Searched defs:res_len (Results 1 - 25 of 36) sorted by path

12

/external/ppp/pppd/plugins/pppoatm/
H A Dans.c41 static int ans(const char *text,int wanted,void *result,int res_len) argument
114 res_len) < 0) return FATAL;
/external/wpa_supplicant_8/hostapd/
H A Dhlr_auc_gw.c779 size_t res_len; local
788 res_len = EAP_AKA_RES_MAX_LEN;
800 autn, ik, ck, res, &res_len);
810 res_len = EAP_AKA_RES_MAX_LEN;
837 pos += wpa_snprintf_hex(pos, end - pos, res, res_len);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dmilenage.c171 * @res_len: Max length for res; set to used length or 0 on failure
175 u8 *ck, u8 *res, size_t *res_len)
180 if (*res_len < 8) {
181 *res_len = 0;
186 *res_len = 0;
189 *res_len = 8;
266 * @res_len: Variable that will be set to RES length
271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
284 *res_len = 8;
285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len);
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
H A Dtls_internal.c366 size_t res_len, ad_len; local
376 &res_len, &ad, &ad_len, need_more_data);
379 out = wpabuf_alloc_ext_data(res, res_len);
409 size_t res_len; local
419 wpabuf_len(in_data), &res_len);
424 out = wpabuf_alloc_ext_data(res, res_len);
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.c235 u8 *res, size_t res_len)
263 while (res_len) {
268 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len;
271 res_len -= hlen;
805 attr->res_len = alen;
232 prf_prime(const u8 *k, const char *seed1, const u8 *seed2, size_t seed2_len, const u8 *seed3, size_t seed3_len, u8 *res, size_t res_len) argument
H A Deap_sim_common.h191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
H A Dikev2_common.c429 size_t *res_len)
512 *res_len = decrypted_len;
425 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_aka.c24 size_t res_len; member in struct:eap_aka_data
223 data->res_len = os_strlen(pos) / 2;
224 if (data->res_len > EAP_AKA_RES_MAX_LEN) {
225 data->res_len = 0;
228 if (hexstr2bin(pos, data->res, data->res_len) < 0)
230 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len);
261 data->autn, data->res, &data->res_len,
296 data->res, &data->res_len, data->auts);
307 data->res_len = EAP_AKA_RES_MAX_LEN;
644 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len *
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_aka.c33 size_t res_len; member in struct:eap_aka_data
791 data->ck, data->res, &data->res_len, sm);
964 if (attr->res == NULL || attr->res_len < data->res_len ||
965 attr->res_len_bits != data->res_len * 8 ||
966 os_memcmp_const(attr->res, data->res, data->res_len) != 0) {
970 (unsigned long) attr->res_len,
972 (unsigned long) data->res_len * 8);
H A Deap_sim_db.c55 size_t res_len; member in struct:eap_sim_db_pending::__anon33703::__anon33705
548 entry->u.aka.res_len = (end - start) / 2;
549 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) {
551 entry->u.aka.res_len = 0;
554 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len))
1320 * @res_len: Buffer for RES length
1337 u8 *res, size_t *res_len, void *cb_session_ctx)
1378 *res_len = entry->u.aka.res_len;
1335 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dcommon.c596 size_t merge_byte_arrays(u8 *res, size_t res_len, argument
602 os_memset(res, 0, res_len);
605 if (src1_len >= res_len) {
606 os_memcpy(res, src1, res_len);
607 return res_len;
615 if (len + src2_len >= res_len) {
616 os_memcpy(res + len, src2, res_len - len);
617 return res_len;
H A Dpcsc_funcs.c1301 * @res_len: Variable that will be set to RES length
1311 * buffers and res_len is set to length of received RES value. If USIM reports
1317 unsigned char *res, size_t *res_len,
1384 *res_len = *pos++;
1385 os_memcpy(res, pos, *res_len);
1386 pos += *res_len;
1387 wpa_hexdump(MSG_DEBUG, "SCARD: RES", res, *res_len);
1315 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
/external/wpa_supplicant_8/hostapd/src/wps/
H A Dwps_common.c25 const char *label, u8 *res, size_t res_len)
34 WPA_PUT_BE32(key_bits, res_len * 8);
45 iter = (res_len + SHA256_MAC_LEN - 1) / SHA256_MAC_LEN;
47 left = res_len;
24 wps_kdf(const u8 *key, const u8 *label_prefix, size_t label_prefix_len, const char *label, u8 *res, size_t res_len) argument
/external/wpa_supplicant_8/src/crypto/
H A Dmilenage.c171 * @res_len: Max length for res; set to used length or 0 on failure
175 u8 *ck, u8 *res, size_t *res_len)
180 if (*res_len < 8) {
181 *res_len = 0;
186 *res_len = 0;
189 *res_len = 8;
266 * @res_len: Variable that will be set to RES length
271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
284 *res_len = 8;
285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len);
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
H A Dtls_internal.c366 size_t res_len, ad_len; local
376 &res_len, &ad, &ad_len, need_more_data);
379 out = wpabuf_alloc_ext_data(res, res_len);
409 size_t res_len; local
419 wpabuf_len(in_data), &res_len);
424 out = wpabuf_alloc_ext_data(res, res_len);
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.c235 u8 *res, size_t res_len)
263 while (res_len) {
268 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len;
271 res_len -= hlen;
805 attr->res_len = alen;
232 prf_prime(const u8 *k, const char *seed1, const u8 *seed2, size_t seed2_len, const u8 *seed3, size_t seed3_len, u8 *res, size_t res_len) argument
H A Deap_sim_common.h191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
H A Dikev2_common.c429 size_t *res_len)
512 *res_len = decrypted_len;
425 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_aka.c24 size_t res_len; member in struct:eap_aka_data
223 data->res_len = os_strlen(pos) / 2;
224 if (data->res_len > EAP_AKA_RES_MAX_LEN) {
225 data->res_len = 0;
228 if (hexstr2bin(pos, data->res, data->res_len) < 0)
230 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len);
261 data->autn, data->res, &data->res_len,
296 data->res, &data->res_len, data->auts);
307 data->res_len = EAP_AKA_RES_MAX_LEN;
644 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len *
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_aka.c33 size_t res_len; member in struct:eap_aka_data
791 data->ck, data->res, &data->res_len, sm);
964 if (attr->res == NULL || attr->res_len < data->res_len ||
965 attr->res_len_bits != data->res_len * 8 ||
966 os_memcmp_const(attr->res, data->res, data->res_len) != 0) {
970 (unsigned long) attr->res_len,
972 (unsigned long) data->res_len * 8);
H A Deap_sim_db.c55 size_t res_len; member in struct:eap_sim_db_pending::__anon33956::__anon33958
548 entry->u.aka.res_len = (end - start) / 2;
549 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) {
551 entry->u.aka.res_len = 0;
554 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len))
1320 * @res_len: Buffer for RES length
1337 u8 *res, size_t *res_len, void *cb_session_ctx)
1378 *res_len = entry->u.aka.res_len;
1335 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
/external/wpa_supplicant_8/src/utils/
H A Dcommon.c596 size_t merge_byte_arrays(u8 *res, size_t res_len, argument
602 os_memset(res, 0, res_len);
605 if (src1_len >= res_len) {
606 os_memcpy(res, src1, res_len);
607 return res_len;
615 if (len + src2_len >= res_len) {
616 os_memcpy(res + len, src2, res_len - len);
617 return res_len;
H A Dpcsc_funcs.c1301 * @res_len: Variable that will be set to RES length
1311 * buffers and res_len is set to length of received RES value. If USIM reports
1317 unsigned char *res, size_t *res_len,
1384 *res_len = *pos++;
1385 os_memcpy(res, pos, *res_len);
1386 pos += *res_len;
1387 wpa_hexdump(MSG_DEBUG, "SCARD: RES", res, *res_len);
1315 scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, const unsigned char *autn, unsigned char *res, size_t *res_len, unsigned char *ik, unsigned char *ck, unsigned char *auts) argument
/external/wpa_supplicant_8/src/wps/
H A Dwps_common.c25 const char *label, u8 *res, size_t res_len)
34 WPA_PUT_BE32(key_bits, res_len * 8);
45 iter = (res_len + SHA256_MAC_LEN - 1) / SHA256_MAC_LEN;
47 left = res_len;
24 wps_kdf(const u8 *key, const u8 *label_prefix, size_t label_prefix_len, const char *label, u8 *res, size_t res_len) argument
/external/wpa_supplicant_8/wpa_supplicant/
H A Dconfig.c61 size_t res_len, *dst_len; local
68 res_len = 0;
72 tmp = wpa_config_parse_string(value, &res_len);
82 (u8 *) tmp, res_len);
85 (u8 *) tmp, res_len);
88 if (data->param3 && res_len < (size_t) data->param3) {
91 (unsigned long) res_len, (long) data->param3);
96 if (data->param4 && res_len > (size_t) data->param4) {
99 (unsigned long) res_len, (long) data->param4);
110 *dst_len = res_len;
1155 size_t res_len; local
[all...]

Completed in 438 milliseconds

12