Searched defs:req (Results 1 - 25 of 426) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/hostapd/
H A Dctrl_iface.c404 struct wpabuf *req, *sel; local
430 req = wpabuf_alloc(len);
431 if (req == NULL)
433 if (hexstr2bin(pos, wpabuf_put(req, len), len) < 0) {
434 wpabuf_free(req);
440 wpabuf_free(req);
447 wpabuf_free(req);
451 wpabuf_free(req);
457 ret = hostapd_wps_nfc_report_handover(hapd, req, sel);
463 wpabuf_free(req);
653 struct wpabuf *req; local
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Daccounting.c391 * @req: RADIUS request message
398 accounting_receive(struct radius_msg *msg, struct radius_msg *req, argument
407 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) {
H A Dbeacon.c334 const struct ieee80211_mgmt *req,
361 if (req)
362 os_memcpy(resp->da, req->sa, ETH_ALEN);
332 hostapd_gen_probe_resp(struct hostapd_data *hapd, struct sta_info *sta, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) argument
H A Dieee802_11_auth.c422 struct radius_msg *req,
436 req, i);
469 * @req: RADIUS request message
477 hostapd_acl_recv_radius(struct radius_msg *msg, struct radius_msg *req, argument
500 if (radius_msg_verify(msg, shared_secret, shared_secret_len, req, 0)) {
545 msg, req, cache);
418 decode_tunnel_passwords(struct hostapd_data *hapd, const u8 *shared_secret, size_t shared_secret_len, struct radius_msg *msg, struct radius_msg *req, struct hostapd_cached_radius_acl *cache) argument
H A Dieee802_1x.c1188 struct radius_msg *req,
1197 keys = radius_msg_get_ms_keys(msg, req, shared_secret,
1517 * @req: RADIUS request message
1524 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, argument
1554 req, 1)) {
1637 ieee802_1x_get_keys(hapd, sta, msg, req, shared_secret,
1186 ieee802_1x_get_keys(struct hostapd_data *hapd, struct sta_info *sta, struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len) argument
H A Dwps_hostapd.c1804 const struct wpabuf *req,
1819 wps = ndef_parse_wifi(req);
1803 hostapd_wps_nfc_report_handover(struct hostapd_data *hapd, const struct wpabuf *req, const struct wpabuf *sel) argument
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_atheros.c916 struct ieee80211req_athdbg req; local
917 struct ieee80211_qos_map *qos_map = &req.data.qos_map;
926 memset(&req, 0, sizeof(struct ieee80211req_athdbg));
927 req.cmd = IEEE80211_DBGREQ_SETQOSMAPCONF;
930 iwr.u.data.pointer = (void *) &req;
1235 wpa_hexdump(MSG_MSGDUMP, "atheros req WPA IE",
1237 wpa_hexdump(MSG_MSGDUMP, "atheros req RSN IE",
1240 wpa_hexdump(MSG_MSGDUMP, "atheros req WPS IE",
1967 struct ieee80211req_res req; local
1968 struct ieee80211req_res_addts *addts = &req
1989 struct ieee80211req_res req; local
[all...]
H A Ddriver_ndis.c739 DOT11_SCAN_REQUEST_V2 req; local
742 os_memset(&req, 0, sizeof(req));
743 req.dot11BSSType = dot11_BSS_type_any;
744 os_memset(req.dot11BSSID, 0xff, ETH_ALEN);
745 req.dot11ScanType = dot11_scan_type_auto;
746 res = ndis_set_oid(drv, OID_DOT11_SCAN_REQUEST, (char *) &req,
747 sizeof(req));
1532 NDIS_802_11_AUTHENTICATION_REQUEST *req; local
1536 if (data_len < sizeof(*req)) {
1933 NDISUIO_REQUEST_NOTIFICATION req; local
1970 NDISUIO_REQUEST_NOTIFICATION req; local
[all...]
H A Ddriver_wext.c1005 struct iw_scan_req req; local
1019 os_memset(&req, 0, sizeof(req));
1020 req.essid_len = ssid_len;
1021 req.bssid.sa_family = ARPHRD_ETHER;
1022 os_memset(req.bssid.sa_data, 0xff, ETH_ALEN);
1023 os_memcpy(req.essid, ssid, ssid_len);
1024 iwr.u.data.pointer = (caddr_t) &req;
1025 iwr.u.data.length = sizeof(req);
H A Dnetlink.c176 } req; local
181 os_memset(&req, 0, sizeof(req));
183 req.hdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg));
184 req.hdr.nlmsg_type = RTM_SETLINK;
185 req.hdr.nlmsg_flags = NLM_F_REQUEST;
186 req.hdr.nlmsg_seq = ++nl_seq;
187 req.hdr.nlmsg_pid = 0;
189 req.ifinfo.ifi_family = AF_UNSPEC;
190 req
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.c165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument
173 if (mac == NULL || wpabuf_len(req) < EAP_SIM_MAC_LEN ||
174 mac < wpabuf_head_u8(req) ||
175 mac > wpabuf_head_u8(req) + wpabuf_len(req) - EAP_SIM_MAC_LEN)
178 tmp = os_malloc(wpabuf_len(req));
183 len[0] = wpabuf_len(req);
188 os_memcpy(tmp, wpabuf_head(req), wpabuf_len(req));
189 os_memset(tmp + (mac - wpabuf_head_u8(req)),
360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
[all...]
H A Deap_sim_common.h86 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req,
98 int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req,
126 const struct wpabuf *req,
125 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap.c42 const struct wpabuf *req);
43 static void eap_sm_processNotify(struct eap_sm *sm, const struct wpabuf *req);
45 static void eap_sm_parseEapReq(struct eap_sm *sm, const struct wpabuf *req);
923 static void eap_sm_processIdentity(struct eap_sm *sm, const struct wpabuf *req) argument
932 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, req,
1195 static void eap_sm_processNotify(struct eap_sm *sm, const struct wpabuf *req) argument
1201 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_NOTIFICATION, req,
1234 static void eap_sm_parseEapReq(struct eap_sm *sm, const struct wpabuf *req) argument
1246 if (req == NULL || wpabuf_len(req) < sizeo
1827 eap_sm_request_sim(struct eap_sm *sm, const char *req) argument
[all...]
H A Deap_aka.c161 char req[200], *pos, *end; local
164 pos = req;
165 end = pos + sizeof(req);
172 eap_sm_request_sim(sm, req);
785 const struct wpabuf *req,
790 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra,
792 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len);
1282 const struct eap_hdr *req; local
1303 req = wpabuf_head(reqData);
1304 id = req
784 eap_aka_verify_mac(struct eap_aka_data *data, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
[all...]
H A Deap_fast.c1175 const struct eap_hdr *req,
1187 req->identifier, out_data);
1192 req->identifier, out_data);
1198 req->identifier, out_data);
1280 return eap_fast_encrypt_response(sm, data, resp, req->identifier,
1287 const struct eap_hdr *req,
1312 req->identifier, NULL, out_data);
1331 res = eap_fast_process_decrypted(sm, data, ret, req,
1525 const struct eap_hdr *req; local
1538 req
1172 eap_fast_process_decrypted(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, struct wpabuf *decrypted, struct wpabuf **out_data) argument
1285 eap_fast_decrypt(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument
[all...]
H A Deap_mschapv2.c233 * @req: Pointer to EAP-MSCHAPv2 header from the request
241 struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req,
252 if (req_len < sizeof(*req) + 1) {
258 pos = (const u8 *) (req + 1);
260 len = req_len - sizeof(*req) - 1;
292 return eap_mschapv2_challenge_reply(sm, data, id, req->mschapv2_id,
338 * @req: Pointer to EAP-MSCHAPv2 header from the request
347 const struct eap_mschapv2_hdr *req,
355 len = req_len - sizeof(*req);
356 pos = (const u8 *) (req
239 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument
344 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument
503 eap_mschapv2_change_password( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id) argument
638 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument
[all...]
H A Deap_pax.c93 static struct wpabuf * eap_pax_alloc_resp(const struct eap_pax_hdr *req, argument
107 pax->mac_id = req->mac_id;
108 pax->dh_group_id = req->dh_group_id;
109 pax->public_key_id = req->public_key_id;
117 const struct eap_pax_hdr *req,
134 if (req->flags & EAP_PAX_FLAGS_CE) {
141 left = req_plen - sizeof(*req);
150 pos = (const u8 *) (req + 1);
180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e,
191 resp = eap_pax_alloc_resp(req, i
115 eap_pax_process_std_1(struct eap_pax_data *data, struct eap_method_ret *ret, u8 id, const struct eap_pax_hdr *req, size_t req_plen) argument
231 eap_pax_process_std_3(struct eap_pax_data *data, struct eap_method_ret *ret, u8 id, const struct eap_pax_hdr *req, size_t req_plen) argument
327 const struct eap_pax_hdr *req; local
[all...]
H A Deap_peap.c455 * @req: EAP-TLV request to be processed. The caller must have validated that
467 const struct wpabuf *req, struct wpabuf **resp,
477 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, req, &left);
511 *resp = eap_tlv_build_nak(eap_get_id(req),
582 eap_get_id(req), resp_status);
592 struct wpabuf *req,
595 struct eap_hdr *hdr = wpabuf_mhead(req);
614 if (eap_tlv_process(sm, data, &iret, req, resp,
635 req, &eleft);
712 &iret, req);
465 eap_tlv_process(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct wpabuf *req, struct wpabuf **resp, int force_failure) argument
589 eap_peap_phase2_request(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, struct wpabuf *req, struct wpabuf **resp) argument
734 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument
964 const struct eap_hdr *req; local
[all...]
H A Deap_sake.c366 const struct eap_sake_hdr *req; local
378 req = (const struct eap_sake_hdr *) pos;
380 subtype = req->subtype;
381 session_id = req->session_id;
382 pos = (const u8 *) (req + 1);
H A Deap_sim.c163 char req[200], *pos, *end; local
167 pos = req;
168 end = pos + sizeof(req);
176 eap_sm_request_sim(sm, req);
1029 const struct eap_hdr *req; local
1049 req = wpabuf_head(reqData);
1050 id = req->identifier;
1051 len = be_to_host16(req->length);
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_aka.c899 const struct wpabuf *req,
904 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra,
906 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len);
898 eap_aka_verify_mac(struct eap_aka_data *data, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
H A Deap_server_fast.c522 struct wpabuf *req; local
524 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_FAST,
527 if (req == NULL) {
534 wpabuf_put_u8(req, EAP_TLS_FLAGS_START | data->fast_version);
537 eap_fast_put_tlv(req, PAC_TYPE_A_ID, data->srv_id, data->srv_id_len);
541 return req;
576 struct wpabuf *req; local
583 req = data->phase2_method->buildReq(sm, data->phase2_priv, id);
584 if (req == NULL)
587 wpa_hexdump_buf_key(MSG_MSGDUMP, "EAP-FAST: Phase 2 EAP-Request", req);
851 struct wpabuf *req = NULL; local
[all...]
H A Deap_server_gpsk.c106 struct wpabuf *req; local
120 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len,
122 if (req == NULL) {
129 wpabuf_put_u8(req, EAP_GPSK_OPCODE_GPSK_1);
130 wpabuf_put_be16(req, sm->server_id_len);
131 wpabuf_put_data(req, sm->server_id, sm->server_id_len);
132 wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN);
133 wpabuf_put_be16(req,
135 wpabuf_put_data(req, data->csuite_list,
138 return req;
148 struct wpabuf *req; local
[all...]
H A Deap_server_gtc.c53 struct wpabuf *req; local
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
62 if (req == NULL) {
69 wpabuf_put_data(req, msg, msg_len);
73 return req;
H A Deap_server_identity.c56 struct wpabuf *req; local
67 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, req_data_len,
69 if (req == NULL) {
76 wpabuf_put_data(req, req_data, req_data_len);
78 return req;

Completed in 225 milliseconds

1234567891011>>