Home
last modified time | relevance | path

Searched refs:buflen (Results 1 – 25 of 141) sorted by relevance

123456

/hostap-latest/src/ap/
Dctrl_iface_ap.c30 static size_t hostapd_write_ht_mcs_bitmask(char *buf, size_t buflen, in hostapd_write_ht_mcs_bitmask() argument
36 ret = os_snprintf(buf + len, buflen - len, in hostapd_write_ht_mcs_bitmask()
38 if (os_snprintf_error(buflen - len, ret)) in hostapd_write_ht_mcs_bitmask()
43 len += wpa_snprintf_hex(buf + len, buflen - len, mcs_set, 10); in hostapd_write_ht_mcs_bitmask()
45 ret = os_snprintf(buf + len, buflen - len, "\n"); in hostapd_write_ht_mcs_bitmask()
46 if (os_snprintf_error(buflen - len, ret)) in hostapd_write_ht_mcs_bitmask()
56 char *buf, size_t buflen) in hostapd_get_sta_conn_time() argument
73 ret = os_snprintf(buf, buflen, "connected_time=%lu\n", secs); in hostapd_get_sta_conn_time()
74 if (os_snprintf_error(buflen, ret)) in hostapd_get_sta_conn_time()
82 char *buf, size_t buflen) in hostapd_get_sta_info() argument
[all …]
Dctrl_iface_ap.h13 char *buf, size_t buflen);
15 char *buf, size_t buflen);
17 char *buf, size_t buflen);
24 char *buf, size_t buflen);
28 size_t buflen);
53 char *buf, size_t buflen);
Dbeacon.c711 size_t buflen = 0; in hostapd_probe_resp_elems_len() local
715 buflen += wpabuf_len(hapd->wps_probe_resp_ie); in hostapd_probe_resp_elems_len()
719 buflen += wpabuf_len(hapd->p2p_probe_resp_ie); in hostapd_probe_resp_elems_len()
723 buflen += wpabuf_len(hapd->iface->fst_ies); in hostapd_probe_resp_elems_len()
726 buflen += wpabuf_len(hapd->conf->vendor_elements); in hostapd_probe_resp_elems_len()
729 buflen += wpabuf_len(hapd->conf->presp_elements); in hostapd_probe_resp_elems_len()
732 buflen += 5 + 2 + sizeof(struct ieee80211_vht_capabilities) + in hostapd_probe_resp_elems_len()
736 buflen += he_elem_len(hapd); in hostapd_probe_resp_elems_len()
740 buflen += hostapd_eid_eht_capab_len(hapd, IEEE80211_MODE_AP); in hostapd_probe_resp_elems_len()
741 buflen += 3 + sizeof(struct ieee80211_eht_operation); in hostapd_probe_resp_elems_len()
[all …]
Dp2p_hostapd.h15 char *buf, size_t buflen);
26 char *buf, size_t buflen) in hostapd_p2p_get_mib_sta() argument
Dtaxonomy.c240 struct sta_info *sta, char *buf, size_t buflen) in retrieve_sta_taxonomy() argument
248 ret = os_snprintf(buf, buflen, "wifi4|probe:"); in retrieve_sta_taxonomy()
249 if (os_snprintf_error(buflen, ret)) in retrieve_sta_taxonomy()
252 end = buf + buflen; in retrieve_sta_taxonomy()
/hostap-latest/src/fst/
Dfst_ctrl_iface.c171 static int session_get(const char *session_id, char *buf, size_t buflen) in session_get() argument
183 return os_snprintf(buf, buflen, "FAIL\n"); in session_get()
191 return os_snprintf(buf, buflen, in session_get()
210 static int session_set(const char *session_id, char *buf, size_t buflen) in session_set() argument
222 return os_snprintf(buf, buflen, "FAIL\n"); in session_set()
226 return os_snprintf(buf, buflen, "FAIL\n"); in session_set()
241 return os_snprintf(buf, buflen, "FAIL\n"); in session_set()
244 return os_snprintf(buf, buflen, "%s\n", ret ? "FAIL" : "OK"); in session_set()
249 static int session_add(const char *group_id, char *buf, size_t buflen) in session_add() argument
258 return os_snprintf(buf, buflen, "FAIL\n"); in session_add()
[all …]
Dfst_ctrl_iface.h17 int fst_ctrl_iface_mb_info(const u8 *addr, char *buf, size_t buflen);
19 int fst_ctrl_iface_receive(const char *txtaddr, char *buf, size_t buflen);
26 fst_ctrl_iface_mb_info(const u8 *addr, char *buf, size_t buflen) in fst_ctrl_iface_mb_info() argument
34 int fst_read_next_text_param(const char *params, char *buf, size_t buflen,
/hostap-latest/src/utils/
Dwpa_debug_zephyr.c181 int buflen; in wpa_msg_impl() local
186 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in wpa_msg_impl()
189 buf = os_malloc(buflen); in wpa_msg_impl()
206 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg_impl()
211 bin_clear_free(buf, buflen); in wpa_msg_impl()
218 int buflen; in wpa_msg_ctrl_impl() local
225 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in wpa_msg_ctrl_impl()
228 buf = os_malloc(buflen); in wpa_msg_ctrl_impl()
234 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg_ctrl_impl()
237 bin_clear_free(buf, buflen); in wpa_msg_ctrl_impl()
[all …]
Dwpa_debug.c132 ssize_t buflen; in wpa_debug_open_linux_tracing() local
141 buflen = read(mounts, buf, sizeof(buf) - 1); in wpa_debug_open_linux_tracing()
143 if (buflen < 0) { in wpa_debug_open_linux_tracing()
147 buf[buflen] = '\0'; in wpa_debug_open_linux_tracing()
651 int buflen; in wpa_msg() local
656 buflen = vsnprintf(NULL, 0, fmt, ap) + 1; in wpa_msg()
659 buf = os_malloc(buflen); in wpa_msg()
676 len = vsnprintf(buf, buflen, fmt, ap); in wpa_msg()
681 bin_clear_free(buf, buflen); in wpa_msg()
689 int buflen; in wpa_msg_ctrl() local
[all …]
Djson.c513 size_t buflen; in json_get_member_base64url() local
520 &buflen); in json_get_member_base64url()
523 ret = wpabuf_alloc_ext_data(buf, buflen); in json_get_member_base64url()
536 size_t buflen; in json_get_member_base64() local
542 buf = hostap_base64_decode(token->string, os_strlen(token->string), &buflen); in json_get_member_base64()
545 ret = wpabuf_alloc_ext_data(buf, buflen); in json_get_member_base64()
576 char *buf, size_t buflen) in json_print_token() argument
584 ret = os_snprintf(buf + len, buflen - len, "[%d:%s:%s]", in json_print_token()
587 if (os_snprintf_error(buflen - len, ret)) { in json_print_token()
591 json_print_token(token->child, depth + 1, buf, buflen); in json_print_token()
[all …]
Dip_addr.c15 size_t buflen) in hostapd_ip_txt() argument
17 if (buflen == 0 || addr == NULL) in hostapd_ip_txt()
21 os_strlcpy(buf, inet_ntoa(addr->u.v4), buflen); in hostapd_ip_txt()
27 if (inet_ntop(AF_INET6, &addr->u.v6, buf, buflen) == NULL) in hostapd_ip_txt()
Dconfig.c15 static int newline_terminated(const char *buf, size_t buflen) in newline_terminated() argument
20 if (len == buflen - 1 && buf[buflen - 1] != '\r' && in newline_terminated()
/hostap-latest/wpa_supplicant/
Dmain_winsvc.c67 DWORD buflen, val; in read_interface() local
81 buflen = sizeof(ctrl_interface); in read_interface()
83 (LPBYTE) ctrl_interface, &buflen); in read_interface()
88 (int) buflen, (char *) ctrl_interface); in read_interface()
92 buflen = sizeof(adapter); in read_interface()
94 (LPBYTE) adapter, &buflen); in read_interface()
99 (int) buflen, (char *) adapter); in read_interface()
103 buflen = sizeof(config); in read_interface()
105 (LPBYTE) config, &buflen); in read_interface()
110 (int) buflen, (char *) config); in read_interface()
[all …]
Dap.h24 const char *pin, char *buf, size_t buflen,
33 char *buf, size_t buflen);
35 char *buf, size_t buflen);
37 char *buf, size_t buflen);
43 size_t buflen, int verbose);
54 size_t buflen);
Dctrl_iface.c977 char *cmd, char *buf, size_t buflen) in wpa_supplicant_ctrl_iface_get() argument
984 res = os_snprintf(buf, buflen, "%s", VERSION_STR); in wpa_supplicant_ctrl_iface_get()
986 res = os_snprintf(buf, buflen, "%u", CTRL_IFACE_MAX_LEN); in wpa_supplicant_ctrl_iface_get()
989 res = os_snprintf(buf, buflen, "%c%c", in wpa_supplicant_ctrl_iface_get()
1000 res = os_snprintf(buf, buflen, "%d", enabled); in wpa_supplicant_ctrl_iface_get()
1006 res = wpa_snprintf_hex(buf, buflen, wpa_s->last_gtk, in wpa_supplicant_ctrl_iface_get()
1011 res = tls_get_library_version(buf, buflen); in wpa_supplicant_ctrl_iface_get()
1014 return wpa_snprintf_hex(buf, buflen, in wpa_supplicant_ctrl_iface_get()
1018 res = os_snprintf(buf, buflen, "%d", wpa_s->last_tk_key_idx); in wpa_supplicant_ctrl_iface_get()
1021 res = wpa_config_get_value(cmd, wpa_s->conf, buf, buflen); in wpa_supplicant_ctrl_iface_get()
[all …]
Dwifi_display.c353 char *buf, size_t buflen) in wifi_display_subelem_get() argument
364 res = wpa_snprintf_hex(buf, buflen, wpabuf_head(ie), in wifi_display_subelem_get()
377 return wpa_snprintf_hex(buf, buflen, in wifi_display_subelem_get()
388 size_t buflen; in wifi_display_subelem_hex() local
399 buflen = wpabuf_len(wfd_subelems); in wifi_display_subelem_hex()
401 while (i + WIFI_DISPLAY_SUBELEM_HEADER_LEN < buflen) { in wifi_display_subelem_hex()
403 if (i + WIFI_DISPLAY_SUBELEM_HEADER_LEN + elen > buflen) in wifi_display_subelem_hex()
/hostap-latest/wpaspy/
Dwpaspy.c55 size_t buflen; in wpaspy_request() local
61 buflen = sizeof(buf) - 1; in wpaspy_request()
62 ret = wpa_ctrl_request(self->ctrl, cmd, strlen(cmd), buf, &buflen, in wpaspy_request()
73 buf[buflen] = '\0'; in wpaspy_request()
130 size_t buflen; in wpaspy_recv() local
132 buflen = sizeof(buf) - 1; in wpaspy_recv()
134 ret = wpa_ctrl_recv(self->ctrl, buf, &buflen); in wpaspy_recv()
142 buf[buflen] = '\0'; in wpaspy_recv()
/hostap-latest/src/tls/
Dtlsv1_common.c424 size_t buflen; in tls_verify_signature() local
449 buflen = end - pos; in tls_verify_signature()
455 if (crypto_public_key_decrypt_pkcs1(pk, pos, end - pos, buf, &buflen) < in tls_verify_signature()
465 decrypted, buflen); in tls_verify_signature()
483 if (buflen >= 19 + 32 && in tls_verify_signature()
489 buflen -= 19; in tls_verify_signature()
490 } else if (buflen >= 19 + 48 && in tls_verify_signature()
496 buflen -= 19; in tls_verify_signature()
497 } else if (buflen >= 19 + 64 && in tls_verify_signature()
503 buflen -= 19; in tls_verify_signature()
[all …]
/hostap-latest/hs20/client/
Dest.c121 size_t buflen; in est_load_cacerts() local
126 buflen = os_strlen(url) + 100; in est_load_cacerts()
127 buf = os_malloc(buflen); in est_load_cacerts()
131 os_snprintf(buf, buflen, "%s/cacerts", url); in est_load_cacerts()
578 size_t buflen; in est_build_csr() local
584 buflen = os_strlen(url) + 100; in est_build_csr()
585 buf = os_malloc(buflen); in est_build_csr()
589 os_snprintf(buf, buflen, "%s/csrattrs", url); in est_build_csr()
652 size_t buflen, resp_len, len, pkcs7_len; in est_simple_enroll() local
673 buflen = os_strlen(url) + 100; in est_simple_enroll()
[all …]
/hostap-latest/tests/fuzzing/json/
Djson.c19 size_t buflen = 10000; in LLVMFuzzerTestOneInput() local
29 txt = os_zalloc(buflen); in LLVMFuzzerTestOneInput()
31 json_print_tree(root, txt, buflen); in LLVMFuzzerTestOneInput()
/hostap-latest/hostapd/
Dctrl_iface.c194 struct hostapd_data *hapd, char *cmd, char *buf, size_t buflen) in hostapd_ctrl_iface_wps_check_pin() argument
223 ret = os_snprintf(buf, buflen, "FAIL-CHECKSUM\n"); in hostapd_ctrl_iface_wps_check_pin()
224 if (os_snprintf_error(buflen, ret)) in hostapd_ctrl_iface_wps_check_pin()
230 ret = os_snprintf(buf, buflen, "%s", pin); in hostapd_ctrl_iface_wps_check_pin()
231 if (os_snprintf_error(buflen, ret)) in hostapd_ctrl_iface_wps_check_pin()
454 char *buf, size_t buflen) in hostapd_ctrl_iface_wps_ap_pin() argument
466 return os_snprintf(buf, buflen, "OK\n"); in hostapd_ctrl_iface_wps_ap_pin()
475 return os_snprintf(buf, buflen, "%s", pin_txt); in hostapd_ctrl_iface_wps_ap_pin()
482 return os_snprintf(buf, buflen, "%s", pin_txt); in hostapd_ctrl_iface_wps_ap_pin()
495 if (os_strlen(pin) > buflen) in hostapd_ctrl_iface_wps_ap_pin()
[all …]
/hostap-latest/src/eap_peer/
Deap_psk.c91 size_t buflen, len; in eap_psk_process_1() local
146 buflen = data->id_p_len + data->id_s_len + 2 * EAP_PSK_RAND_LEN; in eap_psk_process_1()
147 buf = os_malloc(buflen); in eap_psk_process_1()
159 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) { in eap_psk_process_1()
187 size_t buflen, left, data_len, len, plen; in eap_psk_process_3() local
228 buflen = data->id_s_len + EAP_PSK_RAND_LEN; in eap_psk_process_3()
229 buf = os_malloc(buflen); in eap_psk_process_3()
234 if (omac1_aes_128(data->ak, buf, buflen, mac)) { in eap_psk_process_3()
Deap_methods.c94 size_t eap_get_names(char *buf, size_t buflen) in eap_get_names() argument
100 if (buflen == 0) in eap_get_names()
104 end = pos + buflen; in eap_get_names()
113 buf[buflen - 1] = '\0'; in eap_get_names()
/hostap-latest/src/eap_server/
Deap_server_psk.c95 size_t buflen; in eap_psk_build_3() local
113 buflen = sm->cfg->server_id_len + EAP_PSK_RAND_LEN; in eap_psk_build_3()
114 buf = os_malloc(buflen); in eap_psk_build_3()
120 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s)) { in eap_psk_build_3()
219 size_t left, buflen; in eap_psk_process_2() local
296 buflen = data->id_p_len + sm->cfg->server_id_len + 2 * EAP_PSK_RAND_LEN; in eap_psk_process_2()
297 buf = os_malloc(buflen); in eap_psk_process_2()
309 if (omac1_aes_128(data->ak, buf, buflen, mac)) { in eap_psk_process_2()
/hostap-latest/src/drivers/
Ddriver_privsep.c254 size_t buflen; in wpa_driver_privsep_authenticate() local
262 buflen = sizeof(*data) + params->ie_len + params->auth_data_len; in wpa_driver_privsep_authenticate()
263 data = os_zalloc(buflen); in wpa_driver_privsep_authenticate()
290 res = wpa_priv_cmd(drv, PRIVSEP_CMD_AUTHENTICATE, data, buflen, in wpa_driver_privsep_authenticate()
304 size_t buflen; in wpa_driver_privsep_associate() local
312 buflen = sizeof(*data) + params->wpa_ie_len; in wpa_driver_privsep_associate()
313 data = os_zalloc(buflen); in wpa_driver_privsep_associate()
334 res = wpa_priv_cmd(drv, PRIVSEP_CMD_ASSOCIATE, data, buflen, in wpa_driver_privsep_associate()
527 const size_t buflen = 2000; in wpa_driver_privsep_receive() local
529 buf = os_malloc(buflen); in wpa_driver_privsep_receive()
[all …]

123456