/external/wpa_supplicant/ |
H A D | eap_sake_common.h | 101 int peer, const u8 *eap, size_t eap_len,
|
H A D | eap_sake_common.c | 317 * @eap_len: EAP packet length 318 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len]) 325 int peer, const u8 *eap, size_t eap_len, 332 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; 369 os_memcpy(pos, eap, eap_len); 321 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
H A D | eap_ttls.c | 1083 size_t resp_len, eap_len = 0, len_decrypted = 0, len, buf_len, left; local 1276 eap_len = dlen; 1279 eap_len + dlen); 1287 os_memcpy(neweap + eap_len, dpos, dlen); 1289 eap_len += dlen; 1346 eapdata, eap_len); 1349 if (eap_len < sizeof(*hdr)) { 1352 "- dropped", (unsigned long) eap_len, 1358 if (len > eap_len) { 1363 (unsigned long) eap_len); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_sake_common.h | 97 int peer, const u8 *eap, size_t eap_len,
|
H A D | eap_sake_common.c | 318 * @eap_len: EAP packet length 319 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len]) 326 int peer, const u8 *eap, size_t eap_len, 333 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; 370 os_memcpy(pos, eap, eap_len); 322 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sake_common.h | 97 int peer, const u8 *eap, size_t eap_len,
|
H A D | eap_sake_common.c | 318 * @eap_len: EAP packet length 319 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len]) 326 int peer, const u8 *eap, size_t eap_len, 333 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; 370 os_memcpy(pos, eap, eap_len); 322 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sake_common.h | 97 int peer, const u8 *eap, size_t eap_len,
|
H A D | eap_sake_common.c | 318 * @eap_len: EAP packet length 319 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len]) 326 int peer, const u8 *eap, size_t eap_len, 333 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; 370 os_memcpy(pos, eap, eap_len); 322 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sake_common.h | 97 int peer, const u8 *eap, size_t eap_len,
|
H A D | eap_sake_common.c | 318 * @eap_len: EAP packet length 319 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len]) 326 int peer, const u8 *eap, size_t eap_len, 333 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; 370 os_memcpy(pos, eap, eap_len); 322 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_ttls.c | 148 size_t eap_len; member in struct:eap_ttls_avp 227 parse->eap_len = dlen; 230 parse->eap_len + dlen); 237 os_memcpy(neweap + parse->eap_len, dpos, dlen); 239 parse->eap_len += dlen; 1079 const u8 *eap, size_t eap_len) 1094 if (eap_len < sizeof(*hdr)) { 1096 "packet (len=%lu)", (unsigned long) eap_len); 1105 if (len > eap_len) { 1108 (unsigned long) len, (unsigned long) eap_len); 1077 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *eap, size_t eap_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_ttls.c | 148 size_t eap_len; member in struct:eap_ttls_avp 227 parse->eap_len = dlen; 230 parse->eap_len + dlen); 237 os_memcpy(neweap + parse->eap_len, dpos, dlen); 239 parse->eap_len += dlen; 1057 const u8 *eap, size_t eap_len) 1072 if (eap_len < sizeof(*hdr)) { 1074 "packet (len=%lu)", (unsigned long) eap_len); 1083 if (len > eap_len) { 1086 (unsigned long) len, (unsigned long) eap_len); 1055 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *eap, size_t eap_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_ttls.c | 148 size_t eap_len; member in struct:eap_ttls_avp 227 parse->eap_len = dlen; 230 parse->eap_len + dlen); 237 os_memcpy(neweap + parse->eap_len, dpos, dlen); 239 parse->eap_len += dlen; 1057 const u8 *eap, size_t eap_len) 1072 if (eap_len < sizeof(*hdr)) { 1074 "packet (len=%lu)", (unsigned long) eap_len); 1083 if (len > eap_len) { 1086 (unsigned long) len, (unsigned long) eap_len); 1055 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *eap, size_t eap_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ttls.c | 148 size_t eap_len; member in struct:eap_ttls_avp 227 parse->eap_len = dlen; 230 parse->eap_len + dlen); 237 os_memcpy(neweap + parse->eap_len, dpos, dlen); 239 parse->eap_len += dlen; 1057 const u8 *eap, size_t eap_len) 1072 if (eap_len < sizeof(*hdr)) { 1074 "packet (len=%lu)", (unsigned long) eap_len); 1083 if (len > eap_len) { 1086 (unsigned long) len, (unsigned long) eap_len); 1055 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *eap, size_t eap_len) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_ttls.c | 1060 size_t eap_len; member in struct:ttls_parse_avp 1077 parse->eap_len = dlen; 1079 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen); 1085 os_memcpy(neweap + parse->eap_len, dpos, dlen); 1087 parse->eap_len += dlen; 1282 parse->eapdata, parse->eap_len); 1285 if (parse->eap_len < sizeof(*hdr)) { 1288 (unsigned long) parse->eap_len, 1293 if (len > parse->eap_len) { 1298 (unsigned long) parse->eap_len); [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_ttls.c | 1063 size_t eap_len; member in struct:ttls_parse_avp 1080 parse->eap_len = dlen; 1082 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen); 1088 os_memcpy(neweap + parse->eap_len, dpos, dlen); 1090 parse->eap_len += dlen; 1285 parse->eapdata, parse->eap_len); 1288 if (parse->eap_len < sizeof(*hdr)) { 1291 (unsigned long) parse->eap_len, 1296 if (len > parse->eap_len) { 1301 (unsigned long) parse->eap_len); [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_ttls.c | 1063 size_t eap_len; member in struct:ttls_parse_avp 1080 parse->eap_len = dlen; 1082 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen); 1088 os_memcpy(neweap + parse->eap_len, dpos, dlen); 1090 parse->eap_len += dlen; 1285 parse->eapdata, parse->eap_len); 1288 if (parse->eap_len < sizeof(*hdr)) { 1291 (unsigned long) parse->eap_len, 1296 if (len > parse->eap_len) { 1301 (unsigned long) parse->eap_len); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_ttls.c | 1063 size_t eap_len; member in struct:ttls_parse_avp 1080 parse->eap_len = dlen; 1082 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen); 1088 os_memcpy(neweap + parse->eap_len, dpos, dlen); 1090 parse->eap_len += dlen; 1285 parse->eapdata, parse->eap_len); 1288 if (parse->eap_len < sizeof(*hdr)) { 1291 (unsigned long) parse->eap_len, 1296 if (len > parse->eap_len) { 1301 (unsigned long) parse->eap_len); [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_1x.c | 638 u16 eap_len; local 647 eap_len = be_to_host16(eap->length); 649 eap->code, eap->identifier, eap_len); 650 if (eap_len < sizeof(*eap)) { 653 } else if (eap_len > len) { 657 } else if (eap_len < len) { 659 "packet", (unsigned long) len - eap_len); 668 handle_eap_response(hapd, sta, eap, eap_len);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_1x.c | 638 u16 eap_len; local 647 eap_len = be_to_host16(eap->length); 649 eap->code, eap->identifier, eap_len); 650 if (eap_len < sizeof(*eap)) { 653 } else if (eap_len > len) { 657 } else if (eap_len < len) { 659 "packet", (unsigned long) len - eap_len); 668 handle_eap_response(hapd, sta, eap, eap_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_1x.c | 638 u16 eap_len; local 647 eap_len = be_to_host16(eap->length); 649 eap->code, eap->identifier, eap_len); 650 if (eap_len < sizeof(*eap)) { 653 } else if (eap_len > len) { 657 } else if (eap_len < len) { 659 "packet", (unsigned long) len - eap_len); 668 handle_eap_response(hapd, sta, eap, eap_len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1405 size_t eap_len; local 1411 eap_key = eap_get_eapKeyData(sm->eap, &eap_len); 1416 if (len > eap_len) { 1419 (unsigned long) len, (unsigned long) eap_len); 1420 return eap_len;
|
/external/wpa_supplicant_8/hostapd/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1442 size_t eap_len; local 1448 eap_key = eap_get_eapKeyData(sm->eap, &eap_len); 1453 if (len > eap_len) { 1456 (unsigned long) len, (unsigned long) eap_len); 1457 return eap_len;
|
/external/wpa_supplicant_8/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1442 size_t eap_len; local 1448 eap_key = eap_get_eapKeyData(sm->eap, &eap_len); 1453 if (len > eap_len) { 1456 (unsigned long) len, (unsigned long) eap_len); 1457 return eap_len;
|