Home
last modified time | relevance | path

Searched refs:res_len (Results 1 – 25 of 115) sorted by relevance

12345

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
Dmilenage.c175 u8 *ck, u8 *res, size_t *res_len) in milenage_generate() argument
180 if (*res_len < 8) { in milenage_generate()
181 *res_len = 0; in milenage_generate()
186 *res_len = 0; in milenage_generate()
189 *res_len = 8; in milenage_generate()
271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, in milenage_check() argument
284 *res_len = 8; in milenage_check()
285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); in milenage_check()
Dmilenage.h14 u8 *ck, u8 *res, size_t *res_len);
20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
Dtls_internal.c490 size_t res_len, ad_len; in tls_connection_handshake2() local
500 &res_len, &ad, &ad_len, need_more_data); in tls_connection_handshake2()
503 out = wpabuf_alloc_ext_data(res, res_len); in tls_connection_handshake2()
533 size_t res_len; in tls_connection_server_handshake() local
543 wpabuf_len(in_data), &res_len); in tls_connection_server_handshake()
548 out = wpabuf_alloc_ext_data(res, res_len); in tls_connection_server_handshake()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
Dmilenage.c175 u8 *ck, u8 *res, size_t *res_len) in milenage_generate() argument
180 if (*res_len < 8) { in milenage_generate()
181 *res_len = 0; in milenage_generate()
186 *res_len = 0; in milenage_generate()
189 *res_len = 8; in milenage_generate()
271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, in milenage_check() argument
284 *res_len = 8; in milenage_check()
285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); in milenage_check()
Dmilenage.h14 u8 *ck, u8 *res, size_t *res_len);
20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
Dtls_internal.c490 size_t res_len, ad_len; in tls_connection_handshake2() local
500 &res_len, &ad, &ad_len, need_more_data); in tls_connection_handshake2()
503 out = wpabuf_alloc_ext_data(res, res_len); in tls_connection_handshake2()
533 size_t res_len; in tls_connection_server_handshake() local
543 wpabuf_len(in_data), &res_len); in tls_connection_server_handshake()
548 out = wpabuf_alloc_ext_data(res, res_len); in tls_connection_server_handshake()
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/
Dhlr_auc_gw.c90 size_t res_len; member
198 m->res_len = atoi(argv[i]); in get_milenage_cb()
473 m->res_len = atoi(pos); in read_milenage()
474 if (m->res_len && in read_milenage()
475 (m->res_len < EAP_AKA_RES_MIN_LEN || in read_milenage()
476 m->res_len > EAP_AKA_RES_MAX_LEN)) { in read_milenage()
743 size_t res_len; in aka_req_auth() local
752 res_len = EAP_AKA_RES_MAX_LEN; in aka_req_auth()
764 autn, ik, ck, res, &res_len); in aka_req_auth()
765 if (m->res_len >= EAP_AKA_RES_MIN_LEN && in aka_req_auth()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/
Dhlr_auc_gw.c90 size_t res_len; member
198 m->res_len = atoi(argv[i]); in get_milenage_cb()
473 m->res_len = atoi(pos); in read_milenage()
474 if (m->res_len && in read_milenage()
475 (m->res_len < EAP_AKA_RES_MIN_LEN || in read_milenage()
476 m->res_len > EAP_AKA_RES_MAX_LEN)) { in read_milenage()
743 size_t res_len; in aka_req_auth() local
752 res_len = EAP_AKA_RES_MAX_LEN; in aka_req_auth()
764 autn, ik, ck, res, &res_len); in aka_req_auth()
765 if (m->res_len >= EAP_AKA_RES_MIN_LEN && in aka_req_auth()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/
Dutils_module_tests.c299 size_t res_len; in base64_tests() local
303 res = base64_encode((const unsigned char *) "", ~0, &res_len); in base64_tests()
309 res = base64_encode((const unsigned char *) "=", 1, &res_len); in base64_tests()
310 if (!res || res_len != 5 || res[0] != 'P' || res[1] != 'Q' || in base64_tests()
321 res = base64_decode((const unsigned char *) "", 0, &res_len); in base64_tests()
327 res = base64_decode((const unsigned char *) "a", 1, &res_len); in base64_tests()
333 res = base64_decode((const unsigned char *) "====", 4, &res_len); in base64_tests()
339 res = base64_decode((const unsigned char *) "PQ==", 4, &res_len); in base64_tests()
340 if (!res || res_len != 1 || res[0] != '=') in base64_tests()
344 res = base64_decode((const unsigned char *) "P.Q-=!=*", 8, &res_len); in base64_tests()
[all …]
Dcommon.c733 size_t merge_byte_arrays(u8 *res, size_t res_len, in merge_byte_arrays() argument
739 os_memset(res, 0, res_len); in merge_byte_arrays()
742 if (src1_len >= res_len) { in merge_byte_arrays()
743 os_memcpy(res, src1, res_len); in merge_byte_arrays()
744 return res_len; in merge_byte_arrays()
752 if (len + src2_len >= res_len) { in merge_byte_arrays()
753 os_memcpy(res + len, src2, res_len - len); in merge_byte_arrays()
754 return res_len; in merge_byte_arrays()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/
Dutils_module_tests.c300 size_t res_len; in base64_tests() local
304 res2 = base64_encode("", ~0, &res_len); in base64_tests()
310 res2 = base64_encode("=", 1, &res_len); in base64_tests()
311 if (!res2 || res_len != 5 || res2[0] != 'P' || res2[1] != 'Q' || in base64_tests()
322 res = base64_decode("", 0, &res_len); in base64_tests()
328 res = base64_decode("a", 1, &res_len); in base64_tests()
334 res = base64_decode("====", 4, &res_len); in base64_tests()
340 res = base64_decode("PQ==", 4, &res_len); in base64_tests()
341 if (!res || res_len != 1 || res[0] != '=') in base64_tests()
345 res = base64_decode("P.Q-=!=*", 8, &res_len); in base64_tests()
[all …]
Dcommon.c734 size_t merge_byte_arrays(u8 *res, size_t res_len, in merge_byte_arrays() argument
740 os_memset(res, 0, res_len); in merge_byte_arrays()
743 if (src1_len >= res_len) { in merge_byte_arrays()
744 os_memcpy(res, src1, res_len); in merge_byte_arrays()
745 return res_len; in merge_byte_arrays()
753 if (len + src2_len >= res_len) { in merge_byte_arrays()
754 os_memcpy(res + len, src2, res_len - len); in merge_byte_arrays()
755 return res_len; in merge_byte_arrays()
Dpcsc_funcs.h23 unsigned char *res, size_t *res_len,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
Dcommon_module_tests.c546 size_t res_len; in sae_pk_tests() local
562 res = sae_pk_base32_decode(pw, pw_len, &res_len); in sae_pk_tests()
570 if (res_len != bytes || os_memcmp(val, res, res_len) != 0) { in sae_pk_tests()
575 res, res_len); in sae_pk_tests()
/third_party/ffmpeg/libavfilter/
Davfilter.h309 …s_command)(AVFilterContext *, const char *cmd, const char *arg, char *res, int res_len, int flags);
708 …mand(AVFilterContext *filter, const char *cmd, const char *arg, char *res, int res_len, int flags);
1124 …h *graph, const char *target, const char *cmd, const char *arg, char *res, int res_len, int flags);
Daf_crossfeed.c135 char *res, int res_len, int flags) in process_command() argument
139 ret = ff_filter_process_command(ctx, cmd, args, res, res_len, flags); in process_command()
/third_party/jerryscript/jerry-core/api/
Dgenerate-bytecode.c52 int res_len = len1 + len2 + 1; // str1 + "/" + str2 in splice_path() local
54 char* res = (char*)OhosMalloc(MEM_TYPE_JERRY, (res_len + 1) * sizeof(char)); in splice_path()
58 if (memset_s(res, res_len + 1, 0, res_len + 1) != 0) { in splice_path()
69 || (strcat_s(res, res_len + 1, str2) != 0)) { in splice_path()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_aka.c24 size_t res_len; member
232 data->res_len = os_strlen(pos) / 2; in eap_aka_ext_sim_result()
233 if (data->res_len > EAP_AKA_RES_MAX_LEN) { in eap_aka_ext_sim_result()
234 data->res_len = 0; in eap_aka_ext_sim_result()
237 if (hexstr2bin(pos, data->res, data->res_len) < 0) in eap_aka_ext_sim_result()
239 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len); in eap_aka_ext_sim_result()
270 data->autn, data->res, &data->res_len, in eap_aka_umts_auth()
305 data->res, &data->res_len, data->auts); in eap_aka_umts_auth()
316 data->res_len = EAP_AKA_RES_MAX_LEN; in eap_aka_umts_auth()
680 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len * 8, in eap_aka_response_challenge()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_aka.c24 size_t res_len; member
232 data->res_len = os_strlen(pos) / 2; in eap_aka_ext_sim_result()
233 if (data->res_len > EAP_AKA_RES_MAX_LEN) { in eap_aka_ext_sim_result()
234 data->res_len = 0; in eap_aka_ext_sim_result()
237 if (hexstr2bin(pos, data->res, data->res_len) < 0) in eap_aka_ext_sim_result()
239 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len); in eap_aka_ext_sim_result()
270 data->autn, data->res, &data->res_len, in eap_aka_umts_auth()
305 data->res, &data->res_len, data->auts); in eap_aka_umts_auth()
316 data->res_len = EAP_AKA_RES_MAX_LEN; in eap_aka_umts_auth()
671 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len * 8, in eap_aka_response_challenge()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_aka.c34 size_t res_len; member
808 data->ck, data->res, &data->res_len, sm); in eap_aka_fullauth()
985 if (attr->res == NULL || attr->res_len < data->res_len || in eap_aka_process_challenge()
986 attr->res_len_bits != data->res_len * 8 || in eap_aka_process_challenge()
987 os_memcmp_const(attr->res, data->res, data->res_len) != 0) { in eap_aka_process_challenge()
991 (unsigned long) attr->res_len, in eap_aka_process_challenge()
993 (unsigned long) data->res_len * 8); in eap_aka_process_challenge()
Deap_sim_db.c55 size_t res_len; member
604 entry->u.aka.res_len = (end - start) / 2; in eap_sim_db_aka_resp_auth()
605 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { in eap_sim_db_aka_resp_auth()
607 entry->u.aka.res_len = 0; in eap_sim_db_aka_resp_auth()
610 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) in eap_sim_db_aka_resp_auth()
1395 u8 *res, size_t *res_len, void *cb_session_ctx) in eap_sim_db_get_aka_auth() argument
1436 *res_len = entry->u.aka.res_len; in eap_sim_db_get_aka_auth()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_sim_db.c55 size_t res_len; member
604 entry->u.aka.res_len = (end - start) / 2; in eap_sim_db_aka_resp_auth()
605 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { in eap_sim_db_aka_resp_auth()
607 entry->u.aka.res_len = 0; in eap_sim_db_aka_resp_auth()
610 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) in eap_sim_db_aka_resp_auth()
1395 u8 *res, size_t *res_len, void *cb_session_ctx) in eap_sim_db_get_aka_auth() argument
1436 *res_len = entry->u.aka.res_len; in eap_sim_db_get_aka_auth()
Deap_server_aka.c34 size_t res_len; member
808 data->ck, data->res, &data->res_len, sm); in eap_aka_fullauth()
985 if (attr->res == NULL || attr->res_len < data->res_len || in eap_aka_process_challenge()
986 attr->res_len_bits != data->res_len * 8 || in eap_aka_process_challenge()
987 os_memcmp_const(attr->res, data->res, data->res_len) != 0) { in eap_aka_process_challenge()
991 (unsigned long) attr->res_len, in eap_aka_process_challenge()
993 (unsigned long) data->res_len * 8); in eap_aka_process_challenge()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_sim_common.c234 u8 *res, size_t res_len) in prf_prime() argument
262 while (res_len) { in prf_prime()
267 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len; in prf_prime()
270 res_len -= hlen; in prf_prime()
803 attr->res_len = alen; in eap_sim_parse_attr()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_sim_common.c234 u8 *res, size_t res_len) in prf_prime() argument
262 while (res_len) { in prf_prime()
267 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len; in prf_prime()
270 res_len -= hlen; in prf_prime()
803 attr->res_len = alen; in eap_sim_parse_attr()

12345