if (!pub)
goto fail;
pos = wpabuf_head(pub);
- x = (char *) base64_url_encode(pos, curve->prime_len, NULL, 0);
+ x = (char *) base64_url_encode(pos, curve->prime_len, NULL);
pos += curve->prime_len;
- y = (char *) base64_url_encode(pos, curve->prime_len, NULL, 0);
+ y = (char *) base64_url_encode(pos, curve->prime_len, NULL);
if (!x || !y)
goto fail;
auth->conf->kid, curve->jws_alg);
signed1 = (char *) base64_url_encode((unsigned char *) jws_prot_hdr,
os_strlen(jws_prot_hdr),
- &signed1_len, 0);
+ &signed1_len);
signed2 = (char *) base64_url_encode(wpabuf_head(dppcon),
wpabuf_len(dppcon),
- &signed2_len, 0);
+ &signed2_len);
if (!signed1 || !signed2)
goto fail;
wpa_hexdump(MSG_DEBUG, "DPP: signedConnector ECDSA signature (raw r,s)",
signature, signature_len);
signed3 = (char *) base64_url_encode(signature, signature_len,
- &signed3_len, 0);
+ &signed3_len);
if (!signed3)
goto fail;
if (ssid) {
unsigned char *ssid64;
- ssid64 = base64_url_encode(ssid, ssid_len, NULL, 0);
+ ssid64 = base64_url_encode(ssid, ssid_len, NULL);
if (!ssid64)
goto fail;
wpabuf_put_str(json, ",\"ssid64\":\"");
}
conf->kid = (char *) base64_url_encode(kid_hash, sizeof(kid_hash),
- NULL, 0);
+ NULL);
if (!conf->kid)
goto fail;
out:
wpa_hexdump(MSG_DEBUG, "DPP: Corrupted Connector signature",
signature, signature_len);
signed3 = (char *) base64_url_encode(signature, signature_len,
- &signed3_len, 0);
+ &signed3_len);
if (!signed3)
goto fail;
os_memcpy(pos, signed3, signed3_len);
unsigned char * base64_url_encode(const unsigned char *src, size_t len,
- size_t *out_len, int add_pad)
+ size_t *out_len)
{
- return base64_gen_encode(src, len, out_len, base64_url_table, add_pad);
+ return base64_gen_encode(src, len, out_len, base64_url_table, 0);
}
unsigned char * base64_decode(const unsigned char *src, size_t len,
size_t *out_len);
unsigned char * base64_url_encode(const unsigned char *src, size_t len,
- size_t *out_len, int add_pad);
+ size_t *out_len);
unsigned char * base64_url_decode(const unsigned char *src, size_t len,
size_t *out_len);