/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_peap_common.c | 25 size_t len[5]; local 28 len[0] = 0; 30 len[1] = label_len; 32 len[2] = seed_len; 47 len[3] = 1; 49 len[4] = 2; 63 len[3] = 1; 65 len[4] = 1; 72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0) 81 len[ [all...] |
H A D | eap_pwd_common.c | 26 void eap_pwd_h_update(struct crypto_hash *hash, const u8 *data, size_t len) argument 28 crypto_hash_update(hash, data, len); 34 size_t len = SHA256_MAC_LEN; local 35 crypto_hash_finish(hash, digest, &len); 46 size_t resultbytelen, len = 0, mdlen; local 51 while (len < resultbytelen) { 66 if ((len + mdlen) > resultbytelen) 67 os_memcpy(result + len, digest, resultbytelen - len); 69 os_memcpy(result + len, diges [all...] |
H A D | eap_sake_common.c | 156 * @len: Payload length 160 int eap_sake_parse_attributes(const u8 *buf, size_t len, argument 163 const u8 *pos = buf, *end = buf + len; 218 size_t len[4]; local 221 len[0] = label_len; 223 len[1] = data_len; 225 len[2] = data2_len; 227 len[3] = 1; 233 hmac_sha1_vector(key, key_len, 4, addr, len, 237 hmac_sha1_vector(key, key_len, 4, addr, len, 378 eap_sake_add_attr(struct wpabuf *buf, u8 type, const u8 *data, size_t len) argument 386 os_memset(wpabuf_put(buf, len), 0, len); local [all...] |
H A D | eap_sim_common.c | 35 size_t len[5]; local 38 len[0] = identity_len; 40 len[1] = num_chal * EAP_SIM_KC_LEN; 42 len[2] = EAP_SIM_NONCE_MT_LEN; 44 len[3] = ver_list_len; 46 len[4] = 2; 51 sha1_vector(5, addr, len, mk); 60 size_t len[3]; local 63 len[0] = identity_len; 65 len[ 116 size_t len[4]; local 170 size_t len[2]; local 210 size_t len[2]; local 238 size_t len[5]; local 365 size_t len[2]; local 405 size_t len[2]; local 433 size_t len[5]; local 1050 eap_sim_msg_add_full(struct eap_sim_msg *msg, u8 attr, const u8 *data, size_t len) argument 1074 eap_sim_msg_add(struct eap_sim_msg *msg, u8 attr, u16 value, const u8 *data, size_t len) argument [all...] |
H A D | ikev2_common.c | 96 size_t num_elem, const u8 *addr[], const size_t *len, 101 hmac_sha1_vector(key, key_len, num_elem, addr, len, hash); 104 hmac_md5_vector(key, key_len, num_elem, addr, len, hash); 122 size_t len[3]; local 132 len[0] = hash_len; 134 len[1] = data_len; 136 len[2] = 1; 145 &len[1], hash); 147 res = ikev2_prf_hash(alg, key, key_len, 3, addr, len, 177 const u8 *plain, u8 *crypt, size_t len) 95 ikev2_prf_hash(int alg, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *hash) argument 176 ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *plain, u8 *crypt, size_t len) argument 211 ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *crypt, u8 *plain, size_t len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 1253 "(len=%lu plen=%lu)", 1359 size_t len = data->peer_cert.hash_len * 2 + 1; local 1360 hash_hex = os_malloc(len); 1362 wpa_snprintf_hex(hash_hex, len, 1602 int len, ret; local 1607 len = os_snprintf(buf, buflen, 1610 if (len < 0 || (size_t) len >= buflen) 1626 ret = os_snprintf(buf + len, buflen - len, 1986 eap_get_config_identity(struct eap_sm *sm, size_t *len) argument 2023 eap_get_config_password(struct eap_sm *sm, size_t *len) argument 2050 eap_get_config_password2(struct eap_sm *sm, size_t *len, int *hash) argument 2078 eap_get_config_new_password(struct eap_sm *sm, size_t *len) argument 2094 eap_get_config_otp(struct eap_sm *sm, size_t *len) argument 2227 eap_get_eapSessionId(struct eap_sm *sm, size_t *len) argument 2250 eap_get_eapKeyData(struct eap_sm *sm, size_t *len) argument 2425 eap_set_anon_id(struct eap_sm *sm, const u8 *id, size_t len) argument [all...] |
H A D | eap_aka.c | 456 size_t len; local 472 len = wpabuf_len(data->id_msgs); 473 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA: AT_CHECKCODE data", addr, len); 476 sha256_vector(1, &addr, &len, hash); 479 sha1_vector(1, &addr, &len, hash); 491 size_t len; local 520 len = wpabuf_len(data->id_msgs); 523 sha256_vector(1, &addr, &len, hash); 526 sha1_vector(1, &addr, &len, hash); 1287 size_t len; local 1406 eap_aka_get_identity(struct eap_sm *sm, void *priv, size_t *len) argument 1432 eap_aka_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 1451 eap_aka_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument 1473 eap_aka_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_config.h | 711 * len - Length of binary data 713 size_t len; member in struct:wpa_config_blob
|
H A D | eap_eke.c | 652 size_t len; local 655 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_EKE, reqData, &len); 656 if (pos == NULL || len < 1) { 661 end = pos + len; 708 static u8 * eap_eke_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 720 *len = EAP_MSK_LEN; 726 static u8 * eap_eke_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument 738 *len = EAP_EMSK_LEN;
|
H A D | eap_fast.c | 73 static int eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, argument 96 wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len); 417 size_t len = be_to_host16(hdr->length); local 423 if (len <= sizeof(struct eap_hdr)) { 425 "Phase 2 request (len=%lu)", (unsigned long) len); 467 wpabuf_set(&msg, hdr, len); 486 data->pending_phase2_req = wpabuf_alloc_copy(hdr, len); 563 "Payload TLV (len=%lu)", 757 size_t len; local 826 eap_fast_parse_pac_tlv(struct eap_fast_pac *entry, int type, u8 *pos, size_t len, int *pac_key_found) argument 863 size_t left, len; local 899 eap_fast_parse_pac_info(struct eap_fast_pac *entry, int type, u8 *pos, size_t len) argument 983 size_t left, len; local 1086 size_t len; local 1340 eap_fast_get_a_id(const u8 *buf, size_t len, size_t *id_len) argument 1662 int len, ret; local 1684 eap_fast_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 1703 eap_fast_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument 1722 eap_fast_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_fast_pac.c | 34 * <variable len> PAC-Opaque data (length bytes) 36 * <variable len> PAC-Info data (length bytes) 199 size_t len; local 205 len = l_end - rc->pos; 206 if (len >= rc->buf_len) 207 len = rc->buf_len - 1; 208 os_memcpy(rc->buf, rc->pos, len); 209 rc->buf[len] = '\0'; 232 static u8 * eap_fast_parse_hex(const char *value, size_t *len) argument 242 *len 477 eap_fast_write(char **buf, char **pos, size_t *buf_len, const char *field, const u8 *data, size_t len, int txt) argument 535 eap_fast_write_pac(struct eap_sm *sm, const char *pac_file, char *buf, size_t len) argument 707 u16 type, len; local 755 size_t len, count = 0; local 870 size_t len, count = 0; local [all...] |
H A D | eap_gpsk.c | 242 size_t len; local 251 len = WPA_GET_BE16(pos); 253 if (len > (size_t) (end - pos)) { 257 if (len == 0 || (len % sizeof(struct eap_gpsk_csuite))) { 258 wpa_printf(MSG_DEBUG, "EAP-GPSK: Invalid CSuite_List len %lu", 259 (unsigned long) len); 263 if (eap_gpsk_select_csuite(sm, data, pos, len) < 0) 267 *list_len = len; 268 pos += len; 321 size_t len, miclen; local 454 size_t len; local 672 size_t len; local 714 eap_gpsk_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 732 eap_gpsk_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument 750 eap_gpsk_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 55 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, reqData, &len); 62 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Request message", pos, len); 64 (len < 10 || os_memcmp(pos, "CHALLENGE=", 10) != 0)) { 87 eap_sm_request_otp(sm, (const char *) pos, len);
|
H A D | eap_ikev2.c | 191 size_t len = wpabuf_len(resp); local 195 msg, len, wpabuf_put(resp, icv_len)); 270 const u8 *buf, size_t len) 273 if (len > wpabuf_tailroom(data->in_buf)) { 279 wpabuf_put_data(data->in_buf, buf, len); 281 "for %lu bytes more", (unsigned long) len, 292 const u8 *buf, size_t len) 311 wpabuf_put_data(data->in_buf, buf, len); 314 (unsigned long) len, 328 size_t len; local 269 eap_ikev2_process_cont(struct eap_ikev2_data *data, const u8 *buf, size_t len) argument 288 eap_ikev2_process_fragment(struct eap_ikev2_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u32 message_length, const u8 *buf, size_t len) argument 439 eap_ikev2_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 457 eap_ikev2_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument 475 eap_ikev2_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_leap.c | 67 size_t identity_len, password_len, len; local 77 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_LEAP, reqData, &len); 78 if (pos == NULL || len < 3) { 95 if (challenge_len != LEAP_CHALLENGE_LEN || challenge_len > len - 3) { 191 size_t password_len, len; local 200 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_LEAP, reqData, &len); 201 if (pos == NULL || len < 3) { 218 if (response_len != LEAP_RESPONSE_LEN || response_len > len - 3) { 330 static u8 * eap_leap_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 384 *len [all...] |
H A D | eap_md5.c | 36 size_t len, challenge_len, password_len; local 46 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, reqData, &len); 47 if (pos == NULL || len == 0) { 48 wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)", 49 pos, (unsigned long) len); 59 if (challenge_len == 0 || challenge_len > len - 1) { 61 "(challenge_len=%lu len=%lu)", 62 (unsigned long) challenge_len, (unsigned long) len);
|
H A D | eap_mschapv2.c | 244 size_t len, challenge_len; local 247 if (eap_get_config_identity(sm, &len) == NULL || 248 eap_get_config_password(sm, &len) == NULL) 254 "(len %lu)", (unsigned long) req_len); 260 len = req_len - sizeof(*req) - 1; 268 if (len < challenge_len) { 270 " packet: len=%lu challenge_len=%lu", 271 (unsigned long) len, (unsigned long) challenge_len); 283 len -= challenge_len; 285 pos, len); 352 size_t len; local 647 size_t len = req_len - sizeof(*req); local 699 size_t len; local 717 eap_mschapv2_check_mslen(struct eap_sm *sm, size_t len, const struct eap_mschapv2_hdr *ms) argument 771 size_t len; local 831 eap_mschapv2_getKey(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_otp.c | 34 size_t password_len, len; local 37 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_OTP, reqData, &len); 43 pos, len); 55 eap_sm_request_otp(sm, (const char *) pos, len);
|
H A D | eap_pax.c | 331 size_t len; local 334 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PAX, reqData, &len); 335 if (pos == NULL || len < EAP_PAX_ICV_LEN) { 341 flen = len - EAP_PAX_ICV_LEN; 350 pos, len - EAP_PAX_ICV_LEN); 407 icv = pos + len - EAP_PAX_ICV_LEN; 461 static u8 * eap_pax_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 473 *len = EAP_MSK_LEN; 482 static u8 * eap_pax_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument 494 *len [all...] |
H A D | eap_peap.c | 316 size_t len[2]; local 321 len[0] = 60; 323 len[1] = 1; 337 addr[0], len[0]); 339 addr[1], len[1]); 340 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac); 363 size_t len; local 368 len = 6; 370 len += 60; /* Cryptobinding TLV */ 371 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TLV, len, 596 size_t len = be_to_host16(hdr->length); local 744 size_t len; local 1151 int len, ret; local 1174 eap_peap_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 1212 eap_peap_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_proxy_dummy.c | 33 const u8 * eap_proxy_get_eapKeyData(struct eap_proxy_sm *sm, size_t *len) argument
|
H A D | eap_psk.c | 91 size_t buflen, len; local 96 cpos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, reqData, &len); 98 if (cpos == NULL || len < sizeof(*hdr1)) { 101 (unsigned long) len, 118 data->id_s_len = len - sizeof(*hdr1); 122 "ID_S (len=%lu)", (unsigned long) data->id_s_len); 188 size_t buflen, left, data_len, len, plen; local 195 reqData, &len); 197 if (pos == NULL || len < sizeof(*hdr3)) { 200 (unsigned long) len, 378 size_t len; local 420 eap_psk_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 439 eap_psk_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument 461 eap_psk_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_pwd.c | 174 static u8 * eap_pwd_getkey(struct eap_sm *sm, void *priv, size_t *len) argument 187 *len = EAP_MSK_LEN; 193 static u8 * eap_pwd_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument 206 *len = 1 + SHA256_MAC_LEN; 707 size_t len; local 711 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PWD, reqData, &len); 712 if ((pos == NULL) || (len < 1)) { 714 "len is %d", 715 pos == NULL ? "NULL" : "not NULL", (int) len); 727 len 932 eap_pwd_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_sake.c | 369 size_t len; local 372 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SAKE, reqData, &len); 373 if (pos == NULL || len < sizeof(struct eap_sake_hdr)) { 379 end = pos + len; 437 static u8 * eap_sake_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 449 *len = EAP_MSK_LEN; 455 static u8 * eap_sake_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument 463 *len = 1 + 2 * EAP_SAKE_RAND_LEN; 464 id = os_malloc(*len); 471 wpa_hexdump(MSG_DEBUG, "EAP-SAKE: Derived Session-Id", id, *len); 477 eap_sake_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_sim.c | 1034 size_t len; local 1037 if (eap_get_config_identity(sm, &len) == NULL) { 1044 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SIM, reqData, &len); 1045 if (pos == NULL || len < 1) { 1051 len = be_to_host16(req->length); 1062 if (eap_sim_parse_attr(pos, wpabuf_head_u8(reqData) + len, &attr, 0, 1149 size_t *len) 1154 *len = data->reauth_id_len; 1159 *len = data->pseudonym_len; 1174 static u8 * eap_sim_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 1148 eap_sim_get_identity(struct eap_sm *sm, void *priv, size_t *len) argument 1193 eap_sim_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument 1216 eap_sim_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |