/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_sim_db.c | 55 size_t res_len; member in struct:eap_sim_db_pending::__anon33703::__anon33705 548 entry->u.aka.res_len = (end - start) / 2; 549 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { 551 entry->u.aka.res_len = 0; 554 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) 1320 * @res_len: Buffer for RES length 1337 u8 *res, size_t *res_len, void *cb_session_ctx) 1378 *res_len = entry->u.aka.res_len; 1335 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | pcsc_funcs.c | 1301 * @res_len: Variable that will be set to RES length 1311 * buffers and res_len is set to length of received RES value. If USIM reports 1317 unsigned char *res, size_t *res_len, 1384 *res_len = *pos++; 1385 os_memcpy(res, pos, *res_len); 1386 pos += *res_len; 1387 wpa_hexdump(MSG_DEBUG, "SCARD: RES", res, *res_len); 1315 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.h | 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_aka.c | 24 size_t res_len; member in struct:eap_aka_data 223 data->res_len = os_strlen(pos) / 2; 224 if (data->res_len > EAP_AKA_RES_MAX_LEN) { 225 data->res_len = 0; 228 if (hexstr2bin(pos, data->res, data->res_len) < 0) 230 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len); 261 data->autn, data->res, &data->res_len, 296 data->res, &data->res_len, data->auts); 307 data->res_len = EAP_AKA_RES_MAX_LEN; 644 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len * [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_sim_db.c | 55 size_t res_len; member in struct:eap_sim_db_pending::__anon33956::__anon33958 548 entry->u.aka.res_len = (end - start) / 2; 549 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { 551 entry->u.aka.res_len = 0; 554 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) 1320 * @res_len: Buffer for RES length 1337 u8 *res, size_t *res_len, void *cb_session_ctx) 1378 *res_len = entry->u.aka.res_len; 1335 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
/external/wpa_supplicant_8/src/utils/ |
H A D | pcsc_funcs.c | 1301 * @res_len: Variable that will be set to RES length 1311 * buffers and res_len is set to length of received RES value. If USIM reports 1317 unsigned char *res, size_t *res_len, 1384 *res_len = *pos++; 1385 os_memcpy(res, pos, *res_len); 1386 pos += *res_len; 1387 wpa_hexdump(MSG_DEBUG, "SCARD: RES", res, *res_len); 1315 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.h | 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_aka.c | 24 size_t res_len; member in struct:eap_aka_data 223 data->res_len = os_strlen(pos) / 2; 224 if (data->res_len > EAP_AKA_RES_MAX_LEN) { 225 data->res_len = 0; 228 if (hexstr2bin(pos, data->res, data->res_len) < 0) 230 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len); 261 data->autn, data->res, &data->res_len, 296 data->res, &data->res_len, data->auts); 307 data->res_len = EAP_AKA_RES_MAX_LEN; 644 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len * [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.c | 55 size_t res_len; member in struct:eap_sim_db_pending::__anon34207::__anon34209 548 entry->u.aka.res_len = (end - start) / 2; 549 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { 551 entry->u.aka.res_len = 0; 554 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) 1320 * @res_len: Buffer for RES length 1337 u8 *res, size_t *res_len, void *cb_session_ctx) 1378 *res_len = entry->u.aka.res_len; 1335 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | pcsc_funcs.c | 1301 * @res_len: Variable that will be set to RES length 1311 * buffers and res_len is set to length of received RES value. If USIM reports 1317 unsigned char *res, size_t *res_len, 1384 *res_len = *pos++; 1385 os_memcpy(res, pos, *res_len); 1386 pos += *res_len; 1387 wpa_hexdump(MSG_DEBUG, "SCARD: RES", res, *res_len); 1315 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | config.c | 61 size_t res_len, *dst_len; local 68 res_len = 0; 72 tmp = wpa_config_parse_string(value, &res_len); 82 (u8 *) tmp, res_len); 85 (u8 *) tmp, res_len); 88 if (data->param3 && res_len < (size_t) data->param3) { 91 (unsigned long) res_len, (long) data->param3); 96 if (data->param4 && res_len > (size_t) data->param4) { 99 (unsigned long) res_len, (long) data->param4); 110 *dst_len = res_len; 1155 size_t res_len; local [all...] |