/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_test.c | 2279 size_t msg_len; local 2294 msg_len = 6 + sizeof(eth) + data_len; 2295 msg = os_malloc(msg_len); 2336 if (sendto(drv->test_socket, msg, msg_len, 0, addr, alen) < 0) {
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument 213 len[0] = msg_len; 219 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 400 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, argument 408 len[0] = msg_len; 414 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - msg", msg, msg_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 926 size_t msg_len; local 933 &msg_len); 947 pos, msg_len); 1199 size_t i, msg_len; local 1202 &msg_len); 1206 pos, msg_len); 1208 msg = os_malloc(msg_len + 1); 1211 for (i = 0; i < msg_len; i++) 1213 msg[msg_len] = '\0'; 1795 * @msg_len 1801 eap_sm_request_otp(struct eap_sm *sm, const char *msg, size_t msg_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_gtc.c | 55 size_t msg_len; local 59 msg_len = os_strlen(msg); 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, 69 wpabuf_put_data(req, msg, msg_len);
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 80 const u8 *mka_msg, size_t msg_len); 706 size_t msg_len) 912 const u8 *mka_msg, size_t msg_len) 925 left_len = msg_len; 981 const u8 *peer_msg, size_t msg_len) 1037 const u8 *peer_msg, size_t msg_len) 1233 const u8 *mka_msg, size_t msg_len) 1512 const u8 *mka_msg, size_t msg_len) 1746 const u8 *mka_msg, size_t msg_len) 1756 left_len = msg_len; 705 ieee802_1x_mka_decode_basic_body(struct ieee802_1x_kay *kay, const u8 *mka_msg, size_t msg_len) argument 911 ieee802_1x_mka_i_in_peerlist(struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 979 ieee802_1x_mka_decode_live_peer_body( struct ieee802_1x_mka_participant *participant, const u8 *peer_msg, size_t msg_len) argument 1035 ieee802_1x_mka_decode_potential_peer_body( struct ieee802_1x_mka_participant *participant, const u8 *peer_msg, size_t msg_len) argument 1231 ieee802_1x_mka_decode_sak_use_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1510 ieee802_1x_mka_decode_dist_sak_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1745 ieee802_1x_mka_decode_icv_body(struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1788 ieee802_1x_mka_decode_dist_cak_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1812 ieee802_1x_mka_decode_kmd_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1835 ieee802_1x_mka_decode_announce_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius.c | 656 size_t msg_len; local 664 msg_len = be_to_host16(hdr->length); 665 if (msg_len < sizeof(*hdr) || msg_len > len) { 670 if (msg_len < len) { 672 "RADIUS message", (unsigned long) len - msg_len); 679 msg->buf = wpabuf_alloc_copy(data, msg_len);
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | tdls.c | 231 int initiator, const u8 *msg, size_t msg_len) 237 "msg_len=%u", 239 peer_capab, initiator, (unsigned int) msg_len); 243 msg_len)) { 282 peer->sm_tmr.buf_len = msg_len; 284 peer->sm_tmr.buf = os_malloc(msg_len); 287 os_memcpy(peer->sm_tmr.buf, msg, msg_len); 229 wpa_tdls_tpk_send(struct wpa_sm *sm, const u8 *dest, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *msg, size_t msg_len) argument
|
H A D | wpa.c | 34 * @msg_len: Length of message 39 u8 *msg, size_t msg_len, u8 *key_mic) 59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { 67 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len); 68 wpa_sm_ether_send(sm, dest, proto, msg, msg_len); 37 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument
|
H A D | wpa_i.h | 194 size_t *msg_len, void **data_pos) 198 msg_len, data_pos); 317 u8 *msg, size_t msg_len, u8 *key_mic); 192 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_test.c | 2279 size_t msg_len; local 2294 msg_len = 6 + sizeof(eth) + data_len; 2295 msg = os_malloc(msg_len); 2336 if (sendto(drv->test_socket, msg, msg_len, 0, addr, alen) < 0) {
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.c | 205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument 213 len[0] = msg_len; 219 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 400 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, argument 408 len[0] = msg_len; 414 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - msg", msg, msg_len);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap.c | 926 size_t msg_len; local 933 &msg_len); 947 pos, msg_len); 1199 size_t i, msg_len; local 1202 &msg_len); 1206 pos, msg_len); 1208 msg = os_malloc(msg_len + 1); 1211 for (i = 0; i < msg_len; i++) 1213 msg[msg_len] = '\0'; 1795 * @msg_len 1801 eap_sm_request_otp(struct eap_sm *sm, const char *msg, size_t msg_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_gtc.c | 55 size_t msg_len; local 59 msg_len = os_strlen(msg); 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, 69 wpabuf_put_data(req, msg, msg_len);
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay.c | 80 const u8 *mka_msg, size_t msg_len); 706 size_t msg_len) 912 const u8 *mka_msg, size_t msg_len) 925 left_len = msg_len; 981 const u8 *peer_msg, size_t msg_len) 1037 const u8 *peer_msg, size_t msg_len) 1233 const u8 *mka_msg, size_t msg_len) 1512 const u8 *mka_msg, size_t msg_len) 1746 const u8 *mka_msg, size_t msg_len) 1756 left_len = msg_len; 705 ieee802_1x_mka_decode_basic_body(struct ieee802_1x_kay *kay, const u8 *mka_msg, size_t msg_len) argument 911 ieee802_1x_mka_i_in_peerlist(struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 979 ieee802_1x_mka_decode_live_peer_body( struct ieee802_1x_mka_participant *participant, const u8 *peer_msg, size_t msg_len) argument 1035 ieee802_1x_mka_decode_potential_peer_body( struct ieee802_1x_mka_participant *participant, const u8 *peer_msg, size_t msg_len) argument 1231 ieee802_1x_mka_decode_sak_use_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1510 ieee802_1x_mka_decode_dist_sak_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1745 ieee802_1x_mka_decode_icv_body(struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1788 ieee802_1x_mka_decode_dist_cak_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1812 ieee802_1x_mka_decode_kmd_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument 1835 ieee802_1x_mka_decode_announce_body( struct ieee802_1x_mka_participant *participant, const u8 *mka_msg, size_t msg_len) argument [all...] |
/external/wpa_supplicant_8/src/radius/ |
H A D | radius.c | 656 size_t msg_len; local 664 msg_len = be_to_host16(hdr->length); 665 if (msg_len < sizeof(*hdr) || msg_len > len) { 670 if (msg_len < len) { 672 "RADIUS message", (unsigned long) len - msg_len); 679 msg->buf = wpabuf_alloc_copy(data, msg_len);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | tdls.c | 231 int initiator, const u8 *msg, size_t msg_len) 237 "msg_len=%u", 239 peer_capab, initiator, (unsigned int) msg_len); 243 msg_len)) { 282 peer->sm_tmr.buf_len = msg_len; 284 peer->sm_tmr.buf = os_malloc(msg_len); 287 os_memcpy(peer->sm_tmr.buf, msg, msg_len); 229 wpa_tdls_tpk_send(struct wpa_sm *sm, const u8 *dest, u8 action_code, u8 dialog_token, u16 status_code, u32 peer_capab, int initiator, const u8 *msg, size_t msg_len) argument
|
H A D | wpa.c | 34 * @msg_len: Length of message 39 u8 *msg, size_t msg_len, u8 *key_mic) 59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { 67 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len); 68 wpa_sm_ether_send(sm, dest, proto, msg, msg_len); 37 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument
|
H A D | wpa_i.h | 194 size_t *msg_len, void **data_pos) 198 msg_len, data_pos); 317 u8 *msg, size_t msg_len, u8 *key_mic); 192 wpa_sm_alloc_eapol(struct wpa_sm *sm, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ibss_rsn.c | 80 u16 data_len, size_t *msg_len, void **data_pos) 87 *msg_len = sizeof(*hdr) + data_len; 88 hdr = os_malloc(*msg_len); 79 supp_alloc_eapol(void *ctx, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
H A D | p2p_supplicant.c | 1971 size_t msg_len, size_t offset) 1982 if (offset > msg_len) 1985 tmp = os_malloc(DNS_HEADER_LEN + P2P_SD_IN_MEMORY_LEN + msg_len); 1989 end = spos + msg_len; 1994 os_memcpy(tmp + DNS_HEADER_LEN + P2P_SD_IN_MEMORY_LEN, msg, msg_len); 1970 p2p_sd_dns_uncompress(char *buf, size_t buf_len, const u8 *msg, size_t msg_len, size_t offset) argument
|
H A D | preauth_test.c | 46 size_t *msg_len, void **data_pos) 50 *msg_len = sizeof(*hdr) + data_len; 51 hdr = os_malloc(*msg_len); 73 size_t *msg_len, void **data_pos) 75 return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos); 44 wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument 71 _wpa_alloc_eapol(void *wpa_s, u8 type, const void *data, u16 data_len, size_t *msg_len, void **data_pos) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_test.c | 2279 size_t msg_len; local 2294 msg_len = 6 + sizeof(eth) + data_len; 2295 msg = os_malloc(msg_len); 2336 if (sendto(drv->test_socket, msg, msg_len, 0, addr, alen) < 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 205 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument 213 len[0] = msg_len; 219 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 400 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, argument 408 len[0] = msg_len; 414 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - msg", msg, msg_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 926 size_t msg_len; local 933 &msg_len); 947 pos, msg_len); 1199 size_t i, msg_len; local 1202 &msg_len); 1206 pos, msg_len); 1208 msg = os_malloc(msg_len + 1); 1211 for (i = 0; i < msg_len; i++) 1213 msg[msg_len] = '\0'; 1795 * @msg_len 1801 eap_sm_request_otp(struct eap_sm *sm, const char *msg, size_t msg_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_gtc.c | 55 size_t msg_len; local 59 msg_len = os_strlen(msg); 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, 69 wpabuf_put_data(req, msg, msg_len);
|