Searched defs:res_len (Results 26 - 36 of 36) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_sim_db.c55 size_t res_len; member in struct:eap_sim_db_pending::__anon33703::__anon33705
548 entry->u.aka.res_len = (end - start) / 2;
549 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) {
551 entry->u.aka.res_len = 0;
554 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len))
1320 * @res_len: Buffer for RES length
1337 u8 *res, size_t *res_len, void *cb_session_ctx)
1378 *res_len = entry->u.aka.res_len;
1335 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dpcsc_funcs.c1301 * @res_len: Variable that will be set to RES length
1311 * buffers and res_len is set to length of received RES value. If USIM reports
1317 unsigned char *res, size_t *res_len,
1384 *res_len = *pos++;
1385 os_memcpy(res, pos, *res_len);
1386 pos += *res_len;
1387 wpa_hexdump(MSG_DEBUG, "SCARD: RES", res, *res_len);
1315 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.h191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_aka.c24 size_t res_len; member in struct:eap_aka_data
223 data->res_len = os_strlen(pos) / 2;
224 if (data->res_len > EAP_AKA_RES_MAX_LEN) {
225 data->res_len = 0;
228 if (hexstr2bin(pos, data->res, data->res_len) < 0)
230 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len);
261 data->autn, data->res, &data->res_len,
296 data->res, &data->res_len, data->auts);
307 data->res_len = EAP_AKA_RES_MAX_LEN;
644 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len *
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_sim_db.c55 size_t res_len; member in struct:eap_sim_db_pending::__anon33956::__anon33958
548 entry->u.aka.res_len = (end - start) / 2;
549 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) {
551 entry->u.aka.res_len = 0;
554 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len))
1320 * @res_len: Buffer for RES length
1337 u8 *res, size_t *res_len, void *cb_session_ctx)
1378 *res_len = entry->u.aka.res_len;
1335 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
/external/wpa_supplicant_8/src/utils/
H A Dpcsc_funcs.c1301 * @res_len: Variable that will be set to RES length
1311 * buffers and res_len is set to length of received RES value. If USIM reports
1317 unsigned char *res, size_t *res_len,
1384 *res_len = *pos++;
1385 os_memcpy(res, pos, *res_len);
1386 pos += *res_len;
1387 wpa_hexdump(MSG_DEBUG, "SCARD: RES", res, *res_len);
1315 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.h191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_aka.c24 size_t res_len; member in struct:eap_aka_data
223 data->res_len = os_strlen(pos) / 2;
224 if (data->res_len > EAP_AKA_RES_MAX_LEN) {
225 data->res_len = 0;
228 if (hexstr2bin(pos, data->res, data->res_len) < 0)
230 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len);
261 data->autn, data->res, &data->res_len,
296 data->res, &data->res_len, data->auts);
307 data->res_len = EAP_AKA_RES_MAX_LEN;
644 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len *
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_sim_db.c55 size_t res_len; member in struct:eap_sim_db_pending::__anon34207::__anon34209
548 entry->u.aka.res_len = (end - start) / 2;
549 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) {
551 entry->u.aka.res_len = 0;
554 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len))
1320 * @res_len: Buffer for RES length
1337 u8 *res, size_t *res_len, void *cb_session_ctx)
1378 *res_len = entry->u.aka.res_len;
1335 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
/external/wpa_supplicant_8/wpa_supplicant/src/utils/
H A Dpcsc_funcs.c1301 * @res_len: Variable that will be set to RES length
1311 * buffers and res_len is set to length of received RES value. If USIM reports
1317 unsigned char *res, size_t *res_len,
1384 *res_len = *pos++;
1385 os_memcpy(res, pos, *res_len);
1386 pos += *res_len;
1387 wpa_hexdump(MSG_DEBUG, "SCARD: RES", res, *res_len);
1315 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
/external/wpa_supplicant_8/wpa_supplicant/
H A Dconfig.c61 size_t res_len, *dst_len; local
68 res_len = 0;
72 tmp = wpa_config_parse_string(value, &res_len);
82 (u8 *) tmp, res_len);
85 (u8 *) tmp, res_len);
88 if (data->param3 && res_len < (size_t) data->param3) {
91 (unsigned long) res_len, (long) data->param3);
96 if (data->param4 && res_len > (size_t) data->param4) {
99 (unsigned long) res_len, (long) data->param4);
110 *dst_len = res_len;
1155 size_t res_len; local
[all...]

Completed in 1512 milliseconds

12