Home
last modified time | relevance | path

Searched refs:payload (Results 1 – 25 of 78) sorted by relevance

1234

/hostap-latest/src/tls/
Dtlsv1_client_ocsp.c145 pos = hdr.payload; in tls_process_ocsp_single_response()
146 end = hdr.payload + hdr.length; in tls_process_ocsp_single_response()
167 name_hash = hdr.payload; in tls_process_ocsp_single_response()
171 pos = hdr.payload + hdr.length; in tls_process_ocsp_single_response()
192 key_hash = hdr.payload; in tls_process_ocsp_single_response()
195 pos = hdr.payload + hdr.length; in tls_process_ocsp_single_response()
215 serial_number = hdr.payload; in tls_process_ocsp_single_response()
249 hdr.payload, hdr.length); in tls_process_ocsp_single_response()
250 pos = hdr.payload + hdr.length; in tls_process_ocsp_single_response()
256 x509_parse_time(hdr.payload, hdr.length, hdr.tag, &update) < 0) { in tls_process_ocsp_single_response()
[all …]
Dtlsv1_cred.c463 pos = hdr.payload; in pkcs12_certbag()
464 end = hdr.payload + hdr.length; in pkcs12_certbag()
488 if (asn1_get_next(hdr.payload, hdr.length, &hdr) < 0 || in pkcs12_certbag()
496 hdr.payload, hdr.length); in pkcs12_certbag()
501 cert = x509_certificate_parse(hdr.payload, hdr.length); in pkcs12_certbag()
511 return tlsv1_set_cert(cred, NULL, hdr.payload, hdr.length); in pkcs12_certbag()
535 hdr.payload, hdr.length); in pkcs12_parse_attr_friendly_name()
560 hdr.payload, hdr.length); in pkcs12_parse_attr_local_key_id()
592 hdr.payload, hdr.length); in pkcs12_parse_attr()
593 pos = hdr.payload; in pkcs12_parse_attr()
[all …]
Dx509v3.c200 if (hdr.length > buf + len - hdr.payload) in x509_parse_algorithm_identifier()
202 pos = hdr.payload; in x509_parse_algorithm_identifier()
239 pos = hdr.payload; in x509_parse_public_key()
258 pos = hdr.payload; in x509_parse_public_key()
310 pos = hdr.payload; in x509_parse_name()
328 set_pos = hdr.payload; in x509_parse_name()
329 pos = set_end = hdr.payload + hdr.length; in x509_parse_name()
339 seq_pos = hdr.payload; in x509_parse_name()
340 seq_end = hdr.payload + hdr.length; in x509_parse_name()
412 os_memcpy(name->email, hdr.payload, hdr.length); in x509_parse_name()
[all …]
Dpkcs8.c35 pos = hdr.payload; in pkcs8_key_import()
48 if (bignum_set_unsigned_bin(zero, hdr.payload, hdr.length) < 0) { in pkcs8_key_import()
53 pos = hdr.payload + hdr.length; in pkcs8_key_import()
72 if (asn1_get_oid(hdr.payload, hdr.length, &oid, &pos)) { in pkcs8_key_import()
94 pos = hdr.payload + hdr.length; in pkcs8_key_import()
106 crypto_rsa_import_private_key(hdr.payload, hdr.length); in pkcs8_key_import()
136 pos = hdr.payload; in pkcs8_enc_key_import()
146 enc_alg = hdr.payload; in pkcs8_enc_key_import()
148 pos = hdr.payload + hdr.length; in pkcs8_enc_key_import()
158 data = pkcs5_decrypt(enc_alg, enc_alg_len, hdr.payload, hdr.length, in pkcs8_enc_key_import()
Dpkcs5.c115 pos = hdr.payload; in pkcs5_get_params_pbes2()
116 end = hdr.payload + hdr.length; in pkcs5_get_params_pbes2()
125 pos = hdr.payload; in pkcs5_get_params_pbes2()
126 kdf_end = end = hdr.payload + hdr.length; in pkcs5_get_params_pbes2()
166 pos = hdr.payload; in pkcs5_get_params_pbes2()
167 end = hdr.payload + hdr.length; in pkcs5_get_params_pbes2()
177 pos = hdr.payload + hdr.length; in pkcs5_get_params_pbes2()
178 os_memcpy(params->salt, hdr.payload, hdr.length); in pkcs5_get_params_pbes2()
188 params->iter_count = *hdr.payload; in pkcs5_get_params_pbes2()
190 params->iter_count = WPA_GET_BE16(hdr.payload); in pkcs5_get_params_pbes2()
[all …]
Dpkcs1.c246 hdr.payload, hdr.length); in pkcs1_v15_sig_ver()
248 pos = hdr.payload; in pkcs1_v15_sig_ver()
267 hdr.payload, hdr.length); in pkcs1_v15_sig_ver()
268 da_end = hdr.payload + hdr.length; in pkcs1_v15_sig_ver()
270 if (asn1_get_oid(hdr.payload, hdr.length, &oid, &next)) { in pkcs1_v15_sig_ver()
287 hdr.payload + hdr.length != da_end)) { in pkcs1_v15_sig_ver()
316 hdr.payload, hdr.length); in pkcs1_v15_sig_ver()
319 os_memcmp_const(hdr.payload, hash, hdr.length) != 0) { in pkcs1_v15_sig_ver()
325 if (hdr.payload + hdr.length != decrypted + decrypted_len) { in pkcs1_v15_sig_ver()
330 hdr.payload + hdr.length, in pkcs1_v15_sig_ver()
[all …]
Dasn1.c115 if (hdr->payload[0] != 0 && hdr->payload[0] != 0xff) { in asn1_valid_der_boolean()
118 hdr->payload[0]); in asn1_valid_der_boolean()
266 hdr->payload = pos; in asn1_get_next()
345 *next = hdr.payload + hdr.length; in asn1_get_oid()
347 return asn1_parse_oid(hdr.payload, hdr.length, oid); in asn1_get_oid()
446 *next = hdr.payload + hdr.length; in asn1_get_integer()
447 pos = hdr.payload; in asn1_get_integer()
475 *next = hdr->payload + hdr->length; in asn1_get_sequence()
492 asn1_get_oid(hdr.payload, hdr.length, oid, &pos) < 0) in asn1_get_alg_id()
497 *params_len = hdr.payload + hdr.length - pos; in asn1_get_alg_id()
[all …]
Dtlsv1_server_write.c766 u8 payload[4]; in tls_write_server_hello_done() local
773 pos = payload; in tls_write_server_hello_done()
782 *msgpos, end - *msgpos, payload, pos - payload, in tls_write_server_hello_done()
790 tls_verify_hash_add(&conn->verify, payload, pos - payload); in tls_write_server_hello_done()
802 u8 payload[1]; in tls_write_server_change_cipher_spec() local
806 payload[0] = TLS_CHANGE_CIPHER_SPEC; in tls_write_server_change_cipher_spec()
809 *msgpos, end - *msgpos, payload, sizeof(payload), in tls_write_server_change_cipher_spec()
Drsa.c45 if (bignum_set_unsigned_bin(num, hdr.payload, hdr.length) < 0) { in crypto_rsa_parse_integer()
50 return hdr.payload + hdr.length; in crypto_rsa_parse_integer()
90 pos = hdr.payload; in crypto_rsa_import_public_key()
193 pos = hdr.payload; in crypto_rsa_import_private_key()
/hostap-latest/src/common/
Ddpp_backup.c565 hdr.payload, hdr.length); in dpp_parse_recipient_infos()
566 pos = hdr.payload; in dpp_parse_recipient_infos()
582 pos = hdr.payload; in dpp_parse_recipient_infos()
600 pos = hdr.payload; in dpp_parse_recipient_infos()
633 pos = hdr.payload; in dpp_parse_recipient_infos()
642 hdr.payload, hdr.length); in dpp_parse_recipient_infos()
648 data->salt = hdr.payload; in dpp_parse_recipient_infos()
649 pos = hdr.payload + hdr.length; in dpp_parse_recipient_infos()
667 asn1_get_oid(hdr.payload, hdr.length, &oid, &pos) < 0) { in dpp_parse_recipient_infos()
720 hdr.payload, hdr.length); in dpp_parse_recipient_infos()
[all …]
Dgas.c149 struct wpabuf *payload) in gas_anqp_build_initial_resp_buf() argument
155 payload ? wpabuf_len(payload) : 0); in gas_anqp_build_initial_resp_buf()
159 if (payload) in gas_anqp_build_initial_resp_buf()
160 wpabuf_put_buf(buf, payload); in gas_anqp_build_initial_resp_buf()
191 struct wpabuf *payload) in gas_anqp_build_comeback_resp_buf() argument
197 payload ? wpabuf_len(payload) : 0); in gas_anqp_build_comeback_resp_buf()
201 if (payload) in gas_anqp_build_comeback_resp_buf()
202 wpabuf_put_buf(buf, payload); in gas_anqp_build_comeback_resp_buf()
/hostap-latest/tests/hwsim/
Dnetlink.py109 def __init__(self, msg_type, flags=0, seq=-1, payload=None): argument
114 payload = payload or []
115 if isinstance(payload, list):
116 self.payload = bytes()
117 for attr in payload:
118 self.payload += attr._dump()
120 self.payload = payload
127 length = len(self.payload)
131 conn.send(hdr + self.payload)
135 self.type, self.pid, self.seq, self.flags, repr(self.payload))
[all …]
Dtest_eap_proto.py572 payload = struct.pack("B", EAP_SAKE_AT_ANY_ID_REQ)
574 4 + 1 + 3 + len(payload),
576 EAP_SAKE_SUBTYPE_IDENTITY) + payload
581 payload = struct.pack("BB", EAP_SAKE_AT_IV, 2)
583 4 + 1 + 3 + len(payload),
585 EAP_SAKE_SUBTYPE_IDENTITY) + payload
590 payload = struct.pack("BBBB", 255, 2, 127, 2)
592 4 + 1 + 3 + len(payload),
594 EAP_SAKE_SUBTYPE_IDENTITY) + payload
599 payload = struct.pack("BB", EAP_SAKE_AT_RAND_P, 2)
[all …]
Dtest_wpas_wmm_ac.py141 payload = msg['payload']
142 (categ, action, dialog, status) = struct.unpack('BBBB', payload[0:4])
150 msg['payload'] = struct.pack('BBBB', 17, 1, (dialog + 1) & 0xff, 0) + payload[4:]
154 msg['payload'] = struct.pack('BBBB', 17, 1, dialog, 0) + payload[4:]
163 msg['payload'] = struct.pack('BBBB', 17, 1, dialog, 0) + payload[4:]
171 …msg['payload'] = struct.pack('BBBB', 17, 1, dialog, 0) + payload[4:] + struct.pack('BB', 0xdd, 100)
175 …msg['payload'] = struct.pack('BBBB', 17, 1, dialog, 0) + payload[4:] + b'\xdd\x06\x00\x50\xf2\x02\…
180 msg['payload'] = struct.pack('BBBB', 17, 2, 0, 0) + payload[4:]
188 msg['payload'] = struct.pack('BBBB', 17, 2, 0, 0) + payload[4:]
196 payload = msg['payload']
[all …]
Dtest_he.py1433 payload = mac_capa + phy_capa + 2*mcs_nss
1434 hdr = struct.pack('BBB', 255, 1 + len(payload), 35)
1435 tests += [ (hdr + payload, True) ]
1438 payload = mac_capa + phy_capa + 4*mcs_nss
1439 hdr = struct.pack('BBB', 255, 1 + len(payload), 35)
1440 tests += [ (hdr + payload, True) ]
1443 payload = mac_capa + phy_capa + 4*mcs_nss
1444 hdr = struct.pack('BBB', 255, 1 + len(payload), 35)
1445 tests += [ (hdr + payload, True) ]
1448 payload = mac_capa + phy_capa + 6*mcs_nss
[all …]
Dtest_wnm.py577 payload = resp['payload']
578 if len(payload) < 2 + 3:
580 (category, action) = struct.unpack('BB', payload[0:2])
583 pos = payload[2:]
2138 payload = struct.pack("<3B5B",
2141 mgmt_tx(dev[0], cmd + binascii.hexlify(payload).decode())
2144 payload = struct.pack("<3B4B",
2147 mgmt_tx(dev[0], cmd + binascii.hexlify(payload).decode())
2150 payload = struct.pack("<3B4B",
2153 mgmt_tx(dev[0], cmd + binascii.hexlify(payload).decode())
[all …]
/hostap-latest/src/wps/
Dndef.c25 const u8 *payload; member
78 record->payload = record->payload_length == 0 ? NULL : pos; in ndef_parse_record()
102 return wpabuf_alloc_copy(record.payload, in ndef_parse_records()
115 const struct wpabuf *payload) in ndef_build_record() argument
121 size_t payload_length = wpabuf_len(payload); in ndef_build_record()
156 wpabuf_put_buf(record, payload); in ndef_build_record()
/hostap-latest/wlantest/
Dwired.c208 const u8 *payload; in process_udp() local
224 payload = (const u8 *) (udp + 1); in process_udp()
228 process_radius(wt, dst, dport, src, sport, payload, plen); in process_udp()
235 const u8 *payload; in process_ipv4() local
263 payload = data + 4 * ip->ip_hl; in process_ipv4()
265 if (payload + plen > data + len) in process_ipv4()
271 payload, plen); in process_ipv4()
/hostap-latest/src/eap_server/
Deap_server_gpsk.c241 const u8 *payload, size_t payloadlen) in eap_gpsk_process_gpsk_2() argument
254 pos = payload; in eap_gpsk_process_gpsk_2()
255 end = payload + payloadlen; in eap_gpsk_process_gpsk_2()
447 data->specifier, payload, pos - payload, mic) in eap_gpsk_process_gpsk_2()
474 const u8 *payload, size_t payloadlen) in eap_gpsk_process_gpsk_4() argument
486 pos = payload; in eap_gpsk_process_gpsk_4()
487 end = payload + payloadlen; in eap_gpsk_process_gpsk_4()
516 data->specifier, payload, pos - payload, mic) in eap_gpsk_process_gpsk_4()
Deap_server_eke.c423 const u8 *payload, size_t payloadlen) in eap_eke_process_identity() argument
435 pos = payload; in eap_eke_process_identity()
436 end = payload + payloadlen; in eap_eke_process_identity()
518 const u8 *payload, size_t payloadlen) in eap_eke_process_commit() argument
530 pos = payload; in eap_eke_process_commit()
531 end = payload + payloadlen; in eap_eke_process_commit()
591 const u8 *payload, size_t payloadlen) in eap_eke_process_confirm() argument
613 if (eap_eke_decrypt_prot(&data->sess, payload, data->sess.pnonce_len, in eap_eke_process_confirm()
638 if (os_memcmp_const(auth_p, payload + data->sess.pnonce_len, in eap_eke_process_confirm()
666 const u8 *payload, size_t payloadlen) in eap_eke_process_failure() argument
[all …]
Deap_server_sake.c290 const u8 *payload, size_t payloadlen) in eap_sake_process_identity() argument
304 const u8 *payload, size_t payloadlen) in eap_sake_process_challenge() argument
314 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) in eap_sake_process_challenge()
375 const u8 *payload, size_t payloadlen) in eap_sake_process_confirm() argument
385 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) in eap_sake_process_confirm()
413 const u8 *payload, size_t payloadlen) in eap_sake_process_auth_reject() argument
/hostap-latest/src/eap_peer/
Deap_eke.c223 const u8 *payload, in eap_eke_process_id() argument
246 pos = payload; in eap_eke_process_id()
247 end = payload + payload_len; in eap_eke_process_id()
356 const u8 *payload, in eap_eke_process_commit() argument
384 pos = payload; in eap_eke_process_commit()
385 end = payload + payload_len; in eap_eke_process_commit()
502 const u8 *payload, in eap_eke_process_confirm() argument
523 pos = payload; in eap_eke_process_confirm()
524 end = payload + payload_len; in eap_eke_process_confirm()
629 const u8 *payload, in eap_eke_process_failure() argument
[all …]
Deap_gpsk.c275 const u8 *payload, in eap_gpsk_process_gpsk_1() argument
289 end = payload + payload_len; in eap_gpsk_process_gpsk_1()
291 pos = eap_gpsk_process_id_server(data, payload, end); in eap_gpsk_process_gpsk_1()
545 const u8 *payload, in eap_gpsk_validate_gpsk_3_mic() argument
563 data->specifier, payload, pos - payload, mic) in eap_gpsk_validate_gpsk_3_mic()
584 const u8 *payload, in eap_gpsk_process_gpsk_3() argument
597 end = payload + payload_len; in eap_gpsk_process_gpsk_3()
599 pos = eap_gpsk_validate_rand(data, payload, end); in eap_gpsk_process_gpsk_3()
603 pos = eap_gpsk_validate_gpsk_3_mic(data, payload, pos, end); in eap_gpsk_process_gpsk_3()
Deap_sake.c144 const u8 *payload, in eap_sake_process_identity() argument
157 if (eap_sake_parse_attributes(payload, payload_len, &attr)) in eap_sake_process_identity()
187 const u8 *payload, in eap_sake_process_challenge() argument
206 if (eap_sake_parse_attributes(payload, payload_len, &attr)) in eap_sake_process_challenge()
290 const u8 *payload, in eap_sake_process_confirm() argument
305 if (eap_sake_parse_attributes(payload, payload_len, &attr)) in eap_sake_process_confirm()
/hostap-latest/src/ap/
Dhs20.c156 const struct wpabuf *payload) in hs20_send_wnm_notification_deauth_req() argument
164 buf = wpabuf_alloc(4 + 6 + wpabuf_len(payload)); in hs20_send_wnm_notification_deauth_req()
175 wpabuf_put_u8(buf, 4 + wpabuf_len(payload)); in hs20_send_wnm_notification_deauth_req()
178 wpabuf_put_buf(buf, payload); in hs20_send_wnm_notification_deauth_req()

1234