/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_privsep.c | 44 const void *data, size_t data_len, 52 io[1].iov_base = (u8 *) data; 57 msg.msg_iovlen = data ? 2 : 1; 225 struct privsep_cmd_associate *data; local 235 buflen = sizeof(*data) + params->wpa_ie_len; 236 data = os_zalloc(buflen); 237 if (data == NULL) 241 os_memcpy(data->bssid, params->bssid, ETH_ALEN); 242 os_memcpy(data->ssid, params->ssid, params->ssid_len); 243 data 43 wpa_priv_cmd(struct wpa_driver_privsep_data *drv, int cmd, const void *data, size_t data_len, void *reply, size_t *reply_len) argument 311 union wpa_event_data data; local 341 union wpa_event_data data; local 361 union wpa_event_data data; local 375 union wpa_event_data data; local 388 union wpa_event_data data; local 402 union wpa_event_data data; local [all...] |
H A D | driver_test.c | 154 static int test_driver_send_eapol(void *priv, const u8 *addr, const u8 *data, argument 189 io[2].iov_base = (u8 *) data; 202 u16 proto, const u8 *data, size_t data_len) 233 io[2].iov_base = (u8 *) data; 289 static int wpa_driver_test_send_mlme(void *priv, const u8 *data, argument 311 wpa_hexdump(MSG_MSGDUMP, "test_send_mlme", data, data_len); 321 dest = data + 4; 337 io[1].iov_base = (void *) data; 454 hdr = (struct ieee80211_hdr *) data; 461 event.tx_status.data 201 test_driver_send_ether(void *priv, const u8 *dst, const u8 *src, u16 proto, const u8 *data, size_t data_len) argument 470 test_driver_scan(struct wpa_driver_test_data *drv, struct sockaddr_un *from, socklen_t fromlen, char *data) argument 547 test_driver_assoc(struct wpa_driver_test_data *drv, struct sockaddr_un *from, socklen_t fromlen, char *data) argument 638 test_driver_eapol(struct wpa_driver_test_data *drv, struct sockaddr_un *from, socklen_t fromlen, u8 *data, size_t datalen) argument 674 test_driver_ether(struct wpa_driver_test_data *drv, struct sockaddr_un *from, socklen_t fromlen, u8 *data, size_t datalen) argument 701 test_driver_mlme(struct wpa_driver_test_data *drv, struct sockaddr_un *from, socklen_t fromlen, u8 *data, size_t datalen) argument 1677 wpa_driver_test_scanresp(struct wpa_driver_test_data *drv, struct sockaddr *from, socklen_t fromlen, const char *data) argument 1773 wpa_driver_test_assocresp(struct wpa_driver_test_data *drv, struct sockaddr *from, socklen_t fromlen, const char *data) argument 1808 wpa_driver_test_eapol(struct wpa_driver_test_data *drv, struct sockaddr *from, socklen_t fromlen, const u8 *data, size_t data_len) argument 1830 wpa_driver_test_mlme(struct wpa_driver_test_data *drv, struct sockaddr *from, socklen_t fromlen, const u8 *data, size_t data_len) argument 1896 wpa_driver_test_scan_cmd(struct wpa_driver_test_data *drv, struct sockaddr *from, socklen_t fromlen, const u8 *data, size_t data_len) argument 2273 wpa_driver_test_send_eapol(void *priv, const u8 *dest, u16 proto, const u8 *data, size_t data_len) argument 2527 wpa_driver_test_send_action(void *priv, unsigned int freq, unsigned int wait, const u8 *dst, const u8 *src, const u8 *bssid, const u8 *data, size_t data_len, int no_cck) argument 2574 union wpa_event_data data; local 2593 union wpa_event_data data; local [all...] |
H A D | driver_wext.c | 67 * @priv: Pointer to private wext data from wpa_driver_wext_init() 92 * @priv: Pointer to private wext data from wpa_driver_wext_init() 121 * @priv: Pointer to private wext data from wpa_driver_wext_init() 158 * @priv: Pointer to private wext data from wpa_driver_wext_init() 205 * @priv: Pointer to private wext data from wpa_driver_wext_init() 232 union wpa_event_data data; local 237 os_memset(&data, 0, sizeof(data)); 240 data.michael_mic_failure.unicast = 243 wpa_supplicant_event(ctx, EVENT_MICHAEL_MIC_FAILURE, &data); 306 union wpa_event_data data; local 329 union wpa_event_data data; local 396 union wpa_event_data data; local 420 wpa_driver_wext_event_wireless(struct wpa_driver_wext_data *drv, char *data, int len) argument 1340 wpa_driver_wext_add_scan_entry(struct wpa_scan_results *res, struct wext_scan_data *data) argument 1422 struct wext_scan_data data; local [all...] |
H A D | driver_wired.c | 146 wpa_printf(MSG_DEBUG, "Unknown ethertype 0x%04x in data frame", 311 const u8 *data, size_t data_len, int encrypt, 334 os_memcpy(pos, data, data_len); 356 printf("Could not allocate memory for wired driver data\n"); 310 wired_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len, int encrypt, const u8 *own_addr, u32 flags) argument
|
H A D | ndis_events.c | 194 char *data, size_t data_len) 205 if (data) { 208 "data (%d)", data_len); 213 os_memcpy(pos, data, data_len); 247 char *data, *pos; local 265 data = os_malloc(data_len); 266 if (data == NULL) { 268 "data"); 273 pos = data; 278 wpa_hexdump(MSG_DEBUG, "MediaSpecificEvent", (u8 *) data, data_le 192 ndis_events_send_event(struct ndis_events_data *events, enum event_types type, char *data, size_t data_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.c | 211 static int eap_eke_prf(u8 prf, const u8 *key, size_t key_len, const u8 *data, argument 219 addr[0] = data; 236 static int eap_eke_prf_hmac_sha1(const u8 *key, size_t key_len, const u8 *data, argument 248 addr[1] = data; 277 static int eap_eke_prf_hmac_sha256(const u8 *key, size_t key_len, const u8 *data, argument 289 addr[1] = data; 319 const u8 *data, size_t data_len, u8 *res, size_t len) 322 return eap_eke_prf_hmac_sha1(key, key_len, data, data_len, res, 325 return eap_eke_prf_hmac_sha256(key, key_len, data, data_len, 458 u8 *data; local 318 eap_eke_prfplus(u8 prf, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *res, size_t len) argument 511 u8 *data, *pos; local 557 u8 *data, *pos; local 602 eap_eke_mac(u8 mac, const u8 *key, const u8 *data, size_t data_len, u8 *res) argument 613 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument 668 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument [all...] |
H A D | eap_fast_common.c | 28 void eap_fast_put_tlv(struct wpabuf *buf, u16 type, const void *data, argument 32 wpabuf_put_data(buf, data, len); 37 const struct wpabuf *data) 39 eap_fast_put_tlv_hdr(buf, type, wpabuf_len(data)); 40 wpabuf_put_buf(buf, data); 36 eap_fast_put_tlv_buf(struct wpabuf *buf, u16 type, const struct wpabuf *data) argument
|
H A D | eap_gpsk_common.c | 39 const u8 *data /* Z */, size_t data_len, 52 addr[1] = data; 74 const u8 *data /* Z */, size_t data_len, 87 addr[1] = data; 115 u8 mk[32], *pos, *data; local 140 data = os_malloc(data_len); 141 if (data == NULL) 143 pos = data; 154 data, data_len); 156 if (gkdf(psk, data, data_le 347 u8 *pos, *data; local 499 eap_gpsk_compute_mic_aes(const u8 *sk, size_t sk_len, const u8 *data, size_t len, u8 *mic) argument 523 eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor, int specifier, const u8 *data, size_t len, u8 *mic) argument [all...] |
H A D | eap_pwd_common.c | 26 void eap_pwd_h_update(struct crypto_hash *hash, const u8 *data, size_t len) argument 28 crypto_hash_update(hash, data, len);
|
H A D | eap_sake_common.c | 198 * @data: Extra data (start) to bind into the key 199 * @data_len: Length of the data 200 * @data2: Extra data (end) to bind into the key 209 const u8 *data, size_t data_len, 222 addr[1] = data; /* Msg[start] */ 378 void eap_sake_add_attr(struct wpabuf *buf, u8 type, const u8 *data, argument 383 if (data) 384 wpabuf_put_data(buf, data, len); 208 eap_sake_kdf(const u8 *key, size_t key_len, const char *label, const u8 *data, size_t data_len, const u8 *data2, size_t data2_len, u8 *buf, size_t buf_len) argument
|
H A D | eap_sim_common.c | 134 wpa_printf(MSG_DEBUG, "EAP-SIM: Deriving keying data from reauth"); 192 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - extra data", 220 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - extra data", 387 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - extra data", 415 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - extra data", 529 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Attribute data", 942 wpa_printf(MSG_INFO, "EAP-SIM: Encrypted data, but no IV"); 1051 const u8 *data, size_t len) 1067 wpabuf_put_data(msg->buf, data, len); 1075 const u8 *data, size_ 1050 eap_sim_msg_add_full(struct eap_sim_msg *msg, u8 attr, const u8 *data, size_t len) argument 1074 eap_sim_msg_add(struct eap_sim_msg *msg, u8 attr, u16 value, const u8 *data, size_t len) argument [all...] |
H A D | ikev2_common.c | 56 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, argument 65 hmac_sha1(key, key_len, data, data_len, tmphash); 71 hmac_md5(key, key_len, data, data_len, tmphash); 115 const u8 *data, size_t data_len, 133 addr[1] = data; 357 wpa_printf(MSG_INFO, "IKEV2: Unexpected extra data after " 629 const u8 *skeyseed, const u8 *data, size_t data_len, 652 data, data_len, keybuf, keybuf_len)) { 114 ikev2_prf_plus(int alg, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *out, size_t out_len) argument 626 ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf, const struct ikev2_integ_alg *integ, const struct ikev2_encr_alg *encr, const u8 *skeyseed, const u8 *data, size_t data_len, struct ikev2_keys *keys) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap.c | 158 wpa_printf(MSG_DEBUG, "EAP: maintaining EAP method data for " 279 * the previously used method data to be maintained for 281 * Otherwise, the previously used method data is freed and a new method 289 wpa_printf(MSG_DEBUG, "EAP: Using previous method data" 940 * includes NUL-character, only the data before that should be 946 wpa_hexdump_ascii(MSG_DEBUG, "EAP: EAP-Request Identity data", 1133 * current network. The caller is responsible for freeing the returned data. 1205 wpa_hexdump_ascii(MSG_DEBUG, "EAP: EAP-Request Notification data", 1334 union tls_event_data *data) 1347 data 1333 eap_peer_sm_tls_event(void *ctx, enum tls_event ev, union tls_event_data *data) argument [all...] |
H A D | eap_aka.c | 78 static void eap_aka_state(struct eap_aka_data *data, int state) argument 81 eap_aka_state_txt(data->state), 83 data->state = state; 89 struct eap_aka_data *data; local 93 data = os_zalloc(sizeof(*data)); 94 if (data == NULL) 97 data->eap_method = EAP_TYPE_AKA; 99 eap_aka_state(data, CONTINUE); 100 data 120 struct eap_aka_data *data = eap_aka_init(sm); local 129 eap_aka_clear_keys(struct eap_aka_data *data, int reauth) argument 146 struct eap_aka_data *data = priv; local 159 eap_aka_ext_sim_req(struct eap_sm *sm, struct eap_aka_data *data) argument 177 eap_aka_ext_sim_result(struct eap_sm *sm, struct eap_aka_data *data, struct eap_peer_config *conf) argument 242 eap_aka_umts_auth(struct eap_sm *sm, struct eap_aka_data *data) argument 345 eap_aka_clear_identities(struct eap_sm *sm, struct eap_aka_data *data, int id) argument 370 eap_aka_learn_ids(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_attrs *attr) argument 433 eap_aka_add_id_msg(struct eap_aka_data *data, const struct wpabuf *msg) argument 452 eap_aka_add_checkcode(struct eap_aka_data *data, struct eap_sim_msg *msg) argument 487 eap_aka_verify_checkcode(struct eap_aka_data *data, const u8 *checkcode, size_t checkcode_len) argument 537 eap_aka_client_error(struct eap_aka_data *data, u8 id, int err) argument 555 eap_aka_authentication_reject(struct eap_aka_data *data, u8 id) argument 572 eap_aka_synchronization_failure( struct eap_aka_data *data, u8 id) argument 591 eap_aka_response_identity(struct eap_sm *sm, struct eap_aka_data *data, u8 id, enum eap_sim_id_req id_req) argument 635 eap_aka_response_challenge(struct eap_aka_data *data, u8 id) argument 658 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument 701 eap_aka_response_notification(struct eap_aka_data *data, u8 id, u16 notification) argument 734 eap_aka_process_identity(struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 784 eap_aka_verify_mac(struct eap_aka_data *data, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument 797 eap_aka_prime_kdf_select(struct eap_aka_data *data, u8 id, u16 kdf) argument 814 eap_aka_prime_kdf_neg(struct eap_aka_data *data, u8 id, struct eap_sim_attrs *attr) argument 831 eap_aka_prime_kdf_valid(struct eap_aka_data *data, struct eap_sim_attrs *attr) argument 880 eap_aka_process_challenge(struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1058 eap_aka_process_notification_reauth(struct eap_aka_data *data, struct eap_sim_attrs *attr) argument 1092 eap_aka_process_notification_auth(struct eap_aka_data *data, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1119 eap_aka_process_notification( struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1154 eap_aka_process_reauthentication( struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1281 struct eap_aka_data *data = priv; local 1378 struct eap_aka_data *data = priv; local 1385 struct eap_aka_data *data = priv; local 1398 struct eap_aka_data *data = priv; local 1409 struct eap_aka_data *data = priv; local 1427 struct eap_aka_data *data = priv; local 1434 struct eap_aka_data *data = priv; local 1453 struct eap_aka_data *data = priv; local 1475 struct eap_aka_data *data = priv; local [all...] |
H A D | eap_config.h | 2 * EAP peer configuration data 695 * This data structure is used to provide storage for binary objects to store 697 * configuration data. 706 * data - Pointer to binary data 708 u8 *data; member in struct:wpa_config_blob 711 * len - Length of binary data
|
H A D | eap_eke.c | 57 static void eap_eke_state(struct eap_eke_data *data, int state) argument 60 eap_eke_state_txt(data->state), eap_eke_state_txt(state)); 61 data->state = state; 70 struct eap_eke_data *data; local 81 data = os_zalloc(sizeof(*data)); 82 if (data == NULL) 84 eap_eke_state(data, IDENTITY); 88 data->peerid = os_malloc(identity_len); 89 if (data 136 struct eap_eke_data *data = priv; local 145 eap_eke_build_msg(struct eap_eke_data *data, int id, size_t length, u8 eke_exch) argument 196 eap_eke_build_fail(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, u32 failure_code) argument 222 eap_eke_process_id(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 354 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 499 eap_eke_process_confirm(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 625 eap_eke_process_failure(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 649 struct eap_eke_data *data = priv; local 703 struct eap_eke_data *data = priv; local 710 struct eap_eke_data *data = priv; local 728 struct eap_eke_data *data = priv; local [all...] |
H A D | eap_fast.c | 78 struct eap_fast_data *data = ctx; local 86 data->session_ticket_used = 0; 87 if (data->provisioning_allowed) { 90 data->provisioning = 1; 91 data->current_pac = NULL; 98 if (data->current_pac == NULL) { 101 data->session_ticket_used = 0; 105 eap_fast_derive_master_secret(data->current_pac->pac_key, 109 data->session_ticket_used = 1; 115 static int eap_fast_parse_phase1(struct eap_fast_data *data, argument 149 struct eap_fast_data *data; local 235 struct eap_fast_data *data = priv; local 261 eap_fast_derive_msk(struct eap_fast_data *data) argument 270 eap_fast_derive_key_auth(struct eap_sm *sm, struct eap_fast_data *data) argument 300 eap_fast_derive_key_provisioning(struct eap_sm *sm, struct eap_fast_data *data) argument 332 eap_fast_derive_keys(struct eap_sm *sm, struct eap_fast_data *data) argument 341 eap_fast_init_phase2_method(struct eap_sm *sm, struct eap_fast_data *data) argument 364 eap_fast_select_phase2_method(struct eap_fast_data *data, u8 type) argument 411 eap_fast_phase2_request(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument 553 eap_fast_process_eap_payload_tlv( struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, u8 *eap_payload_tlv, size_t eap_payload_tlv_len) argument 643 eap_fast_get_phase2_key(struct eap_sm *sm, struct eap_fast_data *data, u8 *isk, size_t isk_len) argument 690 eap_fast_get_cmk(struct eap_sm *sm, struct eap_fast_data *data, u8 *cmk) argument 748 eap_fast_process_crypto_binding( struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, struct eap_tlv_crypto_binding_tlv *_bind, size_t bind_len) argument 1024 eap_fast_process_pac(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, u8 *pac, size_t pac_len) argument 1132 eap_fast_encrypt_response(struct eap_sm *sm, struct eap_fast_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1172 eap_fast_process_decrypted(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, struct wpabuf *decrypted, struct wpabuf **out_data) argument 1285 eap_fast_decrypt(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument 1369 eap_fast_select_pac(struct eap_fast_data *data, const u8 *a_id, size_t a_id_len) argument 1394 eap_fast_use_pac_opaque(struct eap_sm *sm, struct eap_fast_data *data, struct eap_fast_pac *pac) argument 1426 eap_fast_clear_pac_opaque_ext(struct eap_sm *sm, struct eap_fast_data *data) argument 1439 eap_fast_set_provisioning_ciphers(struct eap_sm *sm, struct eap_fast_data *data) argument 1472 eap_fast_process_start(struct eap_sm *sm, struct eap_fast_data *data, u8 flags, const u8 *pos, size_t left) argument 1531 struct eap_fast_data *data = priv; local 1661 struct eap_fast_data *data = priv; local 1679 struct eap_fast_data *data = priv; local 1686 struct eap_fast_data *data = priv; local 1705 struct eap_fast_data *data = priv; local 1724 struct eap_fast_data *data = priv; local [all...] |
H A D | eap_fast_pac.c | 19 /* Text data format */ 24 * Binary data format 27 * <version specific data> 34 * <variable len> PAC-Opaque data (length bytes) 36 * <variable len> PAC-Info data (length bytes) 44 * eap_fast_free_pac - Free PAC data 274 rc->pos = (char *) blob->data; 275 rc->end = (char *) blob->data + blob->len; 478 const char *field, const u8 *data, 485 if (data 477 eap_fast_write(char **buf, char **pos, size_t *buf_len, const char *field, const u8 *data, size_t len, int txt) argument [all...] |
H A D | eap_gpsk.c | 40 static struct wpabuf * eap_gpsk_send_gpsk_2(struct eap_gpsk_data *data, 44 static struct wpabuf * eap_gpsk_send_gpsk_4(struct eap_gpsk_data *data, 67 static void eap_gpsk_state(struct eap_gpsk_data *data, int state) argument 70 eap_gpsk_state_txt(data->state), 72 data->state = state; 81 struct eap_gpsk_data *data; local 92 data = os_zalloc(sizeof(*data)); 93 if (data == NULL) 95 data 134 struct eap_gpsk_data *data = priv; local 145 eap_gpsk_process_id_server(struct eap_gpsk_data *data, const u8 *pos, const u8 *end) argument 176 eap_gpsk_process_rand_server(struct eap_gpsk_data *data, const u8 *pos, const u8 *end) argument 195 eap_gpsk_select_csuite(struct eap_sm *sm, struct eap_gpsk_data *data, const u8 *csuite_list, size_t csuite_list_len) argument 236 eap_gpsk_process_csuite_list(struct eap_sm *sm, struct eap_gpsk_data *data, const u8 **list, size_t *list_len, const u8 *pos, const u8 *end) argument 274 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 315 eap_gpsk_send_gpsk_2(struct eap_gpsk_data *data, u8 identifier, const u8 *csuite_list, size_t csuite_list_len) argument 412 eap_gpsk_validate_rand(struct eap_gpsk_data *data, const u8 *pos, const u8 *end) argument 451 eap_gpsk_validate_id_server(struct eap_gpsk_data *data, const u8 *pos, const u8 *end) argument 491 eap_gpsk_validate_csuite(struct eap_gpsk_data *data, const u8 *pos, const u8 *end) argument 520 eap_gpsk_validate_pd_payload_2(struct eap_gpsk_data *data, const u8 *pos, const u8 *end) argument 547 eap_gpsk_validate_gpsk_3_mic(struct eap_gpsk_data *data, const u8 *payload, const u8 *pos, const u8 *end) argument 583 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 630 eap_gpsk_send_gpsk_4(struct eap_gpsk_data *data, u8 identifier) argument 669 struct eap_gpsk_data *data = priv; local 709 struct eap_gpsk_data *data = priv; local 716 struct eap_gpsk_data *data = priv; local 734 struct eap_gpsk_data *data = priv; local 752 struct eap_gpsk_data *data = priv; local [all...] |
H A D | eap_gtc.c | 22 struct eap_gtc_data *data; local 23 data = os_zalloc(sizeof(*data)); 24 if (data == NULL) 31 data->prefix = 1; 33 return data; 39 struct eap_gtc_data *data = priv; local 40 os_free(data); 48 struct eap_gtc_data *data = priv; local 63 if (data [all...] |
H A D | eap_ikev2.c | 49 static void eap_ikev2_state(struct eap_ikev2_data *data, int state) argument 52 eap_ikev2_state_txt(data->state), 54 data->state = state; 60 struct eap_ikev2_data *data; local 71 data = os_zalloc(sizeof(*data)); 72 if (data == NULL) 74 data->state = WAIT_START; 77 data->fragment_size = IKEV2_FRAGMENT_SIZE; 79 data 112 struct eap_ikev2_data *data = priv; local 120 eap_ikev2_peer_keymat(struct eap_ikev2_data *data) argument 136 eap_ikev2_build_msg(struct eap_ikev2_data *data, struct eap_method_ret *ret, u8 id) argument 246 eap_ikev2_process_icv(struct eap_ikev2_data *data, const struct wpabuf *reqData, u8 flags, const u8 *pos, const u8 **end, int frag_ack) argument 269 eap_ikev2_process_cont(struct eap_ikev2_data *data, const u8 *buf, size_t len) argument 288 eap_ikev2_process_fragment(struct eap_ikev2_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u32 message_length, const u8 *buf, size_t len) argument 326 struct eap_ikev2_data *data = priv; local 434 struct eap_ikev2_data *data = priv; local 441 struct eap_ikev2_data *data = priv; local 459 struct eap_ikev2_data *data = priv; local 477 struct eap_ikev2_data *data = priv; local [all...] |
H A D | eap_leap.c | 41 struct eap_leap_data *data; local 43 data = os_zalloc(sizeof(*data)); 44 if (data == NULL) 46 data->state = LEAP_WAIT_CHALLENGE; 49 return data; 63 struct eap_leap_data *data = priv; local 103 os_memcpy(data->peer_challenge, challenge, LEAP_CHALLENGE_LEN); 122 os_memcpy(data->peer_response, rpos, LEAP_RESPONSE_LEN); 127 data 137 struct eap_leap_data *data = priv; local 187 struct eap_leap_data *data = priv; local 325 struct eap_leap_data *data = priv; local 332 struct eap_leap_data *data = priv; local [all...] |
H A D | eap_mschapv2.c | 36 /* followed by data */ 106 struct eap_mschapv2_data *data; local 107 data = os_zalloc(sizeof(*data)); 108 if (data == NULL) 112 data->peer_challenge = os_malloc(MSCHAPV2_CHAL_LEN); 113 if (data->peer_challenge == NULL) { 114 eap_mschapv2_deinit(sm, data); 117 os_memcpy(data->peer_challenge, sm->peer_challenge, 122 data 139 struct eap_mschapv2_data *data = priv; local 147 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument 239 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 297 eap_mschapv2_password_changed(struct eap_sm *sm, struct eap_mschapv2_data *data) argument 344 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 400 eap_mschapv2_failure_txt(struct eap_sm *sm, struct eap_mschapv2_data *data, char *txt) argument 503 eap_mschapv2_change_password( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id) argument 638 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 741 eap_mschapv2_copy_challenge(struct eap_mschapv2_data *data, const struct wpabuf *reqData) argument 766 struct eap_mschapv2_data *data = priv; local 826 struct eap_mschapv2_data *data = priv; local 833 struct eap_mschapv2_data *data = priv; local [all...] |
H A D | eap_pax.c | 49 struct eap_pax_data *data; local 66 data = os_zalloc(sizeof(*data)); 67 if (data == NULL) 69 data->state = PAX_INIT; 71 data->cid = os_malloc(identity_len); 72 if (data->cid == NULL) { 73 eap_pax_deinit(sm, data); 76 os_memcpy(data->cid, identity, identity_len); 77 data 87 struct eap_pax_data *data = priv; local 115 eap_pax_process_std_1(struct eap_pax_data *data, struct eap_method_ret *ret, u8 id, const struct eap_pax_hdr *req, size_t req_plen) argument 231 eap_pax_process_std_3(struct eap_pax_data *data, struct eap_method_ret *ret, u8 id, const struct eap_pax_hdr *req, size_t req_plen) argument 326 struct eap_pax_data *data = priv; local 456 struct eap_pax_data *data = priv; local 463 struct eap_pax_data *data = priv; local 484 struct eap_pax_data *data = priv; local [all...] |
H A D | eap_peap.c | 72 static int eap_peap_parse_phase1(struct eap_peap_data *data, argument 79 data->force_peap_version = atoi(pos + 8); 80 data->peap_version = data->force_peap_version; 82 data->force_peap_version); 86 data->force_new_label = 1; 92 data->peap_outer_success = 0; 96 data->peap_outer_success = 1; 100 data->peap_outer_success = 2; 106 data 135 struct eap_peap_data *data; local 173 eap_peap_free_key(struct eap_peap_data *data) argument 184 struct eap_peap_data *data = priv; local 226 eap_peap_get_isk(struct eap_sm *sm, struct eap_peap_data *data, u8 *isk, size_t isk_len) argument 255 eap_peap_derive_cmk(struct eap_sm *sm, struct eap_peap_data *data) argument 309 eap_tlv_add_cryptobinding(struct eap_sm *sm, struct eap_peap_data *data, struct wpabuf *buf) argument 357 eap_tlv_build_result(struct eap_sm *sm, struct eap_peap_data *data, int crypto_tlv_used, int id, u16 status) argument 390 eap_tlv_validate_cryptobinding(struct eap_sm *sm, struct eap_peap_data *data, const u8 *crypto_tlv, size_t crypto_tlv_len) argument 465 eap_tlv_process(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct wpabuf *req, struct wpabuf **resp, int force_failure) argument 589 eap_peap_phase2_request(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, struct wpabuf *req, struct wpabuf **resp) argument 734 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument 970 struct eap_peap_data *data = priv; local 1109 struct eap_peap_data *data = priv; local 1117 struct eap_peap_data *data = priv; local 1126 struct eap_peap_data *data = priv; local 1150 struct eap_peap_data *data = priv; local 1169 struct eap_peap_data *data = priv; local 1176 struct eap_peap_data *data = priv; local 1214 struct eap_peap_data *data = priv; local [all...] |