/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
D | milenage.c | 181 u8 *ck, u8 *res, size_t *res_len) in milenage_generate() argument 186 if (*res_len < 8) { in milenage_generate() 187 *res_len = 0; in milenage_generate() 192 *res_len = 0; in milenage_generate() 195 *res_len = 8; in milenage_generate() 277 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, in milenage_check() argument 290 *res_len = 8; in milenage_check() 291 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); in milenage_check() 1029 size_t res_len; in main() local 1101 res_len = 8; in main() [all …]
|
D | milenage.h | 20 u8 *ck, u8 *res, size_t *res_len); 26 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
D | hlr_auc_gw.c | 478 size_t res_len; in aka_req_auth() local 486 res_len = EAP_AKA_RES_MAX_LEN; in aka_req_auth() 492 autn, ik, ck, res, &res_len); in aka_req_auth() 502 res_len = EAP_AKA_RES_MAX_LEN; in aka_req_auth() 522 pos += wpa_snprintf_hex(pos, end - pos, res, res_len); in aka_req_auth()
|
/external/wpa_supplicant_8/src/crypto/ |
D | milenage.c | 175 u8 *ck, u8 *res, size_t *res_len) in milenage_generate() argument 180 if (*res_len < 8) { in milenage_generate() 181 *res_len = 0; in milenage_generate() 186 *res_len = 0; in milenage_generate() 189 *res_len = 8; in milenage_generate() 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, in milenage_check() argument 284 *res_len = 8; in milenage_check() 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); in milenage_check()
|
D | milenage.h | 14 u8 *ck, u8 *res, size_t *res_len); 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
D | tls_internal.c | 342 size_t res_len, ad_len; in tls_connection_handshake2() local 352 &res_len, &ad, &ad_len, need_more_data); in tls_connection_handshake2() 355 out = wpabuf_alloc_ext_data(res, res_len); in tls_connection_handshake2() 385 size_t res_len; in tls_connection_server_handshake() local 395 wpabuf_len(in_data), &res_len); in tls_connection_server_handshake() 400 out = wpabuf_alloc_ext_data(res, res_len); in tls_connection_server_handshake()
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
D | wps_common.c | 27 const char *label, u8 *res, size_t res_len) in wps_kdf() argument 36 WPA_PUT_BE32(key_bits, res_len * 8); in wps_kdf() 47 iter = (res_len + SHA256_MAC_LEN - 1) / SHA256_MAC_LEN; in wps_kdf() 49 left = res_len; in wps_kdf()
|
/external/wpa_supplicant_6/wpa_supplicant/ |
D | config.c | 100 size_t res_len, *dst_len; in wpa_config_parse_str() local 107 res_len = 0; in wpa_config_parse_str() 111 tmp = wpa_config_parse_string(value, &res_len); in wpa_config_parse_str() 121 (u8 *) tmp, res_len); in wpa_config_parse_str() 124 (u8 *) tmp, res_len); in wpa_config_parse_str() 127 if (data->param3 && res_len < (size_t) data->param3) { in wpa_config_parse_str() 130 (unsigned long) res_len, (long) data->param3); in wpa_config_parse_str() 135 if (data->param4 && res_len > (size_t) data->param4) { in wpa_config_parse_str() 138 (unsigned long) res_len, (long) data->param4); in wpa_config_parse_str() 149 *dst_len = res_len; in wpa_config_parse_str() [all …]
|
/external/wpa_supplicant_8/hostapd/ |
D | hlr_auc_gw.c | 473 size_t res_len; in aka_req_auth() local 481 res_len = EAP_AKA_RES_MAX_LEN; in aka_req_auth() 487 autn, ik, ck, res, &res_len); in aka_req_auth() 497 res_len = EAP_AKA_RES_MAX_LEN; in aka_req_auth() 517 pos += wpa_snprintf_hex(pos, end - pos, res, res_len); in aka_req_auth()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_sim_db.c | 55 size_t res_len; member 251 entry->u.aka.res_len = (end - start) / 2; in eap_sim_db_aka_resp_auth() 252 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { in eap_sim_db_aka_resp_auth() 254 entry->u.aka.res_len = 0; in eap_sim_db_aka_resp_auth() 257 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) in eap_sim_db_aka_resp_auth() 1171 u8 *ck, u8 *res, size_t *res_len, in eap_sim_db_get_aka_auth() argument 1223 *res_len = entry->u.aka.res_len; in eap_sim_db_get_aka_auth()
|
D | eap_server_aka.c | 33 size_t res_len; member 689 &data->res_len, sm); in eap_aka_determine_identity() 850 if (attr->res == NULL || attr->res_len < data->res_len || in eap_aka_process_challenge() 851 attr->res_len_bits != data->res_len * 8 || in eap_aka_process_challenge() 852 os_memcmp(attr->res, data->res, data->res_len) != 0) { in eap_aka_process_challenge() 856 (unsigned long) attr->res_len, in eap_aka_process_challenge() 858 (unsigned long) data->res_len * 8); in eap_aka_process_challenge()
|
D | eap_sim_db.h | 78 u8 *ck, u8 *res, size_t *res_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_sim_db.c | 60 size_t res_len; member 256 entry->u.aka.res_len = (end - start) / 2; in eap_sim_db_aka_resp_auth() 257 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { in eap_sim_db_aka_resp_auth() 259 entry->u.aka.res_len = 0; in eap_sim_db_aka_resp_auth() 262 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) in eap_sim_db_aka_resp_auth() 1176 u8 *ck, u8 *res, size_t *res_len, in eap_sim_db_get_aka_auth() argument 1228 *res_len = entry->u.aka.res_len; in eap_sim_db_get_aka_auth()
|
D | eap_aka.c | 39 size_t res_len; member 696 &data->res_len, sm); in eap_aka_determine_identity() 857 if (attr->res == NULL || attr->res_len < data->res_len || in eap_aka_process_challenge() 858 attr->res_len_bits != data->res_len * 8 || in eap_aka_process_challenge() 859 os_memcmp(attr->res, data->res, data->res_len) != 0) { in eap_aka_process_challenge() 863 (unsigned long) attr->res_len, in eap_aka_process_challenge() 865 (unsigned long) data->res_len * 8); in eap_aka_process_challenge()
|
D | eap_sim_db.h | 86 u8 *ck, u8 *res, size_t *res_len,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | config.c | 95 size_t res_len, *dst_len; in wpa_config_parse_str() local 102 res_len = 0; in wpa_config_parse_str() 106 tmp = wpa_config_parse_string(value, &res_len); in wpa_config_parse_str() 116 (u8 *) tmp, res_len); in wpa_config_parse_str() 119 (u8 *) tmp, res_len); in wpa_config_parse_str() 122 if (data->param3 && res_len < (size_t) data->param3) { in wpa_config_parse_str() 125 (unsigned long) res_len, (long) data->param3); in wpa_config_parse_str() 130 if (data->param4 && res_len > (size_t) data->param4) { in wpa_config_parse_str() 133 (unsigned long) res_len, (long) data->param4); in wpa_config_parse_str() 144 *dst_len = res_len; in wpa_config_parse_str() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
D | pcsc_funcs.h | 54 unsigned char *res, size_t *res_len,
|
D | pcsc_funcs.c | 1141 unsigned char *res, size_t *res_len, in scard_umts_auth() argument 1208 *res_len = *pos++; in scard_umts_auth() 1209 os_memcpy(res, pos, *res_len); in scard_umts_auth() 1210 pos += *res_len; in scard_umts_auth() 1211 wpa_hexdump(MSG_DEBUG, "SCARD: RES", res, *res_len); in scard_umts_auth()
|
/external/ppp/pppd/plugins/pppoatm/ |
D | ans.c | 41 static int ans(const char *text,int wanted,void *result,int res_len) in ans() argument 114 res_len) < 0) return FATAL; in ans()
|
/external/wpa_supplicant_8/src/utils/ |
D | pcsc_funcs.h | 50 unsigned char *res, size_t *res_len,
|
D | pcsc_funcs.c | 1190 unsigned char *res, size_t *res_len, in scard_umts_auth() argument 1257 *res_len = *pos++; in scard_umts_auth() 1258 os_memcpy(res, pos, *res_len); in scard_umts_auth() 1259 pos += *res_len; in scard_umts_auth() 1260 wpa_hexdump(MSG_DEBUG, "SCARD: RES", res, *res_len); in scard_umts_auth()
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_common.c | 22 const char *label, u8 *res, size_t res_len) in wps_kdf() argument 31 WPA_PUT_BE32(key_bits, res_len * 8); in wps_kdf() 42 iter = (res_len + SHA256_MAC_LEN - 1) / SHA256_MAC_LEN; in wps_kdf() 44 left = res_len; in wps_kdf()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | eap_sim_common.c | 240 u8 *res, size_t res_len) in prf_prime() argument 268 while (res_len) { in prf_prime() 273 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len; in prf_prime() 276 res_len -= hlen; in prf_prime() 810 attr->res_len = alen; in eap_sim_parse_attr()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.c | 235 u8 *res, size_t res_len) in prf_prime() argument 263 while (res_len) { in prf_prime() 268 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len; in prf_prime() 271 res_len -= hlen; in prf_prime() 805 attr->res_len = alen; in eap_sim_parse_attr()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_aka.c | 24 size_t res_len; member 146 data->autn, data->res, &data->res_len, in eap_aka_umts_auth() 181 data->res, &data->res_len, data->auts); in eap_aka_umts_auth() 192 data->res_len = EAP_AKA_RES_MAX_LEN; in eap_aka_umts_auth() 524 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len * 8, in eap_aka_response_challenge() 525 data->res, data->res_len); in eap_aka_response_challenge()
|