Home
last modified time | relevance | path

Searched refs:payload_len (Results 1 – 23 of 23) sorted by relevance

/hostap-latest/src/eap_peer/
Deap_pwd.c255 const u8 *payload, size_t payload_len) in eap_pwd_perform_id_exchange() argument
265 if (payload_len < sizeof(struct eap_pwd_id)) { in eap_pwd_perform_id_exchange()
316 data->id_server = os_malloc(payload_len - sizeof(struct eap_pwd_id)); in eap_pwd_perform_id_exchange()
322 data->id_server_len = payload_len - sizeof(struct eap_pwd_id); in eap_pwd_perform_id_exchange()
356 const u8 *payload, size_t payload_len) in eap_pwd_perform_commit_exchange() argument
396 if (payload_len != 2 * prime_len + order_len) { in eap_pwd_perform_commit_exchange()
399 (unsigned int) payload_len, in eap_pwd_perform_commit_exchange()
427 if (payload_len < 1 || *ptr == 0) { in eap_pwd_perform_commit_exchange()
433 if (payload_len != exp_len) { in eap_pwd_perform_commit_exchange()
436 (unsigned int) payload_len, in eap_pwd_perform_commit_exchange()
[all …]
Deap_eke.c224 size_t payload_len) in eap_eke_process_id() argument
240 if (payload_len < 2 + 4) { in eap_eke_process_id()
247 end = payload + payload_len; in eap_eke_process_id()
357 size_t payload_len) in eap_eke_process_commit() argument
385 end = payload + payload_len; in eap_eke_process_commit()
503 size_t payload_len) in eap_eke_process_confirm() argument
524 end = payload + payload_len; in eap_eke_process_confirm()
630 size_t payload_len) in eap_eke_process_failure() argument
634 if (payload_len < 4) { in eap_eke_process_failure()
Deap_sake.c145 size_t payload_len) in eap_sake_process_identity() argument
157 if (eap_sake_parse_attributes(payload, payload_len, &attr)) in eap_sake_process_identity()
188 size_t payload_len) in eap_sake_process_challenge() argument
206 if (eap_sake_parse_attributes(payload, payload_len, &attr)) in eap_sake_process_challenge()
291 size_t payload_len) in eap_sake_process_confirm() argument
305 if (eap_sake_parse_attributes(payload, payload_len, &attr)) in eap_sake_process_confirm()
Deap_gpsk.c276 size_t payload_len) in eap_gpsk_process_gpsk_1() argument
289 end = payload + payload_len; in eap_gpsk_process_gpsk_1()
585 size_t payload_len) in eap_gpsk_process_gpsk_3() argument
597 end = payload + payload_len; in eap_gpsk_process_gpsk_3()
Deap_tls_common.c19 static struct wpabuf * eap_tls_msg_alloc(enum eap_type type, size_t payload_len, in eap_tls_msg_alloc() argument
24 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, in eap_tls_msg_alloc()
28 EAP_VENDOR_WFA_UNAUTH_TLS, payload_len, in eap_tls_msg_alloc()
30 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code, in eap_tls_msg_alloc()
Dikev2.c625 u8 *payload, size_t payload_len) in ikev2_process_sa_auth_decrypted() argument
632 payload_len) < 0) { in ikev2_process_sa_auth_decrypted()
/hostap-latest/src/tls/
Dtlsv1_record.c151 size_t buf_size, const u8 *payload, size_t payload_len, in tlsv1_record_send() argument
171 WPA_PUT_BE16(length, payload_len); in tlsv1_record_send()
196 if (pos + payload_len > buf + buf_size) in tlsv1_record_send()
198 os_memmove(pos, payload, payload_len); in tlsv1_record_send()
199 pos += payload_len; in tlsv1_record_send()
217 crypto_hash_update(hmac, payload, payload_len); in tlsv1_record_send()
Dtlsv1_record.h65 size_t buf_size, const u8 *payload, size_t payload_len,
/hostap-latest/src/eap_server/
Deap_server_pwd.c581 const u8 *payload, size_t payload_len) in eap_pwd_process_id_resp() argument
589 if (payload_len < sizeof(struct eap_pwd_id)) { in eap_pwd_process_id_resp()
608 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id)); in eap_pwd_process_id_resp()
613 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id); in eap_pwd_process_id_resp()
661 const u8 *payload, size_t payload_len) in eap_pwd_process_commit_resp() argument
673 if (payload_len != 2 * prime_len + order_len) { in eap_pwd_process_commit_resp()
676 (unsigned int) payload_len, in eap_pwd_process_commit_resp()
756 const u8 *payload, size_t payload_len) in eap_pwd_process_confirm_resp() argument
767 if (payload_len != SHA256_MAC_LEN) { in eap_pwd_process_confirm_resp()
770 (unsigned int) payload_len, SHA256_MAC_LEN); in eap_pwd_process_confirm_resp()
Deap_server_tls_common.c21 struct wpabuf * eap_tls_msg_alloc(enum eap_type type, size_t payload_len, in eap_tls_msg_alloc() argument
26 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, in eap_tls_msg_alloc()
30 EAP_VENDOR_WFA_UNAUTH_TLS, payload_len, in eap_tls_msg_alloc()
32 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code, in eap_tls_msg_alloc()
Deap_tls_common.h78 struct wpabuf * eap_tls_msg_alloc(enum eap_type type, size_t payload_len,
Dikev2.c689 u8 *payload, size_t payload_len) in ikev2_process_sa_auth_decrypted() argument
696 payload_len) < 0) { in ikev2_process_sa_auth_decrypted()
/hostap-latest/wpa_supplicant/
Dhs20_supplicant.c211 void hs20_put_anqp_req(u32 stypes, const u8 *payload, size_t payload_len, in hs20_put_anqp_req() argument
226 wpabuf_put_data(buf, payload, payload_len); in hs20_put_anqp_req()
231 wpabuf_put_data(buf, payload, payload_len); in hs20_put_anqp_req()
248 size_t payload_len) in hs20_build_anqp_req() argument
252 buf = gas_anqp_build_initial_req(0, 100 + payload_len); in hs20_build_anqp_req()
256 hs20_put_anqp_req(stypes, payload, payload_len, buf); in hs20_build_anqp_req()
263 const u8 *payload, size_t payload_len, int inmem) in hs20_anqp_send_req() argument
286 buf = hs20_build_anqp_req(stypes, payload, payload_len); in hs20_anqp_send_req()
305 icon_entry->file_name = os_malloc(payload_len + 1); in hs20_anqp_send_req()
310 os_memcpy(icon_entry->file_name, payload, payload_len); in hs20_anqp_send_req()
[all …]
Dhs20_supplicant.h18 const u8 *payload, size_t payload_len, int inmem);
19 void hs20_put_anqp_req(u32 stypes, const u8 *payload, size_t payload_len,
Dctrl_iface.c3439 size_t payload_len = 0, len; in wpa_supplicant_ctrl_iface_mesh_link_probe() local
3448 payload_len = os_strlen(pos); in wpa_supplicant_ctrl_iface_mesh_link_probe()
3449 if (payload_len & 1) in wpa_supplicant_ctrl_iface_mesh_link_probe()
3452 payload_len /= 2; in wpa_supplicant_ctrl_iface_mesh_link_probe()
3455 len = ETH_HLEN + payload_len; in wpa_supplicant_ctrl_iface_mesh_link_probe()
3465 if (payload_len && hexstr2bin(pos, buf + ETH_HLEN, payload_len) < 0) in wpa_supplicant_ctrl_iface_mesh_link_probe()
/hostap-latest/src/eap_common/
Deap_common.c129 size_t payload_len, u8 code, u8 identifier) in eap_msg_alloc() argument
136 payload_len; in eap_msg_alloc()
Deap_common.h26 size_t payload_len, u8 code, u8 identifier);
/hostap-latest/wlantest/
Dtest_vectors.c600 size_t payload_len; member
650 .payload_len = 256,
706 .payload_len = 40,
737 vector->payload_len); in run_gcmp()
741 vector->hdr_len + vector->payload_len, in run_gcmp()
754 vector->payload_len) != 0) { in run_gcmp()
780 if (plain_len != vector->payload_len || in run_gcmp()
/hostap-latest/src/common/
Ddpp_i.h74 size_t payload_len; member
Ddpp_reconfig.c497 root = json_parse((const char *) info.payload, info.payload_len); in dpp_reconfig_auth_req_rx()
760 root = json_parse((const char *) info.payload, info.payload_len); in dpp_reconfig_auth_resp_rx()
Ddpp.c2752 u16 payload_len) in dpp_parse_connector() argument
2760 root = json_parse((const char *) payload, payload_len); in dpp_parse_connector()
2967 info.payload, info.payload_len) < 0) { in dpp_parse_cred_dpp()
4185 root = json_parse((const char *) info.payload, info.payload_len); in dpp_peer_intro()
Ddpp_crypto.c778 info->payload = base64_url_decode(pos, end - pos, &info->payload_len); in dpp_process_signed_connector()
787 info->payload, info->payload_len); in dpp_process_signed_connector()
/hostap-latest/src/crypto/
Dtls_openssl.c1492 size_t payload_len, id_len; in check_server_hello() local
1502 payload_len = WPA_GET_BE24(pos); in check_server_hello()
1505 if ((size_t) (end - pos) < payload_len) in check_server_hello()
1507 end = pos + payload_len; in check_server_hello()
1533 size_t payload_len; in check_server_key_exchange() local
1547 payload_len = WPA_GET_BE24(pos); in check_server_key_exchange()
1550 if ((size_t) (end - pos) < payload_len) in check_server_key_exchange()
1552 end = pos + payload_len; in check_server_key_exchange()
1605 size_t payload_len = WPA_GET_BE16(pos + 1); in tls_msg_cb() local
1606 if (payload_len + 3 > len) { in tls_msg_cb()