/hostap-3.7.0/src/tls/ |
D | tlsv1_client_write.c | 568 size_t rlen, hlen, clen; in tls_write_client_certificate_verify() local 610 hlen = SHA256_MAC_LEN; in tls_write_client_certificate_verify() 612 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify() 635 os_memmove(hash + 19, hash, hlen); in tls_write_client_certificate_verify() 636 hlen += 19; in tls_write_client_certificate_verify() 642 hlen = MD5_MAC_LEN; in tls_write_client_certificate_verify() 644 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 655 hlen = SHA1_MAC_LEN; in tls_write_client_certificate_verify() 657 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 665 hlen += MD5_MAC_LEN; in tls_write_client_certificate_verify() [all …]
|
D | tlsv1_common.c | 344 size_t hlen; in tlsv12_key_x_server_params_hash() local 351 hlen = SHA256_MAC_LEN; in tlsv12_key_x_server_params_hash() 355 hlen = 48; in tlsv12_key_x_server_params_hash() 359 hlen = 64; in tlsv12_key_x_server_params_hash() 370 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tlsv12_key_x_server_params_hash() 373 return hlen; in tlsv12_key_x_server_params_hash() 384 size_t hlen; in tls_key_x_server_params_hash() local 395 hlen = MD5_MAC_LEN; in tls_key_x_server_params_hash() 396 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tls_key_x_server_params_hash() 398 hpos += hlen; in tls_key_x_server_params_hash() [all …]
|
D | tlsv1_server_write.c | 567 int hlen; in tls_write_server_key_exchange() local 571 hlen = tlsv12_key_x_server_params_hash( in tls_write_server_key_exchange() 587 if (hlen < 0 || end - pos < 2) { in tls_write_server_key_exchange() 609 hlen += 19; in tls_write_server_key_exchange() 620 hlen = tls_key_x_server_params_hash( in tls_write_server_key_exchange() 626 if (hlen < 0) { in tls_write_server_key_exchange() 633 hash, hlen); in tls_write_server_key_exchange() 637 hash[hlen - 1] ^= 0x80; in tls_write_server_key_exchange() 657 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, in tls_write_server_key_exchange() 835 size_t rlen, hlen; in tls_write_server_finished() local [all …]
|
D | tlsv1_server_read.c | 890 size_t hlen; in tls_process_certificate_verify() local 986 hlen = SHA256_MAC_LEN; in tls_process_certificate_verify() 988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify() 999 hlen = MD5_MAC_LEN; in tls_process_certificate_verify() 1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1012 hlen = SHA1_MAC_LEN; in tls_process_certificate_verify() 1014 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1022 hlen += MD5_MAC_LEN; in tls_process_certificate_verify() 1028 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); in tls_process_certificate_verify() 1031 hash, hlen, pos, end - pos, &alert) < 0) { in tls_process_certificate_verify() [all …]
|
D | tlsv1_client_read.c | 736 int hlen; in tlsv1_process_diffie_hellman() local 761 hlen = tlsv12_key_x_server_params_hash( in tlsv1_process_diffie_hellman() 771 hlen = tls_key_x_server_params_hash( in tlsv1_process_diffie_hellman() 777 if (hlen < 0) in tlsv1_process_diffie_hellman() 780 hash, hlen); in tlsv1_process_diffie_hellman() 784 hash, hlen, pos, end - pos, in tlsv1_process_diffie_hellman() 1323 size_t left, len, hlen; in tls_process_server_finished() local 1382 hlen = SHA256_MAC_LEN; in tls_process_server_finished() 1384 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen) in tls_process_server_finished() 1395 hlen = MD5_MAC_LEN; in tls_process_server_finished() [all …]
|
D | tlsv1_record.c | 282 size_t i, rlen, hlen; in tlsv1_record_receive() local 451 hlen = sizeof(hash); in tlsv1_record_receive() 452 if (crypto_hash_finish(hmac, hash, &hlen) < 0) { in tlsv1_record_receive() 458 if (hlen != rl->hash_size || in tlsv1_record_receive() 459 os_memcmp_const(hash, out_data + plen, hlen) != 0 || in tlsv1_record_receive()
|
/hostap-3.7.0/wpa_supplicant/ |
D | wpa_cli_zephyr.c | 130 size_t hlen = sizeof(int); in wpa_cli_recv_pending() local 133 if (wpa_ctrl_recv(ctrl, buf, &hlen) == 0 && in wpa_cli_recv_pending() 134 hlen == sizeof(int)) { in wpa_cli_recv_pending() 137 wpa_printf(MSG_ERROR, "Could not read pending message header len %d.\n", hlen); in wpa_cli_recv_pending()
|
/hostap-3.7.0/src/common/ |
D | dhcp.h | 27 u8 hlen; member 46 u8 hlen; member
|
/hostap-3.7.0/src/radius/ |
D | radius.c | 1198 int hlen; in radius_msg_add_mppe_keys() local 1201 hlen = sizeof(vendor_id) + sizeof(*vhdr) + 2; in radius_msg_add_mppe_keys() 1204 buf = os_malloc(hlen + send_key_len + 16); in radius_msg_add_mppe_keys() 1223 vhdr->vendor_length = hlen + elen - sizeof(vendor_id); in radius_msg_add_mppe_keys() 1226 buf, hlen + elen); in radius_msg_add_mppe_keys() 1233 buf = os_malloc(hlen + recv_key_len + 16); in radius_msg_add_mppe_keys() 1248 vhdr->vendor_length = hlen + elen - sizeof(vendor_id); in radius_msg_add_mppe_keys() 1251 buf, hlen + elen); in radius_msg_add_mppe_keys()
|
/hostap-3.7.0/src/eap_peer/ |
D | eap_teap_pac.c | 234 int hlen; in eap_teap_parse_hex() local 239 hlen = os_strlen(value); in eap_teap_parse_hex() 240 if (hlen & 1) in eap_teap_parse_hex() 242 *len = hlen / 2; in eap_teap_parse_hex()
|
D | eap_fast_pac.c | 233 int hlen; in eap_fast_parse_hex() local 238 hlen = os_strlen(value); in eap_fast_parse_hex() 239 if (hlen & 1) in eap_fast_parse_hex() 241 *len = hlen / 2; in eap_fast_parse_hex()
|
/hostap-3.7.0/src/eap_common/ |
D | eap_sim_common.c | 263 size_t hlen; in prf_prime() local 267 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len; in prf_prime() 268 os_memcpy(res, hash, hlen); in prf_prime() 269 res += hlen; in prf_prime() 270 res_len -= hlen; in prf_prime()
|
/hostap-3.7.0/src/utils/ |
D | common.c | 681 size_t tlen, hlen = os_strlen(value); in wpa_config_parse_string() local 682 if (hlen & 1) in wpa_config_parse_string() 684 tlen = hlen / 2; in wpa_config_parse_string()
|
D | pcsc_funcs.c | 377 unsigned char *hdr, size_t hlen) in scard_pin_needed() argument 380 if (hlen > SCARD_CHV1_OFFSET && in scard_pin_needed() 388 if (scard_parse_fsp_templ(hdr, hlen, &ps_do, NULL)) in scard_pin_needed()
|
/hostap-3.7.0/src/drivers/ |
D | driver_wired.c | 62 u_int8_t hlen; member
|
/hostap-3.7.0/src/ap/ |
D | fils_hlp.c | 344 dhcp->op, dhcp->htype, dhcp->hlen, dhcp->hops, in fils_process_hlp_dhcp()
|
/hostap-3.7.0/tests/hwsim/ |
D | test_fils.py | 669 hlen = 6 # Hardware address length 684 payload = struct.pack('>BBBBLHH', op, htype, hlen, hops, xid, secs, flags) 821 …op, htype, hlen, hops, xid, secs, flags, ciaddr, yiaddr, siaddr, giaddr = struct.unpack('>4BL2H4L'…
|
/hostap-3.7.0/hostapd/ |
D | config_file.c | 2339 size_t hlen = os_strlen(val), len = hlen / 2; in get_hex_config() local 2343 if (hlen & 1 || len > EXT_CAPA_MAX_LEN || hexstr2bin(val, tmp, len)) { in get_hex_config()
|