/hostap-3.6.0/src/eapol_auth/ |
D | eapol_auth_sm.c | 30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1) 32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0) 38 #define abortAuth() sm->eapol->cb.abort_auth(sm->eapol->conf.ctx, sm->sta) 39 #define txKey() sm->eapol->cb.tx_key(sm->eapol->conf.ctx, sm->sta) 53 if (eapol->cb.logger == NULL) in eapol_auth_logger() 55 eapol->cb.logger(eapol->conf.ctx, addr, level, txt); in eapol_auth_logger() 68 if (eapol->cb.logger == NULL) in eapol_auth_vlogger() 100 sm->eapol->cb.eapol_send(sm->eapol->conf.ctx, sm->sta, in eapol_auth_tx_canned_eap() 129 sm->eapol->cb.eapol_send(sm->eapol->conf.ctx, sm->sta, in eapol_auth_tx_req() 235 sm->eapol->cb.finished(sm->eapol->conf.ctx, sm->sta, 0, in SM_STATE() [all …]
|
/hostap-3.6.0/src/wps/ |
D | http_client.c | 28 void (*cb)(void *ctx, struct http_client *c, member 40 c->cb(c->cb_ctx, c, HTTP_CLIENT_TIMEOUT); in http_client_timeout() 63 c->cb(c->cb_ctx, c, HTTP_CLIENT_OK); in http_client_got_response() 69 c->cb(c->cb_ctx, c, HTTP_CLIENT_INVALID_REPLY); in http_client_got_response() 72 c->cb(c->cb_ctx, c, HTTP_CLIENT_INVALID_REPLY); in http_client_got_response() 75 c->cb(c->cb_ctx, c, HTTP_CLIENT_TIMEOUT); in http_client_got_response() 78 c->cb(c->cb_ctx, c, HTTP_CLIENT_FAILED); in http_client_got_response() 102 c->cb(c->cb_ctx, c, HTTP_CLIENT_FAILED); in http_client_tx_ready() 124 c->cb(c->cb_ctx, c, HTTP_CLIENT_FAILED); in http_client_tx_ready() 132 void (*cb)(void *ctx, in http_client_addr() [all …]
|
D | http_server.c | 30 void (*cb)(void *ctx, struct http_request *req); member 51 srv->cb(srv->cb_ctx, req); in http_request_cb() 229 void (*cb)(void *ctx, in http_server_init() 240 srv->cb = cb; in http_server_init()
|
D | httpread.c | 53 void (*cb)(struct httpread *handle, void *cookie, member 149 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_TIMEOUT); in httpread_timeout_handler() 687 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_ERROR); in httpread_read_handler() 712 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_FILE_READY); in httpread_read_handler() 731 void (*cb)(struct httpread *handle, void *cookie, in httpread_create() 744 h->cb = cb; in httpread_create()
|
D | http_client.h | 25 void (*cb)(void *ctx, 31 void (*cb)(void *ctx,
|
/hostap-3.6.0/src/eap_server/ |
D | eap_server_teap.c | 618 struct teap_tlv_crypto_binding *cb; in eap_teap_build_crypto_binding() local 621 buf = wpabuf_alloc(2 * sizeof(*result) + sizeof(*cb)); in eap_teap_build_crypto_binding() 656 cb = wpabuf_put(buf, sizeof(*cb)); in eap_teap_build_crypto_binding() 657 cb->tlv_type = host_to_be16(TEAP_TLV_MANDATORY | in eap_teap_build_crypto_binding() 659 cb->length = host_to_be16(sizeof(*cb) - sizeof(struct teap_tlv_hdr)); in eap_teap_build_crypto_binding() 660 cb->version = EAP_TEAP_VERSION; in eap_teap_build_crypto_binding() 661 cb->received_version = data->peer_version; in eap_teap_build_crypto_binding() 668 cb->subtype = (flags << 4) | subtype; in eap_teap_build_crypto_binding() 669 if (random_get_bytes(cb->nonce, sizeof(cb->nonce)) < 0) { in eap_teap_build_crypto_binding() 678 cb->nonce[sizeof(cb->nonce) - 1] &= ~0x01; in eap_teap_build_crypto_binding() [all …]
|
/hostap-3.6.0/src/eap_peer/ |
D | eap_teap.c | 638 const struct teap_tlv_crypto_binding *cb) in eap_teap_validate_crypto_binding() argument 642 subtype = cb->subtype & 0x0f; in eap_teap_validate_crypto_binding() 643 flags = cb->subtype >> 4; in eap_teap_validate_crypto_binding() 647 cb->version, cb->received_version, flags, subtype); in eap_teap_validate_crypto_binding() 649 cb->nonce, sizeof(cb->nonce)); in eap_teap_validate_crypto_binding() 651 cb->emsk_compound_mac, sizeof(cb->emsk_compound_mac)); in eap_teap_validate_crypto_binding() 653 cb->msk_compound_mac, sizeof(cb->msk_compound_mac)); in eap_teap_validate_crypto_binding() 655 if (cb->version != EAP_TEAP_VERSION || in eap_teap_validate_crypto_binding() 656 cb->received_version != data->received_version || in eap_teap_validate_crypto_binding() 661 cb->version, cb->received_version, flags, subtype); in eap_teap_validate_crypto_binding() [all …]
|
/hostap-3.6.0/eap_example/ |
D | server.pem | 41 b6:98:ae:d9:9b:9a:44:49:b2:06:ee:af:36:83:cb:cd:cb:c9: 42 f3:38:6d:65:cb:e9:81:d2:25:dd:76:12:5c:da:3f:a1:0e:11: 44 10:c3:51:a2:7b:f5:0b:5f:ec:70:12:99:cb:65:6f:50:7f:2b:
|
/hostap-3.6.0/src/ap/ |
D | utils.c | 19 int (*cb)(void *ctx, const u8 *sa, in hostapd_register_probereq_cb() 36 n->cb = cb; in hostapd_register_probereq_cb()
|
D | wpa_auth_ft.c | 630 if (wpa_auth->cb->send_ether == NULL) in wpa_ft_rrb_send() 633 return wpa_auth->cb->send_ether(wpa_auth->cb_ctx, dst, ETH_P_RRB, in wpa_ft_rrb_send() 642 if (!wpa_auth->cb->send_oui) in wpa_ft_rrb_oui_send() 646 return wpa_auth->cb->send_oui(wpa_auth->cb_ctx, dst, oui_suffix, data, in wpa_ft_rrb_oui_send() 654 if (wpa_auth->cb->send_ft_action == NULL) in wpa_ft_action_send() 656 return wpa_auth->cb->send_ft_action(wpa_auth->cb_ctx, dst, in wpa_ft_action_send() 665 if (wpa_auth->cb->get_psk == NULL) in wpa_ft_get_psk() 667 return wpa_auth->cb->get_psk(wpa_auth->cb_ctx, addr, p2p_dev_addr, in wpa_ft_get_psk() 675 if (wpa_auth->cb->add_sta == NULL) in wpa_ft_add_sta() 677 return wpa_auth->cb->add_sta(wpa_auth->cb_ctx, sta_addr); in wpa_ft_add_sta() [all …]
|
D | wpa_auth.c | 85 if (wpa_auth->cb->mic_failure_report) in wpa_auth_mic_failure_report() 86 return wpa_auth->cb->mic_failure_report(wpa_auth->cb_ctx, addr); in wpa_auth_mic_failure_report() 94 if (wpa_auth->cb->psk_failure_report) in wpa_auth_psk_failure_report() 95 wpa_auth->cb->psk_failure_report(wpa_auth->cb_ctx, addr); in wpa_auth_psk_failure_report() 103 if (wpa_auth->cb->set_eapol) in wpa_auth_set_eapol() 104 wpa_auth->cb->set_eapol(wpa_auth->cb_ctx, addr, var, value); in wpa_auth_set_eapol() 111 if (!wpa_auth->cb->get_eapol) in wpa_auth_get_eapol() 113 return wpa_auth->cb->get_eapol(wpa_auth->cb_ctx, addr, var); in wpa_auth_get_eapol() 123 if (!wpa_auth->cb->get_psk) in wpa_auth_get_psk() 125 return wpa_auth->cb->get_psk(wpa_auth->cb_ctx, addr, p2p_dev_addr, in wpa_auth_get_psk() [all …]
|
D | wpa_auth.h | 307 int (*for_each_sta)(void *ctx, int (*cb)(struct wpa_state_machine *sm, 309 int (*for_each_auth)(void *ctx, int (*cb)(struct wpa_authenticator *a, 352 const struct wpa_auth_callbacks *cb, 461 void (*cb)(void *ctx, const u8 *dst, const u8 *bssid, 548 void (*cb)(void *ctx1, void *ctx2), 551 void (*cb)(void *ctx1, void *ctx2), 554 void (*cb)(void *ctx1, void *ctx2),
|
/hostap-3.6.0/tests/hwsim/auth_serv/ |
D | server-long-duration.pem | 5 d8:d3:e3:a6:cb:e3:cd:6e 24 ab:1a:5e:d6:7a:5a:cb:bf:40:04:91:6a:9c:84:f3: 40 2d:cb:35:b1:96:6a:d9:fe:47:90:03:b7:5d:c7:3d: 66 aa:73:6c:8d:3b:7e:cb:87:82:2f:b8:05:f7:79:1c:5d:ec:37: 69 e7:40:b8:16:9f:47:51:e5:39:2e:93:cb:61:a8:b1:f2:f6:53: 78 4e:2a:cb:88:28:33:42:df:8f:81:c3:89:01:f4:8a:ef:56:db:
|
D | server.pem | 5 d8:d3:e3:a6:cb:e3:cd:69 19 bc:29:d7:d0:6e:75:00:35:fc:f7:65:b1:b6:0f:cb: 25 20:20:cb:5c:0d:9c:d2:9c:30:21:11:bc:b3:74:df: 30 46:ae:cb:eb:79:36:57:ad:c3:70:02:15:6d:f0:a5: 63 3c:62:3d:30:7c:75:0c:16:31:ce:cb:e7:41:1e:4f:3c:92:1a:
|
D | server-no-dnsname.pem | 5 d8:d3:e3:a6:cb:e3:cd:6a 27 ce:9b:7d:4c:b5:cb:41:1b:9c:96:51:df:58:4d:b7: 53 cb:72:1f:93:5d:df:d7:9e:76:41:4c:61:cb:70:03:5d:45:69: 57 bd:cb:af:9b:dc:ce:62:3b:b3:ff:0f:85:e3:47:66:d0:dc:c6:
|
D | server-certpol2.pem | 5 d8:d3:e3:a6:cb:e3:cd:70 30 06:17:85:63:6e:28:cb:d7:88:d1:ce:40:c7:ff:61: 33 45:cb:ee:88:a5:a0:54:71:83:f7:d3:d3:c5:bc:b2: 34 7e:85:a7:b1:1a:cf:91:cb:8b:39:ba:7c:2c:9d:b2: 73 b3:f0:a2:50:59:cb:1b:19:af:6d:62:95:73:a4:94:76:8d:3e:
|
D | ec-user.pem | 15 04:0d:b0:28:87:67:db:cb:f8:64:c6:61:7d:1e:6f: 16 1f:cb:30:47:0a:96:83:cc:5b:80:c8:6f:92:62:64: 37 cb:1e:ce:f7:e6:fe:b6:79:b4:af:d8:85:72:49:2d:e9:de:01:
|
D | ca.pem | 17 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91: 18 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d: 51 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28: 55 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
|
D | ca-and-crl-expired.pem | 17 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91: 18 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d: 51 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28: 55 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
|
D | ca-and-crl.pem | 17 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91: 18 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d: 51 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28: 55 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
|
/hostap-3.6.0/src/crypto/ |
D | aes-gcm.c | 146 u8 cb[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; in aes_gctr() local 155 os_memcpy(cb, icb, AES_BLOCK_SIZE); in aes_gctr() 158 aes_encrypt(aes, cb, ypos); in aes_gctr() 162 inc32(cb); in aes_gctr() 168 aes_encrypt(aes, cb, tmp); in aes_gctr()
|
/hostap-3.6.0/tests/hwsim/auth_serv/iCA-user/ |
D | ca-and-root.pem | 5 d8:d3:e3:a6:cb:e3:cc:f8 22 5c:c8:34:8e:6b:36:64:bc:44:c9:fb:cb:50:ef:b1: 47 cb:23:ad:fa:01:7c:27:f7:aa:8d:d8:6c:6a:f8:72:21:63:bf: 98 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91: 99 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d: 132 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28: 136 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
|
/hostap-3.6.0/tests/hwsim/auth_serv/test-ca/ |
D | cacert.pem | 17 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91: 18 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d: 51 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28: 55 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
|
/hostap-3.6.0/tests/hwsim/auth_serv/iCA-server/ |
D | ca-and-root.pem | 5 d8:d3:e3:a6:cb:e3:cc:f7 28 af:1b:25:a9:45:33:06:cb:cc:0d:ca:78:5c:56:52: 98 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91: 99 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d: 132 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28: 136 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
|
/hostap-3.6.0/src/drivers/ |
D | netlink.c | 24 void (*cb)(void *ctx, struct ifinfomsg *ifi, in netlink_receive_link() 28 if (cb == NULL || NLMSG_PAYLOAD(h, 0) < sizeof(struct ifinfomsg)) in netlink_receive_link() 30 cb(netlink->cfg->ctx, NLMSG_DATA(h), in netlink_receive_link()
|