/hostap-latest/src/tls/ |
D | tlsv1_client_ocsp.c | 145 pos = hdr.payload; in tls_process_ocsp_single_response() 146 end = hdr.payload + hdr.length; in tls_process_ocsp_single_response() 167 name_hash = hdr.payload; in tls_process_ocsp_single_response() 171 pos = hdr.payload + hdr.length; in tls_process_ocsp_single_response() 192 key_hash = hdr.payload; in tls_process_ocsp_single_response() 195 pos = hdr.payload + hdr.length; in tls_process_ocsp_single_response() 215 serial_number = hdr.payload; in tls_process_ocsp_single_response() 249 hdr.payload, hdr.length); in tls_process_ocsp_single_response() 250 pos = hdr.payload + hdr.length; in tls_process_ocsp_single_response() 256 x509_parse_time(hdr.payload, hdr.length, hdr.tag, &update) < 0) { in tls_process_ocsp_single_response() [all …]
|
D | tlsv1_cred.c | 463 pos = hdr.payload; in pkcs12_certbag() 464 end = hdr.payload + hdr.length; in pkcs12_certbag() 488 if (asn1_get_next(hdr.payload, hdr.length, &hdr) < 0 || in pkcs12_certbag() 496 hdr.payload, hdr.length); in pkcs12_certbag() 501 cert = x509_certificate_parse(hdr.payload, hdr.length); in pkcs12_certbag() 511 return tlsv1_set_cert(cred, NULL, hdr.payload, hdr.length); in pkcs12_certbag() 535 hdr.payload, hdr.length); in pkcs12_parse_attr_friendly_name() 560 hdr.payload, hdr.length); in pkcs12_parse_attr_local_key_id() 592 hdr.payload, hdr.length); in pkcs12_parse_attr() 593 pos = hdr.payload; in pkcs12_parse_attr() [all …]
|
D | x509v3.c | 200 if (hdr.length > buf + len - hdr.payload) in x509_parse_algorithm_identifier() 202 pos = hdr.payload; in x509_parse_algorithm_identifier() 239 pos = hdr.payload; in x509_parse_public_key() 258 pos = hdr.payload; in x509_parse_public_key() 310 pos = hdr.payload; in x509_parse_name() 328 set_pos = hdr.payload; in x509_parse_name() 329 pos = set_end = hdr.payload + hdr.length; in x509_parse_name() 339 seq_pos = hdr.payload; in x509_parse_name() 340 seq_end = hdr.payload + hdr.length; in x509_parse_name() 412 os_memcpy(name->email, hdr.payload, hdr.length); in x509_parse_name() [all …]
|
D | pkcs8.c | 35 pos = hdr.payload; in pkcs8_key_import() 48 if (bignum_set_unsigned_bin(zero, hdr.payload, hdr.length) < 0) { in pkcs8_key_import() 53 pos = hdr.payload + hdr.length; in pkcs8_key_import() 72 if (asn1_get_oid(hdr.payload, hdr.length, &oid, &pos)) { in pkcs8_key_import() 94 pos = hdr.payload + hdr.length; in pkcs8_key_import() 106 crypto_rsa_import_private_key(hdr.payload, hdr.length); in pkcs8_key_import() 136 pos = hdr.payload; in pkcs8_enc_key_import() 146 enc_alg = hdr.payload; in pkcs8_enc_key_import() 148 pos = hdr.payload + hdr.length; in pkcs8_enc_key_import() 158 data = pkcs5_decrypt(enc_alg, enc_alg_len, hdr.payload, hdr.length, in pkcs8_enc_key_import()
|
D | pkcs5.c | 115 pos = hdr.payload; in pkcs5_get_params_pbes2() 116 end = hdr.payload + hdr.length; in pkcs5_get_params_pbes2() 125 pos = hdr.payload; in pkcs5_get_params_pbes2() 126 kdf_end = end = hdr.payload + hdr.length; in pkcs5_get_params_pbes2() 166 pos = hdr.payload; in pkcs5_get_params_pbes2() 167 end = hdr.payload + hdr.length; in pkcs5_get_params_pbes2() 177 pos = hdr.payload + hdr.length; in pkcs5_get_params_pbes2() 178 os_memcpy(params->salt, hdr.payload, hdr.length); in pkcs5_get_params_pbes2() 188 params->iter_count = *hdr.payload; in pkcs5_get_params_pbes2() 190 params->iter_count = WPA_GET_BE16(hdr.payload); in pkcs5_get_params_pbes2() [all …]
|
D | pkcs1.c | 246 hdr.payload, hdr.length); in pkcs1_v15_sig_ver() 248 pos = hdr.payload; in pkcs1_v15_sig_ver() 267 hdr.payload, hdr.length); in pkcs1_v15_sig_ver() 268 da_end = hdr.payload + hdr.length; in pkcs1_v15_sig_ver() 270 if (asn1_get_oid(hdr.payload, hdr.length, &oid, &next)) { in pkcs1_v15_sig_ver() 287 hdr.payload + hdr.length != da_end)) { in pkcs1_v15_sig_ver() 316 hdr.payload, hdr.length); in pkcs1_v15_sig_ver() 319 os_memcmp_const(hdr.payload, hash, hdr.length) != 0) { in pkcs1_v15_sig_ver() 325 if (hdr.payload + hdr.length != decrypted + decrypted_len) { in pkcs1_v15_sig_ver() 330 hdr.payload + hdr.length, in pkcs1_v15_sig_ver() [all …]
|
D | asn1.c | 115 if (hdr->payload[0] != 0 && hdr->payload[0] != 0xff) { in asn1_valid_der_boolean() 118 hdr->payload[0]); in asn1_valid_der_boolean() 266 hdr->payload = pos; in asn1_get_next() 345 *next = hdr.payload + hdr.length; in asn1_get_oid() 347 return asn1_parse_oid(hdr.payload, hdr.length, oid); in asn1_get_oid() 446 *next = hdr.payload + hdr.length; in asn1_get_integer() 447 pos = hdr.payload; in asn1_get_integer() 475 *next = hdr->payload + hdr->length; in asn1_get_sequence() 492 asn1_get_oid(hdr.payload, hdr.length, oid, &pos) < 0) in asn1_get_alg_id() 497 *params_len = hdr.payload + hdr.length - pos; in asn1_get_alg_id() [all …]
|
D | tlsv1_server_write.c | 766 u8 payload[4]; in tls_write_server_hello_done() local 773 pos = payload; in tls_write_server_hello_done() 782 *msgpos, end - *msgpos, payload, pos - payload, in tls_write_server_hello_done() 790 tls_verify_hash_add(&conn->verify, payload, pos - payload); in tls_write_server_hello_done() 802 u8 payload[1]; in tls_write_server_change_cipher_spec() local 806 payload[0] = TLS_CHANGE_CIPHER_SPEC; in tls_write_server_change_cipher_spec() 809 *msgpos, end - *msgpos, payload, sizeof(payload), in tls_write_server_change_cipher_spec()
|
D | rsa.c | 45 if (bignum_set_unsigned_bin(num, hdr.payload, hdr.length) < 0) { in crypto_rsa_parse_integer() 50 return hdr.payload + hdr.length; in crypto_rsa_parse_integer() 90 pos = hdr.payload; in crypto_rsa_import_public_key() 193 pos = hdr.payload; in crypto_rsa_import_private_key()
|
/hostap-latest/src/common/ |
D | dpp_backup.c | 565 hdr.payload, hdr.length); in dpp_parse_recipient_infos() 566 pos = hdr.payload; in dpp_parse_recipient_infos() 582 pos = hdr.payload; in dpp_parse_recipient_infos() 600 pos = hdr.payload; in dpp_parse_recipient_infos() 633 pos = hdr.payload; in dpp_parse_recipient_infos() 642 hdr.payload, hdr.length); in dpp_parse_recipient_infos() 648 data->salt = hdr.payload; in dpp_parse_recipient_infos() 649 pos = hdr.payload + hdr.length; in dpp_parse_recipient_infos() 667 asn1_get_oid(hdr.payload, hdr.length, &oid, &pos) < 0) { in dpp_parse_recipient_infos() 720 hdr.payload, hdr.length); in dpp_parse_recipient_infos() [all …]
|
D | gas.c | 149 struct wpabuf *payload) in gas_anqp_build_initial_resp_buf() argument 155 payload ? wpabuf_len(payload) : 0); in gas_anqp_build_initial_resp_buf() 159 if (payload) in gas_anqp_build_initial_resp_buf() 160 wpabuf_put_buf(buf, payload); in gas_anqp_build_initial_resp_buf() 191 struct wpabuf *payload) in gas_anqp_build_comeback_resp_buf() argument 197 payload ? wpabuf_len(payload) : 0); in gas_anqp_build_comeback_resp_buf() 201 if (payload) in gas_anqp_build_comeback_resp_buf() 202 wpabuf_put_buf(buf, payload); in gas_anqp_build_comeback_resp_buf()
|
/hostap-latest/tests/hwsim/ |
D | netlink.py | 109 def __init__(self, msg_type, flags=0, seq=-1, payload=None): argument 114 payload = payload or [] 115 if isinstance(payload, list): 116 self.payload = bytes() 117 for attr in payload: 118 self.payload += attr._dump() 120 self.payload = payload 127 length = len(self.payload) 131 conn.send(hdr + self.payload) 135 self.type, self.pid, self.seq, self.flags, repr(self.payload)) [all …]
|
D | test_eap_proto.py | 572 payload = struct.pack("B", EAP_SAKE_AT_ANY_ID_REQ) 574 4 + 1 + 3 + len(payload), 576 EAP_SAKE_SUBTYPE_IDENTITY) + payload 581 payload = struct.pack("BB", EAP_SAKE_AT_IV, 2) 583 4 + 1 + 3 + len(payload), 585 EAP_SAKE_SUBTYPE_IDENTITY) + payload 590 payload = struct.pack("BBBB", 255, 2, 127, 2) 592 4 + 1 + 3 + len(payload), 594 EAP_SAKE_SUBTYPE_IDENTITY) + payload 599 payload = struct.pack("BB", EAP_SAKE_AT_RAND_P, 2) [all …]
|
D | test_wpas_wmm_ac.py | 141 payload = msg['payload'] 142 (categ, action, dialog, status) = struct.unpack('BBBB', payload[0:4]) 150 msg['payload'] = struct.pack('BBBB', 17, 1, (dialog + 1) & 0xff, 0) + payload[4:] 154 msg['payload'] = struct.pack('BBBB', 17, 1, dialog, 0) + payload[4:] 163 msg['payload'] = struct.pack('BBBB', 17, 1, dialog, 0) + payload[4:] 171 …msg['payload'] = struct.pack('BBBB', 17, 1, dialog, 0) + payload[4:] + struct.pack('BB', 0xdd, 100) 175 …msg['payload'] = struct.pack('BBBB', 17, 1, dialog, 0) + payload[4:] + b'\xdd\x06\x00\x50\xf2\x02\… 180 msg['payload'] = struct.pack('BBBB', 17, 2, 0, 0) + payload[4:] 188 msg['payload'] = struct.pack('BBBB', 17, 2, 0, 0) + payload[4:] 196 payload = msg['payload'] [all …]
|
D | test_he.py | 1433 payload = mac_capa + phy_capa + 2*mcs_nss 1434 hdr = struct.pack('BBB', 255, 1 + len(payload), 35) 1435 tests += [ (hdr + payload, True) ] 1438 payload = mac_capa + phy_capa + 4*mcs_nss 1439 hdr = struct.pack('BBB', 255, 1 + len(payload), 35) 1440 tests += [ (hdr + payload, True) ] 1443 payload = mac_capa + phy_capa + 4*mcs_nss 1444 hdr = struct.pack('BBB', 255, 1 + len(payload), 35) 1445 tests += [ (hdr + payload, True) ] 1448 payload = mac_capa + phy_capa + 6*mcs_nss [all …]
|
D | test_wnm.py | 577 payload = resp['payload'] 578 if len(payload) < 2 + 3: 580 (category, action) = struct.unpack('BB', payload[0:2]) 583 pos = payload[2:] 2138 payload = struct.pack("<3B5B", 2141 mgmt_tx(dev[0], cmd + binascii.hexlify(payload).decode()) 2144 payload = struct.pack("<3B4B", 2147 mgmt_tx(dev[0], cmd + binascii.hexlify(payload).decode()) 2150 payload = struct.pack("<3B4B", 2153 mgmt_tx(dev[0], cmd + binascii.hexlify(payload).decode()) [all …]
|
/hostap-latest/src/wps/ |
D | ndef.c | 25 const u8 *payload; member 78 record->payload = record->payload_length == 0 ? NULL : pos; in ndef_parse_record() 102 return wpabuf_alloc_copy(record.payload, in ndef_parse_records() 115 const struct wpabuf *payload) in ndef_build_record() argument 121 size_t payload_length = wpabuf_len(payload); in ndef_build_record() 156 wpabuf_put_buf(record, payload); in ndef_build_record()
|
/hostap-latest/wlantest/ |
D | wired.c | 208 const u8 *payload; in process_udp() local 224 payload = (const u8 *) (udp + 1); in process_udp() 228 process_radius(wt, dst, dport, src, sport, payload, plen); in process_udp() 235 const u8 *payload; in process_ipv4() local 263 payload = data + 4 * ip->ip_hl; in process_ipv4() 265 if (payload + plen > data + len) in process_ipv4() 271 payload, plen); in process_ipv4()
|
/hostap-latest/src/eap_server/ |
D | eap_server_gpsk.c | 241 const u8 *payload, size_t payloadlen) in eap_gpsk_process_gpsk_2() argument 254 pos = payload; in eap_gpsk_process_gpsk_2() 255 end = payload + payloadlen; in eap_gpsk_process_gpsk_2() 447 data->specifier, payload, pos - payload, mic) in eap_gpsk_process_gpsk_2() 474 const u8 *payload, size_t payloadlen) in eap_gpsk_process_gpsk_4() argument 486 pos = payload; in eap_gpsk_process_gpsk_4() 487 end = payload + payloadlen; in eap_gpsk_process_gpsk_4() 516 data->specifier, payload, pos - payload, mic) in eap_gpsk_process_gpsk_4()
|
D | eap_server_eke.c | 423 const u8 *payload, size_t payloadlen) in eap_eke_process_identity() argument 435 pos = payload; in eap_eke_process_identity() 436 end = payload + payloadlen; in eap_eke_process_identity() 518 const u8 *payload, size_t payloadlen) in eap_eke_process_commit() argument 530 pos = payload; in eap_eke_process_commit() 531 end = payload + payloadlen; in eap_eke_process_commit() 591 const u8 *payload, size_t payloadlen) in eap_eke_process_confirm() argument 613 if (eap_eke_decrypt_prot(&data->sess, payload, data->sess.pnonce_len, in eap_eke_process_confirm() 638 if (os_memcmp_const(auth_p, payload + data->sess.pnonce_len, in eap_eke_process_confirm() 666 const u8 *payload, size_t payloadlen) in eap_eke_process_failure() argument [all …]
|
D | eap_server_sake.c | 290 const u8 *payload, size_t payloadlen) in eap_sake_process_identity() argument 304 const u8 *payload, size_t payloadlen) in eap_sake_process_challenge() argument 314 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) in eap_sake_process_challenge() 375 const u8 *payload, size_t payloadlen) in eap_sake_process_confirm() argument 385 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) in eap_sake_process_confirm() 413 const u8 *payload, size_t payloadlen) in eap_sake_process_auth_reject() argument
|
/hostap-latest/src/eap_peer/ |
D | eap_eke.c | 223 const u8 *payload, in eap_eke_process_id() argument 246 pos = payload; in eap_eke_process_id() 247 end = payload + payload_len; in eap_eke_process_id() 356 const u8 *payload, in eap_eke_process_commit() argument 384 pos = payload; in eap_eke_process_commit() 385 end = payload + payload_len; in eap_eke_process_commit() 502 const u8 *payload, in eap_eke_process_confirm() argument 523 pos = payload; in eap_eke_process_confirm() 524 end = payload + payload_len; in eap_eke_process_confirm() 629 const u8 *payload, in eap_eke_process_failure() argument [all …]
|
D | eap_gpsk.c | 275 const u8 *payload, in eap_gpsk_process_gpsk_1() argument 289 end = payload + payload_len; in eap_gpsk_process_gpsk_1() 291 pos = eap_gpsk_process_id_server(data, payload, end); in eap_gpsk_process_gpsk_1() 545 const u8 *payload, in eap_gpsk_validate_gpsk_3_mic() argument 563 data->specifier, payload, pos - payload, mic) in eap_gpsk_validate_gpsk_3_mic() 584 const u8 *payload, in eap_gpsk_process_gpsk_3() argument 597 end = payload + payload_len; in eap_gpsk_process_gpsk_3() 599 pos = eap_gpsk_validate_rand(data, payload, end); in eap_gpsk_process_gpsk_3() 603 pos = eap_gpsk_validate_gpsk_3_mic(data, payload, pos, end); in eap_gpsk_process_gpsk_3()
|
D | eap_sake.c | 144 const u8 *payload, in eap_sake_process_identity() argument 157 if (eap_sake_parse_attributes(payload, payload_len, &attr)) in eap_sake_process_identity() 187 const u8 *payload, in eap_sake_process_challenge() argument 206 if (eap_sake_parse_attributes(payload, payload_len, &attr)) in eap_sake_process_challenge() 290 const u8 *payload, in eap_sake_process_confirm() argument 305 if (eap_sake_parse_attributes(payload, payload_len, &attr)) in eap_sake_process_confirm()
|
/hostap-latest/src/ap/ |
D | hs20.c | 156 const struct wpabuf *payload) in hs20_send_wnm_notification_deauth_req() argument 164 buf = wpabuf_alloc(4 + 6 + wpabuf_len(payload)); in hs20_send_wnm_notification_deauth_req() 175 wpabuf_put_u8(buf, 4 + wpabuf_len(payload)); in hs20_send_wnm_notification_deauth_req() 178 wpabuf_put_buf(buf, payload); in hs20_send_wnm_notification_deauth_req()
|