/hostap-3.7.0/tests/ |
D | test-sha1.c | 21 int msg_len = 0, tmp_len; in cavp_shavs() local 53 msg_len = atoi(pos); in cavp_shavs() 56 if (msg_len == 0 && tmp_len == 2) in cavp_shavs() 58 if (msg_len != tmp_len * 4) { in cavp_shavs() 60 msg_len, tmp_len, pos); in cavp_shavs() 65 if (hexstr2bin(pos, msg, msg_len / 8) < 0) { in cavp_shavs() 89 len[0] = msg_len / 8; in cavp_shavs()
|
D | test-sha256.c | 21 int msg_len = 0, tmp_len; in cavp_shavs() local 53 msg_len = atoi(pos); in cavp_shavs() 56 if (msg_len == 0 && tmp_len == 2) in cavp_shavs() 58 if (msg_len != tmp_len * 4) { in cavp_shavs() 60 msg_len, tmp_len, pos); in cavp_shavs() 65 if (hexstr2bin(pos, msg, msg_len / 8) < 0) { in cavp_shavs() 89 len[0] = msg_len / 8; in cavp_shavs()
|
D | test-rsa-sig-ver.c | 24 size_t msg_len = 0, n_len = 0, s_len = 0, em_len, e_len = 0; in cavp_rsa_sig_ver() local 65 msg_len = tmp_len / 2; in cavp_rsa_sig_ver() 66 if (hexstr2bin(pos, msg, msg_len) < 0) { in cavp_rsa_sig_ver() 132 len[0] = msg_len; in cavp_rsa_sig_ver()
|
/hostap-3.7.0/tests/fuzzing/eapol-key-supp/ |
D | eapol-key-supp.c | 43 u16 msg_len; in read_msg() local 51 msg_len = WPA_GET_BE16(&wpa->data[wpa->data_offset]); in read_msg() 54 msg = os_malloc(msg_len); in read_msg() 57 if (msg_len > 0 && wpa->data_len - wpa->data_offset < msg_len) { in read_msg() 59 msg_len); in read_msg() 64 os_memcpy(msg, &wpa->data[wpa->data_offset], msg_len); in read_msg() 65 wpa->data_offset += msg_len; in read_msg() 66 wpa_hexdump(MSG_DEBUG, "TEST: Read message from file", msg, msg_len); in read_msg() 68 *ret_len = msg_len; in read_msg() 123 u16 data_len, size_t *msg_len, void **data_pos) in supp_alloc_eapol() argument [all …]
|
/hostap-3.7.0/tests/fuzzing/tls-client/ |
D | tls-client.c | 28 u16 msg_len; in read_msg() local 35 msg_len = WPA_GET_BE16(&ctx->data[ctx->data_offset]); in read_msg() 38 msg = wpabuf_alloc(msg_len); in read_msg() 41 if (msg_len > 0 && ctx->data_len - ctx->data_offset < msg_len) { in read_msg() 43 msg_len); in read_msg() 47 wpabuf_put_data(msg, &ctx->data[ctx->data_offset], msg_len); in read_msg() 48 ctx->data_offset += msg_len; in read_msg()
|
/hostap-3.7.0/tests/fuzzing/tls-server/ |
D | tls-server.c | 28 u16 msg_len; in read_msg() local 35 msg_len = WPA_GET_BE16(&ctx->data[ctx->data_offset]); in read_msg() 38 msg = wpabuf_alloc(msg_len); in read_msg() 41 if (msg_len > 0 && ctx->data_len - ctx->data_offset < msg_len) { in read_msg() 43 msg_len); in read_msg() 47 wpabuf_put_data(msg, &ctx->data[ctx->data_offset], msg_len); in read_msg() 48 ctx->data_offset += msg_len; in read_msg()
|
/hostap-3.7.0/tests/fuzzing/eapol-key-auth/ |
D | eapol-key-auth.c | 53 u16 msg_len; in read_msg() local 61 msg_len = WPA_GET_BE16(&wpa->data[wpa->data_offset]); in read_msg() 64 msg = os_malloc(msg_len); in read_msg() 67 if (msg_len > 0 && wpa->data_len - wpa->data_offset < msg_len) { in read_msg() 69 msg_len); in read_msg() 74 os_memcpy(msg, &wpa->data[wpa->data_offset], msg_len); in read_msg() 75 wpa->data_offset += msg_len; in read_msg() 76 wpa_hexdump(MSG_DEBUG, "TEST: Read message from file", msg, msg_len); in read_msg() 78 *ret_len = msg_len; in read_msg()
|
/hostap-3.7.0/src/eap_server/ |
D | eap_server_gtc.c | 55 size_t msg_len; in eap_gtc_buildReq() local 59 msg_len = os_strlen(msg); in eap_gtc_buildReq() 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, in eap_gtc_buildReq() 69 wpabuf_put_data(req, msg, msg_len); in eap_gtc_buildReq()
|
/hostap-3.7.0/wpa_supplicant/ |
D | preauth_test.c | 52 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument 56 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol() 57 hdr = os_malloc(*msg_len); in wpa_alloc_eapol() 79 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument 81 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
|
D | wpa_cli_zephyr.c | 144 msg->msg[msg->msg_len] = '\0'; in wpa_cli_recv_pending() 145 if (msg->msg_len >= MAX_CTRL_MSG_LEN) { in wpa_cli_recv_pending() 150 if (msg->msg_len > 0) { in wpa_cli_recv_pending() 155 msg->msg, msg->msg_len); in wpa_cli_recv_pending()
|
D | ctrl_iface_zephyr.h | 50 int msg_len; member
|
D | p2p_supplicant_sd.c | 103 size_t msg_len, size_t offset) in p2p_sd_dns_uncompress() argument 114 if (offset > msg_len) in p2p_sd_dns_uncompress() 117 tmp = os_malloc(DNS_HEADER_LEN + P2P_SD_IN_MEMORY_LEN + msg_len); in p2p_sd_dns_uncompress() 121 end = spos + msg_len; in p2p_sd_dns_uncompress() 126 os_memcpy(tmp + DNS_HEADER_LEN + P2P_SD_IN_MEMORY_LEN, msg, msg_len); in p2p_sd_dns_uncompress()
|
D | wpas_glue.c | 64 size_t *msg_len, void **data_pos) in wpa_alloc_eapol() argument 68 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol() 69 hdr = os_malloc(*msg_len); in wpa_alloc_eapol() 449 size_t *msg_len, void **data_pos) in _wpa_alloc_eapol() argument 451 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
|
D | ibss_rsn.c | 86 u16 data_len, size_t *msg_len, void **data_pos) in supp_alloc_eapol() argument 93 *msg_len = sizeof(*hdr) + data_len; in supp_alloc_eapol() 94 hdr = os_malloc(*msg_len); in supp_alloc_eapol()
|
D | ctrl_iface_zephyr.c | 80 msg.msg_len = len; in wpa_supplicant_ctrl_iface_send()
|
/hostap-3.7.0/tests/fuzzing/eapol-supp/ |
D | eapol-supp.c | 72 size_t *msg_len, void **data_pos) in alloc_eapol() argument 76 *msg_len = sizeof(*hdr) + data_len; in alloc_eapol() 77 hdr = os_malloc(*msg_len); in alloc_eapol()
|
/hostap-3.7.0/src/crypto/ |
D | crypto_module_tests.c | 165 int msg_len; member 230 if (omac1_aes_128(tv->k, tv->msg, tv->msg_len, result) || in test_omac1_vector() 236 if (tv->msg_len > 1) { in test_omac1_vector() 241 len[1] = tv->msg_len - 1; in test_omac1_vector() 252 len[0] = tv->msg_len - 2; in test_omac1_vector() 253 addr[1] = tv->msg + tv->msg_len - 2; in test_omac1_vector() 255 addr[2] = tv->msg + tv->msg_len - 1; in test_omac1_vector()
|
/hostap-3.7.0/src/eap_common/ |
D | eap_sim_common.c | 204 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, in eap_sim_add_mac() argument 212 len[0] = msg_len; in eap_sim_add_mac() 218 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); in eap_sim_add_mac() 398 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, in eap_sim_add_mac_sha256() argument 406 len[0] = msg_len; in eap_sim_add_mac_sha256() 412 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - msg", msg, msg_len); in eap_sim_add_mac_sha256()
|
D | eap_sim_common.h | 88 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, 101 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
|
/hostap-3.7.0/src/eap_peer/ |
D | eap.c | 1499 size_t msg_len; in eap_sm_processIdentity() local 1506 &msg_len); in eap_sm_processIdentity() 1520 pos, msg_len); in eap_sm_processIdentity() 1743 size_t i, msg_len; in eap_sm_processNotify() local 1746 &msg_len); in eap_sm_processNotify() 1750 pos, msg_len); in eap_sm_processNotify() 1752 msg = os_malloc(msg_len + 1); in eap_sm_processNotify() 1755 for (i = 0; i < msg_len; i++) in eap_sm_processNotify() 1757 msg[msg_len] = '\0'; in eap_sm_processNotify() 2574 void eap_sm_request_otp(struct eap_sm *sm, const char *msg, size_t msg_len) in eap_sm_request_otp() argument [all …]
|
D | eap.h | 343 void eap_sm_request_otp(struct eap_sm *sm, const char *msg, size_t msg_len);
|
/hostap-3.7.0/src/rsn_supp/ |
D | wpa_i.h | 290 size_t *msg_len, void **data_pos) in wpa_sm_alloc_eapol() argument 294 msg_len, data_pos); in wpa_sm_alloc_eapol() 486 u8 *msg, size_t msg_len, u8 *key_mic);
|
/hostap-3.7.0/src/radius/ |
D | radius.c | 680 size_t msg_len; in radius_msg_parse() local 688 msg_len = be_to_host16(hdr->length); in radius_msg_parse() 689 if (msg_len < sizeof(*hdr) || msg_len > len) { in radius_msg_parse() 694 if (msg_len < len) { in radius_msg_parse() 696 "RADIUS message", (unsigned long) len - msg_len); in radius_msg_parse() 703 msg->buf = wpabuf_alloc_copy(data, msg_len); in radius_msg_parse()
|
/hostap-3.7.0/src/pae/ |
D | ieee802_1x_kay.c | 801 size_t msg_len) in ieee802_1x_mka_decode_basic_body() argument 1043 const u8 *mka_msg, size_t msg_len) in ieee802_1x_mka_i_in_peerlist() argument 1052 for (pos = mka_msg, left_len = msg_len; in ieee802_1x_mka_i_in_peerlist() 1121 const u8 *peer_msg, size_t msg_len) in ieee802_1x_mka_decode_live_peer_body() argument 1180 const u8 *peer_msg, size_t msg_len) in ieee802_1x_mka_decode_potential_peer_body() argument 1387 const u8 *mka_msg, size_t msg_len) in ieee802_1x_mka_decode_sak_use_body() argument 1689 const u8 *mka_msg, size_t msg_len) in ieee802_1x_mka_decode_dist_sak_body() argument 1911 const u8 *mka_msg, size_t msg_len) in ieee802_1x_mka_decode_icv_body() argument 1921 left_len = msg_len; in ieee802_1x_mka_decode_icv_body() 1944 return mka_msg + msg_len - DEFAULT_ICV_LEN; in ieee802_1x_mka_decode_icv_body() [all …]
|
D | ieee802_1x_kay_i.h | 80 const u8 *msg, size_t msg_len, u8 *icv);
|