Searched defs:eap_len (Results 1 - 10 of 10) sorted by relevance

/external/wpa_supplicant/
H A Deap_sake_common.c317 * @eap_len: EAP packet length
318 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len])
325 int peer, const u8 *eap, size_t eap_len,
332 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len;
369 os_memcpy(pos, eap, eap_len);
321 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
H A Deap_ttls.c1083 size_t resp_len, eap_len = 0, len_decrypted = 0, len, buf_len, left; local
1276 eap_len = dlen;
1279 eap_len + dlen);
1287 os_memcpy(neweap + eap_len, dpos, dlen);
1289 eap_len += dlen;
1346 eapdata, eap_len);
1349 if (eap_len < sizeof(*hdr)) {
1352 "- dropped", (unsigned long) eap_len,
1358 if (len > eap_len) {
1363 (unsigned long) eap_len);
[all...]
H A Dradius.c542 u8 *radius_msg_get_eap(struct radius_msg *msg, size_t *eap_len) argument
574 if (eap_len)
575 *eap_len = len;
H A Deapol_sm.c1356 size_t eap_len; local
1360 eap_key = eap_get_eapKeyData(sm->eap, &eap_len);
1363 if (len > eap_len)
1364 return eap_len;
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_sake_common.c318 * @eap_len: EAP packet length
319 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len])
326 int peer, const u8 *eap, size_t eap_len,
333 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len;
370 os_memcpy(pos, eap, eap_len);
322 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_ttls.c1060 size_t eap_len; member in struct:ttls_parse_avp
1077 parse->eap_len = dlen;
1079 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen);
1085 os_memcpy(neweap + parse->eap_len, dpos, dlen);
1087 parse->eap_len += dlen;
1282 parse->eapdata, parse->eap_len);
1285 if (parse->eap_len < sizeof(*hdr)) {
1288 (unsigned long) parse->eap_len,
1293 if (len > parse->eap_len) {
1298 (unsigned long) parse->eap_len);
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_ttls.c148 size_t eap_len; member in struct:eap_ttls_avp
227 parse->eap_len = dlen;
230 parse->eap_len + dlen);
237 os_memcpy(neweap + parse->eap_len, dpos, dlen);
239 parse->eap_len += dlen;
1079 const u8 *eap, size_t eap_len)
1094 if (eap_len < sizeof(*hdr)) {
1096 "packet (len=%lu)", (unsigned long) eap_len);
1105 if (len > eap_len) {
1108 (unsigned long) len, (unsigned long) eap_len);
1077 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *eap, size_t eap_len) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/radius/
H A Dradius.c545 u8 *radius_msg_get_eap(struct radius_msg *msg, size_t *eap_len) argument
578 if (eap_len)
579 *eap_len = len;
H A Dradius_server.c489 size_t eap_len; local
551 eap = radius_msg_get_eap(msg, &eap_len);
560 RADIUS_DUMP("Received EAP data", eap, eap_len);
570 sess->eap_if->eapRespData = wpabuf_alloc_ext_data(eap, eap_len);
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/
H A Deapol_supp_sm.c1405 size_t eap_len; local
1411 eap_key = eap_get_eapKeyData(sm->eap, &eap_len);
1416 if (len > eap_len) {
1419 (unsigned long) len, (unsigned long) eap_len);
1420 return eap_len;

Completed in 125 milliseconds