Home
last modified time | relevance | path

Searched refs:in (Results 1 – 25 of 103) sorted by relevance

12345

/hostap-latest/src/crypto/
Dmd5-internal.c17 static void MD5Transform(u32 buf[4], u32 const in[16]);
118 unsigned char *p = (unsigned char *) ctx->in + t; in MD5Update()
126 byteReverse(ctx->in, 16); in MD5Update()
127 MD5Transform(ctx->buf, (u32 *) ctx->in); in MD5Update()
134 os_memcpy(ctx->in, buf, 64); in MD5Update()
135 byteReverse(ctx->in, 16); in MD5Update()
136 MD5Transform(ctx->buf, (u32 *) ctx->in); in MD5Update()
143 os_memcpy(ctx->in, buf, len); in MD5Update()
160 p = ctx->in + count; in MD5Final()
170 byteReverse(ctx->in, 16); in MD5Final()
[all …]
Dmd4-internal.c200 u32 a, b, c, d, in[MD4_BLOCK_LENGTH / 4]; in MD4Transform() local
203 os_memcpy(in, block, sizeof(in)); in MD4Transform()
206 in[a] = (u32)( in MD4Transform()
219 MD4STEP(F1, a, b, c, d, in[ 0], 3); in MD4Transform()
220 MD4STEP(F1, d, a, b, c, in[ 1], 7); in MD4Transform()
221 MD4STEP(F1, c, d, a, b, in[ 2], 11); in MD4Transform()
222 MD4STEP(F1, b, c, d, a, in[ 3], 19); in MD4Transform()
223 MD4STEP(F1, a, b, c, d, in[ 4], 3); in MD4Transform()
224 MD4STEP(F1, d, a, b, c, in[ 5], 7); in MD4Transform()
225 MD4STEP(F1, c, d, a, b, in[ 6], 11); in MD4Transform()
[all …]
Dcrypto_internal-rsa.c73 const u8 *in, size_t inlen, in crypto_public_key_encrypt_pkcs1_v15() argument
77 0, in, inlen, out, outlen); in crypto_public_key_encrypt_pkcs1_v15()
82 const u8 *in, size_t inlen, in crypto_private_key_decrypt_pkcs1_v15() argument
86 in, inlen, out, outlen); in crypto_private_key_decrypt_pkcs1_v15()
91 const u8 *in, size_t inlen, in crypto_private_key_sign_pkcs1() argument
95 1, in, inlen, out, outlen); in crypto_private_key_sign_pkcs1()
/hostap-latest/tests/
Dtest-https.c25 struct wpabuf *in; in https_recv() local
30 in = wpabuf_alloc(20000); in https_recv()
31 if (in == NULL) in https_recv()
43 wpabuf_free(in); in https_recv()
49 wpabuf_free(in); in https_recv()
53 len = recv(s, wpabuf_put(in, 0), wpabuf_tailroom(in), 0); in https_recv()
56 wpabuf_free(in); in https_recv()
61 wpabuf_free(in); in https_recv()
65 wpabuf_put(in, len); in https_recv()
67 return in; in https_recv()
[all …]
Dtest-https_server.c24 struct wpabuf *in; in https_recv() local
29 in = wpabuf_alloc(20000); in https_recv()
30 if (in == NULL) in https_recv()
42 wpabuf_free(in); in https_recv()
48 wpabuf_free(in); in https_recv()
52 len = recv(s, wpabuf_put(in, 0), wpabuf_tailroom(in), 0); in https_recv()
55 wpabuf_free(in); in https_recv()
60 wpabuf_free(in); in https_recv()
64 wpabuf_put(in, len); in https_recv()
66 return in; in https_recv()
[all …]
/hostap-latest/tests/fuzzing/tls-client/
Dtls-client.c63 struct wpabuf *in = NULL, *out = NULL, *appl; in LLVMFuzzerTestOneInput() local
85 in = NULL; in LLVMFuzzerTestOneInput()
88 out = tls_connection_handshake(tls_client, conn_client, in, in LLVMFuzzerTestOneInput()
90 wpabuf_free(in); in LLVMFuzzerTestOneInput()
91 in = NULL; in LLVMFuzzerTestOneInput()
102 in = read_msg(&ctx); in LLVMFuzzerTestOneInput()
105 if (!in) in LLVMFuzzerTestOneInput()
111 wpabuf_free(in); in LLVMFuzzerTestOneInput()
112 in = wpabuf_alloc(100); in LLVMFuzzerTestOneInput()
113 if (!in) in LLVMFuzzerTestOneInput()
[all …]
/hostap-latest/tests/fuzzing/tls-server/
Dtls-server.c63 struct wpabuf *in = NULL, *out = NULL, *appl; in LLVMFuzzerTestOneInput() local
91 in = NULL; in LLVMFuzzerTestOneInput()
95 wpabuf_free(in); in LLVMFuzzerTestOneInput()
96 in = NULL; in LLVMFuzzerTestOneInput()
101 in = tls_connection_server_handshake(tls_server, conn_server, in LLVMFuzzerTestOneInput()
105 if (!in) in LLVMFuzzerTestOneInput()
115 wpabuf_free(in); in LLVMFuzzerTestOneInput()
116 in = wpabuf_alloc(100); in LLVMFuzzerTestOneInput()
117 if (!in) in LLVMFuzzerTestOneInput()
119 wpabuf_put_str(in, "PING"); in LLVMFuzzerTestOneInput()
[all …]
/hostap-latest/src/wps/
Dupnp_xml.c78 int xml_next_tag(const char *in, const char **out, in xml_next_tag() argument
81 while (*in && *in != '<') in xml_next_tag()
82 in++; in xml_next_tag()
83 if (*in != '<') in xml_next_tag()
85 *out = ++in; in xml_next_tag()
86 if (*in == '/') in xml_next_tag()
87 in++; in xml_next_tag()
88 *out_tagname = in; /* maybe */ in xml_next_tag()
89 while (isalnum(*in) || *in == '-') in xml_next_tag()
90 in++; in xml_next_tag()
[all …]
/hostap-latest/src/utils/
Dbase64.c30 const unsigned char *end, *in; in base64_gen_encode() local
47 in = src; in base64_gen_encode()
50 while (end - in >= 3) { in base64_gen_encode()
51 *pos++ = table[(in[0] >> 2) & 0x3f]; in base64_gen_encode()
52 *pos++ = table[(((in[0] & 0x03) << 4) | (in[1] >> 4)) & 0x3f]; in base64_gen_encode()
53 *pos++ = table[(((in[1] & 0x0f) << 2) | (in[2] >> 6)) & 0x3f]; in base64_gen_encode()
54 *pos++ = table[in[2] & 0x3f]; in base64_gen_encode()
55 in += 3; in base64_gen_encode()
63 if (end - in) { in base64_gen_encode()
64 *pos++ = table[(in[0] >> 2) & 0x3f]; in base64_gen_encode()
[all …]
/hostap-latest/wpa_supplicant/
DREADME-NAN-USD5 in the Wi-Fi Aware specification v4.0 can be used with wpa_spplicant.
14 The following parameters must be included in the config file used to
20 Enable NAN USD in wpa_supplicant build config file
29 NAN_PUBLISH service_name=<name> [ttl=<time-to-live-in-sec>] [freq=<in MHz>] [freq_list=<comma separ…
42 srv_proto_type values are defined in the Service Protocol Types table in
47 This command maps to the Publish() method in the NAN Discovery Engine.
51 This command maps to the CancelPublish() method in the NAN Discovery
56 This command maps to the UpdatePublish() method in the NAN Discovery
59 NAN_SUBSCRIBE service_name=<name> [active=1] [ttl=<time-to-live-in-sec>] [freq=<in MHz>] [srv_proto…
67 srv_proto_type values are defined in the Service Protocol Types table in
[all …]
DREADME-DPP5 implementation in wpa_supplicant and hostapd can be configured and how
13 enrolling of interface-less devices in a secure Wi-Fi network using many
15 authentication (password with in-band provisioning), etc. In DPP a
27 The following parameters must be included in the config file used to
33 Enable DPP in wpa_supplicant build config file
40 Enable DPP in hostapd build config file
47 Any STA or AP device can act as a Configurator. Enable DPP in build
116 band channel 1 is 2412 MHz) in case the Enrollee is a client device. An
123 Enter the QR Code in the Configurator.
134 The DPP values will be printed in the console. Save these values into the
[all …]
DChangeLog21 - discard unencrypted EAPOL frames in additional cases
22 - use Secure=1 in message 2 during PTK rekeying
33 - this is based on additional details being added in the IEEE 802.11
45 * add support for explicit SSID protection in 4-way handshake
48 - in addition, verify SSID after key setup when beacon protection is
59 get enabled by default in the future
71 * fixed PMF disconnection protection bypass in AP mode
76 * fixed various issues in experimental support for EAP-TEAP peer
103 to other compiled in options
119 * fixed a regression in OpenSSL 1.1+ engine loading
[all …]
DREADME-Windows.txt50 defines mentioned in nmake.mak. Example VS2005 solution and project
51 files are included in vs2005 subdirectory. This can be used as a
58 that Include and Lib directories are in this directory. The files can be
59 stored elsewhere as long as the WINPCAPDIR in nmake.mak is updated to
60 match with the selected directory. In case a project file in the IDE is
66 installed following instructions in INSTALL.W32. Note that if EAP-FAST
67 support will be included in the wpa_supplicant, OpenSSL needs to be
70 this directory can be modified by changing OPENSSLDIR variable in
77 Lib directories in suitable directory, e.g., C:\dev\openssl for the
98 added to match the system. An example configuration is available in
[all …]
/hostap-latest/doc/
Deap.doxygen5 defined in RFC 3748. wpa_supplicant uses a separate code module for EAP
7 of direct function calls (mainly, to debug/event functions) in order for
8 it to be usable in other programs. The design of the EAP
10 defined in this RFC and so is the interface between the peer state
12 understanding the EAP peer implementation in wpa_supplicant.
14 Some of the terminology used in EAP state machine is referring to
18 lower layer as defined in RFC 4137.
30 (Makefile) and the EAP method registration list in the
32 method should use a build-time configuration option, e.g., EAP_TLS, in
34 in the build.
[all …]
Ddriver_wrapper.doxygen4 All hardware and driver dependent functionality is in separate C files
9 Driver wrappers need to implement whatever calls are used in the
11 devices. As an example, in case of Linux, these are mostly some glue
14 Linux Wireless Extensions (in version 18), some driver specific code is used
15 in number of driver interface implementations. These driver dependent parts
16 can be replaced with generic code in \ref driver_wext.c once the target driver
18 least in theory, could use the same driver wrapper code.
21 defined in \ref driver.h. These functions are registered by filling struct
26 documented in \ref driver.h. In addition, a pointer to the 'struct
27 \ref wpa_driver_ops' needs to be registered in \ref drivers.c file.
[all …]
Deap_server.doxygen5 defined in RFC 3748. hostapd uses a separate code module for EAP server
7 direct function calls (mainly, to debug/event functions) in order for
8 it to be usable in other programs. The design of the EAP
10 defined in this RFC and so is the interface between the server state
12 understanding the EAP server implementation in hostapd.
14 Some of the terminology used in EAP state machine is referring to
18 lower layer as defined in RFC 4137.
30 (Makefile) and the EAP method registration list in the
32 method should use a build-time configuration option, e.g., EAP_TLS, in
34 in the build.
[all …]
/hostap-latest/
DCONTRIBUTIONS5 allow it to be used in any projects, whether open source or proprietary.
13 inclusion of Signed-off-by tag in the contributions at the end of the
44 patch file than just send a whitespace damaged version in the message
48 everything in a single patch. In other words, please keep cleanup, new
49 features, and bug fixes all in their own patches. Each patch needs a
53 Please try to follow the coding style used in the project.
59 A list of pending patches waiting for review is available in
66 Until February 11, 2012, in case of most files in hostap.git, "under the
67 open source license indicated in the file" means that the contribution
76 licensed until GPL v2. In case of most files in hostap.git, "under the
[all …]
/hostap-latest/wpadebug/src/w1/fi/wpadebug/
DWpaCommandListActivity.java35 private void read_commands(ArrayList<CmdList> list, Scanner in) in read_commands() argument
37 in.useDelimiter("@"); in read_commands()
38 while (in.hasNext()) { in read_commands()
39 String title = in.next(); in read_commands()
40 String cmd = in.nextLine().substring(1); in read_commands()
43 in.close(); in read_commands()
53 FileReader in; in onCreate() local
55 in = new FileReader(cmdfile); in onCreate()
56 read_commands(list, new Scanner(in)); in onCreate()
DCommandListActivity.java53 private void read_commands(ArrayList<CmdList> list, Scanner in) in read_commands() argument
55 in.useDelimiter("@"); in read_commands()
56 while (in.hasNext()) { in read_commands()
57 String title = in.next(); in read_commands()
58 String cmd = in.nextLine().substring(1); in read_commands()
61 in.close(); in read_commands()
71 FileReader in; in onCreate() local
73 in = new FileReader(cmdfile); in onCreate()
74 read_commands(list, new Scanner(in)); in onCreate()
/hostap-latest/eap_example/
DREADME10 machines defined in IEEE 802.1X-2004. hostapd and wpa_supplicant
23 same for EAP server. eap_example.c is an example that ties in both the
29 In practice, server and peer functionalities would likely reside in
31 devices based on an external protocol. For example, in IEEE 802.11
34 mechanism that transmits EAP messages as defined in IEEE 802.16e.
37 The EAP library links in number of helper functions from src/utils and
39 be desirable to replace the debug output code in src/utils/wpa_debug.c
41 functions there in a way that better fits in with the main
/hostap-latest/tests/hwsim/
DREADME22 The python scripts and tools in this directory control test case
26 network connection works in the expected way.
29 for regression testing and to help in keeping the hostap.git main
30 branch in stable state. Results from these tests are available here:
38 tested. These are available in the hostap.git repository and can be
56 The test scripts can find the binaries in the locations where they were
62 installed by default in many distributions. For example, following
85 case, you can either enable it in the kernel configuration
87 CPTCFG_MAC80211_HWSIM=m to replace the wireless LAN components in the
97 password entry very quickly. For example, use this in the sudoers file:
[all …]
/hostap-latest/hostapd/
DChangeLog18 - use Secure=1 in message 3 during PTK rekeying
25 - this is based on additional details being added in the IEEE 802.11
33 * add support for explicit SSID protection in 4-way handshake
58 * fixed various issues in experimental support for EAP-TEAP server
117 - added Finite Cyclic Group field in status code 77 responses
119 in REVmd (allow only FFC groups with prime >= 3072 bits and ECC
121 - minimize timing and memory use differences in PWE derivation
123 - fixed confirm message validation in error cases
126 - minimize timing and memory use differences in PWE derivation
133 - fix a memory leak in PWE derivation
[all …]
DREADME22 Redistribution and use in source and binary forms, with or without
29 2. Redistributions in binary form must reproduce the above copyright
30 notice, this list of conditions and the following disclaimer in the
56 included in the kernel driver: using external RADIUS authentication
75 to work in WPA mode.
109 Access Entity, and Authentication Server. Supplicant is a component in
122 Authenticator, in which case there is no need for additional protocol
124 use an external Authentication Server and encapsulate EAP frame in the
128 Host AP driver includes PAE functionality in the kernel driver. It
142 FreeRADIUS (http://www.freeradius.org/). The Authenticator in hostapd
[all …]
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml21 probably in <command>/usr/share/doc/wpa_supplicant/</command>, for
25 <para>All file paths in this configuration file should use full
26 (absolute, not relative to working directory) path in order to allow
28 run in the background.</para>
37 select the best network based on the order of network blocks in
52 # allow frontend (e.g., wpa_cli) to be used by all users in 'wheel' group
150 on what security policy is used in the selected SSID. This is
210 private key file has to also be included in configuration. If the
211 private key uses a passphrase, this has to be configured in
214 <para>wpa_supplicant supports X.509 certificates in PEM and DER
[all …]
/hostap-latest/radius_example/
DREADME9 functionality from hostapd can be used as a library in another
15 The RADIUS library links in couple of helper functions from src/utils and
17 be desirable to replace the debug output code in src/utils/wpa_debug.c
19 functions there in a way that better fits in with the main
30 to use whatever event loop design is used in the main program. This
32 implementing following functions defines in src/utils/eloop.h:

12345