Searched defs:payload_len (Results 26 - 46 of 46) sorted by relevance

12

/external/wpa_supplicant_8/src/eap_peer/
H A Deap_gpsk.c279 size_t payload_len)
292 end = payload + payload_len;
588 size_t payload_len)
600 end = payload + payload_len;
274 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *payload, size_t payload_len) argument
583 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *payload, size_t payload_len) argument
H A Deap_pwd.c220 const u8 *payload, size_t payload_len)
234 if (payload_len < sizeof(struct eap_pwd_id)) {
271 data->id_server = os_malloc(payload_len - sizeof(struct eap_pwd_id));
277 data->id_server_len = payload_len - sizeof(struct eap_pwd_id);
352 const u8 *payload, size_t payload_len)
368 if (payload_len != 2 * prime_len + order_len) {
371 (unsigned int) payload_len,
565 const u8 *payload, size_t payload_len)
579 if (payload_len != SHA256_MAC_LEN) {
582 (unsigned int) payload_len, SHA256_MAC_LE
217 eap_pwd_perform_id_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
349 eap_pwd_perform_commit_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
562 eap_pwd_perform_confirm_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
[all...]
H A Deap_tls_common.c19 static struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument
24 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len,
28 EAP_VENDOR_WFA_UNAUTH_TLS, payload_len,
30 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
H A Dikev2.c624 u8 *payload, size_t payload_len)
631 payload_len) < 0) {
622 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_eke.c225 size_t payload_len)
241 if (payload_len < 2 + 4) {
248 end = payload + payload_len;
359 size_t payload_len)
387 end = payload + payload_len;
504 size_t payload_len)
525 end = payload + payload_len;
631 size_t payload_len)
635 if (payload_len < 4) {
221 eap_eke_process_id(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
354 eap_eke_process_commit(struct eap_sm *sm, struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
500 eap_eke_process_confirm(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
627 eap_eke_process_failure(struct eap_eke_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
H A Deap_gpsk.c279 size_t payload_len)
292 end = payload + payload_len;
588 size_t payload_len)
600 end = payload + payload_len;
274 eap_gpsk_process_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *payload, size_t payload_len) argument
583 eap_gpsk_process_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, struct eap_method_ret *ret, u8 identifier, const u8 *payload, size_t payload_len) argument
H A Deap_pwd.c220 const u8 *payload, size_t payload_len)
234 if (payload_len < sizeof(struct eap_pwd_id)) {
271 data->id_server = os_malloc(payload_len - sizeof(struct eap_pwd_id));
277 data->id_server_len = payload_len - sizeof(struct eap_pwd_id);
352 const u8 *payload, size_t payload_len)
368 if (payload_len != 2 * prime_len + order_len) {
371 (unsigned int) payload_len,
565 const u8 *payload, size_t payload_len)
579 if (payload_len != SHA256_MAC_LEN) {
582 (unsigned int) payload_len, SHA256_MAC_LE
217 eap_pwd_perform_id_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
349 eap_pwd_perform_commit_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
562 eap_pwd_perform_confirm_exchange(struct eap_sm *sm, struct eap_pwd_data *data, struct eap_method_ret *ret, const struct wpabuf *reqData, const u8 *payload, size_t payload_len) argument
[all...]
H A Deap_tls_common.c19 static struct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, argument
24 EAP_VENDOR_TYPE_UNAUTH_TLS, payload_len,
28 EAP_VENDOR_WFA_UNAUTH_TLS, payload_len,
30 return eap_msg_alloc(EAP_VENDOR_IETF, type, payload_len, code,
H A Dikev2.c624 u8 *payload, size_t payload_len)
631 payload_len) < 0) {
622 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
/external/libnfc-nci/src/nfc/ndef/
H A Dndef_utils.c85 UINT32 payload_len; local
116 payload_len = *p_rec++;
123 BE_STREAM_TO_UINT32 (payload_len, p_rec);
180 if ( (type_len != 0) || (id_len != 0) || (payload_len != 0) )
191 p_rec += (payload_len + type_len + id_len);
225 UINT32 payload_len; local
241 payload_len = *p_rec++;
243 BE_STREAM_TO_UINT32 (payload_len, p_rec);
252 p_rec += (payload_len + type_len + id_len);
273 UINT32 payload_len; local
324 UINT32 payload_len; local
369 UINT32 payload_len; local
420 UINT32 payload_len; local
468 UINT32 payload_len; local
525 UINT32 payload_len; local
587 UINT32 payload_len; local
644 UINT32 payload_len; local
780 UINT32 payload_len; local
836 NDEF_MsgAddRec(UINT8 *p_msg, UINT32 max_size, UINT32 *p_cur_size, UINT8 tnf, UINT8 *p_type, UINT8 type_len, UINT8 *p_id, UINT8 id_len, UINT8 *p_payload, UINT32 payload_len) argument
932 NDEF_MsgInsertRec(UINT8 *p_msg, UINT32 max_size, UINT32 *p_cur_size, INT32 index, UINT8 tnf, UINT8 *p_type, UINT8 type_len, UINT8 *p_id, UINT8 id_len, UINT8 *p_payload, UINT32 payload_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dikev2.c624 u8 *payload, size_t payload_len)
631 payload_len) < 0) {
622 ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_pwd.c583 const u8 *payload, size_t payload_len)
591 if (payload_len < sizeof(struct eap_pwd_id)) {
605 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id));
610 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id);
653 const u8 *payload, size_t payload_len)
666 if (payload_len != 2 * prime_len + order_len) {
669 (unsigned int) payload_len,
780 const u8 *payload, size_t payload_len)
789 if (payload_len != SHA256_MAC_LEN) {
792 (unsigned int) payload_len, SHA256_MAC_LE
581 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
652 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
779 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
[all...]
H A Dikev2.c690 u8 *payload, size_t payload_len)
697 payload_len) < 0) {
688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_pwd.c583 const u8 *payload, size_t payload_len)
591 if (payload_len < sizeof(struct eap_pwd_id)) {
605 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id));
610 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id);
653 const u8 *payload, size_t payload_len)
666 if (payload_len != 2 * prime_len + order_len) {
669 (unsigned int) payload_len,
780 const u8 *payload, size_t payload_len)
789 if (payload_len != SHA256_MAC_LEN) {
792 (unsigned int) payload_len, SHA256_MAC_LE
581 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
652 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
779 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
[all...]
H A Dikev2.c690 u8 *payload, size_t payload_len)
697 payload_len) < 0) {
688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
/external/wpa_supplicant_8/wpa_supplicant/
H A Dhs20_supplicant.c131 void hs20_put_anqp_req(u32 stypes, const u8 *payload, size_t payload_len, argument
146 wpabuf_put_data(buf, payload, payload_len);
151 wpabuf_put_data(buf, payload, payload_len);
168 size_t payload_len)
172 buf = gas_anqp_build_initial_req(0, 100 + payload_len);
176 hs20_put_anqp_req(stypes, payload, payload_len, buf);
183 const u8 *payload, size_t payload_len)
205 buf = hs20_build_anqp_req(stypes, payload, payload_len);
167 hs20_build_anqp_req(u32 stypes, const u8 *payload, size_t payload_len) argument
182 hs20_anqp_send_req(struct wpa_supplicant *wpa_s, const u8 *dst, u32 stypes, const u8 *payload, size_t payload_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_pwd.c583 const u8 *payload, size_t payload_len)
591 if (payload_len < sizeof(struct eap_pwd_id)) {
605 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id));
610 data->id_peer_len = payload_len - sizeof(struct eap_pwd_id);
653 const u8 *payload, size_t payload_len)
666 if (payload_len != 2 * prime_len + order_len) {
669 (unsigned int) payload_len,
780 const u8 *payload, size_t payload_len)
789 if (payload_len != SHA256_MAC_LEN) {
792 (unsigned int) payload_len, SHA256_MAC_LE
581 eap_pwd_process_id_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
652 eap_pwd_process_commit_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
779 eap_pwd_process_confirm_resp(struct eap_sm *sm, struct eap_pwd_data *data, const u8 *payload, size_t payload_len) argument
[all...]
H A Dikev2.c690 u8 *payload, size_t payload_len)
697 payload_len) < 0) {
688 ikev2_process_sa_auth_decrypted(struct ikev2_initiator_data *data, u8 next_payload, u8 *payload, size_t payload_len) argument
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_openssl.c1057 size_t payload_len = WPA_GET_BE16(pos + 1); local
1058 if (payload_len + 3 > len) {
/external/wpa_supplicant_8/src/crypto/
H A Dtls_openssl.c1057 size_t payload_len = WPA_GET_BE16(pos + 1); local
1058 if (payload_len + 3 > len) {
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_openssl.c1057 size_t payload_len = WPA_GET_BE16(pos + 1); local
1058 if (payload_len + 3 > len) {

Completed in 1408 milliseconds

12