/hostap-latest/hostapd/ |
D | sae_pk_gen.c | 25 char *b64 = NULL, *pw = NULL, *pos, *src; in main() local 134 b64 = hostap_base64_encode(der, der_len, NULL); in main() 135 if (!b64) in main() 137 src = pos = b64; in main() 175 printf("sae_password=%s|pk=%s:%s\n", pw, m_hex, b64); in main() 190 os_free(b64); in main()
|
/hostap-latest/src/utils/ |
D | json.c | 634 char *b64; in json_add_base64url() local 636 b64 = base64_url_encode(val, len, NULL); in json_add_base64url() 637 if (!b64) in json_add_base64url() 639 json_add_string(json, name, b64); in json_add_base64url() 640 os_free(b64); in json_add_base64url() 648 char *b64; in json_add_base64() local 650 b64 = base64_encode_no_lf(val, len, NULL); in json_add_base64() 651 if (!b64) in json_add_base64() 653 json_add_string(json, name, b64); in json_add_base64() 654 os_free(b64); in json_add_base64()
|
/hostap-latest/src/eap_server/ |
D | tncs.c | 182 char *b64; in TNC_TNCS_SendMessage() local 198 b64 = hostap_base64_encode(message, messageLength, &b64len); in TNC_TNCS_SendMessage() 199 if (b64 == NULL) in TNC_TNCS_SendMessage() 206 os_free(b64); in TNC_TNCS_SendMessage() 215 (unsigned int) messageType, b64); in TNC_TNCS_SendMessage() 217 os_free(b64); in TNC_TNCS_SendMessage()
|
/hostap-latest/src/eap_peer/ |
D | tncc.c | 147 char *b64; in TNC_TNCC_SendMessage() local 159 b64 = hostap_base64_encode(message, messageLength, &b64len); in TNC_TNCC_SendMessage() 160 if (b64 == NULL) in TNC_TNCC_SendMessage() 168 os_free(b64); in TNC_TNCC_SendMessage() 176 (unsigned int) messageType, b64); in TNC_TNCC_SendMessage() 178 os_free(b64); in TNC_TNCC_SendMessage()
|
D | eap_sim.c | 519 char *b64; in eap_sim_encrypt_identity() local 533 b64 = base64_encode_no_lf(wpabuf_head(enc), wpabuf_len(enc), &b64_len); in eap_sim_encrypt_identity() 535 if (!b64) in eap_sim_encrypt_identity() 543 os_free(b64); in eap_sim_encrypt_identity() 547 wpabuf_put_data(enc, b64, b64_len); in eap_sim_encrypt_identity() 548 os_free(b64); in eap_sim_encrypt_identity()
|
D | eap_aka.c | 651 char *b64; in eap_aka_encrypt_identity() local 665 b64 = base64_encode_no_lf(wpabuf_head(enc), wpabuf_len(enc), &b64_len); in eap_aka_encrypt_identity() 667 if (!b64) in eap_aka_encrypt_identity() 675 os_free(b64); in eap_aka_encrypt_identity() 679 wpabuf_put_data(enc, b64, b64_len); in eap_aka_encrypt_identity() 680 os_free(b64); in eap_aka_encrypt_identity()
|
/hostap-latest/hs20/server/ca/ |
D | est-csrattrs.sh | 4 base64 est-csrattrs.der > est-attrs.b64
|
/hostap-latest/hs20/server/ |
D | spp_server.c | 627 char *b64; in build_username_password() local 636 b64 = hostap_base64_encode(pw, strlen(pw), NULL); in build_username_password() 637 if (b64 == NULL) in build_username_password() 639 len = os_strlen(b64); in build_username_password() 640 if (len > 0 && b64[len - 1] == '\n') in build_username_password() 641 b64[len - 1] = '\0'; in build_username_password() 642 add_text_node(ctx, node, "Password", b64); in build_username_password() 643 free(b64); in build_username_password() 1583 char *b64; in spp_exec_get_certificate() local 1608 b64 = hostap_base64_encode(password, strlen(password), NULL); in spp_exec_get_certificate() [all …]
|
/hostap-latest/wpa_supplicant/ |
D | hs20_supplicant.c | 343 char *b64; in hs20_get_icon() local 362 b64 = hostap_base64_encode(&icon->image[offset], size, &b64_size); in hs20_get_icon() 363 if (b64 && buf_len >= b64_size) { in hs20_get_icon() 364 os_memcpy(reply, b64, b64_size); in hs20_get_icon() 369 os_free(b64); in hs20_get_icon()
|
D | dpp_supplicant.c | 1752 char *b64; in wpas_dpp_handle_config_obj() local 1754 b64 = base64_encode_no_lf(wpabuf_head(conf->certbag), in wpas_dpp_handle_config_obj() 1756 if (b64) in wpas_dpp_handle_config_obj() 1757 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_CERTBAG "%s", b64); in wpas_dpp_handle_config_obj() 1758 os_free(b64); in wpas_dpp_handle_config_obj() 1762 char *b64; in wpas_dpp_handle_config_obj() local 1764 b64 = base64_encode_no_lf(wpabuf_head(conf->cacert), in wpas_dpp_handle_config_obj() 1766 if (b64) in wpas_dpp_handle_config_obj() 1767 wpa_msg(wpa_s, MSG_INFO, DPP_EVENT_CACERT "%s", b64); in wpas_dpp_handle_config_obj() 1768 os_free(b64); in wpas_dpp_handle_config_obj()
|
/hostap-latest/hs20/client/ |
D | osu_client.c | 313 char *b64; in download_cert() local 367 b64 = hostap_base64_encode(cert, len, NULL); in download_cert() 369 if (b64 == NULL) in download_cert() 374 os_free(b64); in download_cert() 381 b64); in download_cert() 383 os_free(b64); in download_cert()
|
/hostap-latest/src/common/ |
D | dpp.c | 3286 const u8 *b64; in dpp_get_csr_attrs() local 3289 b64 = dpp_get_attr(attrs, attrs_len, DPP_ATTR_CSR_ATTR_REQ, &b64_len); in dpp_get_csr_attrs() 3290 if (!b64) in dpp_get_csr_attrs() 3292 return hostap_base64_decode((const char *) b64, b64_len, len); in dpp_get_csr_attrs()
|
/hostap-latest/tests/hwsim/ |
D | test_ap_eap.py | 345 raise Exception("Unexpected length of the base64 encoded identity: " + b64) 1196 raise Exception("Unexpected length of the base64 encoded identity: " + b64) 1570 raise Exception("Unexpected length of the base64 encoded identity: " + b64)
|