/hostap-latest/src/drivers/ |
D | driver_wext.c | 1682 struct iw_encode_ext *ext; in wpa_driver_wext_set_psk() local 1697 ext = os_zalloc(sizeof(*ext) + PMK_LEN); in wpa_driver_wext_set_psk() 1698 if (ext == NULL) in wpa_driver_wext_set_psk() 1701 iwr.u.encoding.pointer = (caddr_t) ext; in wpa_driver_wext_set_psk() 1702 iwr.u.encoding.length = sizeof(*ext) + PMK_LEN; in wpa_driver_wext_set_psk() 1703 ext->key_len = PMK_LEN; in wpa_driver_wext_set_psk() 1704 os_memcpy(&ext->key, psk, ext->key_len); in wpa_driver_wext_set_psk() 1705 ext->alg = IW_ENCODE_ALG_PMK; in wpa_driver_wext_set_psk() 1711 os_free(ext); in wpa_driver_wext_set_psk() 1727 struct iw_encode_ext *ext; in wpa_driver_wext_set_key_ext() local [all …]
|
/hostap-latest/src/radius/ |
D | radius.c | 318 struct radius_attr_hdr_ext *ext = NULL; in radius_msg_dump_attr() local 335 ext = (struct radius_attr_hdr_ext *) hdr; in radius_msg_dump_attr() 338 if (ext) { in radius_msg_dump_attr() 339 attr = radius_get_attr_type((ext->type << 8) | ext->ext_type); in radius_msg_dump_attr() 341 ext->type, ext->ext_type, in radius_msg_dump_attr() 342 attr ? attr->name : "?Unknown?", ext->length); in radius_msg_dump_attr() 343 pos = (unsigned char *) (ext + 1); in radius_msg_dump_attr() 344 len = ext->length - sizeof(struct radius_attr_hdr_ext); in radius_msg_dump_attr() 715 struct radius_attr_hdr_ext *ext; in radius_msg_add_attr() local 772 ext = wpabuf_put(msg->buf, in radius_msg_add_attr() [all …]
|
/hostap-latest/wpaspy/ |
D | setup.py | 11 ext = Extension(name = 'wpaspy', variable 21 ext_modules = [ext],
|
/hostap-latest/src/crypto/ |
D | tls_wolfssl.c | 606 void *ext; in tls_match_alt_subject_component() local 610 ext = wolfSSL_X509_get_ext_d2i(cert, ALT_NAMES_OID, NULL, NULL); in tls_match_alt_subject_component() 612 for (i = 0; ext && i < wolfSSL_sk_num(ext); i++) { in tls_match_alt_subject_component() 613 gen = wolfSSL_sk_value(ext, i); in tls_match_alt_subject_component() 622 wolfSSL_sk_GENERAL_NAME_free(ext); in tls_match_alt_subject_component() 707 void *ext; in tls_match_suffix_helper() local 716 ext = wolfSSL_X509_get_ext_d2i(cert, ALT_NAMES_OID, NULL, NULL); in tls_match_suffix_helper() 718 for (j = 0; ext && j < wolfSSL_sk_num(ext); j++) { in tls_match_suffix_helper() 719 gen = wolfSSL_sk_value(ext, j); in tls_match_suffix_helper() 732 wolfSSL_sk_ASN1_OBJECT_free(ext); in tls_match_suffix_helper() [all …]
|
D | tls_openssl.c | 1847 void *ext; in tls_match_altsubject_component() local 1851 ext = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL); in tls_match_altsubject_component() 1853 for (i = 0; ext && i < sk_GENERAL_NAME_num(ext); i++) { in tls_match_altsubject_component() 1854 gen = sk_GENERAL_NAME_value(ext, i); in tls_match_altsubject_component() 1862 sk_GENERAL_NAME_pop_free(ext, GENERAL_NAME_free); in tls_match_altsubject_component() 2162 void *ext; in tls_match_suffix_helper() local 2171 ext = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL); in tls_match_suffix_helper() 2173 for (j = 0; ext && j < sk_GENERAL_NAME_num(ext); j++) { in tls_match_suffix_helper() 2174 gen = sk_GENERAL_NAME_value(ext, j); in tls_match_suffix_helper() 2186 sk_GENERAL_NAME_pop_free(ext, GENERAL_NAME_free); in tls_match_suffix_helper() [all …]
|
D | tls_openssl_ocsp.c | 326 static char * extensions_str(const char *title, STACK_OF(X509_EXTENSION) *ext) in extensions_str() argument 330 if (!ext) in extensions_str() 337 if (!X509V3_extensions_print(out, title, ext, 0, 0)) { in extensions_str()
|
D | crypto_mbedtls_alt.c | 3132 unsigned char *end = csr->cri.p + csr->cri.len, *ext; in mbedtls_x509_csr_attr_oid_value() local 3152 ext = p; in mbedtls_x509_csr_attr_oid_value() 3155 if (mbedtls_asn1_get_tag(&ext, end, &len, MBEDTLS_ASN1_OID) != 0) in mbedtls_x509_csr_attr_oid_value() 3157 if (oid_len != len || 0 != memcmp(ext, oid, oid_len)) in mbedtls_x509_csr_attr_oid_value() 3161 *vtype = *ext++; /* tag */ in mbedtls_x509_csr_attr_oid_value() 3162 return (mbedtls_asn1_get_len(&ext, end, vlen) == 0) ? ext : NULL; in mbedtls_x509_csr_attr_oid_value()
|
/hostap-latest/src/eapol_supp/ |
D | eapol_supp_sm.h | 362 struct ext_password_data *ext); 477 struct ext_password_data *ext) in eapol_sm_set_ext_pw_ctx() argument
|
D | eapol_supp_sm.c | 2204 struct ext_password_data *ext) in eapol_sm_set_ext_pw_ctx() argument 2207 eap_sm_set_ext_pw_ctx(sm->eap, ext); in eapol_sm_set_ext_pw_ctx()
|
/hostap-latest/src/wps/ |
D | wps_dev_attr.h | 32 void wps_process_vendor_ext_m1(struct wps_device_data *dev, const u8 ext);
|
D | wps_dev_attr.c | 408 void wps_process_vendor_ext_m1(struct wps_device_data *dev, const u8 ext) in wps_process_vendor_ext_m1() argument 410 dev->multi_ap_ext = ext; in wps_process_vendor_ext_m1()
|
/hostap-latest/tests/hwsim/vm/ |
D | vm-run.sh | 75 --ext ) shift
|
/hostap-latest/src/eap_peer/ |
D | eap.h | 367 void eap_sm_set_ext_pw_ctx(struct eap_sm *sm, struct ext_password_data *ext);
|
D | eap.c | 3268 void eap_sm_set_ext_pw_ctx(struct eap_sm *sm, struct ext_password_data *ext) in eap_sm_set_ext_pw_ctx() argument 3272 sm->ext_pw = ext; in eap_sm_set_ext_pw_ctx()
|
/hostap-latest/wpa_supplicant/ |
D | bss.h | 179 const u8 * wpa_bss_get_ie_ext(const struct wpa_bss *bss, u8 ext);
|
D | README | 1049 ext:test@wlan0:0:1:2.487797 1058 ext:test freq=2412 timeout=30@wlan0:2412:1:28.583483 1070 ext:test2 freq=2412 timeout=60@wlan0:2412:1:9.751844 1071 ext:test3@wlan0:0:0:5.071812 1072 ext:test4@wlan0:0:0:3.143870 1076 ext:test2 freq=2412 timeout=60@wlan0:2412:1:16.287869 1077 ext:test4@wlan0:0:0:9.679895
|
D | bss.c | 1259 const u8 * wpa_bss_get_ie_ext(const struct wpa_bss *bss, u8 ext) in wpa_bss_get_ie_ext() argument 1261 return get_ie_ext(wpa_bss_ie_ptr(bss), bss->ie_len, ext); in wpa_bss_get_ie_ext()
|
D | ChangeLog | 236 * fixed EAP-SIM/AKA/AKA' ext auth cases within TLS tunnel 1010 * added optional framework for external password storage ("ext:<name>")
|
/hostap-latest/src/tls/ |
D | tlsv1_server_read.c | 91 const u8 *ext, size_t ext_len) in tls_process_status_request_v2() argument 97 pos = ext; in tls_process_status_request_v2() 98 end = ext + ext_len; in tls_process_status_request_v2()
|
D | tlsv1_client_read.c | 49 u16 ext, elen; in tls_process_server_hello_extensions() local 56 ext = WPA_GET_BE16(pos); in tls_process_server_hello_extensions() 67 ext); in tls_process_server_hello_extensions()
|
/hostap-latest/src/utils/ |
D | http_curl.c | 782 X509_EXTENSION *ext; in add_logotype_ext() local 799 ext = X509_get_ext(cert, pos); in add_logotype_ext() 800 if (!ext) { in add_logotype_ext() 805 os = X509_EXTENSION_get_data(ext); in add_logotype_ext()
|
/hostap-latest/src/common/ |
D | ieee802_11_common.h | 281 const u8 * get_ie_ext(const u8 *ies, size_t len, u8 ext);
|
D | ieee802_11_common.c | 2549 const u8 * get_ie_ext(const u8 *ies, size_t len, u8 ext) in get_ie_ext() argument 2556 for_each_element_extid(elem, ext, ies, len) in get_ie_ext()
|
/hostap-latest/wpa_supplicant/dbus/ |
D | dbus_new_handlers_p2p.c | 3074 int ext = 0; in wpas_dbus_handler_p2p_serv_disc_external() local 3077 dbus_message_iter_get_basic(&iter, &ext); in wpas_dbus_handler_p2p_serv_disc_external() 3079 wpa_s->p2p_sd_over_ctrl_iface = ext; in wpas_dbus_handler_p2p_serv_disc_external()
|
/hostap-latest/tests/hwsim/ |
D | test_dbus.py | 3839 ext = dbus.ByteArray(b"\x11\x22\x33\x44") 3846 vals = dbus.Dictionary({'WPSVendorExtensions': [ext]}, 3856 if res[0] != ext: 3887 vals = dbus.Dictionary({'Foo': [ext]}, signature='sv') 4185 ext = dbus.ByteArray(b"\x11\x22\x33\x44")
|