Searched defs:len (Results 751 - 775 of 5216) sorted by last modified time

<<31323334353637383940>>

/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius_client.c713 int len, roundtrip; local
734 len = recv(sock, buf, sizeof(buf), MSG_DONTWAIT);
735 if (len < 0) {
741 "server", len);
742 if (len == sizeof(buf)) {
747 msg = radius_msg_parse(buf, len);
H A Dradius_das.c58 size_t len; local
76 &buf, &len, NULL) == 0) {
77 if (len != 4) {
88 &buf, &len, NULL) == 0) {
89 if (len != 16) {
100 &buf, &len, NULL) == 0) {
102 attrs.nas_identifier_len = len;
106 &buf, &len, NULL) == 0) {
107 if (len >= sizeof(tmp))
108 len
187 int len; local
[all...]
H A Dradius_server.c737 int len; local
744 len = sess->eap_if->eapKeyDataLen;
745 if (len > 64)
746 len = 64;
747 len = wpa_snprintf_hex(
749 sess->eap_if->eapKeyData, len);
750 buf[len] = '\0';
757 len = 32;
759 len = sess->eap_if->eapKeyDataLen / 2;
764 sess->eap_if->eapKeyData + len,
1179 int len; local
1289 int len, res; local
2004 radius_server_get_eap_req_id_text(void *ctx, size_t *len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.c270 hdr->len = (pos - peerkey->rsnie_p) - 2;
302 const size_t len[5] = { 8, WPA_NONCE_LEN, ETH_ALEN, WPA_NONCE_LEN, local
314 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash);
317 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash);
907 * @len: Length of the EAPOL-Key frame
913 const u8 *buf, size_t len)
930 wpa_eapol_key_mic(peerkey->tstk.kck, ver, buf, len,
946 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len,
1042 hdr->len = (pos - peerkey->rsnie_i) - 2;
910 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
H A Dpeerkey.h42 const u8 *buf, size_t len);
57 const u8 *buf, size_t len)
54 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
H A Dpmksa_cache.c458 * @len: Length of the buffer
464 int pmksa_cache_list(struct rsn_pmksa_cache *pmksa, char *buf, size_t len) argument
472 ret = os_snprintf(pos, buf + len - pos,
475 if (ret < 0 || ret >= buf + len - pos)
482 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ",
484 if (ret < 0 || ret >= buf + len - pos)
487 pos += wpa_snprintf_hex(pos, buf + len - pos, entry->pmkid,
489 ret = os_snprintf(pos, buf + len - pos, " %d %d\n",
492 if (ret < 0 || ret >= buf + len - pos)
H A Dpmksa_cache.h57 int pmksa_cache_list(struct rsn_pmksa_cache *pmksa, char *buf, size_t len);
100 size_t len)
99 pmksa_cache_list(struct rsn_pmksa_cache *pmksa, char *buf, size_t len) argument
H A Dpreauth.c53 const u8 *buf, size_t len)
58 wpa_hexdump(MSG_MSGDUMP, "RX pre-auth", buf, len);
69 eapol_sm_rx_eapol(sm->preauth_eapol, src_addr, buf, len);
130 size_t len)
143 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL);
52 rsn_preauth_receive(void *ctx, const u8 *src_addr, const u8 *buf, size_t len) argument
129 rsn_preauth_eapol_send(void *ctx, int type, const u8 *buf, size_t len) argument
H A Dtdls.c221 int initiator, const u8 *buf, size_t len)
225 len);
391 size_t len[2]; local
397 len[0] = WPA_NONCE_LEN;
398 len[1] = WPA_NONCE_LEN;
408 sha256_vector(2, nonce, len, key_input);
459 int len = 2 * ETH_ALEN + 1 + 2 + lnkid[1] + 2 + rsnie[1] + local
461 buf = os_zalloc(len);
520 int len; local
525 len
218 wpa_tdls_send_tpk_msg(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument
896 wpa_tdls_recv_teardown(struct wpa_sm *sm, const u8 *src_addr, const u8 *buf, size_t len) argument
1476 wpa_tdls_process_discovery_request(struct wpa_sm *sm, const u8 *addr, const u8 *buf, size_t len) argument
1733 wpa_tdls_process_tpk_m1(struct wpa_sm *sm, const u8 *src_addr, const u8 *buf, size_t len) argument
2115 wpa_tdls_process_tpk_m2(struct wpa_sm *sm, const u8 *src_addr, const u8 *buf, size_t len) argument
2390 wpa_tdls_process_tpk_m3(struct wpa_sm *sm, const u8 *src_addr, const u8 *buf, size_t len) argument
2655 wpa_supplicant_rx_tdls(void *ctx, const u8 *src_addr, const u8 *buf, size_t len) argument
2833 wpa_tdls_prohibited(const u8 *ies, size_t len) argument
2851 wpa_tdls_ap_ies(struct wpa_sm *sm, const u8 *ies, size_t len) argument
2859 wpa_tdls_assoc_resp_ies(struct wpa_sm *sm, const u8 *ies, size_t len) argument
[all...]
H A Dwpa.c133 "pairwise=%d ptk_set=%d len=%lu)",
644 "WPA: Installing GTK to the driver (keyidx=%d tx=%d len=%d)",
755 size_t len; local
758 len = wpa_cipher_key_len(sm->mgmt_group_cipher);
759 if (ie->igtk_len != WPA_IGTK_KDE_PREFIX_LEN + len)
767 igtk->igtk, len);
776 igtk->igtk, len) < 0) {
1224 "RSN: Too long GTK in GTK IE (len=%lu)",
1286 "WPA: Unsupported AES-WRAP len %lu",
1413 const u8 *buf, size_t len)
1410 wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
1595 wpa_sm_rx_eapol(struct wpa_sm *sm, const u8 *src_addr, const u8 *buf, size_t len) argument
1932 size_t len; local
2517 wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument
2552 wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument
2587 wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument
2637 wpa_sm_pmksa_cache_list(struct wpa_sm *sm, char *buf, size_t len) argument
2755 wpa_sm_rx_eapol_peerkey(struct wpa_sm *sm, const u8 *src_addr, const u8 *buf, size_t len) argument
[all...]
H A Dwpa.h35 size_t len);
58 int initiator, const u8 *buf, size_t len);
117 int wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len);
120 int wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len);
121 int wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, size_t len);
138 const u8 *buf, size_t len);
140 int wpa_sm_pmksa_cache_list(struct wpa_sm *sm, char *buf, size_t len);
205 size_t len)
218 size_t len)
224 size_t len)
204 wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument
217 wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument
223 wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument
267 wpa_sm_rx_eapol(struct wpa_sm *sm, const u8 *src_addr, const u8 *buf, size_t len) argument
279 wpa_sm_pmksa_cache_list(struct wpa_sm *sm, char *buf, size_t len) argument
316 wpa_sm_rx_eapol_peerkey(struct wpa_sm *sm, const u8 *src_addr, const u8 *buf, size_t len) argument
[all...]
H A Dwpa_ft.c133 * @len: Buffer for returning the length of the IEs
145 static u8 * wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, argument
245 rsnie->len = (pos - (u8 *) rsnie) - 2;
304 (u8 *) rsnie, 2 + rsnie->len, ric_ies,
312 *len = pos - buf;
H A Dwpa_i.h174 u16 proto, const u8 *buf, size_t len)
177 return sm->ctx->ether_send(sm->ctx->ctx, dest, proto, buf, len);
272 size_t len)
278 len);
173 wpa_sm_ether_send(struct wpa_sm *sm, const u8 *dest, u16 proto, const u8 *buf, size_t len) argument
268 wpa_sm_send_tdls_mgmt(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument
H A Dwpa_ie.c97 hdr->len = (pos - wpa_ie) - 2;
218 hdr->len = (pos - rsn_ie) - 2;
231 u8 *pos, *len; local
240 len = pos++; /* to be filled */
275 *len = pos - len - 1;
327 wpa_printf(MSG_MSGDUMP, "Too short vendor specific IE ignored (len=%u)",
476 * @len: Key Data Length
480 int wpa_supplicant_parse_ies(const u8 *buf, size_t len, argument
487 for (pos = buf, end = pos + len; po
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dasn1.c16 .len = 6
21 .len = 9
25 int asn1_get_next(const u8 *buf, size_t len, struct asn1_hdr *hdr) argument
32 end = buf + len;
90 int asn1_parse_oid(const u8 *buf, size_t len, struct asn1_oid *oid) argument
99 end = buf + len;
111 if (oid->len >= ASN1_MAX_OID_LEN) {
115 if (oid->len == 0) {
125 oid->len = 2;
127 oid->oid[oid->len
134 asn1_get_oid(const u8 *buf, size_t len, struct asn1_oid *oid, const u8 **next) argument
154 asn1_oid_to_str(const struct asn1_oid *oid, char *buf, size_t len) argument
194 asn1_bit_string_to_long(const u8 *buf, size_t len) argument
[all...]
H A Dasn1.h55 size_t len; member in struct:asn1_oid
59 int asn1_get_next(const u8 *buf, size_t len, struct asn1_hdr *hdr);
60 int asn1_parse_oid(const u8 *buf, size_t len, struct asn1_oid *oid);
61 int asn1_get_oid(const u8 *buf, size_t len, struct asn1_oid *oid,
63 void asn1_oid_to_str(const struct asn1_oid *oid, char *buf, size_t len);
64 unsigned long asn1_bit_string_to_long(const u8 *buf, size_t len);
H A Dbignum.c71 * @len: Length of the buffer, can be %NULL if buffer is known to be long
75 int bignum_get_unsigned_bin(const struct bignum *n, u8 *buf, size_t *len) argument
78 if (len && need > *len) {
79 *len = need;
86 if (len)
87 *len = need;
96 * @len: Length of buf in octets
99 int bignum_set_unsigned_bin(struct bignum *n, const u8 *buf, size_t len) argument
101 if (mp_read_unsigned_bin((mp_int *) n, (u8 *) buf, len) !
[all...]
H A Dlibtommath.c202 static void bn_reverse (unsigned char *s, int len) argument
208 iy = len - 1;
H A Dpkcs1.c138 size_t len; local
141 len = *plain_len;
142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0)
156 if (len < 3 + 8 + 16 /* min hash len */ ||
170 while (pos < plain + len && *pos == 0xff)
180 if (pos + 16 /* min hash len */ >= plain + len || *pos != 0x00) {
186 len -= pos - plain;
189 os_memmove(plain, pos, len);
[all...]
H A Dpkcs5.c31 if (oid->len == 7 &&
145 size_t len[2]; local
151 len[0] = os_strlen(passwd);
153 len[1] = params->salt_len;
154 if (md5_vector(2, addr, len, hash) < 0)
157 len[0] = MD5_MAC_LEN;
159 if (md5_vector(1, addr, len, hash) < 0)
H A Dpkcs8.c19 struct crypto_private_key * pkcs8_key_import(const u8 *buf, size_t len) argument
30 if (asn1_get_next(buf, len, &hdr) < 0 ||
71 if (asn1_get_next(pos, len, &hdr) < 0 ||
90 if (oid.len != 7 ||
122 pkcs8_enc_key_import(const u8 *buf, size_t len, const char *passwd) argument
142 if (asn1_get_next(buf, len, &hdr) < 0 ||
H A Drsa.c58 * @len: Key buffer length in bytes
62 crypto_rsa_import_public_key(const u8 *buf, size_t len) argument
87 if (asn1_get_next(buf, len, &hdr) < 0 ||
145 * @len: Key buffer length in bytes
149 crypto_rsa_import_private_key(const u8 *buf, size_t len) argument
194 if (asn1_get_next(buf, len, &hdr) < 0 ||
H A Dtlsv1_client_read.c34 size_t left, len, i; local
63 len = WPA_GET_BE24(pos);
67 if (len > left)
72 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len);
73 end = pos + len;
218 size_t left, len, list_len, cert_len, idx; local
236 "(len=%lu)", (unsigned long) left);
242 len = WPA_GET_BE24(pos);
246 if (len > left) {
248 "length (len
412 count_bits(const u8 *val, size_t len) argument
436 tlsv1_process_diffie_hellman(struct tlsv1_client *conn, const u8 *buf, size_t len, tls_key_exchange key_exchange) argument
571 size_t left, len; local
662 size_t left, len; local
726 size_t left, len; local
854 size_t left, len, hlen; local
1014 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
[all...]
H A Dtlsv1_client_write.c26 size_t len = 0; local
34 len += 3 + cert->cert_len;
41 return len;
49 size_t len, i; local
64 len = 100 + conn->num_cipher_suites * 2 + conn->client_hello_ext_len;
65 hello = os_malloc(len);
68 end = hello + len;
H A Dtlsv1_common.c145 return 1 /* FIX: public key len > 512 bits */;
155 * @len: Length of the buffer
163 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) argument
168 buf, len);
170 *pk = crypto_public_key_from_cert(buf, len);
174 cert = x509_certificate_parse(buf, len);
239 size_t len)
242 crypto_hash_update(verify->md5_client, buf, len);
243 crypto_hash_update(verify->sha1_client, buf, len);
246 crypto_hash_update(verify->md5_server, buf, len);
238 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) argument
401 tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, const u8 *data, size_t data_len, const u8 *pos, size_t len, u8 *alert) argument
[all...]

Completed in 359 milliseconds

<<31323334353637383940>>