/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | milenage.c | 171 * @res_len: Max length for res; set to used length or 0 on failure 175 u8 *ck, u8 *res, size_t *res_len) 180 if (*res_len < 8) { 181 *res_len = 0; 186 *res_len = 0; 189 *res_len = 8; 266 * @res_len: Variable that will be set to RES length 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 284 *res_len = 8; 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | tls_internal.c | 428 size_t res_len, ad_len; local 438 &res_len, &ad, &ad_len, need_more_data); 441 out = wpabuf_alloc_ext_data(res, res_len); 471 size_t res_len; local 481 wpabuf_len(in_data), &res_len); 486 out = wpabuf_alloc_ext_data(res, res_len);
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | utils_module_tests.c | 278 size_t res_len; local 282 res = base64_encode((const unsigned char *) "", ~0, &res_len); 288 res = base64_encode((const unsigned char *) "=", 1, &res_len); 289 if (!res || res_len != 5 || res[0] != 'P' || res[1] != 'Q' || 300 res = base64_decode((const unsigned char *) "", 0, &res_len); 306 res = base64_decode((const unsigned char *) "a", 1, &res_len); 312 res = base64_decode((const unsigned char *) "====", 4, &res_len); 318 res = base64_decode((const unsigned char *) "PQ==", 4, &res_len); 319 if (!res || res_len != 1 || res[0] != '=') 323 res = base64_decode((const unsigned char *) "P.Q-=!=*", 8, &res_len); [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | milenage.c | 171 * @res_len: Max length for res; set to used length or 0 on failure 175 u8 *ck, u8 *res, size_t *res_len) 180 if (*res_len < 8) { 181 *res_len = 0; 186 *res_len = 0; 189 *res_len = 8; 266 * @res_len: Variable that will be set to RES length 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 284 *res_len = 8; 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | tls_internal.c | 428 size_t res_len, ad_len; local 438 &res_len, &ad, &ad_len, need_more_data); 441 out = wpabuf_alloc_ext_data(res, res_len); 471 size_t res_len; local 481 wpabuf_len(in_data), &res_len); 486 out = wpabuf_alloc_ext_data(res, res_len);
|
/external/wpa_supplicant_8/src/utils/ |
H A D | utils_module_tests.c | 278 size_t res_len; local 282 res = base64_encode((const unsigned char *) "", ~0, &res_len); 288 res = base64_encode((const unsigned char *) "=", 1, &res_len); 289 if (!res || res_len != 5 || res[0] != 'P' || res[1] != 'Q' || 300 res = base64_decode((const unsigned char *) "", 0, &res_len); 306 res = base64_decode((const unsigned char *) "a", 1, &res_len); 312 res = base64_decode((const unsigned char *) "====", 4, &res_len); 318 res = base64_decode((const unsigned char *) "PQ==", 4, &res_len); 319 if (!res || res_len != 1 || res[0] != '=') 323 res = base64_decode((const unsigned char *) "P.Q-=!=*", 8, &res_len); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | milenage.c | 171 * @res_len: Max length for res; set to used length or 0 on failure 175 u8 *ck, u8 *res, size_t *res_len) 180 if (*res_len < 8) { 181 *res_len = 0; 186 *res_len = 0; 189 *res_len = 8; 266 * @res_len: Variable that will be set to RES length 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 284 *res_len = 8; 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
H A D | tls_internal.c | 428 size_t res_len, ad_len; local 438 &res_len, &ad, &ad_len, need_more_data); 441 out = wpabuf_alloc_ext_data(res, res_len); 471 size_t res_len; local 481 wpabuf_len(in_data), &res_len); 486 out = wpabuf_alloc_ext_data(res, res_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | utils_module_tests.c | 278 size_t res_len; local 282 res = base64_encode((const unsigned char *) "", ~0, &res_len); 288 res = base64_encode((const unsigned char *) "=", 1, &res_len); 289 if (!res || res_len != 5 || res[0] != 'P' || res[1] != 'Q' || 300 res = base64_decode((const unsigned char *) "", 0, &res_len); 306 res = base64_decode((const unsigned char *) "a", 1, &res_len); 312 res = base64_decode((const unsigned char *) "====", 4, &res_len); 318 res = base64_decode((const unsigned char *) "PQ==", 4, &res_len); 319 if (!res || res_len != 1 || res[0] != '=') 323 res = base64_decode((const unsigned char *) "P.Q-=!=*", 8, &res_len); [all...] |
/external/ppp/pppd/plugins/pppoatm/ |
H A D | ans.c | 41 static int ans(const char *text,int wanted,void *result,int res_len) argument 114 res_len) < 0) return FATAL;
|
/external/wpa_supplicant_8/hostapd/ |
H A D | hlr_auc_gw.c | 90 size_t res_len; member in struct:milenage_parameters 130 " res_len INTEGER" 197 if (os_strcmp(col[i], "res_len") == 0 && argv[i]) { 198 m->res_len = atoi(argv[i]); 527 m->res_len = atoi(pos); 528 if (m->res_len && 529 (m->res_len < EAP_AKA_RES_MIN_LEN || 530 m->res_len > EAP_AKA_RES_MAX_LEN)) { 797 size_t res_len; local 806 res_len [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 235 u8 *res, size_t res_len) 263 while (res_len) { 268 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len; 271 res_len -= hlen; 805 attr->res_len = alen; 232 prf_prime(const u8 *k, const char *seed1, const u8 *seed2, size_t seed2_len, const u8 *seed3, size_t seed3_len, u8 *res, size_t res_len) argument
|
H A D | ikev2_common.c | 433 size_t *res_len) 516 *res_len = decrypted_len; 429 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
|
H A D | eap_sim_common.h | 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_aka.c | 33 size_t res_len; member in struct:eap_aka_data 791 data->ck, data->res, &data->res_len, sm); 964 if (attr->res == NULL || attr->res_len < data->res_len || 965 attr->res_len_bits != data->res_len * 8 || 966 os_memcmp_const(attr->res, data->res, data->res_len) != 0) { 970 (unsigned long) attr->res_len, 972 (unsigned long) data->res_len * 8);
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_common.c | 25 const char *label, u8 *res, size_t res_len) 34 WPA_PUT_BE32(key_bits, res_len * 8); 45 iter = (res_len + SHA256_MAC_LEN - 1) / SHA256_MAC_LEN; 47 left = res_len; 24 wps_kdf(const u8 *key, const u8 *label_prefix, size_t label_prefix_len, const char *label, u8 *res, size_t res_len) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.c | 235 u8 *res, size_t res_len) 263 while (res_len) { 268 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len; 271 res_len -= hlen; 805 attr->res_len = alen; 232 prf_prime(const u8 *k, const char *seed1, const u8 *seed2, size_t seed2_len, const u8 *seed3, size_t seed3_len, u8 *res, size_t res_len) argument
|
H A D | ikev2_common.c | 433 size_t *res_len) 516 *res_len = decrypted_len; 429 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_aka.c | 33 size_t res_len; member in struct:eap_aka_data 791 data->ck, data->res, &data->res_len, sm); 964 if (attr->res == NULL || attr->res_len < data->res_len || 965 attr->res_len_bits != data->res_len * 8 || 966 os_memcmp_const(attr->res, data->res, data->res_len) != 0) { 970 (unsigned long) attr->res_len, 972 (unsigned long) data->res_len * 8);
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_common.c | 25 const char *label, u8 *res, size_t res_len) 34 WPA_PUT_BE32(key_bits, res_len * 8); 45 iter = (res_len + SHA256_MAC_LEN - 1) / SHA256_MAC_LEN; 47 left = res_len; 24 wps_kdf(const u8 *key, const u8 *label_prefix, size_t label_prefix_len, const char *label, u8 *res, size_t res_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 235 u8 *res, size_t res_len) 263 while (res_len) { 268 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len; 271 res_len -= hlen; 805 attr->res_len = alen; 232 prf_prime(const u8 *k, const char *seed1, const u8 *seed2, size_t seed2_len, const u8 *seed3, size_t seed3_len, u8 *res, size_t res_len) argument
|
H A D | ikev2_common.c | 433 size_t *res_len) 516 *res_len = decrypted_len; 429 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_aka.c | 33 size_t res_len; member in struct:eap_aka_data 791 data->ck, data->res, &data->res_len, sm); 964 if (attr->res == NULL || attr->res_len < data->res_len || 965 attr->res_len_bits != data->res_len * 8 || 966 os_memcmp_const(attr->res, data->res, data->res_len) != 0) { 970 (unsigned long) attr->res_len, 972 (unsigned long) data->res_len * 8);
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_common.c | 25 const char *label, u8 *res, size_t res_len) 34 WPA_PUT_BE32(key_bits, res_len * 8); 45 iter = (res_len + SHA256_MAC_LEN - 1) / SHA256_MAC_LEN; 47 left = res_len; 24 wps_kdf(const u8 *key, const u8 *label_prefix, size_t label_prefix_len, const char *label, u8 *res, size_t res_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_aka.c | 24 size_t res_len; member in struct:eap_aka_data 223 data->res_len = os_strlen(pos) / 2; 224 if (data->res_len > EAP_AKA_RES_MAX_LEN) { 225 data->res_len = 0; 228 if (hexstr2bin(pos, data->res, data->res_len) < 0) 230 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len); 261 data->autn, data->res, &data->res_len, 296 data->res, &data->res_len, data->auts); 307 data->res_len = EAP_AKA_RES_MAX_LEN; 644 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len * [all...] |