Searched defs:plen (Results 1 - 25 of 228) sorted by last modified time

12345678910

/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dsha1.c127 size_t pos, plen; local
142 plen = buf_len - pos;
143 if (plen >= SHA1_MAC_LEN) {
150 os_memcpy(&buf[pos], hash, plen);
176 size_t pos, plen; local
199 plen = buf_len - pos;
201 if (plen >= SHA1_MAC_LEN) {
205 os_memcpy(&buf[pos], hash, plen);
361 size_t left = buflen, plen; local
368 plen
[all...]
H A Dsha256.c126 size_t pos, plen; local
144 plen = buf_len - pos;
146 if (plen >= SHA256_MAC_LEN) {
152 os_memcpy(&buf[pos], hash, plen);
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/
H A Ddriver_nl80211.c914 int len, plen; local
917 plen = len - sizeof(*h);
918 if (len > left || plen < 0) {
920 "len=%d left=%d plen=%d",
921 len, left, plen);
928 h, plen);
932 h, plen);
H A Ddriver_ralink.c815 int len, plen; local
818 plen = len - sizeof(*h);
819 if (len > left || plen < 0) {
821 "len=%d left=%d plen=%d", len, left, plen);
828 plen);
H A Ddriver_wext.c818 int len, plen; local
821 plen = len - sizeof(*h);
822 if (len > left || plen < 0) {
824 "len=%d left=%d plen=%d",
825 len, left, plen);
832 h, plen);
836 h, plen);
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_common.c26 * @plen: Pointer to variable to contain the returned payload length
33 * caller can just use the returned payload pointer (into *plen) for processing
38 const struct wpabuf *msg, size_t *plen)
78 *plen = len - sizeof(*hdr) - 8;
85 *plen = len - sizeof(*hdr) - 1;
37 eap_hdr_validate(int vendor, EapType eap_type, const struct wpabuf *msg, size_t *plen) argument
H A Deap_peap_common.c26 size_t pos, plen; local
77 plen = buf_len - pos;
79 if (plen >= SHA1_MAC_LEN) {
83 os_memcpy(&buf[pos], hash, plen);
H A Deap_sake_common.c220 size_t pos, plen; local
237 plen = buf_len - pos;
238 if (plen >= SHA1_MAC_LEN) {
245 os_memcpy(&buf[pos], hash, plen);
H A Deap_sim_common.c506 size_t alen, plen, i, list_len; local
627 plen = WPA_GET_BE16(apos);
630 if (plen > alen) {
634 (unsigned long) plen,
640 attr->identity_len = plen;
765 plen = apos[0] * 256 + apos[1];
766 if (plen > alen - 2) {
770 (unsigned long) plen,
775 attr->next_pseudonym_len = plen;
785 plen
[all...]
H A Dikev2_common.c324 int plen, pdatalen; local
334 plen = WPA_GET_BE16(phdr->payload_length);
335 if (plen < (int) sizeof(*phdr) || pos + plen > end) {
337 "length %d", plen);
343 phdr->next_payload, phdr->flags, plen);
346 pdatalen = plen - sizeof(*phdr);
412 pos + plen == end) {
423 pos += plen;
602 size_t plen; local
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap.c1063 size_t plen; local
1076 plen = be_to_host16(hdr->length);
1077 if (plen > wpabuf_len(req)) {
1079 "(len=%lu plen=%lu)",
1081 (unsigned long) plen);
1090 md5_vector(1, addr, &plen, sm->req_md5);
1095 if (plen < sizeof(*hdr) + 1) {
1104 if (plen < sizeof(*hdr) + 8) {
1106 "expanded EAP-Packet (plen=%lu)",
1107 (unsigned long) plen);
[all...]
H A Deap_gtc.c57 size_t password_len, identity_len, len, plen; local
104 plen = password_len;
109 plen += 9 + identity_len + 1;
110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
122 1, plen);
H A Deap_ikev2.c142 size_t send_len, plen, icv_len = 0; local
165 plen = 1 + send_len;
167 plen += 4;
181 plen += icv_len;
183 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen,
H A Deap_pax.c101 u8 id, u8 op_code, size_t plen)
107 sizeof(*pax) + plen, EAP_CODE_RESPONSE, id);
130 size_t left, plen; local
196 plen = 2 + EAP_PAX_RAND_LEN + 2 + data->cid_len + 2 + EAP_PAX_MAC_LEN +
198 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen);
100 eap_pax_alloc_resp(const struct eap_pax_hdr *req, u8 id, u8 op_code, size_t plen) argument
H A Deap_psk.c191 size_t buflen, left, data_len, len, plen; local
319 plen = sizeof(*hdr4) + 4 + 16 + data_len;
320 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen,
H A Deap_sake.c125 size_t plen; local
127 plen = length + sizeof(struct eap_sake_hdr);
129 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
H A Deap_tnc.c94 size_t send_len, plen; local
111 plen = 1 + send_len;
113 plen += 4;
114 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen,
H A Deap_wsc.c171 size_t send_len, plen; local
187 plen = 2 + send_len;
189 plen += 2;
190 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen,
H A Dikev2.c346 int plen; local
352 plen = ikev2_parse_proposal(&prop, pos, end);
353 if (plen < 0)
363 pos += plen;
883 size_t plen; local
921 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t;
922 WPA_PUT_BE16(t->transform_length, plen);
941 plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p;
942 WPA_PUT_BE16(p->proposal_length, plen);
944 plen
955 size_t plen; local
991 size_t plen; local
1010 size_t plen; local
1036 size_t plen; local
1076 size_t plen; local
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap.c853 size_t plen; local
870 plen = be_to_host16(hdr->length);
871 if (plen > wpabuf_len(resp)) {
873 "(len=%lu plen=%lu)",
875 (unsigned long) plen);
884 if (plen > sizeof(*hdr)) {
888 if (plen < sizeof(*hdr) + 8) {
890 "expanded EAP-Packet (plen=%lu)",
891 (unsigned long) plen);
H A Deap_ikev2.c140 size_t send_len, plen, icv_len = 0; local
155 plen = 1 + send_len;
157 plen += 4;
171 plen += icv_len;
173 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen,
H A Deap_md5.c108 size_t plen; local
119 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &plen);
120 if (pos == NULL || *pos != CHAP_MD5_LEN || plen < 1 + CHAP_MD5_LEN)
H A Deap_sake.c108 size_t plen; local
110 plen = sizeof(struct eap_sake_hdr) + length;
112 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen,
134 size_t plen; local
138 plen = 4;
140 plen += 2 + data->serverid_len;
141 msg = eap_sake_build_msg(data, id, plen, EAP_SAKE_SUBTYPE_IDENTITY);
165 size_t plen; local
177 plen = 2 + EAP_SAKE_RAND_LEN;
179 plen
[all...]
H A Deap_tls_common.c114 size_t send_len, plen; local
133 plen = 1 + send_len;
135 plen += 4;
137 req = eap_msg_alloc(EAP_VENDOR_IETF, eap_type, plen,
H A Deap_tnc.c191 size_t send_len, plen; local
206 plen = 1 + send_len;
208 plen += 4;
209 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen,

Completed in 231 milliseconds

12345678910