/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | milenage.c | 171 * @res_len: Max length for res; set to used length or 0 on failure 175 u8 *ck, u8 *res, size_t *res_len) 180 if (*res_len < 8) { 181 *res_len = 0; 186 *res_len = 0; 189 *res_len = 8; 266 * @res_len: Variable that will be set to RES length 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 284 *res_len = 8; 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | tls_internal.c | 366 size_t res_len, ad_len; local 376 &res_len, &ad, &ad_len, need_more_data); 379 out = wpabuf_alloc_ext_data(res, res_len); 409 size_t res_len; local 419 wpabuf_len(in_data), &res_len); 424 out = wpabuf_alloc_ext_data(res, res_len);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | milenage.c | 171 * @res_len: Max length for res; set to used length or 0 on failure 175 u8 *ck, u8 *res, size_t *res_len) 180 if (*res_len < 8) { 181 *res_len = 0; 186 *res_len = 0; 189 *res_len = 8; 266 * @res_len: Variable that will be set to RES length 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 284 *res_len = 8; 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | tls_internal.c | 366 size_t res_len, ad_len; local 376 &res_len, &ad, &ad_len, need_more_data); 379 out = wpabuf_alloc_ext_data(res, res_len); 409 size_t res_len; local 419 wpabuf_len(in_data), &res_len); 424 out = wpabuf_alloc_ext_data(res, res_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | milenage.c | 171 * @res_len: Max length for res; set to used length or 0 on failure 175 u8 *ck, u8 *res, size_t *res_len) 180 if (*res_len < 8) { 181 *res_len = 0; 186 *res_len = 0; 189 *res_len = 8; 266 * @res_len: Variable that will be set to RES length 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 284 *res_len = 8; 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | tls_internal.c | 366 size_t res_len, ad_len; local 376 &res_len, &ad, &ad_len, need_more_data); 379 out = wpabuf_alloc_ext_data(res, res_len); 409 size_t res_len; local 419 wpabuf_len(in_data), &res_len); 424 out = wpabuf_alloc_ext_data(res, res_len);
|
/external/ppp/pppd/plugins/pppoatm/ |
H A D | ans.c | 41 static int ans(const char *text,int wanted,void *result,int res_len) argument 114 res_len) < 0) return FATAL;
|
/external/wpa_supplicant_8/hostapd/ |
H A D | hlr_auc_gw.c | 779 size_t res_len; local 788 res_len = EAP_AKA_RES_MAX_LEN; 800 autn, ik, ck, res, &res_len); 810 res_len = EAP_AKA_RES_MAX_LEN; 837 pos += wpa_snprintf_hex(pos, end - pos, res, res_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 235 u8 *res, size_t res_len) 263 while (res_len) { 268 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len; 271 res_len -= hlen; 805 attr->res_len = alen; 232 prf_prime(const u8 *k, const char *seed1, const u8 *seed2, size_t seed2_len, const u8 *seed3, size_t seed3_len, u8 *res, size_t res_len) argument
|
H A D | ikev2_common.c | 429 size_t *res_len) 512 *res_len = decrypted_len; 425 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
|
H A D | eap_sim_common.h | 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_aka.c | 33 size_t res_len; member in struct:eap_aka_data 791 data->ck, data->res, &data->res_len, sm); 964 if (attr->res == NULL || attr->res_len < data->res_len || 965 attr->res_len_bits != data->res_len * 8 || 966 os_memcmp_const(attr->res, data->res, data->res_len) != 0) { 970 (unsigned long) attr->res_len, 972 (unsigned long) data->res_len * 8);
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | common.c | 596 size_t merge_byte_arrays(u8 *res, size_t res_len, argument 602 os_memset(res, 0, res_len); 605 if (src1_len >= res_len) { 606 os_memcpy(res, src1, res_len); 607 return res_len; 615 if (len + src2_len >= res_len) { 616 os_memcpy(res + len, src2, res_len - len); 617 return res_len;
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_common.c | 25 const char *label, u8 *res, size_t res_len) 34 WPA_PUT_BE32(key_bits, res_len * 8); 45 iter = (res_len + SHA256_MAC_LEN - 1) / SHA256_MAC_LEN; 47 left = res_len; 24 wps_kdf(const u8 *key, const u8 *label_prefix, size_t label_prefix_len, const char *label, u8 *res, size_t res_len) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.c | 235 u8 *res, size_t res_len) 263 while (res_len) { 268 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len; 271 res_len -= hlen; 805 attr->res_len = alen; 232 prf_prime(const u8 *k, const char *seed1, const u8 *seed2, size_t seed2_len, const u8 *seed3, size_t seed3_len, u8 *res, size_t res_len) argument
|
H A D | ikev2_common.c | 429 size_t *res_len) 512 *res_len = decrypted_len; 425 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_aka.c | 33 size_t res_len; member in struct:eap_aka_data 791 data->ck, data->res, &data->res_len, sm); 964 if (attr->res == NULL || attr->res_len < data->res_len || 965 attr->res_len_bits != data->res_len * 8 || 966 os_memcmp_const(attr->res, data->res, data->res_len) != 0) { 970 (unsigned long) attr->res_len, 972 (unsigned long) data->res_len * 8);
|
/external/wpa_supplicant_8/src/utils/ |
H A D | common.c | 596 size_t merge_byte_arrays(u8 *res, size_t res_len, argument 602 os_memset(res, 0, res_len); 605 if (src1_len >= res_len) { 606 os_memcpy(res, src1, res_len); 607 return res_len; 615 if (len + src2_len >= res_len) { 616 os_memcpy(res + len, src2, res_len - len); 617 return res_len;
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_common.c | 25 const char *label, u8 *res, size_t res_len) 34 WPA_PUT_BE32(key_bits, res_len * 8); 45 iter = (res_len + SHA256_MAC_LEN - 1) / SHA256_MAC_LEN; 47 left = res_len; 24 wps_kdf(const u8 *key, const u8 *label_prefix, size_t label_prefix_len, const char *label, u8 *res, size_t res_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 235 u8 *res, size_t res_len) 263 while (res_len) { 268 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len; 271 res_len -= hlen; 805 attr->res_len = alen; 232 prf_prime(const u8 *k, const char *seed1, const u8 *seed2, size_t seed2_len, const u8 *seed3, size_t seed3_len, u8 *res, size_t res_len) argument
|
H A D | ikev2_common.c | 429 size_t *res_len) 512 *res_len = decrypted_len; 425 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_aka.c | 33 size_t res_len; member in struct:eap_aka_data 791 data->ck, data->res, &data->res_len, sm); 964 if (attr->res == NULL || attr->res_len < data->res_len || 965 attr->res_len_bits != data->res_len * 8 || 966 os_memcmp_const(attr->res, data->res, data->res_len) != 0) { 970 (unsigned long) attr->res_len, 972 (unsigned long) data->res_len * 8);
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | common.c | 596 size_t merge_byte_arrays(u8 *res, size_t res_len, argument 602 os_memset(res, 0, res_len); 605 if (src1_len >= res_len) { 606 os_memcpy(res, src1, res_len); 607 return res_len; 615 if (len + src2_len >= res_len) { 616 os_memcpy(res + len, src2, res_len - len); 617 return res_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_common.c | 25 const char *label, u8 *res, size_t res_len) 34 WPA_PUT_BE32(key_bits, res_len * 8); 45 iter = (res_len + SHA256_MAC_LEN - 1) / SHA256_MAC_LEN; 47 left = res_len; 24 wps_kdf(const u8 *key, const u8 *label_prefix, size_t label_prefix_len, const char *label, u8 *res, size_t res_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_aka.c | 24 size_t res_len; member in struct:eap_aka_data 223 data->res_len = os_strlen(pos) / 2; 224 if (data->res_len > EAP_AKA_RES_MAX_LEN) { 225 data->res_len = 0; 228 if (hexstr2bin(pos, data->res, data->res_len) < 0) 230 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len); 261 data->autn, data->res, &data->res_len, 296 data->res, &data->res_len, data->auts); 307 data->res_len = EAP_AKA_RES_MAX_LEN; 644 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len * [all...] |