/hostap-latest/src/eap_peer/ |
D | eap_pwd.c | 255 const u8 *payload, size_t payload_len) in eap_pwd_perform_id_exchange() argument 265 if (payload_len < sizeof(struct eap_pwd_id)) { in eap_pwd_perform_id_exchange() 316 data->id_server = os_malloc(payload_len - sizeof(struct eap_pwd_id)); in eap_pwd_perform_id_exchange() 322 data->id_server_len = payload_len - sizeof(struct eap_pwd_id); in eap_pwd_perform_id_exchange() 356 const u8 *payload, size_t payload_len) in eap_pwd_perform_commit_exchange() argument 396 if (payload_len != 2 * prime_len + order_len) { in eap_pwd_perform_commit_exchange() 399 (unsigned int) payload_len, in eap_pwd_perform_commit_exchange() 427 if (payload_len < 1 || *ptr == 0) { in eap_pwd_perform_commit_exchange() 433 if (payload_len != exp_len) { in eap_pwd_perform_commit_exchange() 436 (unsigned int) payload_len, in eap_pwd_perform_commit_exchange() [all …]
|
D | eap_eke.c | 224 size_t payload_len) in eap_eke_process_id() argument 240 if (payload_len < 2 + 4) { in eap_eke_process_id() 247 end = payload + payload_len; in eap_eke_process_id() 357 size_t payload_len) in eap_eke_process_commit() argument 385 end = payload + payload_len; in eap_eke_process_commit() 503 size_t payload_len) in eap_eke_process_confirm() argument 524 end = payload + payload_len; in eap_eke_process_confirm() 630 size_t payload_len) in eap_eke_process_failure() argument 634 if (payload_len < 4) { in eap_eke_process_failure()
|
D | eap_sake.c | 145 size_t payload_len) in eap_sake_process_identity() argument 157 if (eap_sake_parse_attributes(payload, payload_len, &attr)) in eap_sake_process_identity() 188 size_t payload_len) in eap_sake_process_challenge() argument 206 if (eap_sake_parse_attributes(payload, payload_len, &attr)) in eap_sake_process_challenge() 291 size_t payload_len) in eap_sake_process_confirm() argument 305 if (eap_sake_parse_attributes(payload, payload_len, &attr)) in eap_sake_process_confirm()
|
D | eap_gpsk.c | 276 size_t payload_len) in eap_gpsk_process_gpsk_1() argument 289 end = payload + payload_len; in eap_gpsk_process_gpsk_1() 585 size_t payload_len) in eap_gpsk_process_gpsk_3() argument 597 end = payload + payload_len; in eap_gpsk_process_gpsk_3()
|
D | eap_tls_common.c | 19 static struct wpabuf * eap_tls_msg_alloc(enum eap_type type, size_t payload_len, in eap_tls_msg_alloc() argument 24 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, in eap_tls_msg_alloc() 28 EAP_VENDOR_WFA_UNAUTH_TLS, payload_len, in eap_tls_msg_alloc() 30 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code, in eap_tls_msg_alloc()
|
D | ikev2.c | 625 u8 *payload, size_t payload_len) in ikev2_process_sa_auth_decrypted() argument 632 payload_len) < 0) { in ikev2_process_sa_auth_decrypted()
|
/hostap-latest/src/tls/ |
D | tlsv1_record.c | 151 size_t buf_size, const u8 *payload, size_t payload_len, in tlsv1_record_send() argument 171 WPA_PUT_BE16(length, payload_len); in tlsv1_record_send() 196 if (pos + payload_len > buf + buf_size) in tlsv1_record_send() 198 os_memmove(pos, payload, payload_len); in tlsv1_record_send() 199 pos += payload_len; in tlsv1_record_send() 217 crypto_hash_update(hmac, payload, payload_len); in tlsv1_record_send()
|
D | tlsv1_record.h | 65 size_t buf_size, const u8 *payload, size_t payload_len,
|
/hostap-latest/src/eap_server/ |
D | eap_server_pwd.c | 581 const u8 *payload, size_t payload_len) in eap_pwd_process_id_resp() argument 589 if (payload_len < sizeof(struct eap_pwd_id)) { in eap_pwd_process_id_resp() 608 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id)); in eap_pwd_process_id_resp() 613 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id); in eap_pwd_process_id_resp() 661 const u8 *payload, size_t payload_len) in eap_pwd_process_commit_resp() argument 673 if (payload_len != 2 * prime_len + order_len) { in eap_pwd_process_commit_resp() 676 (unsigned int) payload_len, in eap_pwd_process_commit_resp() 756 const u8 *payload, size_t payload_len) in eap_pwd_process_confirm_resp() argument 767 if (payload_len != SHA256_MAC_LEN) { in eap_pwd_process_confirm_resp() 770 (unsigned int) payload_len, SHA256_MAC_LEN); in eap_pwd_process_confirm_resp()
|
D | eap_server_tls_common.c | 21 struct wpabuf * eap_tls_msg_alloc(enum eap_type type, size_t payload_len, in eap_tls_msg_alloc() argument 26 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, in eap_tls_msg_alloc() 30 EAP_VENDOR_WFA_UNAUTH_TLS, payload_len, in eap_tls_msg_alloc() 32 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code, in eap_tls_msg_alloc()
|
D | eap_tls_common.h | 78 struct wpabuf * eap_tls_msg_alloc(enum eap_type type, size_t payload_len,
|
D | ikev2.c | 689 u8 *payload, size_t payload_len) in ikev2_process_sa_auth_decrypted() argument 696 payload_len) < 0) { in ikev2_process_sa_auth_decrypted()
|
/hostap-latest/wpa_supplicant/ |
D | hs20_supplicant.c | 211 void hs20_put_anqp_req(u32 stypes, const u8 *payload, size_t payload_len, in hs20_put_anqp_req() argument 226 wpabuf_put_data(buf, payload, payload_len); in hs20_put_anqp_req() 231 wpabuf_put_data(buf, payload, payload_len); in hs20_put_anqp_req() 248 size_t payload_len) in hs20_build_anqp_req() argument 252 buf = gas_anqp_build_initial_req(0, 100 + payload_len); in hs20_build_anqp_req() 256 hs20_put_anqp_req(stypes, payload, payload_len, buf); in hs20_build_anqp_req() 263 const u8 *payload, size_t payload_len, int inmem) in hs20_anqp_send_req() argument 286 buf = hs20_build_anqp_req(stypes, payload, payload_len); in hs20_anqp_send_req() 305 icon_entry->file_name = os_malloc(payload_len + 1); in hs20_anqp_send_req() 310 os_memcpy(icon_entry->file_name, payload, payload_len); in hs20_anqp_send_req() [all …]
|
D | hs20_supplicant.h | 18 const u8 *payload, size_t payload_len, int inmem); 19 void hs20_put_anqp_req(u32 stypes, const u8 *payload, size_t payload_len,
|
D | ctrl_iface.c | 3439 size_t payload_len = 0, len; in wpa_supplicant_ctrl_iface_mesh_link_probe() local 3448 payload_len = os_strlen(pos); in wpa_supplicant_ctrl_iface_mesh_link_probe() 3449 if (payload_len & 1) in wpa_supplicant_ctrl_iface_mesh_link_probe() 3452 payload_len /= 2; in wpa_supplicant_ctrl_iface_mesh_link_probe() 3455 len = ETH_HLEN + payload_len; in wpa_supplicant_ctrl_iface_mesh_link_probe() 3465 if (payload_len && hexstr2bin(pos, buf + ETH_HLEN, payload_len) < 0) in wpa_supplicant_ctrl_iface_mesh_link_probe()
|
/hostap-latest/src/eap_common/ |
D | eap_common.c | 129 size_t payload_len, u8 code, u8 identifier) in eap_msg_alloc() argument 136 payload_len; in eap_msg_alloc()
|
D | eap_common.h | 26 size_t payload_len, u8 code, u8 identifier);
|
/hostap-latest/wlantest/ |
D | test_vectors.c | 600 size_t payload_len; member 650 .payload_len = 256, 706 .payload_len = 40, 737 vector->payload_len); in run_gcmp() 741 vector->hdr_len + vector->payload_len, in run_gcmp() 754 vector->payload_len) != 0) { in run_gcmp() 780 if (plain_len != vector->payload_len || in run_gcmp()
|
/hostap-latest/src/common/ |
D | dpp_i.h | 74 size_t payload_len; member
|
D | dpp_reconfig.c | 497 root = json_parse((const char *) info.payload, info.payload_len); in dpp_reconfig_auth_req_rx() 760 root = json_parse((const char *) info.payload, info.payload_len); in dpp_reconfig_auth_resp_rx()
|
D | dpp.c | 2752 u16 payload_len) in dpp_parse_connector() argument 2760 root = json_parse((const char *) payload, payload_len); in dpp_parse_connector() 2967 info.payload, info.payload_len) < 0) { in dpp_parse_cred_dpp() 4185 root = json_parse((const char *) info.payload, info.payload_len); in dpp_peer_intro()
|
D | dpp_crypto.c | 778 info->payload = base64_url_decode(pos, end - pos, &info->payload_len); in dpp_process_signed_connector() 787 info->payload, info->payload_len); in dpp_process_signed_connector()
|
/hostap-latest/src/crypto/ |
D | tls_openssl.c | 1492 size_t payload_len, id_len; in check_server_hello() local 1502 payload_len = WPA_GET_BE24(pos); in check_server_hello() 1505 if ((size_t) (end - pos) < payload_len) in check_server_hello() 1507 end = pos + payload_len; in check_server_hello() 1533 size_t payload_len; in check_server_key_exchange() local 1547 payload_len = WPA_GET_BE24(pos); in check_server_key_exchange() 1550 if ((size_t) (end - pos) < payload_len) in check_server_key_exchange() 1552 end = pos + payload_len; in check_server_key_exchange() 1605 size_t payload_len = WPA_GET_BE16(pos + 1); in tls_msg_cb() local 1606 if (payload_len + 3 > len) { in tls_msg_cb()
|