/hostap-latest/wpa_supplicant/dbus/ |
D | dbus_dict_helpers.c | 660 char *buffer, *nbuffer; in _wpa_dbus_dict_entry_get_byte_array() local 665 buffer = os_calloc(BYTE_ARRAY_CHUNK_SIZE, BYTE_ARRAY_ITEM_SIZE); in _wpa_dbus_dict_entry_get_byte_array() 666 if (!buffer) in _wpa_dbus_dict_entry_get_byte_array() 675 buffer, count + BYTE_ARRAY_CHUNK_SIZE, in _wpa_dbus_dict_entry_get_byte_array() 678 os_free(buffer); in _wpa_dbus_dict_entry_get_byte_array() 684 buffer = nbuffer; in _wpa_dbus_dict_entry_get_byte_array() 688 buffer[count] = byte; in _wpa_dbus_dict_entry_get_byte_array() 692 entry->bytearray_value = buffer; in _wpa_dbus_dict_entry_get_byte_array() 716 dbus_uint16_t *buffer, *nbuffer; in _wpa_dbus_dict_entry_get_uint16_array() local 721 buffer = os_calloc(UINT16_ARRAY_CHUNK_SIZE, UINT16_ARRAY_ITEM_SIZE); in _wpa_dbus_dict_entry_get_uint16_array() [all …]
|
/hostap-latest/src/utils/ |
D | wpa_debug_zephyr.c | 30 char buffer[WPA_DEBUG_MAX_LINE_LENGTH]; in wpa_printf_impl() local 36 vsnprintf(buffer, sizeof(buffer), fmt, ap); in wpa_printf_impl() 40 len = strlen(buffer); in wpa_printf_impl() 41 if (len > 0 && buffer[len - 1] == '\n') { in wpa_printf_impl() 42 buffer[len - 1] = '\0'; in wpa_printf_impl() 47 LOG_ERR("%s", buffer); in wpa_printf_impl() 50 LOG_WRN("%s", buffer); in wpa_printf_impl() 53 LOG_INF("%s", buffer); in wpa_printf_impl() 58 LOG_DBG("%s", buffer); in wpa_printf_impl() 64 forced_memzero(buffer, sizeof(buffer)); in wpa_printf_impl()
|
/hostap-latest/src/eap_common/ |
D | eap_teap_common.c | 318 const u8 *buffer, size_t buffer_len, in eap_teap_tls_mac() argument 329 res = hmac_sha1(cmk, cmk_len, buffer, buffer_len, tmp); in eap_teap_tls_mac() 332 res = hmac_sha256(cmk, cmk_len, buffer, buffer_len, tmp); in eap_teap_tls_mac() 335 res = hmac_sha384(cmk, cmk_len, buffer, buffer_len, tmp); in eap_teap_tls_mac() 361 u8 *pos, *buffer; in eap_teap_compound_mac() local 373 buffer = os_malloc(buffer_len); in eap_teap_compound_mac() 374 if (!buffer) in eap_teap_compound_mac() 377 pos = buffer; in eap_teap_compound_mac() 382 tmp_cb = (struct teap_tlv_crypto_binding *) buffer; in eap_teap_compound_mac() 409 buffer_len = pos - buffer; in eap_teap_compound_mac() [all …]
|
/hostap-latest/src/crypto/ |
D | sha1-internal.c | 19 void SHA1Transform(u32 state[5], const unsigned char buffer[64]); 176 void SHA1Transform(u32 state[5], const unsigned char buffer[64]) in SHA1Transform() 187 os_memcpy(block, buffer, 64); in SHA1Transform() 189 block = (CHAR64LONG16 *) buffer; in SHA1Transform() 261 os_memcpy(&context->buffer[j], data, (i = 64-j)); in SHA1Update() 262 SHA1Transform(context->state, context->buffer); in SHA1Update() 269 os_memcpy(&context->buffer[j], &data[i], len - i); in SHA1Update() 300 os_memset(context->buffer, 0, 64); in SHA1Final()
|
D | sha1_i.h | 15 unsigned char buffer[64]; member 21 void SHA1Transform(u32 state[5], const unsigned char buffer[64]);
|
D | md4-internal.c | 20 u8 buffer[MD4_BLOCK_LENGTH]; /* input buffer */ member 124 os_memcpy(ctx->buffer + have, input, need); in MD4Update() 125 MD4Transform(ctx->state, ctx->buffer); in MD4Update() 141 os_memcpy(ctx->buffer + have, input, len); in MD4Update()
|
/hostap-latest/wpadebug/src/w1/fi/wpadebug/ |
D | WpaCommandListActivity.java | 98 char[] buffer = new char[1024]; in run() local 99 while ((read = reader.read(buffer)) > 0) in run() 100 output.append(buffer, 0, read); in run()
|
D | CommandListActivity.java | 116 char[] buffer = new char[1024]; in run() local 117 while ((read = reader.read(buffer)) > 0) in run() 118 output.append(buffer, 0, read); in run()
|
D | WpaNfcActivity.java | 63 char[] buffer = new char[1024]; in wpaCmd() local 64 while ((read = reader.read(buffer)) > 0) in wpaCmd() 65 output.append(buffer, 0, read); in wpaCmd()
|
D | MainActivity.java | 125 char[] buffer = new char[1024]; in run() local 126 while ((read = reader.read(buffer)) > 0) in run() 127 output.append(buffer, 0, read); in run()
|
D | WpaCredActivity.java | 237 char[] buffer = new char[1024]; in run() local 238 while ((read = reader.read(buffer)) > 0) in run() 239 output.append(buffer, 0, read); in run()
|
/hostap-latest/src/fst/ |
D | fst_ctrl_iface.c | 36 char *buffer, size_t size) in format_session_state_extra() argument 70 len = os_snprintf(buffer, size, in format_session_state_extra()
|
/hostap-latest/src/eap_server/ |
D | tncs.c | 266 TNC_BufferReference buffer, in TNC_TNCS_GetAttribute() argument 280 TNC_BufferReference buffer) in TNC_TNCS_SetAttribute() argument
|
/hostap-latest/doc/ |
D | driver_wrapper.doxygen | 159 a larger buffer is needed)
|
/hostap-latest/hostapd/ |
D | ctrl_iface.c | 5376 char buffer[256], *buf = buffer; in hostapd_global_ctrl_iface_receive() local 5387 res = recvfrom(sock, buffer, sizeof(buffer) - 1, 0, in hostapd_global_ctrl_iface_receive()
|
/hostap-latest/wpa_supplicant/ |
D | ChangeLog | 289 issues with monitor sockets running out of buffer space 561 * fixed wfd_dev_info to be more careful and not read beyond the buffer 1329 * fixed scan buffer processing with WEXT to handle up to 65535 1330 byte result buffer (previously, limited to 32768 bytes) 1546 * fixed a buffer overflow in parsing TSF from scan results when using 1552 buffer read overflow 1860 * fixed PC/SC code to use correct length for GSM AUTH command buffer 2122 Length; such frames could have crashed wpa_supplicant due to buffer
|