/external/wpa_supplicant/ |
H A D | eap_sake_common.c | 317 * @eap_len: EAP packet length 318 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len]) 325 int peer, const u8 *eap, size_t eap_len, 332 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; 369 os_memcpy(pos, eap, eap_len); 321 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
H A D | eap_ttls.c | 1083 size_t resp_len, eap_len = 0, len_decrypted = 0, len, buf_len, left; local 1276 eap_len = dlen; 1279 eap_len + dlen); 1287 os_memcpy(neweap + eap_len, dpos, dlen); 1289 eap_len += dlen; 1346 eapdata, eap_len); 1349 if (eap_len < sizeof(*hdr)) { 1352 "- dropped", (unsigned long) eap_len, 1358 if (len > eap_len) { 1363 (unsigned long) eap_len); [all...] |
H A D | radius.c | 542 u8 *radius_msg_get_eap(struct radius_msg *msg, size_t *eap_len) argument 574 if (eap_len) 575 *eap_len = len;
|
H A D | eapol_sm.c | 1356 size_t eap_len; local 1360 eap_key = eap_get_eapKeyData(sm->eap, &eap_len); 1363 if (len > eap_len) 1364 return eap_len;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_sake_common.c | 318 * @eap_len: EAP packet length 319 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len]) 326 int peer, const u8 *eap, size_t eap_len, 333 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; 370 os_memcpy(pos, eap, eap_len); 322 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_ttls.c | 1060 size_t eap_len; member in struct:ttls_parse_avp 1077 parse->eap_len = dlen; 1079 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen); 1085 os_memcpy(neweap + parse->eap_len, dpos, dlen); 1087 parse->eap_len += dlen; 1282 parse->eapdata, parse->eap_len); 1285 if (parse->eap_len < sizeof(*hdr)) { 1288 (unsigned long) parse->eap_len, 1293 if (len > parse->eap_len) { 1298 (unsigned long) parse->eap_len); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_ttls.c | 148 size_t eap_len; member in struct:eap_ttls_avp 227 parse->eap_len = dlen; 230 parse->eap_len + dlen); 237 os_memcpy(neweap + parse->eap_len, dpos, dlen); 239 parse->eap_len += dlen; 1079 const u8 *eap, size_t eap_len) 1094 if (eap_len < sizeof(*hdr)) { 1096 "packet (len=%lu)", (unsigned long) eap_len); 1105 if (len > eap_len) { 1108 (unsigned long) len, (unsigned long) eap_len); 1077 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *eap, size_t eap_len) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
H A D | radius.c | 545 u8 *radius_msg_get_eap(struct radius_msg *msg, size_t *eap_len) argument 578 if (eap_len) 579 *eap_len = len;
|
H A D | radius_server.c | 489 size_t eap_len; local 551 eap = radius_msg_get_eap(msg, &eap_len); 560 RADIUS_DUMP("Received EAP data", eap, eap_len); 570 sess->eap_if->eapRespData = wpabuf_alloc_ext_data(eap, eap_len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1405 size_t eap_len; local 1411 eap_key = eap_get_eapKeyData(sm->eap, &eap_len); 1416 if (len > eap_len) { 1419 (unsigned long) len, (unsigned long) eap_len); 1420 return eap_len;
|