Home
last modified time | relevance | path

Searched refs:b64 (Results 1 – 13 of 13) sorted by relevance

/hostap-latest/hostapd/
Dsae_pk_gen.c25 char *b64 = NULL, *pw = NULL, *pos, *src; in main() local
134 b64 = hostap_base64_encode(der, der_len, NULL); in main()
135 if (!b64) in main()
137 src = pos = b64; in main()
175 printf("sae_password=%s|pk=%s:%s\n", pw, m_hex, b64); in main()
190 os_free(b64); in main()
/hostap-latest/src/utils/
Djson.c634 char *b64; in json_add_base64url() local
636 b64 = base64_url_encode(val, len, NULL); in json_add_base64url()
637 if (!b64) in json_add_base64url()
639 json_add_string(json, name, b64); in json_add_base64url()
640 os_free(b64); in json_add_base64url()
648 char *b64; in json_add_base64() local
650 b64 = base64_encode_no_lf(val, len, NULL); in json_add_base64()
651 if (!b64) in json_add_base64()
653 json_add_string(json, name, b64); in json_add_base64()
654 os_free(b64); in json_add_base64()
/hostap-latest/src/eap_server/
Dtncs.c182 char *b64; in TNC_TNCS_SendMessage() local
198 b64 = hostap_base64_encode(message, messageLength, &b64len); in TNC_TNCS_SendMessage()
199 if (b64 == NULL) in TNC_TNCS_SendMessage()
206 os_free(b64); in TNC_TNCS_SendMessage()
215 (unsigned int) messageType, b64); in TNC_TNCS_SendMessage()
217 os_free(b64); in TNC_TNCS_SendMessage()
/hostap-latest/src/eap_peer/
Dtncc.c147 char *b64; in TNC_TNCC_SendMessage() local
159 b64 = hostap_base64_encode(message, messageLength, &b64len); in TNC_TNCC_SendMessage()
160 if (b64 == NULL) in TNC_TNCC_SendMessage()
168 os_free(b64); in TNC_TNCC_SendMessage()
176 (unsigned int) messageType, b64); in TNC_TNCC_SendMessage()
178 os_free(b64); in TNC_TNCC_SendMessage()
Deap_sim.c519 char *b64; in eap_sim_encrypt_identity() local
533 b64 = base64_encode_no_lf(wpabuf_head(enc), wpabuf_len(enc), &b64_len); in eap_sim_encrypt_identity()
535 if (!b64) in eap_sim_encrypt_identity()
543 os_free(b64); in eap_sim_encrypt_identity()
547 wpabuf_put_data(enc, b64, b64_len); in eap_sim_encrypt_identity()
548 os_free(b64); in eap_sim_encrypt_identity()
Deap_aka.c651 char *b64; in eap_aka_encrypt_identity() local
665 b64 = base64_encode_no_lf(wpabuf_head(enc), wpabuf_len(enc), &b64_len); in eap_aka_encrypt_identity()
667 if (!b64) in eap_aka_encrypt_identity()
675 os_free(b64); in eap_aka_encrypt_identity()
679 wpabuf_put_data(enc, b64, b64_len); in eap_aka_encrypt_identity()
680 os_free(b64); in eap_aka_encrypt_identity()
/hostap-latest/hs20/server/ca/
Dest-csrattrs.sh4 base64 est-csrattrs.der > est-attrs.b64
/hostap-latest/hs20/server/
Dspp_server.c627 char *b64; in build_username_password() local
636 b64 = hostap_base64_encode(pw, strlen(pw), NULL); in build_username_password()
637 if (b64 == NULL) in build_username_password()
639 len = os_strlen(b64); in build_username_password()
640 if (len > 0 && b64[len - 1] == '\n') in build_username_password()
641 b64[len - 1] = '\0'; in build_username_password()
642 add_text_node(ctx, node, "Password", b64); in build_username_password()
643 free(b64); in build_username_password()
1583 char *b64; in spp_exec_get_certificate() local
1608 b64 = hostap_base64_encode(password, strlen(password), NULL); in spp_exec_get_certificate()
[all …]
/hostap-latest/wpa_supplicant/
Dhs20_supplicant.c343 char *b64; in hs20_get_icon() local
362 b64 = hostap_base64_encode(&icon->image[offset], size, &b64_size); in hs20_get_icon()
363 if (b64 && buf_len >= b64_size) { in hs20_get_icon()
364 os_memcpy(reply, b64, b64_size); in hs20_get_icon()
369 os_free(b64); in hs20_get_icon()
Ddpp_supplicant.c1752 char *b64; in wpas_dpp_handle_config_obj() local
1754 b64 = base64_encode_no_lf(wpabuf_head(conf->certbag), in wpas_dpp_handle_config_obj()
1756 if (b64) in wpas_dpp_handle_config_obj()
1757 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_CERTBAG "%s", b64); in wpas_dpp_handle_config_obj()
1758 os_free(b64); in wpas_dpp_handle_config_obj()
1762 char *b64; in wpas_dpp_handle_config_obj() local
1764 b64 = base64_encode_no_lf(wpabuf_head(conf->cacert), in wpas_dpp_handle_config_obj()
1766 if (b64) in wpas_dpp_handle_config_obj()
1767 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_CACERT "%s", b64); in wpas_dpp_handle_config_obj()
1768 os_free(b64); in wpas_dpp_handle_config_obj()
/hostap-latest/hs20/client/
Dosu_client.c313 char *b64; in download_cert() local
367 b64 = hostap_base64_encode(cert, len, NULL); in download_cert()
369 if (b64 == NULL) in download_cert()
374 os_free(b64); in download_cert()
381 b64); in download_cert()
383 os_free(b64); in download_cert()
/hostap-latest/src/common/
Ddpp.c3286 const u8 *b64; in dpp_get_csr_attrs() local
3289 b64 = dpp_get_attr(attrs, attrs_len, DPP_ATTR_CSR_ATTR_REQ, &b64_len); in dpp_get_csr_attrs()
3290 if (!b64) in dpp_get_csr_attrs()
3292 return hostap_base64_decode((const char *) b64, b64_len, len); in dpp_get_csr_attrs()
/hostap-latest/tests/hwsim/
Dtest_ap_eap.py345 raise Exception("Unexpected length of the base64 encoded identity: " + b64)
1196 raise Exception("Unexpected length of the base64 encoded identity: " + b64)
1570 raise Exception("Unexpected length of the base64 encoded identity: " + b64)