/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
H A D | milenage.h | 20 u8 *ck, u8 *res, size_t *res_len); 26 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | milenage.c | 171 * @res_len: Max length for res; set to used length or 0 on failure 175 u8 *ck, u8 *res, size_t *res_len) 180 if (*res_len < 8) { 181 *res_len = 0; 186 *res_len = 0; 189 *res_len = 8; 266 * @res_len: Variable that will be set to RES length 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 284 *res_len = 8; 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | milenage.h | 14 u8 *ck, u8 *res, size_t *res_len); 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
H A D | tls_internal.c | 342 size_t res_len, ad_len; local 352 &res_len, &ad, &ad_len, need_more_data); 355 out = wpabuf_alloc_ext_data(res, res_len); 385 size_t res_len; local 395 wpabuf_len(in_data), &res_len); 400 out = wpabuf_alloc_ext_data(res, res_len);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | milenage.c | 171 * @res_len: Max length for res; set to used length or 0 on failure 175 u8 *ck, u8 *res, size_t *res_len) 180 if (*res_len < 8) { 181 *res_len = 0; 186 *res_len = 0; 189 *res_len = 8; 266 * @res_len: Variable that will be set to RES length 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 284 *res_len = 8; 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | milenage.h | 14 u8 *ck, u8 *res, size_t *res_len); 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
H A D | tls_internal.c | 342 size_t res_len, ad_len; local 352 &res_len, &ad, &ad_len, need_more_data); 355 out = wpabuf_alloc_ext_data(res, res_len); 385 size_t res_len; local 395 wpabuf_len(in_data), &res_len); 400 out = wpabuf_alloc_ext_data(res, res_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | milenage.c | 171 * @res_len: Max length for res; set to used length or 0 on failure 175 u8 *ck, u8 *res, size_t *res_len) 180 if (*res_len < 8) { 181 *res_len = 0; 186 *res_len = 0; 189 *res_len = 8; 266 * @res_len: Variable that will be set to RES length 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 284 *res_len = 8; 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | milenage.h | 14 u8 *ck, u8 *res, size_t *res_len); 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
H A D | tls_internal.c | 342 size_t res_len, ad_len; local 352 &res_len, &ad, &ad_len, need_more_data); 355 out = wpabuf_alloc_ext_data(res, res_len); 385 size_t res_len; local 395 wpabuf_len(in_data), &res_len); 400 out = wpabuf_alloc_ext_data(res, res_len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
H A D | pcsc_funcs.h | 54 unsigned char *res, size_t *res_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
H A D | wps_common.c | 27 const char *label, u8 *res, size_t res_len) 36 WPA_PUT_BE32(key_bits, res_len * 8); 47 iter = (res_len + SHA256_MAC_LEN - 1) / SHA256_MAC_LEN; 49 left = res_len; 26 wps_kdf(const u8 *key, const u8 *label_prefix, size_t label_prefix_len, const char *label, u8 *res, size_t res_len) argument
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | pcsc_funcs.h | 50 unsigned char *res, size_t *res_len,
|
/external/wpa_supplicant_8/src/utils/ |
H A D | pcsc_funcs.h | 50 unsigned char *res, size_t *res_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | pcsc_funcs.h | 50 unsigned char *res, size_t *res_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.h | 86 u8 *ck, u8 *res, size_t *res_len,
|
H A D | eap_sim_db.c | 60 size_t res_len; member in struct:eap_sim_db_pending::__anon13920::__anon13922 256 entry->u.aka.res_len = (end - start) / 2; 257 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { 259 entry->u.aka.res_len = 0; 262 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) 1156 * @res_len: Buffer for RES length 1176 u8 *ck, u8 *res, size_t *res_len, 1228 *res_len = entry->u.aka.res_len; 1174 eap_sim_db_get_aka_auth(void *priv, const u8 *identity, size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_sim_db.h | 78 u8 *ck, u8 *res, size_t *res_len,
|
H A D | eap_sim_db.c | 55 size_t res_len; member in struct:eap_sim_db_pending::__anon14136::__anon14138 251 entry->u.aka.res_len = (end - start) / 2; 252 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { 254 entry->u.aka.res_len = 0; 257 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) 1151 * @res_len: Buffer for RES length 1171 u8 *ck, u8 *res, size_t *res_len, 1223 *res_len = entry->u.aka.res_len; 1169 eap_sim_db_get_aka_auth(void *priv, const u8 *identity, size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_sim_db.h | 78 u8 *ck, u8 *res, size_t *res_len,
|
H A D | eap_sim_db.c | 55 size_t res_len; member in struct:eap_sim_db_pending::__anon14353::__anon14355 251 entry->u.aka.res_len = (end - start) / 2; 252 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { 254 entry->u.aka.res_len = 0; 257 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) 1151 * @res_len: Buffer for RES length 1171 u8 *ck, u8 *res, size_t *res_len, 1223 *res_len = entry->u.aka.res_len; 1169 eap_sim_db_get_aka_auth(void *priv, const u8 *identity, size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.h | 78 u8 *ck, u8 *res, size_t *res_len,
|
H A D | eap_sim_db.c | 55 size_t res_len; member in struct:eap_sim_db_pending::__anon14572::__anon14574 251 entry->u.aka.res_len = (end - start) / 2; 252 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { 254 entry->u.aka.res_len = 0; 257 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) 1151 * @res_len: Buffer for RES length 1171 u8 *ck, u8 *res, size_t *res_len, 1223 *res_len = entry->u.aka.res_len; 1169 eap_sim_db_get_aka_auth(void *priv, const u8 *identity, size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
/external/ppp/pppd/plugins/pppoatm/ |
H A D | ans.c | 41 static int ans(const char *text,int wanted,void *result,int res_len) argument 114 res_len) < 0) return FATAL;
|
/external/wpa_supplicant_6/wpa_supplicant/ |
H A D | config.c | 100 size_t res_len, *dst_len; local 107 res_len = 0; 111 tmp = wpa_config_parse_string(value, &res_len); 121 (u8 *) tmp, res_len); 124 (u8 *) tmp, res_len); 127 if (data->param3 && res_len < (size_t) data->param3) { 130 (unsigned long) res_len, (long) data->param3); 135 if (data->param4 && res_len > (size_t) data->param4) { 138 (unsigned long) res_len, (long) data->param4); 149 *dst_len = res_len; 1064 size_t res_len; local [all...] |