/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp_reconfig.c | 47 size_t attr_len; in dpp_build_reconfig_announcement() local 92 attr_len = 4 + SHA256_MAC_LEN; in dpp_build_reconfig_announcement() 93 attr_len += 4 + 2; in dpp_build_reconfig_announcement() 94 attr_len += 4 + wpabuf_len(a_nonce); in dpp_build_reconfig_announcement() 95 attr_len += 4 + wpabuf_len(e_id); in dpp_build_reconfig_announcement() 96 msg = dpp_alloc_msg(DPP_PA_RECONFIG_ANNOUNCEMENT, attr_len); in dpp_build_reconfig_announcement() 133 size_t attr_len; in dpp_reconfig_build_req() local 136 attr_len = 4 + 1 + 4 + 1 + 4 + os_strlen(auth->conf->connector) + in dpp_reconfig_build_req() 138 msg = dpp_alloc_msg(DPP_PA_RECONFIG_AUTH_REQ, attr_len); in dpp_reconfig_build_req() 318 size_t clear_len, attr_len, le in dpp_reconfig_build_resp() local 422 dpp_reconfig_auth_req_rx(struct dpp_global *dpp, void *msg_ctx, const char *own_connector, const u8 *net_access_key, size_t net_access_key_len, const u8 *csign_key, size_t csign_key_len, unsigned int freq, const u8 *hdr, const u8 *attr_start, size_t attr_len) dpp_reconfig_auth_req_rx() argument 561 size_t clear_len, attr_len, len[2]; dpp_reconfig_build_conf() local 648 dpp_reconfig_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len) dpp_reconfig_auth_resp_rx() argument 833 dpp_reconfig_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len) dpp_reconfig_auth_conf_rx() argument [all...] |
H A D | dpp_auth.c | 71 size_t len[2], siv_len, attr_len; in dpp_auth_build_req() local 75 attr_len = 2 * (4 + SHA256_MAC_LEN) + 4 + (pi ? wpabuf_len(pi) : 0) + in dpp_auth_build_req() 78 attr_len += 4 + 2; in dpp_auth_build_req() 80 attr_len += 5; in dpp_auth_build_req() 84 attr_len += 5; in dpp_auth_build_req() 86 msg = dpp_alloc_msg(DPP_PA_AUTHENTICATION_REQ, attr_len); in dpp_auth_build_req() 250 size_t len[2], siv_len, attr_len; in dpp_auth_build_resp() local 258 attr_len = 4 + 1 + 2 * (4 + SHA256_MAC_LEN) + in dpp_auth_build_resp() 261 attr_len += 5; in dpp_auth_build_resp() 265 attr_len in dpp_auth_build_resp() 668 dpp_auth_req_rx(struct dpp_global *dpp, void *msg_ctx, u8 dpp_allowed_roles, int qr_mutual, struct dpp_bootstrap_info *peer_bi, struct dpp_bootstrap_info *own_bi, unsigned int freq, const u8 *hdr, const u8 *attr_start, size_t attr_len) dpp_auth_req_rx() argument 965 size_t len[2], attr_len; dpp_auth_build_conf() local 1305 dpp_auth_resp_rx_status(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len, const u8 *wrapped_data, u16 wrapped_data_len, enum dpp_status_error status) dpp_auth_resp_rx_status() argument 1403 dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len) dpp_auth_resp_rx() argument 1743 dpp_auth_conf_rx_failure(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len, const u8 *wrapped_data, u16 wrapped_data_len, enum dpp_status_error status) dpp_auth_conf_rx_failure() argument 1814 dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len) dpp_auth_conf_rx() argument [all...] |
H A D | dpp_pkex.c | 37 size_t attr_len; in dpp_pkex_build_exchange_req() local 80 attr_len = 4 + 2; in dpp_pkex_build_exchange_req() 83 attr_len += 4 + 1; in dpp_pkex_build_exchange_req() 86 attr_len += 4 + os_strlen(pkex->identifier); in dpp_pkex_build_exchange_req() 87 attr_len += 4 + 2 * curve->prime_len; in dpp_pkex_build_exchange_req() 89 DPP_PA_PKEX_V1_EXCHANGE_REQ, attr_len); in dpp_pkex_build_exchange_req() 218 size_t attr_len; in dpp_pkex_build_exchange_resp() local 223 attr_len = 4 + 1; in dpp_pkex_build_exchange_resp() 226 attr_len += 4 + 1; in dpp_pkex_build_exchange_resp() 229 attr_len in dpp_pkex_build_exchange_resp() 583 size_t clear_len, attr_len; dpp_pkex_build_commit_reveal_req() local 907 size_t clear_len, attr_len; dpp_pkex_build_commit_reveal_resp() local [all...] |
H A D | dpp.h | 538 size_t attr_len); 541 const u8 *attr_start, size_t attr_len); 549 const u8 *attr_start, size_t attr_len); 568 size_t attr_len); 573 const u8 *attr_start, size_t attr_len); 579 size_t attr_len, 728 const u8 *attr_start, size_t attr_len); 731 const u8 *attr_start, size_t attr_len); 733 const u8 *attr_start, size_t attr_len);
|
H A D | dpp.c | 664 size_t attr_len; in dpp_build_conf_req_attr() local 680 attr_len = 4 + clear_len + AES_BLOCK_SIZE; in dpp_build_conf_req_attr() 683 attr_len += 5; in dpp_build_conf_req_attr() 685 msg = wpabuf_alloc(attr_len); in dpp_build_conf_req_attr() 1699 size_t clear_len, attr_len; in dpp_build_conf_resp() local 1750 attr_len = 4 + 1 + 4 + clear_len + AES_BLOCK_SIZE; in dpp_build_conf_resp() 1753 attr_len += 5; in dpp_build_conf_resp() 1755 msg = wpabuf_alloc(attr_len); in dpp_build_conf_resp() 1887 size_t attr_len) in dpp_conf_req_rx() 1906 if (dpp_check_attrs(attr_start, attr_len) < in dpp_conf_req_rx() 1886 dpp_conf_req_rx(struct dpp_authentication *auth, const u8 *attr_start, size_t attr_len) dpp_conf_req_rx() argument 3005 dpp_conf_result_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len) dpp_conf_result_rx() argument 3091 size_t nonce_len, clear_len, attr_len; dpp_build_conf_result() local 3156 dpp_conn_status_result_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len, u8 *ssid, size_t *ssid_len, char **channel_list) dpp_conn_status_result_rx() argument 3309 size_t nonce_len, clear_len, attr_len; dpp_build_conn_status_result() local [all...] |
H A D | ieee802_11_common.c | 2221 size_t mbo_add_ie(u8 *buf, size_t len, const u8 *attr, size_t attr_len) in mbo_add_ie() argument 2227 if (len < 6 + attr_len) { in mbo_add_ie() 2229 "MBO: Not enough room in buffer for MBO IE: buf len = %zu, attr_len = %zu", in mbo_add_ie() 2230 len, attr_len); in mbo_add_ie() 2235 *buf++ = attr_len + 4; in mbo_add_ie() 2239 os_memcpy(buf, attr, attr_len); in mbo_add_ie() 2241 return 6 + attr_len; in mbo_add_ie()
|
H A D | ieee802_11_common.h | 307 size_t mbo_add_ie(u8 *buf, size_t len, const u8 *attr, size_t attr_len);
|
H A D | dpp_crypto.c | 2128 size_t attr_len; in dpp_validate_csr() local 2144 &attr_len, &attr_type); in dpp_validate_csr() 2161 cp = base64_decode((const char *) attr, attr_len, &cp_len); in dpp_validate_csr()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | robust_av.c | 1172 u8 attr_len, const u8 *attr_data) in wpas_fill_dscp_policy() 1176 if (attr_len < 4) { in wpas_fill_dscp_policy() 1179 attr_len); in wpas_fill_dscp_policy() 1187 if (attr_len < 3) { in wpas_fill_dscp_policy() 1190 attr_len); in wpas_fill_dscp_policy() 1199 if (attr_len < 1) { in wpas_fill_dscp_policy() 1202 attr_len); in wpas_fill_dscp_policy() 1206 policy->frame_classifier_len = attr_len; in wpas_fill_dscp_policy() 1209 if (attr_len < 1) { in wpas_fill_dscp_policy() 1212 attr_len); in wpas_fill_dscp_policy() 1171 wpas_fill_dscp_policy(struct dscp_policy_data *policy, u8 attr_id, u8 attr_len, const u8 *attr_data) wpas_fill_dscp_policy() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | dpp.h | 410 size_t attr_len); 413 const u8 *attr_start, size_t attr_len); 417 const u8 *attr_start, size_t attr_len); 434 size_t attr_len); 439 const u8 *attr_start, size_t attr_len);
|
H A D | dpp.c | 1681 size_t len[2], siv_len, attr_len; in dpp_auth_build_req() local 1685 attr_len = 2 * (4 + SHA256_MAC_LEN) + 4 + (pi ? wpabuf_len(pi) : 0) + in dpp_auth_build_req() 1688 attr_len += 4 + 2; in dpp_auth_build_req() 1690 attr_len += 5; in dpp_auth_build_req() 1694 attr_len += 5; in dpp_auth_build_req() 1696 msg = dpp_alloc_msg(DPP_PA_AUTHENTICATION_REQ, attr_len); in dpp_auth_build_req() 1858 size_t len[2], siv_len, attr_len; in dpp_auth_build_resp() local 1865 attr_len = 4 + 1 + 2 * (4 + SHA256_MAC_LEN) + in dpp_auth_build_resp() 1868 attr_len += 5; in dpp_auth_build_resp() 1872 attr_len in dpp_auth_build_resp() 2368 size_t attr_len; dpp_build_conf_req_attr() local 3072 dpp_auth_req_rx(void *msg_ctx, u8 dpp_allowed_roles, int qr_mutual, struct dpp_bootstrap_info *peer_bi, struct dpp_bootstrap_info *own_bi, unsigned int freq, const u8 *hdr, const u8 *attr_start, size_t attr_len) dpp_auth_req_rx() argument 3369 size_t len[2], attr_len; dpp_auth_build_conf() local 3539 dpp_auth_resp_rx_status(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len, const u8 *wrapped_data, u16 wrapped_data_len, enum dpp_status_error status) dpp_auth_resp_rx_status() argument 3637 dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len) dpp_auth_resp_rx() argument 3969 dpp_auth_conf_rx_failure(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len, const u8 *wrapped_data, u16 wrapped_data_len, enum dpp_status_error status) dpp_auth_conf_rx_failure() argument 4040 dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len) dpp_auth_conf_rx() argument 4849 size_t clear_len, attr_len; dpp_build_conf_resp() local 4974 dpp_conf_req_rx(struct dpp_authentication *auth, const u8 *attr_start, size_t attr_len) dpp_conf_req_rx() argument 6013 dpp_conf_result_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len) dpp_conf_result_rx() argument 6100 size_t nonce_len, clear_len, attr_len; dpp_build_conf_result() local 6905 size_t attr_len; dpp_pkex_build_exchange_req() local 7084 size_t attr_len; dpp_pkex_build_exchange_resp() local 7488 size_t clear_len, attr_len; dpp_pkex_build_commit_reveal_req() local 7794 size_t clear_len, attr_len; dpp_pkex_build_commit_reveal_resp() local [all...] |
H A D | ieee802_11_common.c | 1697 size_t mbo_add_ie(u8 *buf, size_t len, const u8 *attr, size_t attr_len) in mbo_add_ie() argument 1703 if (len < 6 + attr_len) { in mbo_add_ie() 1705 "MBO: Not enough room in buffer for MBO IE: buf len = %zu, attr_len = %zu", in mbo_add_ie() 1706 len, attr_len); in mbo_add_ie() 1711 *buf++ = attr_len + 4; in mbo_add_ie() 1715 os_memcpy(buf, attr, attr_len); in mbo_add_ie() 1717 return 6 + attr_len; in mbo_add_ie()
|
H A D | ieee802_11_common.h | 210 size_t mbo_add_ie(u8 *buf, size_t len, const u8 *attr, size_t attr_len);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_sim_common.c | 646 "attr_len=%lu)", in eap_sim_parse_attr() 1055 int attr_len = 2 + len; in eap_sim_msg_add_full() local 1062 pad_len = (4 - attr_len % 4) % 4; in eap_sim_msg_add_full() 1063 attr_len += pad_len; in eap_sim_msg_add_full() 1064 if (wpabuf_resize(&msg->buf, attr_len)) in eap_sim_msg_add_full() 1068 wpabuf_put_u8(msg->buf, attr_len / 4); in eap_sim_msg_add_full() 1079 int attr_len = 4 + len; in eap_sim_msg_add() local 1086 pad_len = (4 - attr_len % 4) % 4; in eap_sim_msg_add() 1087 attr_len += pad_len; in eap_sim_msg_add() 1088 if (wpabuf_resize(&msg->buf, attr_len)) in eap_sim_msg_add() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_sim_common.c | 656 "attr_len=%lu)", in eap_sim_parse_attr() 1065 int attr_len = 2 + len; in eap_sim_msg_add_full() local 1072 pad_len = (4 - attr_len % 4) % 4; in eap_sim_msg_add_full() 1073 attr_len += pad_len; in eap_sim_msg_add_full() 1074 if (wpabuf_resize(&msg->buf, attr_len)) in eap_sim_msg_add_full() 1078 wpabuf_put_u8(msg->buf, attr_len / 4); in eap_sim_msg_add_full() 1089 int attr_len = 4 + len; in eap_sim_msg_add() local 1096 pad_len = (4 - attr_len % 4) % 4; in eap_sim_msg_add() 1097 attr_len += pad_len; in eap_sim_msg_add() 1098 if (wpabuf_resize(&msg->buf, attr_len)) in eap_sim_msg_add() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/p2p/ |
H A D | p2p_build.c | 479 size_t *total_len, u8 *attr_len) in p2p_buf_add_service_info() 589 WPA_PUT_LE16(attr_len, (u16) *total_len); in p2p_buf_add_service_info() 602 u8 *pos, *attr_len, *ie_len = NULL; in p2p_buf_add_service_instance() local 626 attr_len = wpabuf_put(tmp_buf, sizeof(u16)); in p2p_buf_add_service_instance() 627 WPA_PUT_LE16(attr_len, (u16) total_len); in p2p_buf_add_service_instance() 634 &ie_len, &pos, &total_len, attr_len); in p2p_buf_add_service_instance() 652 attr_len)) in p2p_buf_add_service_instance() 476 p2p_buf_add_service_info(struct wpabuf *buf, struct p2p_data *p2p, u32 adv_id, u16 config_methods, const char *svc_name, u8 **ie_len, u8 **pos, size_t *total_len, u8 *attr_len) p2p_buf_add_service_info() argument
|
H A D | p2p_parse.c | 428 u16 attr_len; in p2p_parse_p2p_ie() local 436 attr_len = WPA_GET_LE16(pos); in p2p_parse_p2p_ie() 439 id, attr_len); in p2p_parse_p2p_ie() 440 if (attr_len > end - pos) { in p2p_parse_p2p_ie() 443 attr_len, (int) (end - pos)); in p2p_parse_p2p_ie() 447 if (p2p_parse_attribute(id, pos, attr_len, msg)) in p2p_parse_p2p_ie() 449 pos += attr_len; in p2p_parse_p2p_ie()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/p2p/ |
H A D | p2p_build.c | 479 size_t *total_len, u8 *attr_len) in p2p_buf_add_service_info() 589 WPA_PUT_LE16(attr_len, (u16) *total_len); in p2p_buf_add_service_info() 602 u8 *pos, *attr_len, *ie_len = NULL; in p2p_buf_add_service_instance() local 626 attr_len = wpabuf_put(tmp_buf, sizeof(u16)); in p2p_buf_add_service_instance() 627 WPA_PUT_LE16(attr_len, (u16) total_len); in p2p_buf_add_service_instance() 634 &ie_len, &pos, &total_len, attr_len); in p2p_buf_add_service_instance() 652 attr_len)) in p2p_buf_add_service_instance() 476 p2p_buf_add_service_info(struct wpabuf *buf, struct p2p_data *p2p, u32 adv_id, u16 config_methods, const char *svc_name, u8 **ie_len, u8 **pos, size_t *total_len, u8 *attr_len) p2p_buf_add_service_info() argument
|
H A D | p2p_parse.c | 426 u16 attr_len; in p2p_parse_p2p_ie() local 434 attr_len = WPA_GET_LE16(pos); in p2p_parse_p2p_ie() 437 id, attr_len); in p2p_parse_p2p_ie() 438 if (attr_len > end - pos) { in p2p_parse_p2p_ie() 441 attr_len, (int) (end - pos)); in p2p_parse_p2p_ie() 445 if (p2p_parse_attribute(id, pos, attr_len, msg)) in p2p_parse_p2p_ie() 447 pos += attr_len; in p2p_parse_p2p_ie()
|
/third_party/curl/lib/ |
H A D | ldap.c | 608 size_t attr_len; in ldap_do() local 622 attr_len = strlen(attr); in ldap_do() 638 result = Curl_client_write(data, CLIENTWRITE_BODY, attr, attr_len); in ldap_do() 660 if((attr_len > 7) && in ldap_do() 661 (strcmp(";binary", attr + (attr_len - 7)) == 0)) { in ldap_do()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wps_hostapd.c | 340 size_t attr_len) in hapd_new_ap_event() 342 size_t blen = attr_len * 2 + 1; in hapd_new_ap_event() 345 wpa_snprintf_hex(buf, blen, attr, attr_len); in hapd_new_ap_event() 339 hapd_new_ap_event(struct hostapd_data *hapd, const u8 *attr, size_t attr_len) hapd_new_ap_event() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wps_hostapd.c | 300 size_t attr_len) in hapd_new_ap_event() 302 size_t blen = attr_len * 2 + 1; in hapd_new_ap_event() 305 wpa_snprintf_hex(buf, blen, attr, attr_len); in hapd_new_ap_event() 299 hapd_new_ap_event(struct hostapd_data *hapd, const u8 *attr, size_t attr_len) hapd_new_ap_event() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/drivers/ |
H A D | driver_nl80211.c | 316 size_t ack_len, attr_len; in ack_handler_cookie() local 327 attr_len = nlmsg_hdr(msg)->nlmsg_len - ack_len; in ack_handler_cookie() 332 nla_parse(tb, NLMSGERR_ATTR_MAX, attrs, attr_len, NULL); in ack_handler_cookie()
|