Home
last modified time | relevance | path

Searched refs:respDataLen (Results 1 – 19 of 19) sorted by relevance

/external/wpa_supplicant/
Deap_aka.c183 size_t *respDataLen, int err) in eap_aka_client_error() argument
194 return eap_sim_msg_finish(msg, respDataLen, NULL, NULL, 0); in eap_aka_client_error()
200 size_t *respDataLen) in eap_aka_authentication_reject() argument
213 return eap_sim_msg_finish(msg, respDataLen, NULL, NULL, 0); in eap_aka_authentication_reject()
219 size_t *respDataLen) in eap_aka_synchronization_failure() argument
234 return eap_sim_msg_finish(msg, respDataLen, NULL, NULL, 0); in eap_aka_synchronization_failure()
241 size_t *respDataLen, in eap_aka_response_identity() argument
280 return eap_sim_msg_finish(msg, respDataLen, NULL, NULL, 0); in eap_aka_response_identity()
286 size_t *respDataLen) in eap_aka_response_challenge() argument
299 return eap_sim_msg_finish(msg, respDataLen, data->k_aut, (u8 *) "", 0); in eap_aka_response_challenge()
[all …]
Deap_sim.c234 size_t *respDataLen, int err) in eap_sim_client_error() argument
245 return eap_sim_msg_finish(msg, respDataLen, NULL, NULL, 0); in eap_sim_client_error()
252 size_t *respDataLen, in eap_sim_response_start() argument
301 return eap_sim_msg_finish(msg, respDataLen, NULL, NULL, 0); in eap_sim_response_start()
307 size_t *respDataLen) in eap_sim_response_challenge() argument
317 return eap_sim_msg_finish(msg, respDataLen, data->k_aut, in eap_sim_response_challenge()
325 size_t *respDataLen, int counter_too_small) in eap_sim_response_reauth() argument
357 return eap_sim_msg_finish(msg, respDataLen, data->k_aut, data->nonce_s, in eap_sim_response_reauth()
364 size_t *respDataLen, in eap_sim_response_notification() argument
396 return eap_sim_msg_finish(msg, respDataLen, k_aut, (u8 *) "", 0); in eap_sim_response_notification()
[all …]
Deap_sake.c159 size_t *respDataLen) in eap_sake_process_identity() argument
183 *respDataLen = 2 + data->peerid_len; in eap_sake_process_identity()
184 resp = eap_sake_build_msg(data, &rpos, hdr->identifier, respDataLen, in eap_sake_process_identity()
206 size_t *respDataLen) in eap_sake_process_challenge() argument
262 *respDataLen = 2 + EAP_SAKE_RAND_LEN + 2 + EAP_SAKE_MIC_LEN; in eap_sake_process_challenge()
264 *respDataLen += 2 + data->peerid_len; in eap_sake_process_challenge()
265 resp = eap_sake_build_msg(data, &rpos, hdr->identifier, respDataLen, in eap_sake_process_challenge()
290 resp, *respDataLen, rpos, rpos)) { in eap_sake_process_challenge()
307 size_t *respDataLen) in eap_sake_process_confirm() argument
340 *respDataLen = 0; in eap_sake_process_confirm()
[all …]
Deap_psk.c85 size_t *respDataLen) in eap_psk_process_1() argument
135 *respDataLen = sizeof(*hdr2) + data->id_p_len; in eap_psk_process_1()
136 resp = os_malloc(*respDataLen); in eap_psk_process_1()
142 hdr2->length = host_to_be16(*respDataLen); in eap_psk_process_1()
179 size_t *respDataLen) in eap_psk_process_3() argument
299 *respDataLen = sizeof(*hdr4) + 4 + 16 + 1; in eap_psk_process_3()
300 resp = os_malloc(*respDataLen + 1); in eap_psk_process_3()
308 hdr4->length = host_to_be16(*respDataLen); in eap_psk_process_3()
326 (*respDataLen)++; in eap_psk_process_3()
327 hdr4->length = host_to_be16(*respDataLen); in eap_psk_process_3()
[all …]
Deap_mschapv2.c223 size_t *respDataLen) in eap_mschapv2_challenge_reply() argument
244 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, respDataLen, in eap_mschapv2_challenge_reply()
313 size_t req_len, u8 id, size_t *respDataLen) in eap_mschapv2_challenge() argument
364 challenge, respDataLen); in eap_mschapv2_challenge()
402 size_t req_len, u8 id, size_t *respDataLen) in eap_mschapv2_success() argument
436 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, respDataLen, in eap_mschapv2_success()
567 u8 id, size_t *respDataLen) in eap_mschapv2_change_password() argument
591 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, respDataLen, in eap_mschapv2_change_password()
672 size_t req_len, u8 id, size_t *respDataLen) in eap_mschapv2_failure() argument
708 id, respDataLen); in eap_mschapv2_failure()
[all …]
Deap_pax.c134 size_t *respDataLen) in eap_pax_process_std_1() argument
207 *respDataLen = sizeof(*resp) + 2 + EAP_PAX_RAND_LEN + in eap_pax_process_std_1()
209 resp = eap_pax_alloc_resp(req, *respDataLen, EAP_PAX_OP_STD_2); in eap_pax_process_std_1()
240 (u8 *) resp, *respDataLen - EAP_PAX_ICV_LEN, in eap_pax_process_std_1()
257 size_t *respDataLen) in eap_pax_process_std_3() argument
326 *respDataLen = sizeof(*resp) + EAP_PAX_ICV_LEN; in eap_pax_process_std_3()
327 resp = eap_pax_alloc_resp(req, *respDataLen, EAP_PAX_OP_ACK); in eap_pax_process_std_3()
336 (u8 *) resp, *respDataLen - EAP_PAX_ICV_LEN, in eap_pax_process_std_3()
352 size_t *respDataLen) in eap_pax_process() argument
459 respDataLen); in eap_pax_process()
[all …]
Deap_gpsk.c47 size_t *respDataLen);
49 size_t *respDataLen);
262 size_t *respDataLen) in eap_gpsk_process_gpsk_1() argument
290 respDataLen); in eap_gpsk_process_gpsk_1()
302 size_t *respDataLen) in eap_gpsk_send_gpsk_2() argument
316 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, respDataLen, len, in eap_gpsk_send_gpsk_2()
569 size_t *respDataLen) in eap_gpsk_process_gpsk_3() argument
601 resp = eap_gpsk_send_gpsk_4(data, req->identifier, respDataLen); in eap_gpsk_process_gpsk_3()
614 size_t *respDataLen) in eap_gpsk_send_gpsk_4() argument
624 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, respDataLen, len, in eap_gpsk_send_gpsk_4()
[all …]
Deap_tls.c83 u8 id, size_t *respDataLen) in eap_tls_failure() argument
112 return eap_tls_build_ack(&data->ssl, respDataLen, id, EAP_TYPE_TLS, 0); in eap_tls_failure()
143 size_t *respDataLen) in eap_tls_process() argument
167 left, &resp, respDataLen); in eap_tls_process()
171 respDataLen); in eap_tls_process()
178 return eap_tls_build_ack(&data->ssl, respDataLen, id, in eap_tls_process()
Deap_leap.c67 size_t *respDataLen) in eap_leap_process_request() argument
118 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, respDataLen, in eap_leap_process_request()
141 const u8 *reqData, size_t *respDataLen) in eap_leap_process_success() argument
165 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, respDataLen, in eap_leap_process_success()
275 size_t *respDataLen) in eap_leap_process() argument
308 respDataLen); in eap_leap_process()
311 respDataLen); in eap_leap_process()
Deap_gtc.c52 size_t *respDataLen) in eap_gtc_process() argument
81 respDataLen, 0, EAP_CODE_RESPONSE, in eap_gtc_process()
113 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, respDataLen, in eap_gtc_process()
Deap_otp.c38 size_t *respDataLen) in eap_otp_process() argument
78 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, respDataLen, in eap_otp_process()
Deap_md5.c39 size_t *respDataLen) in eap_md5_process() argument
89 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, respDataLen, in eap_md5_process()
Deap_peap.c661 size_t *respDataLen) in eap_peap_process() argument
703 &resp, respDataLen); in eap_peap_process()
707 &resp, respDataLen); in eap_peap_process()
767 data->pending_phase2_req_len = *respDataLen; in eap_peap_process()
769 *respDataLen = 0; in eap_peap_process()
771 &resp, respDataLen); in eap_peap_process()
780 return eap_tls_build_ack(&data->ssl, respDataLen, id, in eap_peap_process()
Deap_vendor_test.c71 size_t *respDataLen) in eap_vendor_test_process() argument
128 resp = eap_msg_alloc(EAP_VENDOR_ID, EAP_VENDOR_TYPE, respDataLen, 1, in eap_vendor_test_process()
Deap_ttls.c1493 size_t *respDataLen) in eap_ttls_process() argument
1559 &resp, respDataLen); in eap_ttls_process()
1563 &resp, respDataLen); in eap_ttls_process()
1578 if (*respDataLen == 0) { in eap_ttls_process()
1580 0, &resp, respDataLen)) { in eap_ttls_process()
1596 data->pending_phase2_req_len = *respDataLen; in eap_ttls_process()
1598 *respDataLen = 0; in eap_ttls_process()
1600 &resp, respDataLen); in eap_ttls_process()
1622 return eap_tls_build_ack(&data->ssl, respDataLen, id, in eap_ttls_process()
Deap_tls_common.h61 u8 * eap_tls_build_ack(struct eap_ssl_data *data, size_t *respDataLen, u8 id,
Deap_i.h124 size_t *respDataLen);
Deap_tls_common.c552 u8 * eap_tls_build_ack(struct eap_ssl_data *data, size_t *respDataLen, u8 id, in eap_tls_build_ack() argument
558 resp = eap_msg_alloc(EAP_VENDOR_IETF, eap_type, respDataLen, in eap_tls_build_ack()
Deap_fast.c1804 size_t *respDataLen) in eap_fast_process() argument
1929 &resp, respDataLen); in eap_fast_process()
1948 &resp, respDataLen); in eap_fast_process()
1959 return eap_tls_build_ack(&data->ssl, respDataLen, id, in eap_fast_process()