/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_sake_common.c | 318 * @eap_len: EAP packet length 319 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len]) 326 int peer, const u8 *eap, size_t eap_len, 333 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; 370 os_memcpy(pos, eap, eap_len); 322 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sake_common.c | 312 * @eap_len: EAP packet length 313 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len]) 320 int peer, const u8 *eap, size_t eap_len, 327 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; 364 os_memcpy(pos, eap, eap_len); 316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sake_common.c | 312 * @eap_len: EAP packet length 313 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len]) 320 int peer, const u8 *eap, size_t eap_len, 327 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; 364 os_memcpy(pos, eap, eap_len); 316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sake_common.c | 312 * @eap_len: EAP packet length 313 * @mic_pos: MIC position in the EAP packet (must be [eap .. eap + eap_len]) 320 int peer, const u8 *eap, size_t eap_len, 327 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; 364 os_memcpy(pos, eap, eap_len); 316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_ttls.c | 1060 size_t eap_len; member in struct:ttls_parse_avp 1077 parse->eap_len = dlen; 1079 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen); 1085 os_memcpy(neweap + parse->eap_len, dpos, dlen); 1087 parse->eap_len += dlen; 1282 parse->eapdata, parse->eap_len); 1285 if (parse->eap_len < sizeof(*hdr)) { 1288 (unsigned long) parse->eap_len, 1293 if (len > parse->eap_len) { 1298 (unsigned long) parse->eap_len); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_ttls.c | 148 size_t eap_len; member in struct:eap_ttls_avp 227 parse->eap_len = dlen; 230 parse->eap_len + dlen); 237 os_memcpy(neweap + parse->eap_len, dpos, dlen); 239 parse->eap_len += dlen; 1079 const u8 *eap, size_t eap_len) 1094 if (eap_len < sizeof(*hdr)) { 1096 "packet (len=%lu)", (unsigned long) eap_len); 1105 if (len > eap_len) { 1108 (unsigned long) len, (unsigned long) eap_len); 1077 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *eap, size_t eap_len) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
H A D | radius.c | 545 u8 *radius_msg_get_eap(struct radius_msg *msg, size_t *eap_len) argument 578 if (eap_len) 579 *eap_len = len;
|
H A D | radius_server.c | 489 size_t eap_len; local 551 eap = radius_msg_get_eap(msg, &eap_len); 560 RADIUS_DUMP("Received EAP data", eap, eap_len); 570 sess->eap_if->eapRespData = wpabuf_alloc_ext_data(eap, eap_len);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_1x.c | 668 u16 eap_len; local 677 eap_len = be_to_host16(eap->length); 679 eap->code, eap->identifier, eap_len); 680 if (eap_len < sizeof(*eap)) { 683 } else if (eap_len > len) { 687 } else if (eap_len < len) { 689 "packet", (unsigned long) len - eap_len); 698 handle_eap_response(hapd, sta, eap, eap_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_ttls.c | 783 size_t eap_len; member in struct:ttls_parse_avp 800 parse->eap_len = dlen; 802 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen); 808 os_memcpy(neweap + parse->eap_len, dpos, dlen); 810 parse->eap_len += dlen; 1005 parse->eapdata, parse->eap_len); 1008 if (parse->eap_len < sizeof(*hdr)) { 1011 (unsigned long) parse->eap_len, 1016 if (len > parse->eap_len) { 1021 (unsigned long) parse->eap_len); [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_ttls.c | 130 size_t eap_len; member in struct:eap_ttls_avp 209 parse->eap_len = dlen; 212 parse->eap_len + dlen); 219 os_memcpy(neweap + parse->eap_len, dpos, dlen); 221 parse->eap_len += dlen; 900 const u8 *eap, size_t eap_len) 915 if (eap_len < sizeof(*hdr)) { 917 "packet (len=%lu)", (unsigned long) eap_len); 926 if (len > eap_len) { 929 (unsigned long) len, (unsigned long) eap_len); 898 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *eap, size_t eap_len) argument [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_1x.c | 668 u16 eap_len; local 677 eap_len = be_to_host16(eap->length); 679 eap->code, eap->identifier, eap_len); 680 if (eap_len < sizeof(*eap)) { 683 } else if (eap_len > len) { 687 } else if (eap_len < len) { 689 "packet", (unsigned long) len - eap_len); 698 handle_eap_response(hapd, sta, eap, eap_len);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_ttls.c | 783 size_t eap_len; member in struct:ttls_parse_avp 800 parse->eap_len = dlen; 802 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen); 808 os_memcpy(neweap + parse->eap_len, dpos, dlen); 810 parse->eap_len += dlen; 1005 parse->eapdata, parse->eap_len); 1008 if (parse->eap_len < sizeof(*hdr)) { 1011 (unsigned long) parse->eap_len, 1016 if (len > parse->eap_len) { 1021 (unsigned long) parse->eap_len); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_ttls.c | 130 size_t eap_len; member in struct:eap_ttls_avp 209 parse->eap_len = dlen; 212 parse->eap_len + dlen); 219 os_memcpy(neweap + parse->eap_len, dpos, dlen); 221 parse->eap_len += dlen; 900 const u8 *eap, size_t eap_len) 915 if (eap_len < sizeof(*hdr)) { 917 "packet (len=%lu)", (unsigned long) eap_len); 926 if (len > eap_len) { 929 (unsigned long) len, (unsigned long) eap_len); 898 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *eap, size_t eap_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_1x.c | 668 u16 eap_len; local 677 eap_len = be_to_host16(eap->length); 679 eap->code, eap->identifier, eap_len); 680 if (eap_len < sizeof(*eap)) { 683 } else if (eap_len > len) { 687 } else if (eap_len < len) { 689 "packet", (unsigned long) len - eap_len); 698 handle_eap_response(hapd, sta, eap, eap_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_ttls.c | 783 size_t eap_len; member in struct:ttls_parse_avp 800 parse->eap_len = dlen; 802 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen); 808 os_memcpy(neweap + parse->eap_len, dpos, dlen); 810 parse->eap_len += dlen; 1005 parse->eapdata, parse->eap_len); 1008 if (parse->eap_len < sizeof(*hdr)) { 1011 (unsigned long) parse->eap_len, 1016 if (len > parse->eap_len) { 1021 (unsigned long) parse->eap_len); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ttls.c | 130 size_t eap_len; member in struct:eap_ttls_avp 209 parse->eap_len = dlen; 212 parse->eap_len + dlen); 219 os_memcpy(neweap + parse->eap_len, dpos, dlen); 221 parse->eap_len += dlen; 900 const u8 *eap, size_t eap_len) 915 if (eap_len < sizeof(*hdr)) { 917 "packet (len=%lu)", (unsigned long) eap_len); 926 if (len > eap_len) { 929 (unsigned long) len, (unsigned long) eap_len); 898 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, const u8 *eap, size_t eap_len) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1405 size_t eap_len; local 1411 eap_key = eap_get_eapKeyData(sm->eap, &eap_len); 1416 if (len > eap_len) { 1419 (unsigned long) len, (unsigned long) eap_len); 1420 return eap_len;
|
/external/wpa_supplicant_8/hostapd/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1420 size_t eap_len; local 1426 eap_key = eap_get_eapKeyData(sm->eap, &eap_len); 1431 if (len > eap_len) { 1434 (unsigned long) len, (unsigned long) eap_len); 1435 return eap_len;
|
/external/wpa_supplicant_8/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1420 size_t eap_len; local 1426 eap_key = eap_get_eapKeyData(sm->eap, &eap_len); 1431 if (len > eap_len) { 1434 (unsigned long) len, (unsigned long) eap_len); 1435 return eap_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1420 size_t eap_len; local 1426 eap_key = eap_get_eapKeyData(sm->eap, &eap_len); 1431 if (len > eap_len) { 1434 (unsigned long) len, (unsigned long) eap_len); 1435 return eap_len;
|