Searched defs:len (Results 176 - 200 of 5216) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_tls.c305 static u8 * eap_tls_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
317 *len = EAP_TLS_KEY_LEN;
324 static u8 * eap_tls_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
336 *len = EAP_EMSK_LEN;
343 static u8 * eap_tls_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument
355 *len = data->id_len;
H A Deap_tls_common.c52 *data_len = blob->len;
298 * @len: Length of the key material to generate (usually 64 for MSK)
308 const char *label, size_t len)
315 out = os_malloc(len);
320 if (tls_connection_prf(data->ssl_ctx, data->conn, label, 0, out, len)
346 keys.server_random_len, out, len))
365 * @len: Pointer to length of the session ID generated
375 size_t *len)
391 *len = 1 + keys.client_random_len + keys.server_random_len;
392 out = os_malloc(*len);
307 eap_peer_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, const char *label, size_t len) argument
373 eap_peer_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument
578 size_t len; local
793 int len = 0, ret; local
832 eap_peer_tls_process_init(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, struct eap_method_ret *ret, const struct wpabuf *reqData, size_t *len, u8 *flags) argument
[all...]
H A Deap_tnc.c144 const u8 *buf, size_t len)
147 if (len > wpabuf_tailroom(data->in_buf)) {
153 wpabuf_put_data(data->in_buf, buf, len);
155 "%lu bytes more", (unsigned long) len,
166 const u8 *buf, size_t len)
185 wpabuf_put_data(data->in_buf, buf, len);
188 (unsigned long) len,
204 size_t len, rlen; local
213 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TNC, reqData, &len);
215 wpa_printf(MSG_INFO, "EAP-TNC: Invalid frame (pos=%p len
143 eap_tnc_process_cont(struct eap_tnc_data *data, const u8 *buf, size_t len) argument
162 eap_tnc_process_fragment(struct eap_tnc_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
[all...]
H A Deap_ttls.c161 int mandatory, size_t len)
178 avp->avp_length = host_to_be32((flags << 24) | (u32) (hdrlen + len));
186 const u8 *data, size_t len)
189 pos = eap_ttls_avp_hdr(avphdr, avp_code, vendor_id, mandatory, len);
190 os_memcpy(pos, data, len);
191 pos += len;
253 struct eap_ttls_data *data, size_t len)
255 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", len);
284 struct eap_hdr *hdr, size_t len,
291 wpabuf_set(&msg, hdr, len);
160 eap_ttls_avp_hdr(u8 *avphdr, u32 avp_code, u32 vendor_id, int mandatory, size_t len) argument
184 eap_ttls_avp_add(u8 *start, u8 *avphdr, u32 avp_code, u32 vendor_id, int mandatory, const u8 *data, size_t len) argument
252 eap_ttls_implicit_challenge(struct eap_sm *sm, struct eap_ttls_data *data, size_t len) argument
281 eap_ttls_phase2_eap_process(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, size_t len, struct wpabuf **resp) argument
307 eap_ttls_phase2_request_eap_method(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, size_t len, u8 method, struct wpabuf **resp) argument
385 size_t len = be_to_host16(hdr->length); local
731 size_t len; local
1009 size_t len; local
1564 int len, ret; local
1610 eap_ttls_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
1629 eap_ttls_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_vendor_test.c71 size_t len; local
73 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, reqData, &len);
74 if (pos == NULL || len < 1) {
147 static u8 * eap_vendor_test_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
162 *len = key_len;
H A Deap_wsc.c66 size_t len; local
76 len = os_strlen(pos);
78 len = end - pos;
79 if ((len & 1) || len > 2 * sizeof(cred->ssid) ||
80 hexstr2bin(pos, cred->ssid, len / 2)) {
84 cred->ssid_len = len / 2;
128 len = os_strlen(pos);
130 len = end - pos;
131 if ((len
233 size_t len; local
368 eap_wsc_process_cont(struct eap_wsc_data *data, const u8 *buf, size_t len, u8 op_code) argument
394 eap_wsc_process_fragment(struct eap_wsc_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u8 op_code, u16 message_length, const u8 *buf, size_t len) argument
435 size_t len; local
[all...]
H A Dikev2.c41 size_t len[2]; local
87 len[0] = pad_len;
89 len[1] = wpabuf_len(shared);
91 2, addr, len, skeyseed) < 0) {
732 wpa_printf(MSG_MSGDUMP, "IKEV2: Received message (len %lu)",
H A Dmschapv2.c15 const u8 * mschapv2_remove_domain(const u8 *username, size_t *len) argument
25 for (i = 0; i < *len; i++) {
27 *len -= i + 1;
H A Dtncc.c488 const u8 *msg, size_t len)
493 wpa_hexdump_ascii(MSG_MSGDUMP, "TNC: Message to IMC(s)", msg, len);
503 (TNC_BufferReference) msg, len,
534 size_t len = 0; local
536 len += imc->imc_send_len;
537 return len;
688 const u8 *msg, size_t len)
697 buf = dup_binstr(msg, len);
1282 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len) argument
1286 wpa_hexdump(MSG_DEBUG, "TNC: SoH Request", data, len);
487 tncc_send_to_imcs(struct tncc_data *tncc, unsigned int type, const u8 *msg, size_t len) argument
687 tncc_process_if_tnccs(struct tncc_data *tncc, const u8 *msg, size_t len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server.c41 size_t len);
415 size_t len = 0; local
432 len = be_to_host16(nak->length);
433 if (len > wpabuf_len(sm->eap_if.eapRespData))
434 len = wpabuf_len(sm->eap_if.eapRespData);
436 len -= sizeof(*nak);
439 len--;
443 eap_sm_Policy_update(sm, nak_list, len);
939 "len=%lu", resp,
948 "(len
1053 eap_sm_process_nak(struct eap_sm *sm, const u8 *nak_list, size_t len) argument
1107 eap_sm_Policy_update(struct eap_sm *sm, const u8 *nak_list, size_t len) argument
1423 eap_get_identity(struct eap_sm *sm, size_t *len) argument
[all...]
H A Deap_server_aka.c271 size_t len; local
287 len = wpabuf_len(data->id_msgs);
288 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA: AT_CHECKCODE data", addr, len);
290 sha256_vector(1, &addr, &len, hash);
292 sha1_vector(1, &addr, &len, hash);
304 size_t len; local
333 len = wpabuf_len(data->id_msgs);
335 sha256_vector(1, &addr, &len, hash);
337 sha1_vector(1, &addr, &len, hash);
655 size_t len; local
1183 size_t len; local
1256 eap_aka_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
1273 eap_aka_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_eke.c387 size_t len; local
391 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_EKE, respData, &len);
392 if (pos == NULL || len < 1) {
689 size_t len; local
692 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_EKE, respData, &len);
693 if (pos == NULL || len < 1)
697 end = pos + len;
726 static u8 * eap_eke_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
738 *len = EAP_MSK_LEN;
744 static u8 * eap_eke_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_fast.c120 static int eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, argument
136 ticket, len);
138 if (len < 4 || WPA_GET_BE16(ticket) != PAC_TYPE_PAC_OPAQUE) {
147 pac_opaque_len > len - 4) {
149 "(len=%lu left=%lu)",
151 (unsigned long) len);
805 pac_info->len = host_to_be16(pos - (u8 *) (pac_info + 1));
825 "(len=%d) with last Phase 1 Message (len=%d "
926 size_t len; local
1092 size_t len; local
1128 size_t len; local
1229 eap_fast_pac_type(u8 *pac, size_t len, u16 type) argument
1265 u16 type, len, res; local
1548 eap_fast_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
1567 eap_fast_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_gpsk.c105 size_t len; local
118 len = 1 + 2 + sm->server_id_len + EAP_GPSK_RAND_LEN + 2 +
120 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len,
146 size_t len, miclen; local
153 len = 1 + 2 * EAP_GPSK_RAND_LEN + 2 + sm->server_id_len +
155 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len,
214 size_t len; local
216 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GPSK, respData, &len);
217 if (pos == NULL || len < 1) {
529 size_t len; local
553 eap_gpsk_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
571 eap_gpsk_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_gtc.c81 size_t len; local
83 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &len);
84 if (pos == NULL || len < 1) {
H A Deap_server_identity.c86 size_t len; local
89 respData, &len);
104 size_t len; local
118 respData, &len);
122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
123 buf = os_malloc(len * 4 + 1);
125 printf_encode(buf, len * 4 + 1, pos, len);
132 sm->identity = os_malloc(len ? len
[all...]
H A Deap_server_ikev2.c186 size_t len = wpabuf_len(req); local
190 msg, len, wpabuf_put(req, icv_len));
244 size_t len; local
247 &len);
281 const u8 *buf, size_t len)
284 if (len > wpabuf_tailroom(data->in_buf)) {
290 wpabuf_put_data(data->in_buf, buf, len);
292 "bytes more", (unsigned long) len,
301 const u8 *buf, size_t len)
318 wpabuf_put_data(data->in_buf, buf, len);
280 eap_ikev2_process_cont(struct eap_ikev2_data *data, const u8 *buf, size_t len) argument
299 eap_ikev2_process_fragment(struct eap_ikev2_data *data, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
350 size_t len; local
478 eap_ikev2_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
496 eap_ikev2_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_md5.c80 size_t len; local
82 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &len);
83 if (pos == NULL || len < 1) {
87 if (*pos != CHAP_MD5_LEN || 1 + CHAP_MD5_LEN > len) {
90 *pos, (unsigned long) len);
118 pos++; /* Skip response len */
H A Deap_server_mschapv2.c245 size_t len; local
248 &len);
249 if (pos == NULL || len < 1) {
288 size_t len, name_len, i; local
296 &len);
297 if (pos == NULL || len < 1)
300 end = pos + len;
304 if (len < sizeof(*resp) + 1 + 49 ||
442 size_t len; local
445 &len);
469 size_t len; local
526 eap_mschapv2_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_pax.c189 size_t len, mlen; local
192 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PAX, respData, &len);
193 if (pos == NULL || len < sizeof(*resp)) {
198 mlen = sizeof(struct eap_hdr) + 1 + len;
207 (u8 *) (resp + 1), len - sizeof(*resp) - EAP_PAX_ICV_LEN);
261 if (len - sizeof(*resp) < EAP_PAX_ICV_LEN) {
290 size_t len, left, cid_len; local
298 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PAX, respData, &len);
299 if (pos == NULL || len < sizeof(*resp) + EAP_PAX_ICV_LEN)
304 left = len
462 size_t len; local
495 eap_pax_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
516 eap_pax_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_peap.c372 size_t len[2]; local
393 len[0] = 60;
395 len[1] = 1;
410 addr[0], len[0]);
412 addr[1], len[1]);
413 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac);
527 size_t len; local
529 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PEAP, respData, &len);
530 if (pos == NULL || len < 1) {
699 "(len
1001 size_t len; local
1175 eap_peap_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_psk.c178 size_t len; local
182 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, respData, &len);
183 if (pos == NULL || len < 1) {
203 if ((t == 1 && len < sizeof(struct eap_psk_hdr_2)) ||
204 (t == 3 && len < sizeof(struct eap_psk_hdr_4))) {
356 "PSK-4 (len=%lu, expected 21)",
414 size_t len; local
423 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, respData, &len);
424 if (pos == NULL || len < 1)
445 static u8 * eap_psk_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
463 eap_psk_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_pwd.c429 size_t len; local
490 len = wpabuf_len(data->outbuf) - data->out_frag_pos;
491 if ((len + EAP_PWD_HDR_SIZE) > data->mtu) {
492 len = data->mtu - EAP_PWD_HDR_SIZE;
502 len -= sizeof(u16);
507 (int) len);
514 EAP_PWD_HDR_SIZE + len +
527 wpabuf_put_data(req, buf + data->out_frag_pos, len);
528 data->out_frag_pos += len;
547 size_t len; local
869 size_t len; local
971 eap_pwd_getkey(struct eap_sm *sm, void *priv, size_t *len) argument
990 eap_pwd_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_sake.c240 size_t len; local
244 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SAKE, respData, &len);
245 if (pos == NULL || len < sizeof(struct eap_sake_hdr)) {
415 size_t len; local
418 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SAKE, respData, &len);
419 if (pos == NULL || len < sizeof(struct eap_sake_hdr))
423 end = pos + len;
455 static u8 * eap_sake_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
467 *len = EAP_MSK_LEN;
473 static u8 * eap_sake_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]
H A Deap_server_sim.c350 size_t len; local
352 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SIM, respData, &len);
353 if (pos == NULL || len < 3) {
716 size_t len; local
719 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SIM, respData, &len);
720 if (pos == NULL || len < 3)
723 end = pos + len;
782 static u8 * eap_sim_getKey(struct eap_sm *sm, void *priv, size_t *len) argument
794 *len = EAP_SIM_KEYING_DATA_LEN;
799 static u8 * eap_sim_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument
[all...]

Completed in 230 milliseconds

1234567891011>>