/hostap-latest/src/ap/ |
D | ctrl_iface_ap.c | 30 static size_t hostapd_write_ht_mcs_bitmask(char *buf, size_t buflen, in hostapd_write_ht_mcs_bitmask() argument 36 ret = os_snprintf(buf + len, buflen - len, in hostapd_write_ht_mcs_bitmask() 38 if (os_snprintf_error(buflen - len, ret)) in hostapd_write_ht_mcs_bitmask() 43 len += wpa_snprintf_hex(buf + len, buflen - len, mcs_set, 10); in hostapd_write_ht_mcs_bitmask() 45 ret = os_snprintf(buf + len, buflen - len, "\n"); in hostapd_write_ht_mcs_bitmask() 46 if (os_snprintf_error(buflen - len, ret)) in hostapd_write_ht_mcs_bitmask() 56 char *buf, size_t buflen) in hostapd_get_sta_conn_time() argument 73 ret = os_snprintf(buf, buflen, "connected_time=%lu\n", secs); in hostapd_get_sta_conn_time() 74 if (os_snprintf_error(buflen, ret)) in hostapd_get_sta_conn_time() 82 char *buf, size_t buflen) in hostapd_get_sta_info() argument [all …]
|
D | ctrl_iface_ap.h | 13 char *buf, size_t buflen); 15 char *buf, size_t buflen); 17 char *buf, size_t buflen); 24 char *buf, size_t buflen); 28 size_t buflen); 53 char *buf, size_t buflen);
|
D | beacon.c | 711 size_t buflen = 0; in hostapd_probe_resp_elems_len() local 715 buflen += wpabuf_len(hapd->wps_probe_resp_ie); in hostapd_probe_resp_elems_len() 719 buflen += wpabuf_len(hapd->p2p_probe_resp_ie); in hostapd_probe_resp_elems_len() 723 buflen += wpabuf_len(hapd->iface->fst_ies); in hostapd_probe_resp_elems_len() 726 buflen += wpabuf_len(hapd->conf->vendor_elements); in hostapd_probe_resp_elems_len() 729 buflen += wpabuf_len(hapd->conf->presp_elements); in hostapd_probe_resp_elems_len() 732 buflen += 5 + 2 + sizeof(struct ieee80211_vht_capabilities) + in hostapd_probe_resp_elems_len() 736 buflen += he_elem_len(hapd); in hostapd_probe_resp_elems_len() 740 buflen += hostapd_eid_eht_capab_len(hapd, IEEE80211_MODE_AP); in hostapd_probe_resp_elems_len() 741 buflen += 3 + sizeof(struct ieee80211_eht_operation); in hostapd_probe_resp_elems_len() [all …]
|
D | p2p_hostapd.h | 15 char *buf, size_t buflen); 26 char *buf, size_t buflen) in hostapd_p2p_get_mib_sta() argument
|
D | taxonomy.c | 240 struct sta_info *sta, char *buf, size_t buflen) in retrieve_sta_taxonomy() argument 248 ret = os_snprintf(buf, buflen, "wifi4|probe:"); in retrieve_sta_taxonomy() 249 if (os_snprintf_error(buflen, ret)) in retrieve_sta_taxonomy() 252 end = buf + buflen; in retrieve_sta_taxonomy()
|
/hostap-latest/src/fst/ |
D | fst_ctrl_iface.c | 171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument 183 return os_snprintf(buf, buflen, "FAIL\n"); in session_get() 191 return os_snprintf(buf, buflen, in session_get() 210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument 222 return os_snprintf(buf, buflen, "FAIL\n"); in session_set() 226 return os_snprintf(buf, buflen, "FAIL\n"); in session_set() 241 return os_snprintf(buf, buflen, "FAIL\n"); in session_set() 244 return os_snprintf(buf, buflen, "%s\n", ret ? "FAIL" : "OK"); in session_set() 249 static int session_add(const char *group_id, char *buf, size_t buflen) in session_add() argument 258 return os_snprintf(buf, buflen, "FAIL\n"); in session_add() [all …]
|
D | fst_ctrl_iface.h | 17 int fst_ctrl_iface_mb_info(const u8 *addr, char *buf, size_t buflen); 19 int fst_ctrl_iface_receive(const char *txtaddr, char *buf, size_t buflen); 26 fst_ctrl_iface_mb_info(const u8 *addr, char *buf, size_t buflen) in fst_ctrl_iface_mb_info() argument 34 int fst_read_next_text_param(const char *params, char *buf, size_t buflen,
|
/hostap-latest/src/utils/ |
D | wpa_debug_zephyr.c | 181 int buflen; in wpa_msg_impl() local 186 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in wpa_msg_impl() 189 buf = os_malloc(buflen); in wpa_msg_impl() 206 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg_impl() 211 bin_clear_free(buf, buflen); in wpa_msg_impl() 218 int buflen; in wpa_msg_ctrl_impl() local 225 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in wpa_msg_ctrl_impl() 228 buf = os_malloc(buflen); in wpa_msg_ctrl_impl() 234 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg_ctrl_impl() 237 bin_clear_free(buf, buflen); in wpa_msg_ctrl_impl() [all …]
|
D | wpa_debug.c | 132 ssize_t buflen; in wpa_debug_open_linux_tracing() local 141 buflen = read(mounts, buf, sizeof(buf) - 1); in wpa_debug_open_linux_tracing() 143 if (buflen < 0) { in wpa_debug_open_linux_tracing() 147 buf[buflen] = '\0'; in wpa_debug_open_linux_tracing() 651 int buflen; in wpa_msg() local 656 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in wpa_msg() 659 buf = os_malloc(buflen); in wpa_msg() 676 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg() 681 bin_clear_free(buf, buflen); in wpa_msg() 689 int buflen; in wpa_msg_ctrl() local [all …]
|
D | json.c | 513 size_t buflen; in json_get_member_base64url() local 520 &buflen); in json_get_member_base64url() 523 ret = wpabuf_alloc_ext_data(buf, buflen); in json_get_member_base64url() 536 size_t buflen; in json_get_member_base64() local 542 buf = hostap_base64_decode(token->string, os_strlen(token->string), &buflen); in json_get_member_base64() 545 ret = wpabuf_alloc_ext_data(buf, buflen); in json_get_member_base64() 576 char *buf, size_t buflen) in json_print_token() argument 584 ret = os_snprintf(buf + len, buflen - len, "[%d:%s:%s]", in json_print_token() 587 if (os_snprintf_error(buflen - len, ret)) { in json_print_token() 591 json_print_token(token->child, depth + 1, buf, buflen); in json_print_token() [all …]
|
D | ip_addr.c | 15 size_t buflen) in hostapd_ip_txt() argument 17 if (buflen == 0 || addr == NULL) in hostapd_ip_txt() 21 os_strlcpy(buf, inet_ntoa(addr->u.v4), buflen); in hostapd_ip_txt() 27 if (inet_ntop(AF_INET6, &addr->u.v6, buf, buflen) == NULL) in hostapd_ip_txt()
|
D | config.c | 15 static int newline_terminated(const char *buf, size_t buflen) in newline_terminated() argument 20 if (len == buflen - 1 && buf[buflen - 1] != '\r' && in newline_terminated()
|
/hostap-latest/wpa_supplicant/ |
D | main_winsvc.c | 67 DWORD buflen, val; in read_interface() local 81 buflen = sizeof(ctrl_interface); in read_interface() 83 (LPBYTE) ctrl_interface, &buflen); in read_interface() 88 (int) buflen, (char *) ctrl_interface); in read_interface() 92 buflen = sizeof(adapter); in read_interface() 94 (LPBYTE) adapter, &buflen); in read_interface() 99 (int) buflen, (char *) adapter); in read_interface() 103 buflen = sizeof(config); in read_interface() 105 (LPBYTE) config, &buflen); in read_interface() 110 (int) buflen, (char *) config); in read_interface() [all …]
|
D | ap.h | 24 const char *pin, char *buf, size_t buflen, 33 char *buf, size_t buflen); 35 char *buf, size_t buflen); 37 char *buf, size_t buflen); 43 size_t buflen, int verbose); 54 size_t buflen);
|
D | ctrl_iface.c | 977 char *cmd, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_get() argument 984 res = os_snprintf(buf, buflen, "%s", VERSION_STR); in wpa_supplicant_ctrl_iface_get() 986 res = os_snprintf(buf, buflen, "%u", CTRL_IFACE_MAX_LEN); in wpa_supplicant_ctrl_iface_get() 989 res = os_snprintf(buf, buflen, "%c%c", in wpa_supplicant_ctrl_iface_get() 1000 res = os_snprintf(buf, buflen, "%d", enabled); in wpa_supplicant_ctrl_iface_get() 1006 res = wpa_snprintf_hex(buf, buflen, wpa_s->last_gtk, in wpa_supplicant_ctrl_iface_get() 1011 res = tls_get_library_version(buf, buflen); in wpa_supplicant_ctrl_iface_get() 1014 return wpa_snprintf_hex(buf, buflen, in wpa_supplicant_ctrl_iface_get() 1018 res = os_snprintf(buf, buflen, "%d", wpa_s->last_tk_key_idx); in wpa_supplicant_ctrl_iface_get() 1021 res = wpa_config_get_value(cmd, wpa_s->conf, buf, buflen); in wpa_supplicant_ctrl_iface_get() [all …]
|
D | wifi_display.c | 353 char *buf, size_t buflen) in wifi_display_subelem_get() argument 364 res = wpa_snprintf_hex(buf, buflen, wpabuf_head(ie), in wifi_display_subelem_get() 377 return wpa_snprintf_hex(buf, buflen, in wifi_display_subelem_get() 388 size_t buflen; in wifi_display_subelem_hex() local 399 buflen = wpabuf_len(wfd_subelems); in wifi_display_subelem_hex() 401 while (i + WIFI_DISPLAY_SUBELEM_HEADER_LEN < buflen) { in wifi_display_subelem_hex() 403 if (i + WIFI_DISPLAY_SUBELEM_HEADER_LEN + elen > buflen) in wifi_display_subelem_hex()
|
/hostap-latest/wpaspy/ |
D | wpaspy.c | 55 size_t buflen; in wpaspy_request() local 61 buflen = sizeof(buf) - 1; in wpaspy_request() 62 ret = wpa_ctrl_request(self->ctrl, cmd, strlen(cmd), buf, &buflen, in wpaspy_request() 73 buf[buflen] = '\0'; in wpaspy_request() 130 size_t buflen; in wpaspy_recv() local 132 buflen = sizeof(buf) - 1; in wpaspy_recv() 134 ret = wpa_ctrl_recv(self->ctrl, buf, &buflen); in wpaspy_recv() 142 buf[buflen] = '\0'; in wpaspy_recv()
|
/hostap-latest/src/tls/ |
D | tlsv1_common.c | 424 size_t buflen; in tls_verify_signature() local 449 buflen = end - pos; in tls_verify_signature() 455 if (crypto_public_key_decrypt_pkcs1(pk, pos, end - pos, buf, &buflen) < in tls_verify_signature() 465 decrypted, buflen); in tls_verify_signature() 483 if (buflen >= 19 + 32 && in tls_verify_signature() 489 buflen -= 19; in tls_verify_signature() 490 } else if (buflen >= 19 + 48 && in tls_verify_signature() 496 buflen -= 19; in tls_verify_signature() 497 } else if (buflen >= 19 + 64 && in tls_verify_signature() 503 buflen -= 19; in tls_verify_signature() [all …]
|
/hostap-latest/hs20/client/ |
D | est.c | 121 size_t buflen; in est_load_cacerts() local 126 buflen = os_strlen(url) + 100; in est_load_cacerts() 127 buf = os_malloc(buflen); in est_load_cacerts() 131 os_snprintf(buf, buflen, "%s/cacerts", url); in est_load_cacerts() 578 size_t buflen; in est_build_csr() local 584 buflen = os_strlen(url) + 100; in est_build_csr() 585 buf = os_malloc(buflen); in est_build_csr() 589 os_snprintf(buf, buflen, "%s/csrattrs", url); in est_build_csr() 652 size_t buflen, resp_len, len, pkcs7_len; in est_simple_enroll() local 673 buflen = os_strlen(url) + 100; in est_simple_enroll() [all …]
|
/hostap-latest/tests/fuzzing/json/ |
D | json.c | 19 size_t buflen = 10000; in LLVMFuzzerTestOneInput() local 29 txt = os_zalloc(buflen); in LLVMFuzzerTestOneInput() 31 json_print_tree(root, txt, buflen); in LLVMFuzzerTestOneInput()
|
/hostap-latest/hostapd/ |
D | ctrl_iface.c | 194 struct hostapd_data *hapd, char *cmd, char *buf, size_t buflen) in hostapd_ctrl_iface_wps_check_pin() argument 223 ret = os_snprintf(buf, buflen, "FAIL-CHECKSUM\n"); in hostapd_ctrl_iface_wps_check_pin() 224 if (os_snprintf_error(buflen, ret)) in hostapd_ctrl_iface_wps_check_pin() 230 ret = os_snprintf(buf, buflen, "%s", pin); in hostapd_ctrl_iface_wps_check_pin() 231 if (os_snprintf_error(buflen, ret)) in hostapd_ctrl_iface_wps_check_pin() 454 char *buf, size_t buflen) in hostapd_ctrl_iface_wps_ap_pin() argument 466 return os_snprintf(buf, buflen, "OK\n"); in hostapd_ctrl_iface_wps_ap_pin() 475 return os_snprintf(buf, buflen, "%s", pin_txt); in hostapd_ctrl_iface_wps_ap_pin() 482 return os_snprintf(buf, buflen, "%s", pin_txt); in hostapd_ctrl_iface_wps_ap_pin() 495 if (os_strlen(pin) > buflen) in hostapd_ctrl_iface_wps_ap_pin() [all …]
|
/hostap-latest/src/eap_peer/ |
D | eap_psk.c | 91 size_t buflen, len; in eap_psk_process_1() local 146 buflen = data->id_p_len + data->id_s_len + 2 * EAP_PSK_RAND_LEN; in eap_psk_process_1() 147 buf = os_malloc(buflen); in eap_psk_process_1() 159 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) { in eap_psk_process_1() 187 size_t buflen, left, data_len, len, plen; in eap_psk_process_3() local 228 buflen = data->id_s_len + EAP_PSK_RAND_LEN; in eap_psk_process_3() 229 buf = os_malloc(buflen); in eap_psk_process_3() 234 if (omac1_aes_128(data->ak, buf, buflen, mac)) { in eap_psk_process_3()
|
D | eap_methods.c | 94 size_t eap_get_names(char *buf, size_t buflen) in eap_get_names() argument 100 if (buflen == 0) in eap_get_names() 104 end = pos + buflen; in eap_get_names() 113 buf[buflen - 1] = '\0'; in eap_get_names()
|
/hostap-latest/src/eap_server/ |
D | eap_server_psk.c | 95 size_t buflen; in eap_psk_build_3() local 113 buflen = sm->cfg->server_id_len + EAP_PSK_RAND_LEN; in eap_psk_build_3() 114 buf = os_malloc(buflen); in eap_psk_build_3() 120 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s)) { in eap_psk_build_3() 219 size_t left, buflen; in eap_psk_process_2() local 296 buflen = data->id_p_len + sm->cfg->server_id_len + 2 * EAP_PSK_RAND_LEN; in eap_psk_process_2() 297 buf = os_malloc(buflen); in eap_psk_process_2() 309 if (omac1_aes_128(data->ak, buf, buflen, mac)) { in eap_psk_process_2()
|
/hostap-latest/src/drivers/ |
D | driver_privsep.c | 254 size_t buflen; in wpa_driver_privsep_authenticate() local 262 buflen = sizeof(*data) + params->ie_len + params->auth_data_len; in wpa_driver_privsep_authenticate() 263 data = os_zalloc(buflen); in wpa_driver_privsep_authenticate() 290 res = wpa_priv_cmd(drv, PRIVSEP_CMD_AUTHENTICATE, data, buflen, in wpa_driver_privsep_authenticate() 304 size_t buflen; in wpa_driver_privsep_associate() local 312 buflen = sizeof(*data) + params->wpa_ie_len; in wpa_driver_privsep_associate() 313 data = os_zalloc(buflen); in wpa_driver_privsep_associate() 334 res = wpa_priv_cmd(drv, PRIVSEP_CMD_ASSOCIATE, data, buflen, in wpa_driver_privsep_associate() 527 const size_t buflen = 2000; in wpa_driver_privsep_receive() local 529 buf = os_malloc(buflen); in wpa_driver_privsep_receive() [all …]
|