/hostap-latest/src/eap_common/ |
D | eap_eke_common.c | 184 size_t data_len, const u8 *data2, size_t data2_len, in eap_eke_prf() argument 192 len[0] = data_len; in eap_eke_prf() 209 size_t data_len, u8 *res, size_t len) in eap_eke_prf_hmac_sha1() argument 221 vlen[1] = data_len; in eap_eke_prf_hmac_sha1() 250 size_t data_len, u8 *res, size_t len) in eap_eke_prf_hmac_sha256() argument 262 vlen[1] = data_len; in eap_eke_prf_hmac_sha256() 291 const u8 *data, size_t data_len, u8 *res, size_t len) in eap_eke_prfplus() argument 294 return eap_eke_prf_hmac_sha1(key, key_len, data, data_len, res, in eap_eke_prfplus() 297 return eap_eke_prf_hmac_sha256(key, key_len, data, data_len, in eap_eke_prfplus() 429 size_t data_len; in eap_eke_derive_ke_ki() local [all …]
|
D | eap_gpsk_common.c | 39 const u8 *data /* Z */, size_t data_len, in eap_gpsk_gkdf_cmac() argument 53 vlen[1] = data_len; in eap_gpsk_gkdf_cmac() 74 const u8 *data /* Z */, size_t data_len, in eap_gpsk_gkdf_sha256() argument 88 vlen[1] = data_len; in eap_gpsk_gkdf_sha256() 117 size_t data_len, mk_len; in eap_gpsk_derive_keys_helper() local 140 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper() 141 data = os_malloc(data_len); in eap_gpsk_derive_keys_helper() 155 data, data_len); in eap_gpsk_derive_keys_helper() 157 if (gkdf(psk, data, data_len, mk, mk_len) < 0) { in eap_gpsk_derive_keys_helper() 349 size_t data_len; in eap_gpsk_derive_mid_helper() local [all …]
|
/hostap-latest/src/crypto/ |
D | aes-eax.c | 30 u8 *data, size_t data_len, u8 *tag) in aes_128_eax_encrypt() argument 38 if (nonce_len > data_len) in aes_128_eax_encrypt() 41 buf_len = data_len; in aes_128_eax_encrypt() 62 if (aes_128_ctr_encrypt(key, nonce_mac, data, data_len)) in aes_128_eax_encrypt() 65 os_memcpy(buf + 16, data, data_len); in aes_128_eax_encrypt() 66 if (omac1_aes_128(key, buf, 16 + data_len, data_mac)) in aes_128_eax_encrypt() 94 u8 *data, size_t data_len, const u8 *tag) in aes_128_eax_decrypt() argument 102 if (nonce_len > data_len) in aes_128_eax_decrypt() 105 buf_len = data_len; in aes_128_eax_decrypt() 131 os_memcpy(buf + 16, data, data_len); in aes_128_eax_decrypt() [all …]
|
D | aes_wrap.h | 31 int __must_check omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, 33 int __must_check omac1_aes_256(const u8 *key, const u8 *data, size_t data_len, 37 u8 *data, size_t data_len); 39 u8 *data, size_t data_len); 43 u8 *data, size_t data_len, u8 *tag); 47 u8 *data, size_t data_len, const u8 *tag); 49 size_t data_len); 51 size_t data_len);
|
D | crypto_linux.c | 179 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 182 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5() 194 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 197 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha1() 210 size_t data_len, u8 *mac) in hmac_sha256() argument 212 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha256() 225 size_t data_len, u8 *mac) in hmac_sha384() argument 227 return hmac_sha384_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha384() 538 u8 *data, size_t data_len) in rc4_skip() argument 561 io[1].iov_len = data_len; in rc4_skip() [all …]
|
D | aes-siv.c | 72 size_t data_len[1]; in aes_s2v() local 78 data_len[0] = sizeof(tmp); in aes_s2v() 79 return omac1_aes_vector(key, key_len, 1, data, data_len, mac); in aes_s2v() 83 data_len[0] = sizeof(zero); in aes_s2v() 84 ret = omac1_aes_vector(key, key_len, 1, data, data_len, tmp); in aes_s2v() 114 data_len[0] = sizeof(tmp); in aes_s2v() 115 return omac1_aes_vector(key, key_len, 1, data, data_len, mac); in aes_s2v()
|
D | aes-ctr.c | 26 u8 *data, size_t data_len) in aes_ctr_encrypt() argument 29 size_t j, len, left = data_len; in aes_ctr_encrypt() 68 u8 *data, size_t data_len) in aes_128_ctr_encrypt() argument 70 return aes_ctr_encrypt(key, 16, nonce, data, data_len); in aes_128_ctr_encrypt()
|
D | sha256-prf.c | 31 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) in sha256_prf() argument 33 return sha256_prf_bits(key, key_len, label, data, data_len, buf, in sha256_prf() 55 const u8 *data, size_t data_len, u8 *buf, in sha256_prf_bits() argument 71 len[2] = data_len; in sha256_prf_bits()
|
D | sha384-prf.c | 31 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) in sha384_prf() argument 33 return sha384_prf_bits(key, key_len, label, data, data_len, buf, in sha384_prf() 55 const u8 *data, size_t data_len, u8 *buf, in sha384_prf_bits() argument 71 len[2] = data_len; in sha384_prf_bits()
|
D | sha512-prf.c | 31 const u8 *data, size_t data_len, u8 *buf, size_t buf_len) in sha512_prf() argument 33 return sha512_prf_bits(key, key_len, label, data, data_len, buf, in sha512_prf() 55 const u8 *data, size_t data_len, u8 *buf, in sha512_prf_bits() argument 71 len[2] = data_len; in sha512_prf_bits()
|
D | aes-cbc.c | 24 int aes_128_cbc_encrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) in aes_128_cbc_encrypt() argument 39 blocks = data_len / AES_BLOCK_SIZE; in aes_128_cbc_encrypt() 60 int aes_128_cbc_decrypt(const u8 *key, const u8 *iv, u8 *data, size_t data_len) in aes_128_cbc_decrypt() argument 75 blocks = data_len / AES_BLOCK_SIZE; in aes_128_cbc_decrypt()
|
D | crypto_nettle.c | 126 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 129 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5() 151 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 154 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha1() 179 size_t data_len, u8 *mac) in hmac_sha256() argument 181 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha256() 208 size_t data_len, u8 *mac) in hmac_sha384() argument 210 return hmac_sha384_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha384() 237 size_t data_len, u8 *mac) in hmac_sha512() argument 239 return hmac_sha512_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha512()
|
D | crypto_gnutls.c | 136 int hmac_md5(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_md5() argument 139 return hmac_md5_vector(key, key_len, 1, &data, &data_len, mac); in hmac_md5() 151 int hmac_sha1(const u8 *key, size_t key_len, const u8 *data, size_t data_len, in hmac_sha1() argument 154 return hmac_sha1_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha1() 169 size_t data_len, u8 *mac) in hmac_sha256() argument 171 return hmac_sha256_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha256() 188 size_t data_len, u8 *mac) in hmac_sha384() argument 190 return hmac_sha384_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha384() 207 size_t data_len, u8 *mac) in hmac_sha512() argument 209 return hmac_sha512_vector(key, key_len, 1, &data, &data_len, mac); in hmac_sha512()
|
/hostap-latest/wlantest/ |
D | wep.c | 47 size_t data_len, u8 *plain) in try_wep() argument 60 os_memcpy(plain, data, data_len); in try_wep() 61 wep_crypt(k, plain, data_len); in try_wep() 62 icv = ieee80211_crc32(plain, data_len - 4); in try_wep() 63 rx_icv = WPA_GET_LE32(plain + data_len - 4); in try_wep() 72 const u8 *data, size_t data_len, size_t *decrypted_len) in wep_decrypt() argument 82 if (data_len < 4 + 4) in wep_decrypt() 84 plain = os_malloc(data_len - 4); in wep_decrypt() 91 if (try_wep(key, 3 + w->key_len, data + 4, data_len - 4, plain) in wep_decrypt() 102 *decrypted_len = data_len - 4 - 4; in wep_decrypt()
|
/hostap-latest/tests/fuzzing/eapol-supp/ |
D | eapol-supp.c | 21 size_t data_len; member 34 wpa_hexdump(MSG_MSGDUMP, "fuzzer - EAPOL", ctx->data, ctx->data_len); in test_send_eapol() 47 if (eapol_sm_rx_eapol(ctx->eapol, src, ctx->data, ctx->data_len, in test_send_eapol() 49 wpa_sm_rx_eapol(ctx->wpa, src, ctx->data, ctx->data_len, in test_send_eapol() 73 const void *data, u16 data_len, in alloc_eapol() argument 78 *msg_len = sizeof(*hdr) + data_len; in alloc_eapol() 85 hdr->length = host_to_be16(data_len); in alloc_eapol() 88 os_memcpy(hdr + 1, data, data_len); in alloc_eapol() 90 os_memset(hdr + 1, 0, data_len); in alloc_eapol() 180 ctx.data_len = size; in LLVMFuzzerTestOneInput()
|
/hostap-latest/src/drivers/ |
D | driver_ndis_.c | 25 const u8 *data, size_t data_len); 46 size_t data_len = 0; in wpa_driver_ndis_event_process() local 56 data_len = (int) *pos++ << 8; in wpa_driver_ndis_event_process() 57 data_len += *pos++; in wpa_driver_ndis_event_process() 58 if (data_len > (size_t) (buf + len - pos)) { in wpa_driver_ndis_event_process() 63 wpa_hexdump(MSG_MSGDUMP, "NDIS: event data", data, data_len); in wpa_driver_ndis_event_process() 74 wpa_driver_ndis_event_media_specific(drv, data, data_len); in wpa_driver_ndis_event_process()
|
D | ndis_events.c | 194 char *data, size_t data_len) in ndis_events_send_event() argument 206 if (2 + data_len > (size_t) (end - pos)) { in ndis_events_send_event() 208 "data (%d)", data_len); in ndis_events_send_event() 211 *pos++ = data_len >> 8; in ndis_events_send_event() 212 *pos++ = data_len & 0xff; in ndis_events_send_event() 213 os_memcpy(pos, data, data_len); in ndis_events_send_event() 214 pos += data_len; in ndis_events_send_event() 248 size_t data_len; in ndis_events_media_specific() local 264 data_len = upper - lower + 1; in ndis_events_media_specific() 265 data = os_malloc(data_len); in ndis_events_media_specific() [all …]
|
/hostap-latest/port/mbedtls/ |
D | supp_psa_api.c | 148 int aes_128_cbc_encrypt_psa(const u8 *key, const u8 *iv, u8 *data, size_t data_len) in aes_128_cbc_encrypt_psa() argument 158 if (data_len > SUPP_PSA_MAX_OUTPUT_SIZE) in aes_128_cbc_encrypt_psa() 160 printk("%s invalid input len %d", __func__, data_len); in aes_128_cbc_encrypt_psa() 176 memset(supp_psa_outbuf, 0x0, data_len); in aes_128_cbc_encrypt_psa() 177 …status = supp_psa_cipher_operation(&operation, data, data_len, PSA_BLOCK_CIPHER_BLOCK_LENGTH(key_t… in aes_128_cbc_encrypt_psa() 178 supp_psa_outbuf, data_len, &out_len); in aes_128_cbc_encrypt_psa() 191 int aes_128_cbc_decrypt_psa(const u8 *key, const u8 *iv, u8 *data, size_t data_len) in aes_128_cbc_decrypt_psa() argument 201 if (data_len > SUPP_PSA_MAX_OUTPUT_SIZE) in aes_128_cbc_decrypt_psa() 203 printk("%s invalid input len %d", __func__, data_len); in aes_128_cbc_decrypt_psa() 219 memset(supp_psa_outbuf, 0x0, data_len); in aes_128_cbc_decrypt_psa() [all …]
|
/hostap-latest/tests/fuzzing/p2p/ |
D | p2p.c | 102 size_t data_len; member 113 wpa_hexdump(MSG_MSGDUMP, "fuzzer - IEs", ctx->data, ctx->data_len); in test_send() 117 &rx_time, 0, ctx->data, ctx->data_len); in test_send() 123 ctx->data, ctx->data_len, 2412, 0); in test_send() 125 if (ctx->data_len >= IEEE80211_HDRLEN + 1) { in test_send() 134 ctx->data_len - IEEE80211_HDRLEN - 1, 2412); in test_send() 165 ctx.data_len = size; in LLVMFuzzerTestOneInput()
|
/hostap-latest/tests/fuzzing/eapol-key-supp/ |
D | eapol-key-supp.c | 19 size_t data_len; member 46 if (wpa->data_len - wpa->data_offset < 2) { in read_msg() 57 if (msg_len > 0 && wpa->data_len - wpa->data_offset < msg_len) { in read_msg() 123 u16 data_len, size_t *msg_len, void **data_pos) in supp_alloc_eapol() argument 128 __func__, type, data_len); in supp_alloc_eapol() 130 *msg_len = sizeof(*hdr) + data_len; in supp_alloc_eapol() 137 hdr->length = host_to_be16(data_len); in supp_alloc_eapol() 140 os_memcpy(hdr + 1, data, data_len); in supp_alloc_eapol() 142 os_memset(hdr + 1, 0, data_len); in supp_alloc_eapol() 306 wpa.data_len = size; in LLVMFuzzerTestOneInput()
|
/hostap-latest/src/ap/ |
D | wpa_auth_glue.c | 584 const u8 *data, size_t data_len, in hostapd_wpa_auth_send_eapol() argument 598 size_t hex_len = 2 * data_len + 1; in hostapd_wpa_auth_send_eapol() 603 wpa_snprintf_hex(hex, hex_len, data, data_len); in hostapd_wpa_auth_send_eapol() 621 return hostapd_drv_hapd_send_eapol(hapd, addr, data, data_len, in hostapd_wpa_auth_send_eapol() 688 size_t data_len; member 702 data->data_len); in hostapd_wpa_ft_rrb_rx_later() 714 size_t data_len; member 746 data = os_zalloc(sizeof(*data) + idata->data_len); in hostapd_wpa_auth_ft_iter() 751 os_memcpy(data + 1, idata->data, idata->data_len); in hostapd_wpa_auth_ft_iter() 752 data->data_len = idata->data_len; in hostapd_wpa_auth_ft_iter() [all …]
|
D | taxonomy.c | 54 const u8 *data, size_t data_len) in get_wps_name() argument 59 while (data_len >= 4) { in get_wps_name() 65 data_len -= 4; in get_wps_name() 67 if (elen > data_len) in get_wps_name() 78 data_len -= elen; in get_wps_name() 140 size_t data_len = elen - 4; in ie_to_string() local 144 data_len)) { in ie_to_string()
|
/hostap-latest/src/radius/ |
D | radius.c | 711 const u8 *data, size_t data_len) in radius_msg_add_attr() argument 741 num = (data_len + plen - 1) / plen; in radius_msg_add_attr() 744 buf_needed = num * hdr_len + data_len; in radius_msg_add_attr() 747 buf_needed = sizeof(struct radius_attr_hdr_ext) + data_len; in radius_msg_add_attr() 750 buf_needed = sizeof(*attr) + data_len; in radius_msg_add_attr() 752 if (data_len > max_len) { in radius_msg_add_attr() 755 __func__, data_len, max_len); in radius_msg_add_attr() 771 alen = data_len > plen ? plen : data_len; in radius_msg_add_attr() 779 wpabuf_put_u8(msg->buf, data_len > alen ? 0x80 : 0); in radius_msg_add_attr() 780 wpabuf_put_data(msg->buf, data, data_len); in radius_msg_add_attr() [all …]
|
/hostap-latest/tests/fuzzing/wnm/ |
D | wnm.c | 25 size_t data_len; member 39 wpa_hexdump(MSG_MSGDUMP, "fuzzer - WNM", ctx->data, ctx->data_len); in test_send_wnm() 42 ieee802_11_rx_wnm_action(&ctx->wpa_s, mgmt, ctx->data_len); in test_send_wnm() 86 ctx.data_len = size; in LLVMFuzzerTestOneInput()
|
/hostap-latest/wpa_supplicant/ |
D | preauth_test.c | 52 const void *data, u16 data_len, in wpa_alloc_eapol() argument 57 *msg_len = sizeof(*hdr) + data_len; in wpa_alloc_eapol() 64 hdr->length = htons(data_len); in wpa_alloc_eapol() 67 os_memcpy(hdr + 1, data, data_len); in wpa_alloc_eapol() 69 os_memset(hdr + 1, 0, data_len); in wpa_alloc_eapol() 79 const void *data, u16 data_len, in _wpa_alloc_eapol() argument 82 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); in _wpa_alloc_eapol()
|