/hostap-latest/src/eapol_auth/ |
D | eapol_auth_sm.c | 30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1) 32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0) 38 #define abortAuth() sm->eapol->cb.abort_auth(sm->eapol->conf.ctx, sm->sta) 39 #define txKey() sm->eapol->cb.tx_key(sm->eapol->conf.ctx, sm->sta) 53 if (eapol->cb.logger == NULL) in eapol_auth_logger() 55 eapol->cb.logger(eapol->conf.ctx, addr, level, txt); in eapol_auth_logger() 68 if (eapol->cb.logger == NULL) in eapol_auth_vlogger() 100 sm->eapol->cb.eapol_send(sm->eapol->conf.ctx, sm->sta, in eapol_auth_tx_canned_eap() 129 sm->eapol->cb.eapol_send(sm->eapol->conf.ctx, sm->sta, in eapol_auth_tx_req() 238 if (sm->eapol->cb.finished(sm->eapol->conf.ctx, sm->sta, 0, in SM_STATE() [all …]
|
/hostap-latest/src/ap/ |
D | nan_usd_ap.c | 149 struct nan_callbacks cb; in hostapd_nan_usd_init() local 151 os_memset(&cb, 0, sizeof(cb)); in hostapd_nan_usd_init() 152 cb.ctx = hapd; in hostapd_nan_usd_init() 153 cb.tx = hostapd_nan_de_tx; in hostapd_nan_usd_init() 154 cb.listen = hostapd_nan_de_listen; in hostapd_nan_usd_init() 155 cb.discovery_result = hostapd_nan_de_discovery_result; in hostapd_nan_usd_init() 156 cb.replied = hostapd_nan_de_replied; in hostapd_nan_usd_init() 157 cb.publish_terminated = hostapd_nan_de_publish_terminated; in hostapd_nan_usd_init() 158 cb.subscribe_terminated = hostapd_nan_de_subscribe_terminated; in hostapd_nan_usd_init() 159 cb.receive = hostapd_nan_de_receive; in hostapd_nan_usd_init() [all …]
|
D | utils.c | 19 int (*cb)(void *ctx, const u8 *sa, in hostapd_register_probereq_cb() 36 n->cb = cb; in hostapd_register_probereq_cb()
|
D | wpa_auth_ft.c | 634 if (wpa_auth->cb->send_ether == NULL) in wpa_ft_rrb_send() 637 return wpa_auth->cb->send_ether(wpa_auth->cb_ctx, dst, ETH_P_RRB, in wpa_ft_rrb_send() 646 if (!wpa_auth->cb->send_oui) in wpa_ft_rrb_oui_send() 650 return wpa_auth->cb->send_oui(wpa_auth->cb_ctx, dst, oui_suffix, data, in wpa_ft_rrb_oui_send() 658 if (wpa_auth->cb->send_ft_action == NULL) in wpa_ft_action_send() 660 return wpa_auth->cb->send_ft_action(wpa_auth->cb_ctx, dst, in wpa_ft_action_send() 669 if (wpa_auth->cb->get_psk == NULL) in wpa_ft_get_psk() 671 return wpa_auth->cb->get_psk(wpa_auth->cb_ctx, addr, p2p_dev_addr, in wpa_ft_get_psk() 679 if (wpa_auth->cb->add_sta == NULL) in wpa_ft_add_sta() 681 return wpa_auth->cb->add_sta(wpa_auth->cb_ctx, sta_addr); in wpa_ft_add_sta() [all …]
|
D | wpa_auth.c | 231 if (wpa_auth->cb->mic_failure_report) in wpa_auth_mic_failure_report() 232 return wpa_auth->cb->mic_failure_report(wpa_auth->cb_ctx, addr); in wpa_auth_mic_failure_report() 240 if (wpa_auth->cb->psk_failure_report) in wpa_auth_psk_failure_report() 241 wpa_auth->cb->psk_failure_report(wpa_auth->cb_ctx, addr); in wpa_auth_psk_failure_report() 249 if (wpa_auth->cb->set_eapol) in wpa_auth_set_eapol() 250 wpa_auth->cb->set_eapol(wpa_auth->cb_ctx, addr, var, value); in wpa_auth_set_eapol() 257 if (!wpa_auth->cb->get_eapol) in wpa_auth_get_eapol() 259 return wpa_auth->cb->get_eapol(wpa_auth->cb_ctx, addr, var); in wpa_auth_get_eapol() 269 if (!wpa_auth->cb->get_psk) in wpa_auth_get_psk() 271 return wpa_auth->cb->get_psk(wpa_auth->cb_ctx, addr, p2p_dev_addr, in wpa_auth_get_psk() [all …]
|
/hostap-latest/src/wps/ |
D | http_client.c | 28 void (*cb)(void *ctx, struct http_client *c, member 40 c->cb(c->cb_ctx, c, HTTP_CLIENT_TIMEOUT); in http_client_timeout() 63 c->cb(c->cb_ctx, c, HTTP_CLIENT_OK); in http_client_got_response() 69 c->cb(c->cb_ctx, c, HTTP_CLIENT_INVALID_REPLY); in http_client_got_response() 72 c->cb(c->cb_ctx, c, HTTP_CLIENT_INVALID_REPLY); in http_client_got_response() 75 c->cb(c->cb_ctx, c, HTTP_CLIENT_TIMEOUT); in http_client_got_response() 78 c->cb(c->cb_ctx, c, HTTP_CLIENT_FAILED); in http_client_got_response() 102 c->cb(c->cb_ctx, c, HTTP_CLIENT_FAILED); in http_client_tx_ready() 124 c->cb(c->cb_ctx, c, HTTP_CLIENT_FAILED); in http_client_tx_ready() 132 void (*cb)(void *ctx, in http_client_addr() [all …]
|
D | http_server.c | 30 void (*cb)(void *ctx, struct http_request *req); member 51 srv->cb(srv->cb_ctx, req); in http_request_cb() 229 void (*cb)(void *ctx, in http_server_init() 240 srv->cb = cb; in http_server_init()
|
D | httpread.c | 53 void (*cb)(struct httpread *handle, void *cookie, member 149 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_TIMEOUT); in httpread_timeout_handler() 687 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_ERROR); in httpread_read_handler() 712 (*h->cb)(h, h->cookie, HTTPREAD_EVENT_FILE_READY); in httpread_read_handler() 731 void (*cb)(struct httpread *handle, void *cookie, in httpread_create() 744 h->cb = cb; in httpread_create()
|
D | http_client.h | 25 void (*cb)(void *ctx, 31 void (*cb)(void *ctx,
|
/hostap-latest/src/eap_server/ |
D | eap_server_teap.c | 622 struct teap_tlv_crypto_binding *cb; in eap_teap_build_crypto_binding() local 625 buf = wpabuf_alloc(2 * sizeof(*result) + sizeof(*cb)); in eap_teap_build_crypto_binding() 660 cb = wpabuf_put(buf, sizeof(*cb)); in eap_teap_build_crypto_binding() 661 cb->tlv_type = host_to_be16(TEAP_TLV_MANDATORY | in eap_teap_build_crypto_binding() 663 cb->length = host_to_be16(sizeof(*cb) - sizeof(struct teap_tlv_hdr)); in eap_teap_build_crypto_binding() 664 cb->version = EAP_TEAP_VERSION; in eap_teap_build_crypto_binding() 665 cb->received_version = data->peer_version; in eap_teap_build_crypto_binding() 672 cb->subtype = (flags << 4) | subtype; in eap_teap_build_crypto_binding() 673 if (random_get_bytes(cb->nonce, sizeof(cb->nonce)) < 0) { in eap_teap_build_crypto_binding() 682 cb->nonce[sizeof(cb->nonce) - 1] &= ~0x01; in eap_teap_build_crypto_binding() [all …]
|
/hostap-latest/wpa_supplicant/ |
D | nan_usd.c | 340 struct nan_callbacks cb; in wpas_nan_usd_init() local 342 os_memset(&cb, 0, sizeof(cb)); in wpas_nan_usd_init() 343 cb.ctx = wpa_s; in wpas_nan_usd_init() 344 cb.tx = wpas_nan_de_tx; in wpas_nan_usd_init() 345 cb.listen = wpas_nan_de_listen; in wpas_nan_usd_init() 346 cb.discovery_result = wpas_nan_de_discovery_result; in wpas_nan_usd_init() 347 cb.replied = wpas_nan_de_replied; in wpas_nan_usd_init() 348 cb.publish_terminated = wpas_nan_de_publish_terminated; in wpas_nan_usd_init() 349 cb.subscribe_terminated = wpas_nan_de_subscribe_terminated; in wpas_nan_usd_init() 350 cb.receive = wpas_nan_de_receive; in wpas_nan_usd_init() [all …]
|
/hostap-latest/src/common/ |
D | nan_de.c | 66 struct nan_callbacks cb; member 81 const struct nan_callbacks *cb) in nan_de_init() argument 91 os_memcpy(&de->cb, cb, sizeof(*cb)); in nan_de_init() 112 if (srv->type == NAN_DE_PUBLISH && de->cb.publish_terminated) in nan_de_service_deinit() 113 de->cb.publish_terminated(de->cb.ctx, srv->id, reason); in nan_de_service_deinit() 114 if (srv->type == NAN_DE_SUBSCRIBE && de->cb.subscribe_terminated) in nan_de_service_deinit() 115 de->cb.subscribe_terminated(de->cb.ctx, srv->id, reason); in nan_de_service_deinit() 189 if (!de->cb.tx) in nan_de_tx() 192 res = de->cb.tx(de->cb.ctx, freq, wait_time, dst, src, bssid, buf); in nan_de_tx() 601 if (!started && de->cb.listen && in nan_de_timer() [all …]
|
D | ptksa_cache.h | 27 void (*cb)(struct ptksa_cache_entry *e); member 45 void (*cb)
|
/hostap-latest/src/eap_peer/ |
D | eap_teap.c | 645 const struct teap_tlv_crypto_binding *cb) in eap_teap_validate_crypto_binding() argument 649 subtype = cb->subtype & 0x0f; in eap_teap_validate_crypto_binding() 650 flags = cb->subtype >> 4; in eap_teap_validate_crypto_binding() 654 cb->version, cb->received_version, flags, subtype); in eap_teap_validate_crypto_binding() 656 cb->nonce, sizeof(cb->nonce)); in eap_teap_validate_crypto_binding() 658 cb->emsk_compound_mac, sizeof(cb->emsk_compound_mac)); in eap_teap_validate_crypto_binding() 660 cb->msk_compound_mac, sizeof(cb->msk_compound_mac)); in eap_teap_validate_crypto_binding() 662 if (cb->version != EAP_TEAP_VERSION || in eap_teap_validate_crypto_binding() 663 cb->received_version != data->received_version || in eap_teap_validate_crypto_binding() 668 cb->version, cb->received_version, flags, subtype); in eap_teap_validate_crypto_binding() [all …]
|
/hostap-latest/eap_example/ |
D | server.pem | 41 b6:98:ae:d9:9b:9a:44:49:b2:06:ee:af:36:83:cb:cd:cb:c9: 42 f3:38:6d:65:cb:e9:81:d2:25:dd:76:12:5c:da:3f:a1:0e:11: 44 10:c3:51:a2:7b:f5:0b:5f:ec:70:12:99:cb:65:6f:50:7f:2b:
|
/hostap-latest/tests/hwsim/auth_serv/ |
D | server.pem | 5 d8:d3:e3:a6:cb:e3:cd:87 19 bc:29:d7:d0:6e:75:00:35:fc:f7:65:b1:b6:0f:cb: 25 20:20:cb:5c:0d:9c:d2:9c:30:21:11:bc:b3:74:df: 30 46:ae:cb:eb:79:36:57:ad:c3:70:02:15:6d:f0:a5: 57 cb:83:d3:6e:bd:fd:60:fd:42:7f:15:8a:c3:bb:37:d6:af:b5:
|
D | ec-user.pem | 15 04:0d:b0:28:87:67:db:cb:f8:64:c6:61:7d:1e:6f: 16 1f:cb:30:47:0a:96:83:cc:5b:80:c8:6f:92:62:64: 37 cb:1e:ce:f7:e6:fe:b6:79:b4:af:d8:85:72:49:2d:e9:de:01:
|
D | ca.pem | 17 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91: 18 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d: 51 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28: 55 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
|
D | ocsp-responder.pem | 5 d8:d3:e3:a6:cb:e3:cd:90 50 b7:8f:2c:cb:ea:5f:e8:1e:a5:e0:36:30:c6:f4:c8:6a:63:32: 57 44:1c:6d:80:75:29:cb:7f:38:d0:cb:13:65:78:b6:5f:7c:f5:
|
D | ca-and-crl-expired.pem | 17 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91: 18 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d: 51 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28: 55 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
|
D | ca-and-crl.pem | 17 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91: 18 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d: 51 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28: 55 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
|
/hostap-latest/src/crypto/ |
D | aes-gcm.c | 146 u8 cb[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; in aes_gctr() local 155 os_memcpy(cb, icb, AES_BLOCK_SIZE); in aes_gctr() 158 aes_encrypt(aes, cb, ypos); in aes_gctr() 162 inc32(cb); in aes_gctr() 168 aes_encrypt(aes, cb, tmp); in aes_gctr()
|
/hostap-latest/tests/hwsim/auth_serv/iCA-user/ |
D | ca-and-root.pem | 5 d8:d3:e3:a6:cb:e3:cc:f8 22 5c:c8:34:8e:6b:36:64:bc:44:c9:fb:cb:50:ef:b1: 47 cb:23:ad:fa:01:7c:27:f7:aa:8d:d8:6c:6a:f8:72:21:63:bf: 98 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91: 99 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d: 132 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28: 136 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
|
/hostap-latest/tests/hwsim/auth_serv/test-ca/ |
D | cacert.pem | 17 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91: 18 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d: 51 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28: 55 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
|
/hostap-latest/tests/hwsim/auth_serv/iCA-server/ |
D | ca-and-root.pem | 5 d8:d3:e3:a6:cb:e3:cc:f7 28 af:1b:25:a9:45:33:06:cb:cc:0d:ca:78:5c:56:52: 98 1e:fd:4e:d0:ed:f1:47:cb:25:5b:66:7a:86:39:91: 99 ca:b5:61:a7:7e:2f:3c:63:7d:39:b8:1a:9e:cb:6d: 132 8e:f7:94:54:57:a7:8b:5b:9a:24:aa:86:d4:04:5c:8c:cb:28: 136 8d:9b:0f:b8:41:ac:cb:31:c2:17:6c:7b:61:13:16:9a:db:64:
|