/hostap-latest/src/p2p/ |
D | p2p_sd.c | 333 u16 slen; in p2p_rx_gas_initial_req() local 363 slen = *pos++; in p2p_rx_gas_initial_req() 364 if (slen > end - pos || slen < 2) { in p2p_rx_gas_initial_req() 368 next = pos + slen; in p2p_rx_gas_initial_req() 381 slen = WPA_GET_LE16(pos); in p2p_rx_gas_initial_req() 383 if (slen > end - pos) in p2p_rx_gas_initial_req() 385 end = pos + slen; in p2p_rx_gas_initial_req() 396 slen = WPA_GET_LE16(pos); in p2p_rx_gas_initial_req() 398 if (slen > end - pos || slen < 3 + 1) { in p2p_rx_gas_initial_req() 489 u16 slen; in p2p_rx_gas_initial_resp() local [all …]
|
/hostap-latest/wpa_supplicant/ |
D | hs20_supplicant.c | 461 size_t slen, u8 dialog_token) in hs20_process_icon_binary_file() argument 472 icon->image = os_memdup(pos, slen); in hs20_process_icon_binary_file() 475 icon->image_len = slen; in hs20_process_icon_binary_file() 488 if (slen < 4) { in hs20_process_icon_binary_file() 498 slen--; in hs20_process_icon_binary_file() 500 if ((size_t) 1 + pos[0] > slen) { in hs20_process_icon_binary_file() 507 slen -= 1 + pos[0]; in hs20_process_icon_binary_file() 510 if (slen < 2) { in hs20_process_icon_binary_file() 517 slen -= 2; in hs20_process_icon_binary_file() 519 if (data_len > slen) { in hs20_process_icon_binary_file() [all …]
|
D | interworking.c | 2887 const u8 *data, size_t slen, bool protected_response) in anqp_add_extra() argument 2913 elem->payload = wpabuf_alloc_copy(data, slen); in anqp_add_extra() 2928 u8 slen, num; in interworking_parse_venue_url() local 2930 slen = *pos++; in interworking_parse_venue_url() 2931 if (slen < 1 || slen > end - pos) { in interworking_parse_venue_url() 2938 os_memcpy(url, pos, slen - 1); in interworking_parse_venue_url() 2939 url[slen - 1] = '\0'; in interworking_parse_venue_url() 2941 pos += slen - 1; in interworking_parse_venue_url() 2949 const u8 *data, size_t slen, in interworking_parse_rx_anqp_resp() argument 2965 pos, slen); in interworking_parse_rx_anqp_resp() [all …]
|
D | rrm.c | 1054 u8 sid, u8 slen, const u8 *subelem) in wpas_rm_handle_beacon_req_subelem() argument 1061 if (!slen) { in wpas_rm_handle_beacon_req_subelem() 1067 if (slen > SSID_MAX_LEN) { in wpas_rm_handle_beacon_req_subelem() 1069 "Invalid SSID subelement length: %u", slen); in wpas_rm_handle_beacon_req_subelem() 1073 data->ssid_len = slen; in wpas_rm_handle_beacon_req_subelem() 1077 if (slen != 2) { in wpas_rm_handle_beacon_req_subelem() 1080 slen); in wpas_rm_handle_beacon_req_subelem() 1093 if (slen != 1) { in wpas_rm_handle_beacon_req_subelem() 1096 slen); in wpas_rm_handle_beacon_req_subelem() 1119 if (!slen) { in wpas_rm_handle_beacon_req_subelem() [all …]
|
D | p2p_supplicant_sd.c | 696 u16 slen; in wpas_sd_request() local 727 slen = WPA_GET_LE16(pos); in wpas_sd_request() 729 if (slen > end - pos || slen < 2) { in wpas_sd_request() 735 tlv_end = pos + slen; in wpas_sd_request() 895 u16 slen; in wpas_sd_response() local 924 slen = WPA_GET_LE16(pos); in wpas_sd_response() 926 if (slen > end - pos || slen < 3) { in wpas_sd_response() 931 tlv_end = pos + slen; in wpas_sd_response()
|
D | mbo.c | 669 const u8 *data, size_t slen) in mbo_parse_rx_anqp_resp() argument 674 if (slen < 1) in mbo_parse_rx_anqp_resp() 678 slen--; in mbo_parse_rx_anqp_resp() 682 if (slen < 1) in mbo_parse_rx_anqp_resp()
|
D | hs20_supplicant.h | 23 const u8 *data, size_t slen, u8 dialog_token);
|
D | wpa_supplicant_i.h | 1820 const u8 *data, size_t slen);
|
/hostap-latest/src/tls/ |
D | tlsv1_common.c | 423 u16 slen; in tls_verify_signature() local 430 slen = WPA_GET_BE16(pos); in tls_verify_signature() 432 if (end - pos < slen) { in tls_verify_signature() 436 if (end - pos > slen) { in tls_verify_signature() 438 pos + slen, end - pos - slen); in tls_verify_signature() 439 end = pos + slen; in tls_verify_signature()
|
/hostap-latest/src/utils/ |
D | wpa_debug.c | 287 size_t slen = len; in _wpa_hexdump() local 294 if (slen > 32) in _wpa_hexdump() 295 slen = 32; in _wpa_hexdump() 296 strbuf = os_malloc(1 + 3 * slen); in _wpa_hexdump() 303 for (i = 0; i < slen; i++) in _wpa_hexdump() 316 len > slen ? " ..." : ""); in _wpa_hexdump() 317 bin_clear_free(strbuf, 1 + 3 * slen); in _wpa_hexdump()
|
/hostap-latest/src/common/ |
D | dpp_tcp.c | 1389 u16 slen; in dpp_controller_rx_gas_req() local 1412 slen = *pos++; in dpp_controller_rx_gas_req() 1414 slen > end - pos || slen < 2) in dpp_controller_rx_gas_req() 1417 next = pos + slen; in dpp_controller_rx_gas_req() 1420 if (slen != 8 || *pos != WLAN_EID_VENDOR_SPECIFIC || in dpp_controller_rx_gas_req() 1429 slen = WPA_GET_LE16(pos); in dpp_controller_rx_gas_req() 1431 if (slen > end - pos) in dpp_controller_rx_gas_req() 1434 resp = dpp_conf_req_rx(auth, pos, slen); in dpp_controller_rx_gas_req() 1657 u16 status, slen, comeback_delay; in dpp_rx_gas_resp() local 1681 slen = *pos++; in dpp_rx_gas_resp() [all …]
|
/hostap-latest/src/ap/ |
D | gas_serv.c | 1602 u16 slen; in gas_serv_rx_gas_initial_req() local 1626 slen = *pos++; in gas_serv_rx_gas_initial_req() 1627 if (slen > end - pos || slen < 2) { in gas_serv_rx_gas_initial_req() 1632 next = pos + slen; in gas_serv_rx_gas_initial_req() 1636 if (slen == 8 && *pos == WLAN_EID_VENDOR_SPECIFIC && in gas_serv_rx_gas_initial_req() 1653 0, 2 + slen + 2); in gas_serv_rx_gas_initial_req() 1656 wpabuf_put_data(buf, adv_proto, 2 + slen); in gas_serv_rx_gas_initial_req() 1677 slen = WPA_GET_LE16(pos); in gas_serv_rx_gas_initial_req() 1679 if (slen > end - pos) in gas_serv_rx_gas_initial_req() 1681 end = pos + slen; in gas_serv_rx_gas_initial_req() [all …]
|
/hostap-latest/hostapd/ |
D | config_file.c | 1324 size_t clen, nlen, slen; in parse_lang_string() local 1329 str = wpa_config_parse_string(pos, &slen); in parse_lang_string() 1894 size_t slen; in hs20_parse_osu_ssid() local 1897 str = wpa_config_parse_string(pos, &slen); in hs20_parse_osu_ssid() 1898 if (str == NULL || slen < 1 || slen > SSID_MAX_LEN) { in hs20_parse_osu_ssid() 1904 os_memcpy(bss->osu_ssid, str, slen); in hs20_parse_osu_ssid() 1905 bss->osu_ssid_len = slen; in hs20_parse_osu_ssid() 2527 size_t slen; in hostapd_config_fill() local 2528 char *str = wpa_config_parse_string(pos, &slen); in hostapd_config_fill() 2529 if (str == NULL || slen < 1 || slen > SSID_MAX_LEN) { in hostapd_config_fill() [all …]
|
/hostap-latest/port/mbedtls/ |
D | supp_psa_api.h | 57 const unsigned char *salt, size_t slen,
|
D | supp_psa_api.c | 415 const unsigned char *salt, size_t slen, in pbkdf2_sha1_psa() argument 448 slen); in pbkdf2_sha1_psa()
|
/hostap-latest/src/crypto/ |
D | crypto_mbedtls_alt.c | 2857 size_t rlen, slen; in crypto_ec_key_sign_r_s() local 2862 mbedtls_asn1_get_tag(&p, end, &slen, MBEDTLS_ASN1_INTEGER); in crypto_ec_key_sign_r_s() 2875 if (slen > plen) in crypto_ec_key_sign_r_s() 2877 s += (slen - plen); in crypto_ec_key_sign_r_s() 2878 slen = plen; in crypto_ec_key_sign_r_s() 2887 os_memcpy(p + plen * 2 - slen, s, slen); in crypto_ec_key_sign_r_s()
|