/external/wpa_supplicant/ |
D | eap_aka.c | 183 size_t *respDataLen, int err) in eap_aka_client_error() argument 194 return eap_sim_msg_finish(msg, respDataLen, NULL, NULL, 0); in eap_aka_client_error() 200 size_t *respDataLen) in eap_aka_authentication_reject() argument 213 return eap_sim_msg_finish(msg, respDataLen, NULL, NULL, 0); in eap_aka_authentication_reject() 219 size_t *respDataLen) in eap_aka_synchronization_failure() argument 234 return eap_sim_msg_finish(msg, respDataLen, NULL, NULL, 0); in eap_aka_synchronization_failure() 241 size_t *respDataLen, in eap_aka_response_identity() argument 280 return eap_sim_msg_finish(msg, respDataLen, NULL, NULL, 0); in eap_aka_response_identity() 286 size_t *respDataLen) in eap_aka_response_challenge() argument 299 return eap_sim_msg_finish(msg, respDataLen, data->k_aut, (u8 *) "", 0); in eap_aka_response_challenge() [all …]
|
D | eap_sim.c | 234 size_t *respDataLen, int err) in eap_sim_client_error() argument 245 return eap_sim_msg_finish(msg, respDataLen, NULL, NULL, 0); in eap_sim_client_error() 252 size_t *respDataLen, in eap_sim_response_start() argument 301 return eap_sim_msg_finish(msg, respDataLen, NULL, NULL, 0); in eap_sim_response_start() 307 size_t *respDataLen) in eap_sim_response_challenge() argument 317 return eap_sim_msg_finish(msg, respDataLen, data->k_aut, in eap_sim_response_challenge() 325 size_t *respDataLen, int counter_too_small) in eap_sim_response_reauth() argument 357 return eap_sim_msg_finish(msg, respDataLen, data->k_aut, data->nonce_s, in eap_sim_response_reauth() 364 size_t *respDataLen, in eap_sim_response_notification() argument 396 return eap_sim_msg_finish(msg, respDataLen, k_aut, (u8 *) "", 0); in eap_sim_response_notification() [all …]
|
D | eap_sake.c | 159 size_t *respDataLen) in eap_sake_process_identity() argument 183 *respDataLen = 2 + data->peerid_len; in eap_sake_process_identity() 184 resp = eap_sake_build_msg(data, &rpos, hdr->identifier, respDataLen, in eap_sake_process_identity() 206 size_t *respDataLen) in eap_sake_process_challenge() argument 262 *respDataLen = 2 + EAP_SAKE_RAND_LEN + 2 + EAP_SAKE_MIC_LEN; in eap_sake_process_challenge() 264 *respDataLen += 2 + data->peerid_len; in eap_sake_process_challenge() 265 resp = eap_sake_build_msg(data, &rpos, hdr->identifier, respDataLen, in eap_sake_process_challenge() 290 resp, *respDataLen, rpos, rpos)) { in eap_sake_process_challenge() 307 size_t *respDataLen) in eap_sake_process_confirm() argument 340 *respDataLen = 0; in eap_sake_process_confirm() [all …]
|
D | eap_psk.c | 85 size_t *respDataLen) in eap_psk_process_1() argument 135 *respDataLen = sizeof(*hdr2) + data->id_p_len; in eap_psk_process_1() 136 resp = os_malloc(*respDataLen); in eap_psk_process_1() 142 hdr2->length = host_to_be16(*respDataLen); in eap_psk_process_1() 179 size_t *respDataLen) in eap_psk_process_3() argument 299 *respDataLen = sizeof(*hdr4) + 4 + 16 + 1; in eap_psk_process_3() 300 resp = os_malloc(*respDataLen + 1); in eap_psk_process_3() 308 hdr4->length = host_to_be16(*respDataLen); in eap_psk_process_3() 326 (*respDataLen)++; in eap_psk_process_3() 327 hdr4->length = host_to_be16(*respDataLen); in eap_psk_process_3() [all …]
|
D | eap_mschapv2.c | 223 size_t *respDataLen) in eap_mschapv2_challenge_reply() argument 244 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, respDataLen, in eap_mschapv2_challenge_reply() 313 size_t req_len, u8 id, size_t *respDataLen) in eap_mschapv2_challenge() argument 364 challenge, respDataLen); in eap_mschapv2_challenge() 402 size_t req_len, u8 id, size_t *respDataLen) in eap_mschapv2_success() argument 436 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, respDataLen, in eap_mschapv2_success() 567 u8 id, size_t *respDataLen) in eap_mschapv2_change_password() argument 591 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, respDataLen, in eap_mschapv2_change_password() 672 size_t req_len, u8 id, size_t *respDataLen) in eap_mschapv2_failure() argument 708 id, respDataLen); in eap_mschapv2_failure() [all …]
|
D | eap_pax.c | 134 size_t *respDataLen) in eap_pax_process_std_1() argument 207 *respDataLen = sizeof(*resp) + 2 + EAP_PAX_RAND_LEN + in eap_pax_process_std_1() 209 resp = eap_pax_alloc_resp(req, *respDataLen, EAP_PAX_OP_STD_2); in eap_pax_process_std_1() 240 (u8 *) resp, *respDataLen - EAP_PAX_ICV_LEN, in eap_pax_process_std_1() 257 size_t *respDataLen) in eap_pax_process_std_3() argument 326 *respDataLen = sizeof(*resp) + EAP_PAX_ICV_LEN; in eap_pax_process_std_3() 327 resp = eap_pax_alloc_resp(req, *respDataLen, EAP_PAX_OP_ACK); in eap_pax_process_std_3() 336 (u8 *) resp, *respDataLen - EAP_PAX_ICV_LEN, in eap_pax_process_std_3() 352 size_t *respDataLen) in eap_pax_process() argument 459 respDataLen); in eap_pax_process() [all …]
|
D | eap_gpsk.c | 47 size_t *respDataLen); 49 size_t *respDataLen); 262 size_t *respDataLen) in eap_gpsk_process_gpsk_1() argument 290 respDataLen); in eap_gpsk_process_gpsk_1() 302 size_t *respDataLen) in eap_gpsk_send_gpsk_2() argument 316 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, respDataLen, len, in eap_gpsk_send_gpsk_2() 569 size_t *respDataLen) in eap_gpsk_process_gpsk_3() argument 601 resp = eap_gpsk_send_gpsk_4(data, req->identifier, respDataLen); in eap_gpsk_process_gpsk_3() 614 size_t *respDataLen) in eap_gpsk_send_gpsk_4() argument 624 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, respDataLen, len, in eap_gpsk_send_gpsk_4() [all …]
|
D | eap_tls.c | 83 u8 id, size_t *respDataLen) in eap_tls_failure() argument 112 return eap_tls_build_ack(&data->ssl, respDataLen, id, EAP_TYPE_TLS, 0); in eap_tls_failure() 143 size_t *respDataLen) in eap_tls_process() argument 167 left, &resp, respDataLen); in eap_tls_process() 171 respDataLen); in eap_tls_process() 178 return eap_tls_build_ack(&data->ssl, respDataLen, id, in eap_tls_process()
|
D | eap_leap.c | 67 size_t *respDataLen) in eap_leap_process_request() argument 118 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, respDataLen, in eap_leap_process_request() 141 const u8 *reqData, size_t *respDataLen) in eap_leap_process_success() argument 165 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, respDataLen, in eap_leap_process_success() 275 size_t *respDataLen) in eap_leap_process() argument 308 respDataLen); in eap_leap_process() 311 respDataLen); in eap_leap_process()
|
D | eap_gtc.c | 52 size_t *respDataLen) in eap_gtc_process() argument 81 respDataLen, 0, EAP_CODE_RESPONSE, in eap_gtc_process() 113 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, respDataLen, in eap_gtc_process()
|
D | eap_otp.c | 38 size_t *respDataLen) in eap_otp_process() argument 78 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, respDataLen, in eap_otp_process()
|
D | eap_md5.c | 39 size_t *respDataLen) in eap_md5_process() argument 89 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, respDataLen, in eap_md5_process()
|
D | eap_peap.c | 661 size_t *respDataLen) in eap_peap_process() argument 703 &resp, respDataLen); in eap_peap_process() 707 &resp, respDataLen); in eap_peap_process() 767 data->pending_phase2_req_len = *respDataLen; in eap_peap_process() 769 *respDataLen = 0; in eap_peap_process() 771 &resp, respDataLen); in eap_peap_process() 780 return eap_tls_build_ack(&data->ssl, respDataLen, id, in eap_peap_process()
|
D | eap_vendor_test.c | 71 size_t *respDataLen) in eap_vendor_test_process() argument 128 resp = eap_msg_alloc(EAP_VENDOR_ID, EAP_VENDOR_TYPE, respDataLen, 1, in eap_vendor_test_process()
|
D | eap_ttls.c | 1493 size_t *respDataLen) in eap_ttls_process() argument 1559 &resp, respDataLen); in eap_ttls_process() 1563 &resp, respDataLen); in eap_ttls_process() 1578 if (*respDataLen == 0) { in eap_ttls_process() 1580 0, &resp, respDataLen)) { in eap_ttls_process() 1596 data->pending_phase2_req_len = *respDataLen; in eap_ttls_process() 1598 *respDataLen = 0; in eap_ttls_process() 1600 &resp, respDataLen); in eap_ttls_process() 1622 return eap_tls_build_ack(&data->ssl, respDataLen, id, in eap_ttls_process()
|
D | eap_tls_common.h | 61 u8 * eap_tls_build_ack(struct eap_ssl_data *data, size_t *respDataLen, u8 id,
|
D | eap_i.h | 124 size_t *respDataLen);
|
D | eap_tls_common.c | 552 u8 * eap_tls_build_ack(struct eap_ssl_data *data, size_t *respDataLen, u8 id, in eap_tls_build_ack() argument 558 resp = eap_msg_alloc(EAP_VENDOR_IETF, eap_type, respDataLen, in eap_tls_build_ack()
|
D | eap_fast.c | 1804 size_t *respDataLen) in eap_fast_process() argument 1929 &resp, respDataLen); in eap_fast_process() 1948 &resp, respDataLen); in eap_fast_process() 1959 return eap_tls_build_ack(&data->ssl, respDataLen, id, in eap_fast_process()
|