/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_tls.c | 305 static u8 * eap_tls_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 317 *len = EAP_TLS_KEY_LEN; 324 static u8 * eap_tls_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument 336 *len = EAP_EMSK_LEN; 343 static u8 * eap_tls_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument 355 *len = data->id_len;
|
H A D | eap_tls_common.c | 52 *data_len = blob->len; 298 * @len: Length of the key material to generate (usually 64 for MSK) 308 const char *label, size_t len) 315 out = os_malloc(len); 320 if (tls_connection_prf(data->ssl_ctx, data->conn, label, 0, out, len) 346 keys.server_random_len, out, len)) 365 * @len: Pointer to length of the session ID generated 375 size_t *len) 391 *len = 1 + keys.client_random_len + keys.server_random_len; 392 out = os_malloc(*len); 307 eap_peer_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, const char *label, size_t len) argument 373 eap_peer_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument 578 size_t len; local 793 int len = 0, ret; local 832 eap_peer_tls_process_init(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, struct eap_method_ret *ret, const struct wpabuf *reqData, size_t *len, u8 *flags) argument [all...] |
H A D | eap_tnc.c | 144 const u8 *buf, size_t len) 147 if (len > wpabuf_tailroom(data->in_buf)) { 153 wpabuf_put_data(data->in_buf, buf, len); 155 "%lu bytes more", (unsigned long) len, 166 const u8 *buf, size_t len) 185 wpabuf_put_data(data->in_buf, buf, len); 188 (unsigned long) len, 204 size_t len, rlen; local 213 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TNC, reqData, &len); 215 wpa_printf(MSG_INFO, "EAP-TNC: Invalid frame (pos=%p len 143 eap_tnc_process_cont(struct eap_tnc_data *data, const u8 *buf, size_t len) argument 162 eap_tnc_process_fragment(struct eap_tnc_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u32 message_length, const u8 *buf, size_t len) argument [all...] |
H A D | eap_ttls.c | 161 int mandatory, size_t len) 178 avp->avp_length = host_to_be32((flags << 24) | (u32) (hdrlen + len)); 186 const u8 *data, size_t len) 189 pos = eap_ttls_avp_hdr(avphdr, avp_code, vendor_id, mandatory, len); 190 os_memcpy(pos, data, len); 191 pos += len; 253 struct eap_ttls_data *data, size_t len) 255 return eap_peer_tls_derive_key(sm, &data->ssl, "ttls challenge", len); 284 struct eap_hdr *hdr, size_t len, 291 wpabuf_set(&msg, hdr, len); 160 eap_ttls_avp_hdr(u8 *avphdr, u32 avp_code, u32 vendor_id, int mandatory, size_t len) argument 184 eap_ttls_avp_add(u8 *start, u8 *avphdr, u32 avp_code, u32 vendor_id, int mandatory, const u8 *data, size_t len) argument 252 eap_ttls_implicit_challenge(struct eap_sm *sm, struct eap_ttls_data *data, size_t len) argument 281 eap_ttls_phase2_eap_process(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, size_t len, struct wpabuf **resp) argument 307 eap_ttls_phase2_request_eap_method(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, size_t len, u8 method, struct wpabuf **resp) argument 385 size_t len = be_to_host16(hdr->length); local 731 size_t len; local 1009 size_t len; local 1564 int len, ret; local 1610 eap_ttls_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 1629 eap_ttls_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_vendor_test.c | 71 size_t len; local 73 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, reqData, &len); 74 if (pos == NULL || len < 1) { 147 static u8 * eap_vendor_test_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 162 *len = key_len;
|
H A D | eap_wsc.c | 66 size_t len; local 76 len = os_strlen(pos); 78 len = end - pos; 79 if ((len & 1) || len > 2 * sizeof(cred->ssid) || 80 hexstr2bin(pos, cred->ssid, len / 2)) { 84 cred->ssid_len = len / 2; 128 len = os_strlen(pos); 130 len = end - pos; 131 if ((len 233 size_t len; local 368 eap_wsc_process_cont(struct eap_wsc_data *data, const u8 *buf, size_t len, u8 op_code) argument 394 eap_wsc_process_fragment(struct eap_wsc_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u8 op_code, u16 message_length, const u8 *buf, size_t len) argument 435 size_t len; local [all...] |
H A D | ikev2.c | 41 size_t len[2]; local 87 len[0] = pad_len; 89 len[1] = wpabuf_len(shared); 91 2, addr, len, skeyseed) < 0) { 732 wpa_printf(MSG_MSGDUMP, "IKEV2: Received message (len %lu)",
|
H A D | mschapv2.c | 15 const u8 * mschapv2_remove_domain(const u8 *username, size_t *len) argument 25 for (i = 0; i < *len; i++) { 27 *len -= i + 1;
|
H A D | tncc.c | 488 const u8 *msg, size_t len) 493 wpa_hexdump_ascii(MSG_MSGDUMP, "TNC: Message to IMC(s)", msg, len); 503 (TNC_BufferReference) msg, len, 534 size_t len = 0; local 536 len += imc->imc_send_len; 537 return len; 688 const u8 *msg, size_t len) 697 buf = dup_binstr(msg, len); 1282 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len) argument 1286 wpa_hexdump(MSG_DEBUG, "TNC: SoH Request", data, len); 487 tncc_send_to_imcs(struct tncc_data *tncc, unsigned int type, const u8 *msg, size_t len) argument 687 tncc_process_if_tnccs(struct tncc_data *tncc, const u8 *msg, size_t len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server.c | 41 size_t len); 415 size_t len = 0; local 432 len = be_to_host16(nak->length); 433 if (len > wpabuf_len(sm->eap_if.eapRespData)) 434 len = wpabuf_len(sm->eap_if.eapRespData); 436 len -= sizeof(*nak); 439 len--; 443 eap_sm_Policy_update(sm, nak_list, len); 939 "len=%lu", resp, 948 "(len 1053 eap_sm_process_nak(struct eap_sm *sm, const u8 *nak_list, size_t len) argument 1107 eap_sm_Policy_update(struct eap_sm *sm, const u8 *nak_list, size_t len) argument 1423 eap_get_identity(struct eap_sm *sm, size_t *len) argument [all...] |
H A D | eap_server_aka.c | 271 size_t len; local 287 len = wpabuf_len(data->id_msgs); 288 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA: AT_CHECKCODE data", addr, len); 290 sha256_vector(1, &addr, &len, hash); 292 sha1_vector(1, &addr, &len, hash); 304 size_t len; local 333 len = wpabuf_len(data->id_msgs); 335 sha256_vector(1, &addr, &len, hash); 337 sha1_vector(1, &addr, &len, hash); 655 size_t len; local 1183 size_t len; local 1256 eap_aka_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 1273 eap_aka_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_eke.c | 387 size_t len; local 391 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_EKE, respData, &len); 392 if (pos == NULL || len < 1) { 689 size_t len; local 692 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_EKE, respData, &len); 693 if (pos == NULL || len < 1) 697 end = pos + len; 726 static u8 * eap_eke_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 738 *len = EAP_MSK_LEN; 744 static u8 * eap_eke_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_fast.c | 120 static int eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len, argument 136 ticket, len); 138 if (len < 4 || WPA_GET_BE16(ticket) != PAC_TYPE_PAC_OPAQUE) { 147 pac_opaque_len > len - 4) { 149 "(len=%lu left=%lu)", 151 (unsigned long) len); 805 pac_info->len = host_to_be16(pos - (u8 *) (pac_info + 1)); 825 "(len=%d) with last Phase 1 Message (len=%d " 926 size_t len; local 1092 size_t len; local 1128 size_t len; local 1229 eap_fast_pac_type(u8 *pac, size_t len, u16 type) argument 1265 u16 type, len, res; local 1548 eap_fast_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 1567 eap_fast_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_gpsk.c | 105 size_t len; local 118 len = 1 + 2 + sm->server_id_len + EAP_GPSK_RAND_LEN + 2 + 120 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, 146 size_t len, miclen; local 153 len = 1 + 2 * EAP_GPSK_RAND_LEN + 2 + sm->server_id_len + 155 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, 214 size_t len; local 216 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GPSK, respData, &len); 217 if (pos == NULL || len < 1) { 529 size_t len; local 553 eap_gpsk_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 571 eap_gpsk_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_gtc.c | 81 size_t len; local 83 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &len); 84 if (pos == NULL || len < 1) {
|
H A D | eap_server_identity.c | 86 size_t len; local 89 respData, &len); 104 size_t len; local 118 respData, &len); 122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len); 123 buf = os_malloc(len * 4 + 1); 125 printf_encode(buf, len * 4 + 1, pos, len); 132 sm->identity = os_malloc(len ? len [all...] |
H A D | eap_server_ikev2.c | 186 size_t len = wpabuf_len(req); local 190 msg, len, wpabuf_put(req, icv_len)); 244 size_t len; local 247 &len); 281 const u8 *buf, size_t len) 284 if (len > wpabuf_tailroom(data->in_buf)) { 290 wpabuf_put_data(data->in_buf, buf, len); 292 "bytes more", (unsigned long) len, 301 const u8 *buf, size_t len) 318 wpabuf_put_data(data->in_buf, buf, len); 280 eap_ikev2_process_cont(struct eap_ikev2_data *data, const u8 *buf, size_t len) argument 299 eap_ikev2_process_fragment(struct eap_ikev2_data *data, u8 flags, u32 message_length, const u8 *buf, size_t len) argument 350 size_t len; local 478 eap_ikev2_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 496 eap_ikev2_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_md5.c | 80 size_t len; local 82 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_MD5, respData, &len); 83 if (pos == NULL || len < 1) { 87 if (*pos != CHAP_MD5_LEN || 1 + CHAP_MD5_LEN > len) { 90 *pos, (unsigned long) len); 118 pos++; /* Skip response len */
|
H A D | eap_server_mschapv2.c | 245 size_t len; local 248 &len); 249 if (pos == NULL || len < 1) { 288 size_t len, name_len, i; local 296 &len); 297 if (pos == NULL || len < 1) 300 end = pos + len; 304 if (len < sizeof(*resp) + 1 + 49 || 442 size_t len; local 445 &len); 469 size_t len; local 526 eap_mschapv2_getKey(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_pax.c | 189 size_t len, mlen; local 192 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PAX, respData, &len); 193 if (pos == NULL || len < sizeof(*resp)) { 198 mlen = sizeof(struct eap_hdr) + 1 + len; 207 (u8 *) (resp + 1), len - sizeof(*resp) - EAP_PAX_ICV_LEN); 261 if (len - sizeof(*resp) < EAP_PAX_ICV_LEN) { 290 size_t len, left, cid_len; local 298 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PAX, respData, &len); 299 if (pos == NULL || len < sizeof(*resp) + EAP_PAX_ICV_LEN) 304 left = len 462 size_t len; local 495 eap_pax_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 516 eap_pax_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_peap.c | 372 size_t len[2]; local 393 len[0] = 60; 395 len[1] = 1; 410 addr[0], len[0]); 412 addr[1], len[1]); 413 hmac_sha1_vector(data->cmk, 20, 2, addr, len, mac); 527 size_t len; local 529 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PEAP, respData, &len); 530 if (pos == NULL || len < 1) { 699 "(len 1001 size_t len; local 1175 eap_peap_getKey(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_psk.c | 178 size_t len; local 182 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, respData, &len); 183 if (pos == NULL || len < 1) { 203 if ((t == 1 && len < sizeof(struct eap_psk_hdr_2)) || 204 (t == 3 && len < sizeof(struct eap_psk_hdr_4))) { 356 "PSK-4 (len=%lu, expected 21)", 414 size_t len; local 423 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, respData, &len); 424 if (pos == NULL || len < 1) 445 static u8 * eap_psk_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 463 eap_psk_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_pwd.c | 429 size_t len; local 490 len = wpabuf_len(data->outbuf) - data->out_frag_pos; 491 if ((len + EAP_PWD_HDR_SIZE) > data->mtu) { 492 len = data->mtu - EAP_PWD_HDR_SIZE; 502 len -= sizeof(u16); 507 (int) len); 514 EAP_PWD_HDR_SIZE + len + 527 wpabuf_put_data(req, buf + data->out_frag_pos, len); 528 data->out_frag_pos += len; 547 size_t len; local 869 size_t len; local 971 eap_pwd_getkey(struct eap_sm *sm, void *priv, size_t *len) argument 990 eap_pwd_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_sake.c | 240 size_t len; local 244 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SAKE, respData, &len); 245 if (pos == NULL || len < sizeof(struct eap_sake_hdr)) { 415 size_t len; local 418 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SAKE, respData, &len); 419 if (pos == NULL || len < sizeof(struct eap_sake_hdr)) 423 end = pos + len; 455 static u8 * eap_sake_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 467 *len = EAP_MSK_LEN; 473 static u8 * eap_sake_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_server_sim.c | 350 size_t len; local 352 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SIM, respData, &len); 353 if (pos == NULL || len < 3) { 716 size_t len; local 719 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SIM, respData, &len); 720 if (pos == NULL || len < 3) 723 end = pos + len; 782 static u8 * eap_sim_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 794 *len = EAP_SIM_KEYING_DATA_LEN; 799 static u8 * eap_sim_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |