/hostap-latest/src/tls/ |
D | tlsv1_client_read.c | 82 size_t left, len, i; in tls_process_server_hello() local 95 left = *in_len; in tls_process_server_hello() 97 if (left < 4) in tls_process_server_hello() 113 left -= 4; in tls_process_server_hello() 115 if (len > left) in tls_process_server_hello() 358 size_t left, len, list_len, cert_len, idx; in tls_process_certificate() local 372 left = *in_len; in tls_process_certificate() 374 if (left < 4) { in tls_process_certificate() 376 "(len=%lu)", (unsigned long) left); in tls_process_certificate() 384 left -= 4; in tls_process_certificate() [all …]
|
D | tlsv1_server_read.c | 125 size_t left, len, i, j; in tls_process_client_hello() local 140 left = *in_len; in tls_process_client_hello() 142 if (left < 4) { in tls_process_client_hello() 161 left -= 4; in tls_process_client_hello() 163 if (len > left) { in tls_process_client_hello() 166 (int) len, (int) left); in tls_process_client_hello() 400 size_t left, len, list_len, cert_len, idx; in tls_process_certificate() local 414 left = *in_len; in tls_process_certificate() 416 if (left < 4) { in tls_process_certificate() 418 (unsigned long) left); in tls_process_certificate() [all …]
|
/hostap-latest/src/crypto/ |
D | aes-omac1.c | 49 size_t i, e, left, total_len; in omac1_aes_vector() local 62 left = total_len; in omac1_aes_vector() 68 while (left >= AES_BLOCK_SIZE) { in omac1_aes_vector() 77 left == AES_BLOCK_SIZE) in omac1_aes_vector() 84 if (left > AES_BLOCK_SIZE) in omac1_aes_vector() 86 left -= AES_BLOCK_SIZE; in omac1_aes_vector() 93 if (left || total_len == 0) { in omac1_aes_vector() 94 for (i = 0; i < left; i++) { in omac1_aes_vector() 101 if (i + 1 == left) in omac1_aes_vector() 108 cbc[left] ^= 0x80; in omac1_aes_vector()
|
D | random.c | 163 size_t left; in random_get_bytes() local 174 left = len; in random_get_bytes() 175 while (left) { in random_get_bytes() 181 siz = left > EXTRACT_LEN ? EXTRACT_LEN : left; in random_get_bytes() 184 left -= siz; in random_get_bytes() 190 left = len; in random_get_bytes() 191 while (left) { in random_get_bytes() 201 siz = left > EXTRACT_LEN ? EXTRACT_LEN : left; in random_get_bytes() 204 left -= siz; in random_get_bytes()
|
D | aes-ctr.c | 29 size_t j, len, left = data_len; in aes_ctr_encrypt() local 39 while (left > 0) { in aes_ctr_encrypt() 42 len = (left < AES_BLOCK_SIZE) ? left : AES_BLOCK_SIZE; in aes_ctr_encrypt() 46 left -= len; in aes_ctr_encrypt()
|
D | sha1-pbkdf2.c | 79 size_t left = buflen, plen; in pbkdf2_sha1() local 82 while (left > 0) { in pbkdf2_sha1() 87 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; in pbkdf2_sha1() 90 left -= plen; in pbkdf2_sha1()
|
/hostap-latest/src/eap_server/ |
D | eap_server_psk.c | 219 size_t left, buflen; in eap_psk_process_2() local 229 &left); in eap_psk_process_2() 230 if (cpos == NULL || left < sizeof(*resp)) { in eap_psk_process_2() 236 left -= sizeof(*resp); in eap_psk_process_2() 239 data->id_p = os_memdup(cpos, left); in eap_psk_process_2() 245 data->id_p_len = left; in eap_psk_process_2() 334 size_t left; in eap_psk_process_4() local 342 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, respData, &left); in eap_psk_process_4() 343 if (pos == NULL || left < sizeof(*resp)) { in eap_psk_process_4() 349 left -= sizeof(*resp); in eap_psk_process_4() [all …]
|
D | eap_server_tls_common.c | 436 const u8 **pos, size_t *left) in eap_server_tls_reassemble() argument 439 const u8 *end = *pos + *left; in eap_server_tls_reassemble() 441 wpa_hexdump(MSG_MSGDUMP, "SSL: Received data", *pos, *left); in eap_server_tls_reassemble() 444 if (*left < 4) { in eap_server_tls_reassemble() 453 *left -= 4; in eap_server_tls_reassemble() 455 if (*left > tls_msg_len) { in eap_server_tls_reassemble() 458 "bytes)", (int) tls_msg_len, (int) *left); in eap_server_tls_reassemble() 467 if (*left != 0) { in eap_server_tls_reassemble() 537 size_t left; in eap_server_tls_process() local 543 &left); in eap_server_tls_process() [all …]
|
D | eap_server_pax.c | 310 size_t len, left, cid_len; in eap_pax_process_std_2() local 324 left = len - sizeof(*resp); in eap_pax_process_std_2() 326 if (left < 2 + EAP_PAX_RAND_LEN || in eap_pax_process_std_2() 332 left -= 2; in eap_pax_process_std_2() 337 left -= EAP_PAX_RAND_LEN; in eap_pax_process_std_2() 339 if (left < 2 || (size_t) 2 + WPA_GET_BE16(pos) > left) { in eap_pax_process_std_2() 357 left -= 2 + data->cid_len; in eap_pax_process_std_2() 361 if (left < 2 + EAP_PAX_MAC_LEN || in eap_pax_process_std_2() 367 left -= 2; in eap_pax_process_std_2() 437 left -= EAP_PAX_MAC_LEN; in eap_pax_process_std_2() [all …]
|
D | eap_server_peap.c | 712 size_t left; in eap_peap_process_phase2_tlv() local 717 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, in_data, &left); in eap_peap_process_phase2_tlv() 724 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received TLVs", pos, left); in eap_peap_process_phase2_tlv() 725 while (left >= 4) { in eap_peap_process_phase2_tlv() 731 left -= 4; in eap_peap_process_phase2_tlv() 732 if ((size_t) tlv_len > left) { in eap_peap_process_phase2_tlv() 735 (unsigned long) left); in eap_peap_process_phase2_tlv() 761 left -= tlv_len; in eap_peap_process_phase2_tlv() 763 if (left) { in eap_peap_process_phase2_tlv() 765 "Request (left=%lu)", (unsigned long) left); in eap_peap_process_phase2_tlv() [all …]
|
/hostap-latest/src/common/ |
D | wpa_common.c | 1859 int left; in wpa_parse_wpa_ie_rsn() local 1887 left = rsn_ie_len - 6; in wpa_parse_wpa_ie_rsn() 1900 left = rsn_ie_len - 2 - 4 - 2; in wpa_parse_wpa_ie_rsn() 1915 left = rsn_ie_len - sizeof(*hdr); in wpa_parse_wpa_ie_rsn() 1918 if (left >= RSN_SELECTOR_LEN) { in wpa_parse_wpa_ie_rsn() 1936 left -= RSN_SELECTOR_LEN; in wpa_parse_wpa_ie_rsn() 1937 } else if (left > 0) { in wpa_parse_wpa_ie_rsn() 1939 __func__, left); in wpa_parse_wpa_ie_rsn() 1943 if (left >= 2) { in wpa_parse_wpa_ie_rsn() 1947 left -= 2; in wpa_parse_wpa_ie_rsn() [all …]
|
/hostap-latest/src/eap_peer/ |
D | eap_pax.c | 123 size_t left, plen; in eap_pax_process_std_1() local 141 left = req_plen - sizeof(*req); in eap_pax_process_std_1() 143 if (left < 2 + EAP_PAX_RAND_LEN) { in eap_pax_process_std_1() 160 left -= 2; in eap_pax_process_std_1() 165 left -= EAP_PAX_RAND_LEN; in eap_pax_process_std_1() 167 if (left > 0) { in eap_pax_process_std_1() 169 pos, left); in eap_pax_process_std_1() 239 size_t left; in eap_pax_process_std_3() local 257 left = req_plen - sizeof(*req); in eap_pax_process_std_3() 259 if (left < 2 + EAP_PAX_MAC_LEN) { in eap_pax_process_std_3() [all …]
|
D | eap_psk.c | 187 size_t buflen, left, data_len, len, plen; in eap_psk_process_3() local 204 left = len - sizeof(*hdr3); in eap_psk_process_3() 217 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL", pchannel, left); in eap_psk_process_3() 219 if (left < 4 + 16 + 1) { in eap_psk_process_3() 222 (unsigned long) left); in eap_psk_process_3() 261 left -= 4; in eap_psk_process_3() 265 left -= 16; in eap_psk_process_3() 273 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - cipher msg", msg, left); in eap_psk_process_3() 275 decrypted = os_memdup(msg, left); in eap_psk_process_3() 286 left, tag)) { in eap_psk_process_3() [all …]
|
D | eap_teap.c | 970 size_t left, len; in eap_teap_process_pac_tlv() local 974 left = pac_len; in eap_teap_process_pac_tlv() 976 while (left > sizeof(*hdr)) { in eap_teap_process_pac_tlv() 981 left -= sizeof(*hdr); in eap_teap_process_pac_tlv() 982 if (len > left) { in eap_teap_process_pac_tlv() 986 (unsigned long) left); in eap_teap_process_pac_tlv() 993 left -= len; in eap_teap_process_pac_tlv() 1089 size_t left, len; in eap_teap_process_pac_info() local 1098 left = entry->pac_info_len; in eap_teap_process_pac_info() 1099 while (left > sizeof(*hdr)) { in eap_teap_process_pac_info() [all …]
|
D | eap_fast.c | 878 size_t left, len; in eap_fast_process_pac_tlv() local 882 left = pac_len; in eap_fast_process_pac_tlv() 884 while (left > sizeof(*hdr)) { in eap_fast_process_pac_tlv() 889 left -= sizeof(*hdr); in eap_fast_process_pac_tlv() 890 if (len > left) { in eap_fast_process_pac_tlv() 894 (unsigned long) left); in eap_fast_process_pac_tlv() 901 left -= len; in eap_fast_process_pac_tlv() 998 size_t left, len; in eap_fast_process_pac_info() local 1007 left = entry->pac_info_len; in eap_fast_process_pac_info() 1008 while (left > sizeof(*hdr)) { in eap_fast_process_pac_info() [all …]
|
D | eap_tls_common.c | 920 size_t left; in eap_peer_tls_process_init() local 932 &left); in eap_peer_tls_process_init() 936 &left); in eap_peer_tls_process_init() 939 &left); in eap_peer_tls_process_init() 944 if (left == 0) { in eap_peer_tls_process_init() 957 left--; in eap_peer_tls_process_init() 963 if (left < 4) { in eap_peer_tls_process_init() 979 left -= 4; in eap_peer_tls_process_init() 981 if (left > tls_msg_len) { in eap_peer_tls_process_init() 984 "bytes)", (int) tls_msg_len, (int) left); in eap_peer_tls_process_init() [all …]
|
D | eap_peap.c | 505 size_t left, tlv_len; in eap_tlv_process() local 512 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, req, &left); in eap_tlv_process() 515 wpa_hexdump(MSG_DEBUG, "EAP-TLV: Received TLVs", pos, left); in eap_tlv_process() 516 while (left >= 4) { in eap_tlv_process() 522 left -= 4; in eap_tlv_process() 523 if (tlv_len > left) { in eap_tlv_process() 527 (unsigned long) left); in eap_tlv_process() 555 left -= tlv_len; in eap_tlv_process() 557 if (left) { in eap_tlv_process() 559 "Request (left=%lu)", (unsigned long) left); in eap_tlv_process() [all …]
|
/hostap-latest/src/drivers/ |
D | netlink.c | 40 int left; in netlink_receive() local 48 left = recvfrom(sock, buf, sizeof(buf), MSG_DONTWAIT, in netlink_receive() 50 if (left < 0) { in netlink_receive() 58 while (NLMSG_OK(h, left)) { in netlink_receive() 70 h = NLMSG_NEXT(h, left); in netlink_receive() 73 if (left > 0) { in netlink_receive() 75 "netlink message", left); in netlink_receive()
|
/hostap-latest/src/eap_common/ |
D | eap_pax_common.c | 39 size_t num_blocks, left; in eap_pax_kdf() local 57 left = output_len; in eap_pax_kdf() 59 size_t clen = left > EAP_PAX_MAC_LEN ? EAP_PAX_MAC_LEN : left; in eap_pax_kdf() 64 left -= clen; in eap_pax_kdf()
|
D | eap_gpsk_common.c | 43 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_cmac() local 56 left = len; in eap_gpsk_gkdf_cmac() 62 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_cmac() 65 left -= clen; in eap_gpsk_gkdf_cmac() 78 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_sha256() local 91 left = len; in eap_gpsk_gkdf_sha256() 97 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_sha256() 100 left -= clen; in eap_gpsk_gkdf_sha256()
|
/hostap-latest/src/ap/ |
D | fils_hlp.c | 165 size_t left, len; in fils_dhcp_handler() local 292 left = wpabuf_len(resp); in fils_dhcp_handler() 295 if (left <= 254) in fils_dhcp_handler() 296 len = 1 + left; in fils_dhcp_handler() 307 left -= len - 1; in fils_dhcp_handler() 308 while (left) { in fils_dhcp_handler() 310 len = left > 255 ? 255 : left; in fils_dhcp_handler() 314 left -= len; in fils_dhcp_handler() 577 const u8 *pos, int left) in fils_process_hlp() argument 579 const u8 *end = pos + left; in fils_process_hlp()
|
D | vlan_full.c | 700 int left; in vlan_event_receive() local 707 left = recvfrom(sock, buf, sizeof(buf), MSG_DONTWAIT, in vlan_event_receive() 709 if (left < 0) { in vlan_event_receive() 717 while (NLMSG_OK(h, left)) { in vlan_event_receive() 722 if (len > left || plen < 0) { in vlan_event_receive() 725 len, left, plen); in vlan_event_receive() 738 h = NLMSG_NEXT(h, left); in vlan_event_receive() 741 if (left > 0) { in vlan_event_receive() 743 "netlink message", __func__, left); in vlan_event_receive()
|
/hostap-latest/src/utils/ |
D | os_zephyr.c | 269 size_t left = siz; in os_strlcpy() local 271 if (left) { in os_strlcpy() 273 while (--left != 0) { in os_strlcpy() 280 if (left == 0) { in os_strlcpy()
|
D | os_win32.c | 246 size_t left = siz; in os_strlcpy() local 248 if (left) { in os_strlcpy() 250 while (--left != 0) { in os_strlcpy() 256 if (left == 0) { in os_strlcpy()
|
/hostap-latest/src/radius/ |
D | radius.c | 884 size_t left = data_len; in radius_msg_add_eap() local 886 while (left > 0) { in radius_msg_add_eap() 888 if (left > RADIUS_MAX_ATTR_LEN) in radius_msg_add_eap() 891 len = left; in radius_msg_add_eap() 898 left -= len; in radius_msg_add_eap() 1091 size_t left; in radius_msg_get_vendor_attr() local 1099 left = attr->length - sizeof(*attr); in radius_msg_get_vendor_attr() 1100 if (left < 4) in radius_msg_get_vendor_attr() 1107 left -= 4; in radius_msg_get_vendor_attr() 1112 while (left >= sizeof(*vhdr)) { in radius_msg_get_vendor_attr() [all …]
|