Searched defs:len (Results 151 - 175 of 5216) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_peap_common.c25 size_t len[5]; local
28 len[0] = 0;
30 len[1] = label_len;
32 len[2] = seed_len;
47 len[3] = 1;
49 len[4] = 2;
63 len[3] = 1;
65 len[4] = 1;
72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0)
81 len[
[all...]
H A Deap_pwd_common.c26 void eap_pwd_h_update(struct crypto_hash *hash, const u8 *data, size_t len) argument
28 crypto_hash_update(hash, data, len);
34 size_t len = SHA256_MAC_LEN; local
35 crypto_hash_finish(hash, digest, &len);
46 size_t resultbytelen, len = 0, mdlen; local
51 while (len < resultbytelen) {
66 if ((len + mdlen) > resultbytelen)
67 os_memcpy(result + len, digest, resultbytelen - len);
69 os_memcpy(result + len, diges
[all...]
H A Deap_sake_common.c156 * @len: Payload length
160 int eap_sake_parse_attributes(const u8 *buf, size_t len, argument
163 const u8 *pos = buf, *end = buf + len;
218 size_t len[4]; local
221 len[0] = label_len;
223 len[1] = data_len;
225 len[2] = data2_len;
227 len[3] = 1;
233 hmac_sha1_vector(key, key_len, 4, addr, len,
237 hmac_sha1_vector(key, key_len, 4, addr, len,
378 eap_sake_add_attr(struct wpabuf *buf, u8 type, const u8 *data, size_t len) argument
386 os_memset(wpabuf_put(buf, len), 0, len); local
[all...]
H A Deap_sim_common.c35 size_t len[5]; local
38 len[0] = identity_len;
40 len[1] = num_chal * EAP_SIM_KC_LEN;
42 len[2] = EAP_SIM_NONCE_MT_LEN;
44 len[3] = ver_list_len;
46 len[4] = 2;
51 sha1_vector(5, addr, len, mk);
60 size_t len[3]; local
63 len[0] = identity_len;
65 len[
116 size_t len[4]; local
170 size_t len[2]; local
210 size_t len[2]; local
238 size_t len[5]; local
365 size_t len[2]; local
405 size_t len[2]; local
433 size_t len[5]; local
1050 eap_sim_msg_add_full(struct eap_sim_msg *msg, u8 attr, const u8 *data, size_t len) argument
1074 eap_sim_msg_add(struct eap_sim_msg *msg, u8 attr, u16 value, const u8 *data, size_t len) argument
[all...]
H A Dikev2_common.c96 size_t num_elem, const u8 *addr[], const size_t *len,
101 hmac_sha1_vector(key, key_len, num_elem, addr, len, hash);
104 hmac_md5_vector(key, key_len, num_elem, addr, len, hash);
122 size_t len[3]; local
132 len[0] = hash_len;
134 len[1] = data_len;
136 len[2] = 1;
145 &len[1], hash);
147 res = ikev2_prf_hash(alg, key, key_len, 3, addr, len,
177 const u8 *plain, u8 *crypt, size_t len)
95 ikev2_prf_hash(int alg, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *hash) argument
176 ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *plain, u8 *crypt, size_t len) argument
211 ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *crypt, u8 *plain, size_t len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap.c1253 "(len=%lu plen=%lu)",
1359 size_t len = data->peer_cert.hash_len * 2 + 1; local
1360 hash_hex = os_malloc(len);
1362 wpa_snprintf_hex(hash_hex, len,
1602 int len, ret; local
1607 len = os_snprintf(buf, buflen,
1610 if (len < 0 || (size_t) len >= buflen)
1626 ret = os_snprintf(buf + len, buflen - len,
1986 eap_get_config_identity(struct eap_sm *sm, size_t *len) argument
2023 eap_get_config_password(struct eap_sm *sm, size_t *len) argument
2050 eap_get_config_password2(struct eap_sm *sm, size_t *len, int *hash) argument
2078 eap_get_config_new_password(struct eap_sm *sm, size_t *len) argument
2094 eap_get_config_otp(struct eap_sm *sm, size_t *len) argument
2227 eap_get_eapSessionId(struct eap_sm *sm, size_t *len) argument
2250 eap_get_eapKeyData(struct eap_sm *sm, size_t *len) argument
2425 eap_set_anon_id(struct eap_sm *sm, const u8 *id, size_t len) argument
[all...]
H A Deap_aka.c456 size_t len; local
472 len = wpabuf_len(data->id_msgs);
473 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA: AT_CHECKCODE data", addr, len);
476 sha256_vector(1, &addr, &len, hash);
479 sha1_vector(1, &addr, &len, hash);
491 size_t len; local
520 len = wpabuf_len(data->id_msgs);
523 sha256_vector(1, &addr, &len, hash);
526 sha1_vector(1, &addr, &len, hash);
1287 size_t len; local
1406 eap_aka_get_identity(struct eap_sm *sm, void *priv, size_t *len) argument
1432 eap_aka_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
1451 eap_aka_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument
1473 eap_aka_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_config.h711 * len - Length of binary data
713 size_t len; member in struct:wpa_config_blob
H A Deap_eke.c652 size_t len; local
655 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_EKE, reqData, &len);
656 if (pos == NULL || len < 1) {
661 end = pos + len;
708 static u8 * eap_eke_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
720 *len = EAP_MSK_LEN;
726 static u8 * eap_eke_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
738 *len = EAP_EMSK_LEN;
H A Deap_fast.c73 static int eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, argument
96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len);
417 size_t len = be_to_host16(hdr->length); local
423 if (len <= sizeof(struct eap_hdr)) {
425 "Phase 2 request (len=%lu)", (unsigned long) len);
467 wpabuf_set(&msg, hdr, len);
486 data->pending_phase2_req = wpabuf_alloc_copy(hdr, len);
563 "Payload TLV (len=%lu)",
757 size_t len; local
826 eap_fast_parse_pac_tlv(struct eap_fast_pac *entry, int type, u8 *pos, size_t len, int *pac_key_found) argument
863 size_t left, len; local
899 eap_fast_parse_pac_info(struct eap_fast_pac *entry, int type, u8 *pos, size_t len) argument
983 size_t left, len; local
1086 size_t len; local
1340 eap_fast_get_a_id(const u8 *buf, size_t len, size_t *id_len) argument
1662 int len, ret; local
1684 eap_fast_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
1703 eap_fast_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument
1722 eap_fast_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_fast_pac.c34 * <variable len> PAC-Opaque data (length bytes)
36 * <variable len> PAC-Info data (length bytes)
199 size_t len; local
205 len = l_end - rc->pos;
206 if (len >= rc->buf_len)
207 len = rc->buf_len - 1;
208 os_memcpy(rc->buf, rc->pos, len);
209 rc->buf[len] = '\0';
232 static u8 * eap_fast_parse_hex(const char *value, size_t *len) argument
242 *len
477 eap_fast_write(char **buf, char **pos, size_t *buf_len, const char *field, const u8 *data, size_t len, int txt) argument
535 eap_fast_write_pac(struct eap_sm *sm, const char *pac_file, char *buf, size_t len) argument
707 u16 type, len; local
755 size_t len, count = 0; local
870 size_t len, count = 0; local
[all...]
H A Deap_gpsk.c242 size_t len; local
251 len = WPA_GET_BE16(pos);
253 if (len > (size_t) (end - pos)) {
257 if (len == 0 || (len % sizeof(struct eap_gpsk_csuite))) {
258 wpa_printf(MSG_DEBUG, "EAP-GPSK: Invalid CSuite_List len %lu",
259 (unsigned long) len);
263 if (eap_gpsk_select_csuite(sm, data, pos, len) < 0)
267 *list_len = len;
268 pos += len;
321 size_t len, miclen; local
454 size_t len; local
672 size_t len; local
714 eap_gpsk_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
732 eap_gpsk_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
750 eap_gpsk_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
55 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, reqData, &len);
62 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len);
64 (len < 10 || os_memcmp(pos, "CHALLENGE=", 10) != 0)) {
87 eap_sm_request_otp(sm, (const char *) pos, len);
H A Deap_ikev2.c191 size_t len = wpabuf_len(resp); local
195 msg, len, wpabuf_put(resp, icv_len));
270 const u8 *buf, size_t len)
273 if (len > wpabuf_tailroom(data->in_buf)) {
279 wpabuf_put_data(data->in_buf, buf, len);
281 "for %lu bytes more", (unsigned long) len,
292 const u8 *buf, size_t len)
311 wpabuf_put_data(data->in_buf, buf, len);
314 (unsigned long) len,
328 size_t len; local
269 eap_ikev2_process_cont(struct eap_ikev2_data *data, const u8 *buf, size_t len) argument
288 eap_ikev2_process_fragment(struct eap_ikev2_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
439 eap_ikev2_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
457 eap_ikev2_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
475 eap_ikev2_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_leap.c67 size_t identity_len, password_len, len; local
77 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_LEAP, reqData, &len);
78 if (pos == NULL || len < 3) {
95 if (challenge_len != LEAP_CHALLENGE_LEN || challenge_len > len - 3) {
191 size_t password_len, len; local
200 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_LEAP, reqData, &len);
201 if (pos == NULL || len < 3) {
218 if (response_len != LEAP_RESPONSE_LEN || response_len > len - 3) {
330 static u8 * eap_leap_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
384 *len
[all...]
H A Deap_md5.c36 size_t len, challenge_len, password_len; local
46 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, reqData, &len);
47 if (pos == NULL || len == 0) {
48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)",
49 pos, (unsigned long) len);
59 if (challenge_len == 0 || challenge_len > len - 1) {
61 "(challenge_len=%lu len=%lu)",
62 (unsigned long) challenge_len, (unsigned long) len);
H A Deap_mschapv2.c244 size_t len, challenge_len; local
247 if (eap_get_config_identity(sm, &len) == NULL ||
248 eap_get_config_password(sm, &len) == NULL)
254 "(len %lu)", (unsigned long) req_len);
260 len = req_len - sizeof(*req) - 1;
268 if (len < challenge_len) {
270 " packet: len=%lu challenge_len=%lu",
271 (unsigned long) len, (unsigned long) challenge_len);
283 len -= challenge_len;
285 pos, len);
352 size_t len; local
647 size_t len = req_len - sizeof(*req); local
699 size_t len; local
717 eap_mschapv2_check_mslen(struct eap_sm *sm, size_t len, const struct eap_mschapv2_hdr *ms) argument
771 size_t len; local
831 eap_mschapv2_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_otp.c34 size_t password_len, len; local
37 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_OTP, reqData, &len);
43 pos, len);
55 eap_sm_request_otp(sm, (const char *) pos, len);
H A Deap_pax.c331 size_t len; local
334 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PAX, reqData, &len);
335 if (pos == NULL || len < EAP_PAX_ICV_LEN) {
341 flen = len - EAP_PAX_ICV_LEN;
350 pos, len - EAP_PAX_ICV_LEN);
407 icv = pos + len - EAP_PAX_ICV_LEN;
461 static u8 * eap_pax_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
473 *len = EAP_MSK_LEN;
482 static u8 * eap_pax_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
494 *len
[all...]
H A Deap_peap.c316 size_t len[2]; local
321 len[0] = 60;
323 len[1] = 1;
337 addr[0], len[0]);
339 addr[1], len[1]);
340 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac);
363 size_t len; local
368 len = 6;
370 len += 60; /* Cryptobinding TLV */
371 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TLV, len,
596 size_t len = be_to_host16(hdr->length); local
744 size_t len; local
1151 int len, ret; local
1174 eap_peap_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
1212 eap_peap_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_proxy_dummy.c33 const u8 * eap_proxy_get_eapKeyData(struct eap_proxy_sm *sm, size_t *len) argument
H A Deap_psk.c91 size_t buflen, len; local
96 cpos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, reqData, &len);
98 if (cpos == NULL || len < sizeof(*hdr1)) {
101 (unsigned long) len,
118 data->id_s_len = len - sizeof(*hdr1);
122 "ID_S (len=%lu)", (unsigned long) data->id_s_len);
188 size_t buflen, left, data_len, len, plen; local
195 reqData, &len);
197 if (pos == NULL || len < sizeof(*hdr3)) {
200 (unsigned long) len,
378 size_t len; local
420 eap_psk_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
439 eap_psk_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument
461 eap_psk_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_pwd.c174 static u8 * eap_pwd_getkey(struct eap_sm *sm, void *priv, size_t *len) argument
187 *len = EAP_MSK_LEN;
193 static u8 * eap_pwd_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument
206 *len = 1 + SHA256_MAC_LEN;
707 size_t len; local
711 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PWD, reqData, &len);
712 if ((pos == NULL) || (len < 1)) {
714 "len is %d",
715 pos == NULL ? "NULL" : "not NULL", (int) len);
727 len
932 eap_pwd_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_sake.c369 size_t len; local
372 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SAKE, reqData, &len);
373 if (pos == NULL || len < sizeof(struct eap_sake_hdr)) {
379 end = pos + len;
437 static u8 * eap_sake_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
449 *len = EAP_MSK_LEN;
455 static u8 * eap_sake_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument
463 *len = 1 + 2 * EAP_SAKE_RAND_LEN;
464 id = os_malloc(*len);
471 wpa_hexdump(MSG_DEBUG, "EAP-SAKE: Derived Session-Id", id, *len);
477 eap_sake_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_sim.c1034 size_t len; local
1037 if (eap_get_config_identity(sm, &len) == NULL) {
1044 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SIM, reqData, &len);
1045 if (pos == NULL || len < 1) {
1051 len = be_to_host16(req->length);
1062 if (eap_sim_parse_attr(pos, wpabuf_head_u8(reqData) + len, &attr, 0,
1149 size_t *len)
1154 *len = data->reauth_id_len;
1159 *len = data->pseudonym_len;
1174 static u8 * eap_sim_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
1148 eap_sim_get_identity(struct eap_sm *sm, void *priv, size_t *len) argument
1193 eap_sim_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument
1216 eap_sim_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]

Completed in 202 milliseconds

1234567891011>>