/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_client.c | 713 int len, roundtrip; local 734 len = recv(sock, buf, sizeof(buf), MSG_DONTWAIT); 735 if (len < 0) { 741 "server", len); 742 if (len == sizeof(buf)) { 747 msg = radius_msg_parse(buf, len);
|
H A D | radius_das.c | 58 size_t len; local 76 &buf, &len, NULL) == 0) { 77 if (len != 4) { 88 &buf, &len, NULL) == 0) { 89 if (len != 16) { 100 &buf, &len, NULL) == 0) { 102 attrs.nas_identifier_len = len; 106 &buf, &len, NULL) == 0) { 107 if (len >= sizeof(tmp)) 108 len 187 int len; local [all...] |
H A D | radius_server.c | 737 int len; local 744 len = sess->eap_if->eapKeyDataLen; 745 if (len > 64) 746 len = 64; 747 len = wpa_snprintf_hex( 749 sess->eap_if->eapKeyData, len); 750 buf[len] = '\0'; 757 len = 32; 759 len = sess->eap_if->eapKeyDataLen / 2; 764 sess->eap_if->eapKeyData + len, 1179 int len; local 1289 int len, res; local 2004 radius_server_get_eap_req_id_text(void *ctx, size_t *len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 270 hdr->len = (pos - peerkey->rsnie_p) - 2; 302 const size_t len[5] = { 8, WPA_NONCE_LEN, ETH_ALEN, WPA_NONCE_LEN, local 314 hmac_sha256_vector(smk, PMK_LEN, 5, addr, len, hash); 317 hmac_sha1_vector(smk, PMK_LEN, 5, addr, len, hash); 907 * @len: Length of the EAPOL-Key frame 913 const u8 *buf, size_t len) 930 wpa_eapol_key_mic(peerkey->tstk.kck, ver, buf, len, 946 wpa_eapol_key_mic(peerkey->stk.kck, ver, buf, len, 1042 hdr->len = (pos - peerkey->rsnie_i) - 2; 910 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
|
H A D | peerkey.h | 42 const u8 *buf, size_t len); 57 const u8 *buf, size_t len) 54 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
|
H A D | pmksa_cache.c | 458 * @len: Length of the buffer 464 int pmksa_cache_list(struct rsn_pmksa_cache *pmksa, char *buf, size_t len) argument 472 ret = os_snprintf(pos, buf + len - pos, 475 if (ret < 0 || ret >= buf + len - pos) 482 ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ", 484 if (ret < 0 || ret >= buf + len - pos) 487 pos += wpa_snprintf_hex(pos, buf + len - pos, entry->pmkid, 489 ret = os_snprintf(pos, buf + len - pos, " %d %d\n", 492 if (ret < 0 || ret >= buf + len - pos)
|
H A D | pmksa_cache.h | 57 int pmksa_cache_list(struct rsn_pmksa_cache *pmksa, char *buf, size_t len); 100 size_t len) 99 pmksa_cache_list(struct rsn_pmksa_cache *pmksa, char *buf, size_t len) argument
|
H A D | preauth.c | 53 const u8 *buf, size_t len) 58 wpa_hexdump(MSG_MSGDUMP, "RX pre-auth", buf, len); 69 eapol_sm_rx_eapol(sm->preauth_eapol, src_addr, buf, len); 130 size_t len) 143 msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL); 52 rsn_preauth_receive(void *ctx, const u8 *src_addr, const u8 *buf, size_t len) argument 129 rsn_preauth_eapol_send(void *ctx, int type, const u8 *buf, size_t len) argument
|
H A D | tdls.c | 221 int initiator, const u8 *buf, size_t len) 225 len); 391 size_t len[2]; local 397 len[0] = WPA_NONCE_LEN; 398 len[1] = WPA_NONCE_LEN; 408 sha256_vector(2, nonce, len, key_input); 459 int len = 2 * ETH_ALEN + 1 + 2 + lnkid[1] + 2 + rsnie[1] + local 461 buf = os_zalloc(len); 520 int len; local 525 len 218 wpa_tdls_send_tpk_msg(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument 896 wpa_tdls_recv_teardown(struct wpa_sm *sm, const u8 *src_addr, const u8 *buf, size_t len) argument 1476 wpa_tdls_process_discovery_request(struct wpa_sm *sm, const u8 *addr, const u8 *buf, size_t len) argument 1733 wpa_tdls_process_tpk_m1(struct wpa_sm *sm, const u8 *src_addr, const u8 *buf, size_t len) argument 2115 wpa_tdls_process_tpk_m2(struct wpa_sm *sm, const u8 *src_addr, const u8 *buf, size_t len) argument 2390 wpa_tdls_process_tpk_m3(struct wpa_sm *sm, const u8 *src_addr, const u8 *buf, size_t len) argument 2655 wpa_supplicant_rx_tdls(void *ctx, const u8 *src_addr, const u8 *buf, size_t len) argument 2833 wpa_tdls_prohibited(const u8 *ies, size_t len) argument 2851 wpa_tdls_ap_ies(struct wpa_sm *sm, const u8 *ies, size_t len) argument 2859 wpa_tdls_assoc_resp_ies(struct wpa_sm *sm, const u8 *ies, size_t len) argument [all...] |
H A D | wpa.c | 133 "pairwise=%d ptk_set=%d len=%lu)", 644 "WPA: Installing GTK to the driver (keyidx=%d tx=%d len=%d)", 755 size_t len; local 758 len = wpa_cipher_key_len(sm->mgmt_group_cipher); 759 if (ie->igtk_len != WPA_IGTK_KDE_PREFIX_LEN + len) 767 igtk->igtk, len); 776 igtk->igtk, len) < 0) { 1224 "RSN: Too long GTK in GTK IE (len=%lu)", 1286 "WPA: Unsupported AES-WRAP len %lu", 1413 const u8 *buf, size_t len) 1410 wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument 1595 wpa_sm_rx_eapol(struct wpa_sm *sm, const u8 *src_addr, const u8 *buf, size_t len) argument 1932 size_t len; local 2517 wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument 2552 wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument 2587 wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument 2637 wpa_sm_pmksa_cache_list(struct wpa_sm *sm, char *buf, size_t len) argument 2755 wpa_sm_rx_eapol_peerkey(struct wpa_sm *sm, const u8 *src_addr, const u8 *buf, size_t len) argument [all...] |
H A D | wpa.h | 35 size_t len); 58 int initiator, const u8 *buf, size_t len); 117 int wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len); 120 int wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len); 121 int wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, size_t len); 138 const u8 *buf, size_t len); 140 int wpa_sm_pmksa_cache_list(struct wpa_sm *sm, char *buf, size_t len); 205 size_t len) 218 size_t len) 224 size_t len) 204 wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument 217 wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument 223 wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument 267 wpa_sm_rx_eapol(struct wpa_sm *sm, const u8 *src_addr, const u8 *buf, size_t len) argument 279 wpa_sm_pmksa_cache_list(struct wpa_sm *sm, char *buf, size_t len) argument 316 wpa_sm_rx_eapol_peerkey(struct wpa_sm *sm, const u8 *src_addr, const u8 *buf, size_t len) argument [all...] |
H A D | wpa_ft.c | 133 * @len: Buffer for returning the length of the IEs 145 static u8 * wpa_ft_gen_req_ies(struct wpa_sm *sm, size_t *len, argument 245 rsnie->len = (pos - (u8 *) rsnie) - 2; 304 (u8 *) rsnie, 2 + rsnie->len, ric_ies, 312 *len = pos - buf;
|
H A D | wpa_i.h | 174 u16 proto, const u8 *buf, size_t len) 177 return sm->ctx->ether_send(sm->ctx->ctx, dest, proto, buf, len); 272 size_t len) 278 len); 173 wpa_sm_ether_send(struct wpa_sm *sm, const u8 *dest, u16 proto, const u8 *buf, size_t len) argument 268 wpa_sm_send_tdls_mgmt(struct wpa_sm *sm, const u8 *dst, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *buf, size_t len) argument
|
H A D | wpa_ie.c | 97 hdr->len = (pos - wpa_ie) - 2; 218 hdr->len = (pos - rsn_ie) - 2; 231 u8 *pos, *len; local 240 len = pos++; /* to be filled */ 275 *len = pos - len - 1; 327 wpa_printf(MSG_MSGDUMP, "Too short vendor specific IE ignored (len=%u)", 476 * @len: Key Data Length 480 int wpa_supplicant_parse_ies(const u8 *buf, size_t len, argument 487 for (pos = buf, end = pos + len; po [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | asn1.c | 16 .len = 6 21 .len = 9 25 int asn1_get_next(const u8 *buf, size_t len, struct asn1_hdr *hdr) argument 32 end = buf + len; 90 int asn1_parse_oid(const u8 *buf, size_t len, struct asn1_oid *oid) argument 99 end = buf + len; 111 if (oid->len >= ASN1_MAX_OID_LEN) { 115 if (oid->len == 0) { 125 oid->len = 2; 127 oid->oid[oid->len 134 asn1_get_oid(const u8 *buf, size_t len, struct asn1_oid *oid, const u8 **next) argument 154 asn1_oid_to_str(const struct asn1_oid *oid, char *buf, size_t len) argument 194 asn1_bit_string_to_long(const u8 *buf, size_t len) argument [all...] |
H A D | asn1.h | 55 size_t len; member in struct:asn1_oid 59 int asn1_get_next(const u8 *buf, size_t len, struct asn1_hdr *hdr); 60 int asn1_parse_oid(const u8 *buf, size_t len, struct asn1_oid *oid); 61 int asn1_get_oid(const u8 *buf, size_t len, struct asn1_oid *oid, 63 void asn1_oid_to_str(const struct asn1_oid *oid, char *buf, size_t len); 64 unsigned long asn1_bit_string_to_long(const u8 *buf, size_t len);
|
H A D | bignum.c | 71 * @len: Length of the buffer, can be %NULL if buffer is known to be long 75 int bignum_get_unsigned_bin(const struct bignum *n, u8 *buf, size_t *len) argument 78 if (len && need > *len) { 79 *len = need; 86 if (len) 87 *len = need; 96 * @len: Length of buf in octets 99 int bignum_set_unsigned_bin(struct bignum *n, const u8 *buf, size_t len) argument 101 if (mp_read_unsigned_bin((mp_int *) n, (u8 *) buf, len) ! [all...] |
H A D | libtommath.c | 202 static void bn_reverse (unsigned char *s, int len) argument 208 iy = len - 1;
|
H A D | pkcs1.c | 138 size_t len; local 141 len = *plain_len; 142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) 156 if (len < 3 + 8 + 16 /* min hash len */ || 170 while (pos < plain + len && *pos == 0xff) 180 if (pos + 16 /* min hash len */ >= plain + len || *pos != 0x00) { 186 len -= pos - plain; 189 os_memmove(plain, pos, len); [all...] |
H A D | pkcs5.c | 31 if (oid->len == 7 && 145 size_t len[2]; local 151 len[0] = os_strlen(passwd); 153 len[1] = params->salt_len; 154 if (md5_vector(2, addr, len, hash) < 0) 157 len[0] = MD5_MAC_LEN; 159 if (md5_vector(1, addr, len, hash) < 0)
|
H A D | pkcs8.c | 19 struct crypto_private_key * pkcs8_key_import(const u8 *buf, size_t len) argument 30 if (asn1_get_next(buf, len, &hdr) < 0 || 71 if (asn1_get_next(pos, len, &hdr) < 0 || 90 if (oid.len != 7 || 122 pkcs8_enc_key_import(const u8 *buf, size_t len, const char *passwd) argument 142 if (asn1_get_next(buf, len, &hdr) < 0 ||
|
H A D | rsa.c | 58 * @len: Key buffer length in bytes 62 crypto_rsa_import_public_key(const u8 *buf, size_t len) argument 87 if (asn1_get_next(buf, len, &hdr) < 0 || 145 * @len: Key buffer length in bytes 149 crypto_rsa_import_private_key(const u8 *buf, size_t len) argument 194 if (asn1_get_next(buf, len, &hdr) < 0 ||
|
H A D | tlsv1_client_read.c | 34 size_t left, len, i; local 63 len = WPA_GET_BE24(pos); 67 if (len > left) 72 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len); 73 end = pos + len; 218 size_t left, len, list_len, cert_len, idx; local 236 "(len=%lu)", (unsigned long) left); 242 len = WPA_GET_BE24(pos); 246 if (len > left) { 248 "length (len 412 count_bits(const u8 *val, size_t len) argument 436 tlsv1_process_diffie_hellman(struct tlsv1_client *conn, const u8 *buf, size_t len, tls_key_exchange key_exchange) argument 571 size_t left, len; local 662 size_t left, len; local 726 size_t left, len; local 854 size_t left, len, hlen; local 1014 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument [all...] |
H A D | tlsv1_client_write.c | 26 size_t len = 0; local 34 len += 3 + cert->cert_len; 41 return len; 49 size_t len, i; local 64 len = 100 + conn->num_cipher_suites * 2 + conn->client_hello_ext_len; 65 hello = os_malloc(len); 68 end = hello + len;
|
H A D | tlsv1_common.c | 145 return 1 /* FIX: public key len > 512 bits */; 155 * @len: Length of the buffer 163 int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk) argument 168 buf, len); 170 *pk = crypto_public_key_from_cert(buf, len); 174 cert = x509_certificate_parse(buf, len); 239 size_t len) 242 crypto_hash_update(verify->md5_client, buf, len); 243 crypto_hash_update(verify->sha1_client, buf, len); 246 crypto_hash_update(verify->md5_server, buf, len); 238 tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, size_t len) argument 401 tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, const u8 *data, size_t data_len, const u8 *pos, size_t len, u8 *alert) argument [all...] |