms_keys(msg, req, shared_secret, 1517 * @req: RADIUS request message 1524 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, argument 1554 req, 1)) { 1637 ieee802_1x_get_keys(hapd, sta, msg, req, shared_secret, 1186 ieee802_1x_get_keys(struct hostapd_data *hapd, struct sta_info *sta, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument
|
H A D | wps_hostapd.c | 1804 const struct wpabuf *req, 1819 wps = ndef_parse_wifi(req); 1803 hostapd_wps_nfc_report_handover(struct hostapd_data *hapd, const struct wpabuf *req, const struct wpabuf *sel) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_atheros.c | 916 struct ieee80211req_athdbg req; local 917 struct ieee80211_qos_map *qos_map = &req.data.qos_map; 926 memset(&req, 0, sizeof(struct ieee80211req_athdbg)); 927 req.cmd = IEEE80211_DBGREQ_SETQOSMAPCONF; 930 iwr.u.data.pointer = (void *) &req; 1235 wpa_hexdump(MSG_MSGDUMP, "atheros req WPA IE", 1237 wpa_hexdump(MSG_MSGDUMP, "atheros req RSN IE", 1240 wpa_hexdump(MSG_MSGDUMP, "atheros req WPS IE", 1967 struct ieee80211req_res req; local 1968 struct ieee80211req_res_addts *addts = &req 1989 struct ieee80211req_res req; local [all...] |
H A D | driver_ndis.c | 739 DOT11_SCAN_REQUEST_V2 req; local 742 os_memset(&req, 0, sizeof(req)); 743 req.dot11BSSType = dot11_BSS_type_any; 744 os_memset(req.dot11BSSID, 0xff, ETH_ALEN); 745 req.dot11ScanType = dot11_scan_type_auto; 746 res = ndis_set_oid(drv, OID_DOT11_SCAN_REQUEST, (char *) &req, 747 sizeof(req)); 1532 NDIS_802_11_AUTHENTICATION_REQUEST *req; local 1536 if (data_len < sizeof(*req)) { 1933 NDISUIO_REQUEST_NOTIFICATION req; local 1970 NDISUIO_REQUEST_NOTIFICATION req; local [all...] |
H A D | driver_wext.c | 1005 struct iw_scan_req req; local 1019 os_memset(&req, 0, sizeof(req)); 1020 req.essid_len = ssid_len; 1021 req.bssid.sa_family = ARPHRD_ETHER; 1022 os_memset(req.bssid.sa_data, 0xff, ETH_ALEN); 1023 os_memcpy(req.essid, ssid, ssid_len); 1024 iwr.u.data.pointer = (caddr_t) &req; 1025 iwr.u.data.length = sizeof(req);
|
H A D | netlink.c | 176 } req; local 181 os_memset(&req, 0, sizeof(req)); 183 req.hdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)); 184 req.hdr.nlmsg_type = RTM_SETLINK; 185 req.hdr.nlmsg_flags = NLM_F_REQUEST; 186 req.hdr.nlmsg_seq = ++nl_seq; 187 req.hdr.nlmsg_pid = 0; 189 req.ifinfo.ifi_family = AF_UNSPEC; 190 req [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument 173 if (mac == NULL || wpabuf_len(req) < EAP_SIM_MAC_LEN || 174 mac < wpabuf_head_u8(req) || 175 mac > wpabuf_head_u8(req) + wpabuf_len(req) - EAP_SIM_MAC_LEN) 178 tmp = os_malloc(wpabuf_len(req)); 183 len[0] = wpabuf_len(req); 188 os_memcpy(tmp, wpabuf_head(req), wpabuf_len(req)); 189 os_memset(tmp + (mac - wpabuf_head_u8(req)), 360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument [all...] |
H A D | eap_sim_common.h | 86 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, 98 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, 126 const struct wpabuf *req, 125 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 42 const struct wpabuf *req); 43 static void eap_sm_processNotify(struct eap_sm *sm, const struct wpabuf *req); 45 static void eap_sm_parseEapReq(struct eap_sm *sm, const struct wpabuf *req); 923 static void eap_sm_processIdentity(struct eap_sm *sm, const struct wpabuf *req) argument 932 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, req, 1195 static void eap_sm_processNotify(struct eap_sm *sm, const struct wpabuf *req) argument 1201 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_NOTIFICATION, req, 1234 static void eap_sm_parseEapReq(struct eap_sm *sm, const struct wpabuf *req) argument 1246 if (req == NULL || wpabuf_len(req) < sizeo 1827 eap_sm_request_sim(struct eap_sm *sm, const char *req) argument [all...] |
H A D | eap_aka.c | 161 char req[200], *pos, *end; local 164 pos = req; 165 end = pos + sizeof(req); 172 eap_sm_request_sim(sm, req); 785 const struct wpabuf *req, 790 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, 792 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); 1282 const struct eap_hdr *req; local 1303 req = wpabuf_head(reqData); 1304 id = req 784 eap_aka_verify_mac(struct eap_aka_data *data, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument [all...] |
H A D | eap_fast.c | 1175 const struct eap_hdr *req, 1187 req->identifier, out_data); 1192 req->identifier, out_data); 1198 req->identifier, out_data); 1280 return eap_fast_encrypt_response(sm, data, resp, req->identifier, 1287 const struct eap_hdr *req, 1312 req->identifier, NULL, out_data); 1331 res = eap_fast_process_decrypted(sm, data, ret, req, 1525 const struct eap_hdr *req; local 1538 req 1172 eap_fast_process_decrypted(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, struct wpabuf *decrypted, struct wpabuf **out_data) argument 1285 eap_fast_decrypt(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_mschapv2.c | 233 * @req: Pointer to EAP-MSCHAPv2 header from the request 241 struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, 252 if (req_len < sizeof(*req) + 1) { 258 pos = (const u8 *) (req + 1); 260 len = req_len - sizeof(*req) - 1; 292 return eap_mschapv2_challenge_reply(sm, data, id, req->mschapv2_id, 338 * @req: Pointer to EAP-MSCHAPv2 header from the request 347 const struct eap_mschapv2_hdr *req, 355 len = req_len - sizeof(*req); 356 pos = (const u8 *) (req 239 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 344 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 503 eap_mschapv2_change_password( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id) argument 638 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument [all...] |
H A D | eap_pax.c | 93 static struct wpabuf * eap_pax_alloc_resp(const struct eap_pax_hdr *req, argument 107 pax->mac_id = req->mac_id; 108 pax->dh_group_id = req->dh_group_id; 109 pax->public_key_id = req->public_key_id; 117 const struct eap_pax_hdr *req, 134 if (req->flags & EAP_PAX_FLAGS_CE) { 141 left = req_plen - sizeof(*req); 150 pos = (const u8 *) (req + 1); 180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e, 191 resp = eap_pax_alloc_resp(req, i 115 eap_pax_process_std_1(struct eap_pax_data *data, struct eap_method_ret *ret, u8 id, const struct eap_pax_hdr *req, size_t req_plen) argument 231 eap_pax_process_std_3(struct eap_pax_data *data, struct eap_method_ret *ret, u8 id, const struct eap_pax_hdr *req, size_t req_plen) argument 327 const struct eap_pax_hdr *req; local [all...] |
H A D | eap_peap.c | 455 * @req: EAP-TLV request to be processed. The caller must have validated that 467 const struct wpabuf *req, struct wpabuf **resp, 477 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, req, &left); 511 *resp = eap_tlv_build_nak(eap_get_id(req), 582 eap_get_id(req), resp_status); 592 struct wpabuf *req, 595 struct eap_hdr *hdr = wpabuf_mhead(req); 614 if (eap_tlv_process(sm, data, &iret, req, resp, 635 req, &eleft); 712 &iret, req); 465 eap_tlv_process(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct wpabuf *req, struct wpabuf **resp, int force_failure) argument 589 eap_peap_phase2_request(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, struct wpabuf *req, struct wpabuf **resp) argument 734 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument 964 const struct eap_hdr *req; local [all...] |
H A D | eap_sake.c | 366 const struct eap_sake_hdr *req; local 378 req = (const struct eap_sake_hdr *) pos; 380 subtype = req->subtype; 381 session_id = req->session_id; 382 pos = (const u8 *) (req + 1);
|
H A D | eap_sim.c | 163 char req[200], *pos, *end; local 167 pos = req; 168 end = pos + sizeof(req); 176 eap_sm_request_sim(sm, req); 1029 const struct eap_hdr *req; local 1049 req = wpabuf_head(reqData); 1050 id = req->identifier; 1051 len = be_to_host16(req->length);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_aka.c | 899 const struct wpabuf *req, 904 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, 906 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); 898 eap_aka_verify_mac(struct eap_aka_data *data, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
|
H A D | eap_server_fast.c | 522 struct wpabuf *req; local 524 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_FAST, 527 if (req == NULL) { 534 wpabuf_put_u8(req, EAP_TLS_FLAGS_START | data->fast_version); 537 eap_fast_put_tlv(req, PAC_TYPE_A_ID, data->srv_id, data->srv_id_len); 541 return req; 576 struct wpabuf *req; local 583 req = data->phase2_method->buildReq(sm, data->phase2_priv, id); 584 if (req == NULL) 587 wpa_hexdump_buf_key(MSG_MSGDUMP, "EAP-FAST: Phase 2 EAP-Request", req); 851 struct wpabuf *req = NULL; local [all...] |
H A D | eap_server_gpsk.c | 106 struct wpabuf *req; local 120 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, 122 if (req == NULL) { 129 wpabuf_put_u8(req, EAP_GPSK_OPCODE_GPSK_1); 130 wpabuf_put_be16(req, sm->server_id_len); 131 wpabuf_put_data(req, sm->server_id, sm->server_id_len); 132 wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN); 133 wpabuf_put_be16(req, 135 wpabuf_put_data(req, data->csuite_list, 138 return req; 148 struct wpabuf *req; local [all...] |
H A D | eap_server_gtc.c | 53 struct wpabuf *req; local 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, 62 if (req == NULL) { 69 wpabuf_put_data(req, msg, msg_len); 73 return req;
|
H A D | eap_server_identity.c | 56 struct wpabuf *req; local 67 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, req_data_len, 69 if (req == NULL) { 76 wpabuf_put_data(req, req_data, req_data_len); 78 return req;
|