/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_gpsk.c | 279 size_t payload_len) 292 end = payload + payload_len; 588 size_t payload_len) 600 end = payload + payload_len; 274 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *payload, size_t payload_len) argument 583 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *payload, size_t payload_len) argument
|
H A D | eap_pwd.c | 220 const u8 *payload, size_t payload_len) 234 if (payload_len < sizeof(struct eap_pwd_id)) { 271 data->id_server = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 277 data->id_server_len = payload_len - sizeof(struct eap_pwd_id); 352 const u8 *payload, size_t payload_len) 368 if (payload_len != 2 * prime_len + order_len) { 371 (unsigned int) payload_len, 565 const u8 *payload, size_t payload_len) 579 if (payload_len != SHA256_MAC_LEN) { 582 (unsigned int) payload_len, SHA256_MAC_LE 217 eap_pwd_perform_id_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 349 eap_pwd_perform_commit_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 562 eap_pwd_perform_confirm_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument [all...] |
H A D | eap_tls_common.c | 19 static struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument 24 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, 28 EAP_VENDOR_WFA_UNAUTH_TLS, payload_len, 30 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
|
H A D | ikev2.c | 624 u8 *payload, size_t payload_len) 631 payload_len) < 0) { 622 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_eke.c | 225 size_t payload_len) 241 if (payload_len < 2 + 4) { 248 end = payload + payload_len; 359 size_t payload_len) 387 end = payload + payload_len; 504 size_t payload_len) 525 end = payload + payload_len; 631 size_t payload_len) 635 if (payload_len < 4) { 221 eap_eke_process_id(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 354 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 500 eap_eke_process_confirm(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 627 eap_eke_process_failure(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
|
H A D | eap_gpsk.c | 279 size_t payload_len) 292 end = payload + payload_len; 588 size_t payload_len) 600 end = payload + payload_len; 274 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *payload, size_t payload_len) argument 583 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *payload, size_t payload_len) argument
|
H A D | eap_pwd.c | 220 const u8 *payload, size_t payload_len) 234 if (payload_len < sizeof(struct eap_pwd_id)) { 271 data->id_server = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 277 data->id_server_len = payload_len - sizeof(struct eap_pwd_id); 352 const u8 *payload, size_t payload_len) 368 if (payload_len != 2 * prime_len + order_len) { 371 (unsigned int) payload_len, 565 const u8 *payload, size_t payload_len) 579 if (payload_len != SHA256_MAC_LEN) { 582 (unsigned int) payload_len, SHA256_MAC_LE 217 eap_pwd_perform_id_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 349 eap_pwd_perform_commit_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument 562 eap_pwd_perform_confirm_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument [all...] |
H A D | eap_tls_common.c | 19 static struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument 24 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len, 28 EAP_VENDOR_WFA_UNAUTH_TLS, payload_len, 30 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
|
H A D | ikev2.c | 624 u8 *payload, size_t payload_len) 631 payload_len) < 0) { 622 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/libnfc-nci/src/nfc/ndef/ |
H A D | ndef_utils.c | 85 UINT32 payload_len; local 116 payload_len = *p_rec++; 123 BE_STREAM_TO_UINT32 (payload_len, p_rec); 180 if ( (type_len != 0) || (id_len != 0) || (payload_len != 0) ) 191 p_rec += (payload_len + type_len + id_len); 225 UINT32 payload_len; local 241 payload_len = *p_rec++; 243 BE_STREAM_TO_UINT32 (payload_len, p_rec); 252 p_rec += (payload_len + type_len + id_len); 273 UINT32 payload_len; local 324 UINT32 payload_len; local 369 UINT32 payload_len; local 420 UINT32 payload_len; local 468 UINT32 payload_len; local 525 UINT32 payload_len; local 587 UINT32 payload_len; local 644 UINT32 payload_len; local 780 UINT32 payload_len; local 836 NDEF_MsgAddRec(UINT8 *p_msg, UINT32 max_size, UINT32 *p_cur_size, UINT8 tnf, UINT8 *p_type, UINT8 type_len, UINT8 *p_id, UINT8 id_len, UINT8 *p_payload, UINT32 payload_len) argument 932 NDEF_MsgInsertRec(UINT8 *p_msg, UINT32 max_size, UINT32 *p_cur_size, INT32 index, UINT8 tnf, UINT8 *p_type, UINT8 type_len, UINT8 *p_id, UINT8 id_len, UINT8 *p_payload, UINT32 payload_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.c | 624 u8 *payload, size_t payload_len) 631 payload_len) < 0) { 622 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_pwd.c | 583 const u8 *payload, size_t payload_len) 591 if (payload_len < sizeof(struct eap_pwd_id)) { 605 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 610 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id); 653 const u8 *payload, size_t payload_len) 666 if (payload_len != 2 * prime_len + order_len) { 669 (unsigned int) payload_len, 780 const u8 *payload, size_t payload_len) 789 if (payload_len != SHA256_MAC_LEN) { 792 (unsigned int) payload_len, SHA256_MAC_LE 581 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 652 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 779 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument [all...] |
H A D | ikev2.c | 690 u8 *payload, size_t payload_len) 697 payload_len) < 0) { 688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_pwd.c | 583 const u8 *payload, size_t payload_len) 591 if (payload_len < sizeof(struct eap_pwd_id)) { 605 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 610 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id); 653 const u8 *payload, size_t payload_len) 666 if (payload_len != 2 * prime_len + order_len) { 669 (unsigned int) payload_len, 780 const u8 *payload, size_t payload_len) 789 if (payload_len != SHA256_MAC_LEN) { 792 (unsigned int) payload_len, SHA256_MAC_LE 581 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 652 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 779 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument [all...] |
H A D | ikev2.c | 690 u8 *payload, size_t payload_len) 697 payload_len) < 0) { 688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | hs20_supplicant.c | 131 void hs20_put_anqp_req(u32 stypes, const u8 *payload, size_t payload_len, argument 146 wpabuf_put_data(buf, payload, payload_len); 151 wpabuf_put_data(buf, payload, payload_len); 168 size_t payload_len) 172 buf = gas_anqp_build_initial_req(0, 100 + payload_len); 176 hs20_put_anqp_req(stypes, payload, payload_len, buf); 183 const u8 *payload, size_t payload_len) 205 buf = hs20_build_anqp_req(stypes, payload, payload_len); 167 hs20_build_anqp_req(u32 stypes, const u8 *payload, size_t payload_len) argument 182 hs20_anqp_send_req(struct wpa_supplicant *wpa_s, const u8 *dst, u32 stypes, const u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_pwd.c | 583 const u8 *payload, size_t payload_len) 591 if (payload_len < sizeof(struct eap_pwd_id)) { 605 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id)); 610 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id); 653 const u8 *payload, size_t payload_len) 666 if (payload_len != 2 * prime_len + order_len) { 669 (unsigned int) payload_len, 780 const u8 *payload, size_t payload_len) 789 if (payload_len != SHA256_MAC_LEN) { 792 (unsigned int) payload_len, SHA256_MAC_LE 581 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 652 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument 779 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument [all...] |
H A D | ikev2.c | 690 u8 *payload, size_t payload_len) 697 payload_len) < 0) { 688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_openssl.c | 1057 size_t payload_len = WPA_GET_BE16(pos + 1); local 1058 if (payload_len + 3 > len) {
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_openssl.c | 1057 size_t payload_len = WPA_GET_BE16(pos + 1); local 1058 if (payload_len + 3 > len) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_openssl.c | 1057 size_t payload_len = WPA_GET_BE16(pos + 1); local 1058 if (payload_len + 3 > len) {
|