Home
last modified time | relevance | path

Searched refs:cb (Results 1 – 25 of 95) sorted by relevance

1234

/hostap-3.6.0/src/eapol_auth/
Deapol_auth_sm.c30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1)
32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0)
38 #define abortAuth() sm->eapol->cb.abort_auth(sm->eapol->conf.ctx, sm->sta)
39 #define txKey() sm->eapol->cb.tx_key(sm->eapol->conf.ctx, sm->sta)
53 if (eapol->cb.logger == NULL) in eapol_auth_logger()
55 eapol->cb.logger(eapol->conf.ctx, addr, level, txt); in eapol_auth_logger()
68 if (eapol->cb.logger == NULL) in eapol_auth_vlogger()
100 sm->eapol->cb.eapol_send(sm->eapol->conf.ctx, sm->sta, in eapol_auth_tx_canned_eap()
129 sm->eapol->cb.eapol_send(sm->eapol->conf.ctx, sm->sta, in eapol_auth_tx_req()
235 sm->eapol->cb.finished(sm->eapol->conf.ctx, sm->sta, 0, in SM_STATE()
[all …]
/hostap-3.6.0/src/wps/
Dhttp_client.c28 void (*cb)(void *ctx, struct http_client *c, member
40 c->cb(c->cb_ctx, c, HTTP_CLIENT_TIMEOUT); in http_client_timeout()
63 c->cb(c->cb_ctx, c, HTTP_CLIENT_OK); in http_client_got_response()
69 c->cb(c->cb_ctx, c, HTTP_CLIENT_INVALID_REPLY); in http_client_got_response()
72 c->cb(c->cb_ctx, c, HTTP_CLIENT_INVALID_REPLY); in http_client_got_response()
75 c->cb(c->cb_ctx, c, HTTP_CLIENT_TIMEOUT); in http_client_got_response()
78 c->cb(c->cb_ctx, c, HTTP_CLIENT_FAILED); in http_client_got_response()
102 c->cb(c->cb_ctx, c, HTTP_CLIENT_FAILED); in http_client_tx_ready()
124 c->cb(c->cb_ctx, c, HTTP_CLIENT_FAILED); in http_client_tx_ready()
132 void (*cb)(void *ctx, in http_client_addr()
[all …]
Dhttp_server.c30 void (*cb)(void *ctx, struct http_request *req); member
51 srv->cb(srv->cb_ctx, req); in http_request_cb()
229 void (*cb)(void *ctx, in http_server_init()
240 srv->cb = cb; in http_server_init()
Dhttpread.c53 void (*cb)(struct httpread *handle, void *cookie, member
149 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_TIMEOUT); in httpread_timeout_handler()
687 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_ERROR); in httpread_read_handler()
712 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_FILE_READY); in httpread_read_handler()
731 void (*cb)(struct httpread *handle, void *cookie, in httpread_create()
744 h->cb = cb; in httpread_create()
Dhttp_client.h25 void (*cb)(void *ctx,
31 void (*cb)(void *ctx,
/hostap-3.6.0/src/eap_server/
Deap_server_teap.c618 struct teap_tlv_crypto_binding *cb; in eap_teap_build_crypto_binding() local
621 buf = wpabuf_alloc(2 * sizeof(*result) + sizeof(*cb)); in eap_teap_build_crypto_binding()
656 cb = wpabuf_put(buf, sizeof(*cb)); in eap_teap_build_crypto_binding()
657 cb->tlv_type = host_to_be16(TEAP_TLV_MANDATORY | in eap_teap_build_crypto_binding()
659 cb->length = host_to_be16(sizeof(*cb) - sizeof(struct teap_tlv_hdr)); in eap_teap_build_crypto_binding()
660 cb->version = EAP_TEAP_VERSION; in eap_teap_build_crypto_binding()
661 cb->received_version = data->peer_version; in eap_teap_build_crypto_binding()
668 cb->subtype = (flags << 4) | subtype; in eap_teap_build_crypto_binding()
669 if (random_get_bytes(cb->nonce, sizeof(cb->nonce)) < 0) { in eap_teap_build_crypto_binding()
678 cb->nonce[sizeof(cb->nonce) - 1] &= ~0x01; in eap_teap_build_crypto_binding()
[all …]
/hostap-3.6.0/src/eap_peer/
Deap_teap.c638 const struct teap_tlv_crypto_binding *cb) in eap_teap_validate_crypto_binding() argument
642 subtype = cb->subtype & 0x0f; in eap_teap_validate_crypto_binding()
643 flags = cb->subtype >> 4; in eap_teap_validate_crypto_binding()
647 cb->version, cb->received_version, flags, subtype); in eap_teap_validate_crypto_binding()
649 cb->nonce, sizeof(cb->nonce)); in eap_teap_validate_crypto_binding()
651 cb->emsk_compound_mac, sizeof(cb->emsk_compound_mac)); in eap_teap_validate_crypto_binding()
653 cb->msk_compound_mac, sizeof(cb->msk_compound_mac)); in eap_teap_validate_crypto_binding()
655 if (cb->version != EAP_TEAP_VERSION || in eap_teap_validate_crypto_binding()
656 cb->received_version != data->received_version || in eap_teap_validate_crypto_binding()
661 cb->version, cb->received_version, flags, subtype); in eap_teap_validate_crypto_binding()
[all …]
/hostap-3.6.0/eap_example/
Dserver.pem41 b6:98:ae:d9:9b:9a:44:49:b2:06:ee:af:36:83:cb:cd:cb:c9:
42 f3:38:6d:65:cb:e9:81:d2:25:dd:76:12:5c:da:3f:a1:0e:11:
44 10:c3:51:a2:7b:f5:0b:5f:ec:70:12:99:cb:65:6f:50:7f:2b:
/hostap-3.6.0/src/ap/
Dutils.c19 int (*cb)(void *ctx, const u8 *sa, in hostapd_register_probereq_cb()
36 n->cb = cb; in hostapd_register_probereq_cb()
Dwpa_auth_ft.c630 if (wpa_auth->cb->send_ether == NULL) in wpa_ft_rrb_send()
633 return wpa_auth->cb->send_ether(wpa_auth->cb_ctx, dst, ETH_P_RRB, in wpa_ft_rrb_send()
642 if (!wpa_auth->cb->send_oui) in wpa_ft_rrb_oui_send()
646 return wpa_auth->cb->send_oui(wpa_auth->cb_ctx, dst, oui_suffix, data, in wpa_ft_rrb_oui_send()
654 if (wpa_auth->cb->send_ft_action == NULL) in wpa_ft_action_send()
656 return wpa_auth->cb->send_ft_action(wpa_auth->cb_ctx, dst, in wpa_ft_action_send()
665 if (wpa_auth->cb->get_psk == NULL) in wpa_ft_get_psk()
667 return wpa_auth->cb->get_psk(wpa_auth->cb_ctx, addr, p2p_dev_addr, in wpa_ft_get_psk()
675 if (wpa_auth->cb->add_sta == NULL) in wpa_ft_add_sta()
677 return wpa_auth->cb->add_sta(wpa_auth->cb_ctx, sta_addr); in wpa_ft_add_sta()
[all …]
Dwpa_auth.c85 if (wpa_auth->cb->mic_failure_report) in wpa_auth_mic_failure_report()
86 return wpa_auth->cb->mic_failure_report(wpa_auth->cb_ctx, addr); in wpa_auth_mic_failure_report()
94 if (wpa_auth->cb->psk_failure_report) in wpa_auth_psk_failure_report()
95 wpa_auth->cb->psk_failure_report(wpa_auth->cb_ctx, addr); in wpa_auth_psk_failure_report()
103 if (wpa_auth->cb->set_eapol) in wpa_auth_set_eapol()
104 wpa_auth->cb->set_eapol(wpa_auth->cb_ctx, addr, var, value); in wpa_auth_set_eapol()
111 if (!wpa_auth->cb->get_eapol) in wpa_auth_get_eapol()
113 return wpa_auth->cb->get_eapol(wpa_auth->cb_ctx, addr, var); in wpa_auth_get_eapol()
123 if (!wpa_auth->cb->get_psk) in wpa_auth_get_psk()
125 return wpa_auth->cb->get_psk(wpa_auth->cb_ctx, addr, p2p_dev_addr, in wpa_auth_get_psk()
[all …]
Dwpa_auth.h307 int (*for_each_sta)(void *ctx, int (*cb)(struct wpa_state_machine *sm,
309 int (*for_each_auth)(void *ctx, int (*cb)(struct wpa_authenticator *a,
352 const struct wpa_auth_callbacks *cb,
461 void (*cb)(void *ctx, const u8 *dst, const u8 *bssid,
548 void (*cb)(void *ctx1, void *ctx2),
551 void (*cb)(void *ctx1, void *ctx2),
554 void (*cb)(void *ctx1, void *ctx2),
/hostap-3.6.0/tests/hwsim/auth_serv/
Dserver-long-duration.pem5 d8:d3:e3:a6:cb:e3:cd:6e
24 ab:1a:5e:d6:7a:5a:cb:bf:40:04:91:6a:9c:84:f3:
40 2d:cb:35:b1:96:6a:d9:fe:47:90:03:b7:5d:c7:3d:
66 aa:73:6c:8d:3b:7e:cb:87:82:2f:b8:05:f7:79:1c:5d:ec:37:
69 e7:40:b8:16:9f:47:51:e5:39:2e:93:cb:61:a8:b1:f2:f6:53:
78 4e:2a:cb:88:28:33:42:df:8f:81:c3:89:01:f4:8a:ef:56:db:
Dserver.pem5 d8:d3:e3:a6:cb:e3:cd:69
19 bc:29:d7:d0:6e:75:00:35:fc:f7:65:b1:b6:0f:cb:
25 20:20:cb:5c:0d:9c:d2:9c:30:21:11:bc:b3:74:df:
30 46:ae:cb:eb:79:36:57:ad:c3:70:02:15:6d:f0:a5:
63 3c:62:3d:30:7c:75:0c:16:31:ce:cb:e7:41:1e:4f:3c:92:1a:
Dserver-no-dnsname.pem5 d8:d3:e3:a6:cb:e3:cd:6a
27 ce:9b:7d:4c:b5:cb:41:1b:9c:96:51:df:58:4d:b7:
53 cb:72:1f:93:5d:df:d7:9e:76:41:4c:61:cb:70:03:5d:45:69:
57 bd:cb:af:9b:dc:ce:62:3b:b3:ff:0f:85:e3:47:66:d0:dc:c6:
Dserver-certpol2.pem5 d8:d3:e3:a6:cb:e3:cd:70
30 06:17:85:63:6e:28:cb:d7:88:d1:ce:40:c7:ff:61:
33 45:cb:ee:88:a5:a0:54:71:83:f7:d3:d3:c5:bc:b2:
34 7e:85:a7:b1:1a:cf:91:cb:8b:39:ba:7c:2c:9d:b2:
73 b3:f0:a2:50:59:cb:1b:19:af:6d:62:95:73:a4:94:76:8d:3e:
Dec-user.pem15 04:0d:b0:28:87:67:db:cb:f8:64:c6:61:7d:1e:6f:
16 1f:cb:30:47:0a:96:83:cc:5b:80:c8:6f:92:62:64:
37 cb:1e:ce:f7:e6:fe:b6:79:b4:af:d8:85:72:49:2d:e9:de:01:
Dca.pem17 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91:
18 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d:
51 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28:
55 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
Dca-and-crl-expired.pem17 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91:
18 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d:
51 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28:
55 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
Dca-and-crl.pem17 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91:
18 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d:
51 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28:
55 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
/hostap-3.6.0/src/crypto/
Daes-gcm.c146 u8 cb[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; in aes_gctr() local
155 os_memcpy(cb, icb, AES_BLOCK_SIZE); in aes_gctr()
158 aes_encrypt(aes, cb, ypos); in aes_gctr()
162 inc32(cb); in aes_gctr()
168 aes_encrypt(aes, cb, tmp); in aes_gctr()
/hostap-3.6.0/tests/hwsim/auth_serv/iCA-user/
Dca-and-root.pem5 d8:d3:e3:a6:cb:e3:cc:f8
22 5c:c8:34:8e:6b:36:64:bc:44:c9:fb:cb:50:ef:b1:
47 cb:23:ad:fa:01:7c:27:f7:aa:8d:d8:6c:6a:f8:72:21:63:bf:
98 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91:
99 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d:
132 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28:
136 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
/hostap-3.6.0/tests/hwsim/auth_serv/test-ca/
Dcacert.pem17 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91:
18 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d:
51 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28:
55 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
/hostap-3.6.0/tests/hwsim/auth_serv/iCA-server/
Dca-and-root.pem5 d8:d3:e3:a6:cb:e3:cc:f7
28 af:1b:25:a9:45:33:06:cb:cc:0d:ca:78:5c:56:52:
98 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91:
99 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d:
132 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28:
136 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
/hostap-3.6.0/src/drivers/
Dnetlink.c24 void (*cb)(void *ctx, struct ifinfomsg *ifi, in netlink_receive_link()
28 if (cb == NULL || NLMSG_PAYLOAD(h, 0) < sizeof(struct ifinfomsg)) in netlink_receive_link()
30 cb(netlink->cfg->ctx, NLMSG_DATA(h), in netlink_receive_link()

1234