/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | sha1.c | 127 size_t pos, plen; local 142 plen = buf_len - pos; 143 if (plen >= SHA1_MAC_LEN) { 150 os_memcpy(&buf[pos], hash, plen); 176 size_t pos, plen; local 199 plen = buf_len - pos; 201 if (plen >= SHA1_MAC_LEN) { 205 os_memcpy(&buf[pos], hash, plen); 361 size_t left = buflen, plen; local 368 plen [all...] |
H A D | sha256.c | 126 size_t pos, plen; local 144 plen = buf_len - pos; 146 if (plen >= SHA256_MAC_LEN) { 152 os_memcpy(&buf[pos], hash, plen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
H A D | driver_nl80211.c | 914 int len, plen; local 917 plen = len - sizeof(*h); 918 if (len > left || plen < 0) { 920 "len=%d left=%d plen=%d", 921 len, left, plen); 928 h, plen); 932 h, plen);
|
H A D | driver_ralink.c | 815 int len, plen; local 818 plen = len - sizeof(*h); 819 if (len > left || plen < 0) { 821 "len=%d left=%d plen=%d", len, left, plen); 828 plen);
|
H A D | driver_wext.c | 818 int len, plen; local 821 plen = len - sizeof(*h); 822 if (len > left || plen < 0) { 824 "len=%d left=%d plen=%d", 825 len, left, plen); 832 h, plen); 836 h, plen);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_common.c | 26 * @plen: Pointer to variable to contain the returned payload length 33 * caller can just use the returned payload pointer (into *plen) for processing 38 const struct wpabuf *msg, size_t *plen) 78 *plen = len - sizeof(*hdr) - 8; 85 *plen = len - sizeof(*hdr) - 1; 37 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
|
H A D | eap_peap_common.c | 26 size_t pos, plen; local 77 plen = buf_len - pos; 79 if (plen >= SHA1_MAC_LEN) { 83 os_memcpy(&buf[pos], hash, plen);
|
H A D | eap_sake_common.c | 220 size_t pos, plen; local 237 plen = buf_len - pos; 238 if (plen >= SHA1_MAC_LEN) { 245 os_memcpy(&buf[pos], hash, plen);
|
H A D | eap_sim_common.c | 506 size_t alen, plen, i, list_len; local 627 plen = WPA_GET_BE16(apos); 630 if (plen > alen) { 634 (unsigned long) plen, 640 attr->identity_len = plen; 765 plen = apos[0] * 256 + apos[1]; 766 if (plen > alen - 2) { 770 (unsigned long) plen, 775 attr->next_pseudonym_len = plen; 785 plen [all...] |
H A D | ikev2_common.c | 324 int plen, pdatalen; local 334 plen = WPA_GET_BE16(phdr->payload_length); 335 if (plen < (int) sizeof(*phdr) || pos + plen > end) { 337 "length %d", plen); 343 phdr->next_payload, phdr->flags, plen); 346 pdatalen = plen - sizeof(*phdr); 412 pos + plen == end) { 423 pos += plen; 602 size_t plen; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 1063 size_t plen; local 1076 plen = be_to_host16(hdr->length); 1077 if (plen > wpabuf_len(req)) { 1079 "(len=%lu plen=%lu)", 1081 (unsigned long) plen); 1090 md5_vector(1, addr, &plen, sm->req_md5); 1095 if (plen < sizeof(*hdr) + 1) { 1104 if (plen < sizeof(*hdr) + 8) { 1106 "expanded EAP-Packet (plen=%lu)", 1107 (unsigned long) plen); [all...] |
H A D | eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 104 plen = password_len; 109 plen += 9 + identity_len + 1; 110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 122 1, plen);
|
H A D | eap_ikev2.c | 142 size_t send_len, plen, icv_len = 0; local 165 plen = 1 + send_len; 167 plen += 4; 181 plen += icv_len; 183 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen,
|
H A D | eap_pax.c | 101 u8 id, u8 op_code, size_t plen) 107 sizeof(*pax) + plen, EAP_CODE_RESPONSE, id); 130 size_t left, plen; local 196 plen = 2 + EAP_PAX_RAND_LEN + 2 + data->cid_len + 2 + EAP_PAX_MAC_LEN + 198 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); 100 eap_pax_alloc_resp(const struct eap_pax_hdr *req, u8 id, u8 op_code, size_t plen) argument
|
H A D | eap_psk.c | 191 size_t buflen, left, data_len, len, plen; local 319 plen = sizeof(*hdr4) + 4 + 16 + data_len; 320 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen,
|
H A D | eap_sake.c | 125 size_t plen; local 127 plen = length + sizeof(struct eap_sake_hdr); 129 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
|
H A D | eap_tnc.c | 94 size_t send_len, plen; local 111 plen = 1 + send_len; 113 plen += 4; 114 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen,
|
H A D | eap_wsc.c | 171 size_t send_len, plen; local 187 plen = 2 + send_len; 189 plen += 2; 190 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen,
|
H A D | ikev2.c | 346 int plen; local 352 plen = ikev2_parse_proposal(&prop, pos, end); 353 if (plen < 0) 363 pos += plen; 883 size_t plen; local 921 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t; 922 WPA_PUT_BE16(t->transform_length, plen); 941 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p; 942 WPA_PUT_BE16(p->proposal_length, plen); 944 plen 955 size_t plen; local 991 size_t plen; local 1010 size_t plen; local 1036 size_t plen; local 1076 size_t plen; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap.c | 853 size_t plen; local 870 plen = be_to_host16(hdr->length); 871 if (plen > wpabuf_len(resp)) { 873 "(len=%lu plen=%lu)", 875 (unsigned long) plen); 884 if (plen > sizeof(*hdr)) { 888 if (plen < sizeof(*hdr) + 8) { 890 "expanded EAP-Packet (plen=%lu)", 891 (unsigned long) plen);
|
H A D | eap_ikev2.c | 140 size_t send_len, plen, icv_len = 0; local 155 plen = 1 + send_len; 157 plen += 4; 171 plen += icv_len; 173 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen,
|
H A D | eap_md5.c | 108 size_t plen; local 119 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen); 120 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
|
H A D | eap_sake.c | 108 size_t plen; local 110 plen = sizeof(struct eap_sake_hdr) + length; 112 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen, 134 size_t plen; local 138 plen = 4; 140 plen += 2 + data->serverid_len; 141 msg = eap_sake_build_msg(data, id, plen, EAP_SAKE_SUBTYPE_IDENTITY); 165 size_t plen; local 177 plen = 2 + EAP_SAKE_RAND_LEN; 179 plen [all...] |
H A D | eap_tls_common.c | 114 size_t send_len, plen; local 133 plen = 1 + send_len; 135 plen += 4; 137 req = eap_msg_alloc(EAP_VENDOR_IETF, eap_type, plen,
|
H A D | eap_tnc.c | 191 size_t send_len, plen; local 206 plen = 1 + send_len; 208 plen += 4; 209 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen,
|