Searched refs:eap_len (Results 1 - 25 of 36) sorted by relevance

12

/external/wpa_supplicant/
H A Deap_sake_common.h101 int peer, const u8 *eap, size_t eap_len,
H A Deap_sake_common.c317 * @eap_len: EAP packet length
318 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len])
325 int peer, const u8 *eap, size_t eap_len,
332 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len;
369 os_memcpy(pos, eap, eap_len);
321 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
H A Deap_ttls.c1083 size_t resp_len, eap_len = 0, len_decrypted = 0, len, buf_len, left; local
1276 eap_len = dlen;
1279 eap_len + dlen);
1287 os_memcpy(neweap + eap_len, dpos, dlen);
1289 eap_len += dlen;
1346 eapdata, eap_len);
1349 if (eap_len < sizeof(*hdr)) {
1352 "- dropped", (unsigned long) eap_len,
1358 if (len > eap_len) {
1363 (unsigned long) eap_len);
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_sake_common.h97 int peer, const u8 *eap, size_t eap_len,
H A Deap_sake_common.c318 * @eap_len: EAP packet length
319 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len])
326 int peer, const u8 *eap, size_t eap_len,
333 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len;
370 os_memcpy(pos, eap, eap_len);
322 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sake_common.h97 int peer, const u8 *eap, size_t eap_len,
H A Deap_sake_common.c318 * @eap_len: EAP packet length
319 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len])
326 int peer, const u8 *eap, size_t eap_len,
333 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len;
370 os_memcpy(pos, eap, eap_len);
322 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sake_common.h97 int peer, const u8 *eap, size_t eap_len,
H A Deap_sake_common.c318 * @eap_len: EAP packet length
319 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len])
326 int peer, const u8 *eap, size_t eap_len,
333 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len;
370 os_memcpy(pos, eap, eap_len);
322 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sake_common.h97 int peer, const u8 *eap, size_t eap_len,
H A Deap_sake_common.c318 * @eap_len: EAP packet length
319 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len])
326 int peer, const u8 *eap, size_t eap_len,
333 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len;
370 os_memcpy(pos, eap, eap_len);
322 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_ttls.c148 size_t eap_len; member in struct:eap_ttls_avp
227 parse->eap_len = dlen;
230 parse->eap_len + dlen);
237 os_memcpy(neweap + parse->eap_len, dpos, dlen);
239 parse->eap_len += dlen;
1079 const u8 *eap, size_t eap_len)
1094 if (eap_len < sizeof(*hdr)) {
1096 "packet (len=%lu)", (unsigned long) eap_len);
1105 if (len > eap_len) {
1108 (unsigned long) len, (unsigned long) eap_len);
1077 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *eap, size_t eap_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_ttls.c148 size_t eap_len; member in struct:eap_ttls_avp
227 parse->eap_len = dlen;
230 parse->eap_len + dlen);
237 os_memcpy(neweap + parse->eap_len, dpos, dlen);
239 parse->eap_len += dlen;
1057 const u8 *eap, size_t eap_len)
1072 if (eap_len < sizeof(*hdr)) {
1074 "packet (len=%lu)", (unsigned long) eap_len);
1083 if (len > eap_len) {
1086 (unsigned long) len, (unsigned long) eap_len);
1055 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *eap, size_t eap_len) argument
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_ttls.c148 size_t eap_len; member in struct:eap_ttls_avp
227 parse->eap_len = dlen;
230 parse->eap_len + dlen);
237 os_memcpy(neweap + parse->eap_len, dpos, dlen);
239 parse->eap_len += dlen;
1057 const u8 *eap, size_t eap_len)
1072 if (eap_len < sizeof(*hdr)) {
1074 "packet (len=%lu)", (unsigned long) eap_len);
1083 if (len > eap_len) {
1086 (unsigned long) len, (unsigned long) eap_len);
1055 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *eap, size_t eap_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_ttls.c148 size_t eap_len; member in struct:eap_ttls_avp
227 parse->eap_len = dlen;
230 parse->eap_len + dlen);
237 os_memcpy(neweap + parse->eap_len, dpos, dlen);
239 parse->eap_len += dlen;
1057 const u8 *eap, size_t eap_len)
1072 if (eap_len < sizeof(*hdr)) {
1074 "packet (len=%lu)", (unsigned long) eap_len);
1083 if (len > eap_len) {
1086 (unsigned long) len, (unsigned long) eap_len);
1055 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *eap, size_t eap_len) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_ttls.c1060 size_t eap_len; member in struct:ttls_parse_avp
1077 parse->eap_len = dlen;
1079 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen);
1085 os_memcpy(neweap + parse->eap_len, dpos, dlen);
1087 parse->eap_len += dlen;
1282 parse->eapdata, parse->eap_len);
1285 if (parse->eap_len < sizeof(*hdr)) {
1288 (unsigned long) parse->eap_len,
1293 if (len > parse->eap_len) {
1298 (unsigned long) parse->eap_len);
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_ttls.c1063 size_t eap_len; member in struct:ttls_parse_avp
1080 parse->eap_len = dlen;
1082 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen);
1088 os_memcpy(neweap + parse->eap_len, dpos, dlen);
1090 parse->eap_len += dlen;
1285 parse->eapdata, parse->eap_len);
1288 if (parse->eap_len < sizeof(*hdr)) {
1291 (unsigned long) parse->eap_len,
1296 if (len > parse->eap_len) {
1301 (unsigned long) parse->eap_len);
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_ttls.c1063 size_t eap_len; member in struct:ttls_parse_avp
1080 parse->eap_len = dlen;
1082 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen);
1088 os_memcpy(neweap + parse->eap_len, dpos, dlen);
1090 parse->eap_len += dlen;
1285 parse->eapdata, parse->eap_len);
1288 if (parse->eap_len < sizeof(*hdr)) {
1291 (unsigned long) parse->eap_len,
1296 if (len > parse->eap_len) {
1301 (unsigned long) parse->eap_len);
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_ttls.c1063 size_t eap_len; member in struct:ttls_parse_avp
1080 parse->eap_len = dlen;
1082 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen);
1088 os_memcpy(neweap + parse->eap_len, dpos, dlen);
1090 parse->eap_len += dlen;
1285 parse->eapdata, parse->eap_len);
1288 if (parse->eap_len < sizeof(*hdr)) {
1291 (unsigned long) parse->eap_len,
1296 if (len > parse->eap_len) {
1301 (unsigned long) parse->eap_len);
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_1x.c638 u16 eap_len; local
647 eap_len = be_to_host16(eap->length);
649 eap->code, eap->identifier, eap_len);
650 if (eap_len < sizeof(*eap)) {
653 } else if (eap_len > len) {
657 } else if (eap_len < len) {
659 "packet", (unsigned long) len - eap_len);
668 handle_eap_response(hapd, sta, eap, eap_len);
/external/wpa_supplicant_8/src/ap/
H A Dieee802_1x.c638 u16 eap_len; local
647 eap_len = be_to_host16(eap->length);
649 eap->code, eap->identifier, eap_len);
650 if (eap_len < sizeof(*eap)) {
653 } else if (eap_len > len) {
657 } else if (eap_len < len) {
659 "packet", (unsigned long) len - eap_len);
668 handle_eap_response(hapd, sta, eap, eap_len);
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_1x.c638 u16 eap_len; local
647 eap_len = be_to_host16(eap->length);
649 eap->code, eap->identifier, eap_len);
650 if (eap_len < sizeof(*eap)) {
653 } else if (eap_len > len) {
657 } else if (eap_len < len) {
659 "packet", (unsigned long) len - eap_len);
668 handle_eap_response(hapd, sta, eap, eap_len);
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/
H A Deapol_supp_sm.c1405 size_t eap_len; local
1411 eap_key = eap_get_eapKeyData(sm->eap, &eap_len);
1416 if (len > eap_len) {
1419 (unsigned long) len, (unsigned long) eap_len);
1420 return eap_len;
/external/wpa_supplicant_8/hostapd/src/eapol_supp/
H A Deapol_supp_sm.c1442 size_t eap_len; local
1448 eap_key = eap_get_eapKeyData(sm->eap, &eap_len);
1453 if (len > eap_len) {
1456 (unsigned long) len, (unsigned long) eap_len);
1457 return eap_len;
/external/wpa_supplicant_8/src/eapol_supp/
H A Deapol_supp_sm.c1442 size_t eap_len; local
1448 eap_key = eap_get_eapKeyData(sm->eap, &eap_len);
1453 if (len > eap_len) {
1456 (unsigned long) len, (unsigned long) eap_len);
1457 return eap_len;

Completed in 537 milliseconds

12