Home
last modified time | relevance | path

Searched refs:res_len (Results 1 – 21 of 21) sorted by relevance

/external/wpa_supplicant_8/src/utils/
Dutils_module_tests.c278 size_t res_len; in base64_tests() local
282 res = base64_encode((const unsigned char *) "", ~0, &res_len); in base64_tests()
288 res = base64_encode((const unsigned char *) "=", 1, &res_len); in base64_tests()
289 if (!res || res_len != 5 || res[0] != 'P' || res[1] != 'Q' || in base64_tests()
300 res = base64_decode((const unsigned char *) "", 0, &res_len); in base64_tests()
306 res = base64_decode((const unsigned char *) "a", 1, &res_len); in base64_tests()
312 res = base64_decode((const unsigned char *) "====", 4, &res_len); in base64_tests()
318 res = base64_decode((const unsigned char *) "PQ==", 4, &res_len); in base64_tests()
319 if (!res || res_len != 1 || res[0] != '=') in base64_tests()
323 res = base64_decode((const unsigned char *) "P.Q-=!=*", 8, &res_len); in base64_tests()
[all …]
Dcommon.c700 size_t merge_byte_arrays(u8 *res, size_t res_len, in merge_byte_arrays() argument
706 os_memset(res, 0, res_len); in merge_byte_arrays()
709 if (src1_len >= res_len) { in merge_byte_arrays()
710 os_memcpy(res, src1, res_len); in merge_byte_arrays()
711 return res_len; in merge_byte_arrays()
719 if (len + src2_len >= res_len) { in merge_byte_arrays()
720 os_memcpy(res + len, src2, res_len - len); in merge_byte_arrays()
721 return res_len; in merge_byte_arrays()
Dpcsc_funcs.h23 unsigned char *res, size_t *res_len,
Dpcsc_funcs.c1325 unsigned char *res, size_t *res_len, in scard_umts_auth() argument
1392 *res_len = *pos++; in scard_umts_auth()
1393 os_memcpy(res, pos, *res_len); in scard_umts_auth()
1394 pos += *res_len; in scard_umts_auth()
1395 wpa_hexdump(MSG_DEBUG, "SCARD: RES", res, *res_len); in scard_umts_auth()
Dcommon.h506 size_t merge_byte_arrays(u8 *res, size_t res_len,
/external/wpa_supplicant_8/src/crypto/
Dmilenage.c175 u8 *ck, u8 *res, size_t *res_len) in milenage_generate() argument
180 if (*res_len < 8) { in milenage_generate()
181 *res_len = 0; in milenage_generate()
186 *res_len = 0; in milenage_generate()
189 *res_len = 8; in milenage_generate()
271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, in milenage_check() argument
284 *res_len = 8; in milenage_check()
285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); in milenage_check()
Dmilenage.h14 u8 *ck, u8 *res, size_t *res_len);
20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
Dtls_internal.c428 size_t res_len, ad_len; in tls_connection_handshake2() local
438 &res_len, &ad, &ad_len, need_more_data); in tls_connection_handshake2()
441 out = wpabuf_alloc_ext_data(res, res_len); in tls_connection_handshake2()
471 size_t res_len; in tls_connection_server_handshake() local
481 wpabuf_len(in_data), &res_len); in tls_connection_server_handshake()
486 out = wpabuf_alloc_ext_data(res, res_len); in tls_connection_server_handshake()
/external/wpa_supplicant_8/hostapd/
Dhlr_auc_gw.c90 size_t res_len; member
198 m->res_len = atoi(argv[i]); in get_milenage_cb()
527 m->res_len = atoi(pos); in read_milenage()
528 if (m->res_len && in read_milenage()
529 (m->res_len < EAP_AKA_RES_MIN_LEN || in read_milenage()
530 m->res_len > EAP_AKA_RES_MAX_LEN)) { in read_milenage()
797 size_t res_len; in aka_req_auth() local
806 res_len = EAP_AKA_RES_MAX_LEN; in aka_req_auth()
818 autn, ik, ck, res, &res_len); in aka_req_auth()
819 if (m->res_len >= EAP_AKA_RES_MIN_LEN && in aka_req_auth()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap_aka.c24 size_t res_len; member
223 data->res_len = os_strlen(pos) / 2; in eap_aka_ext_sim_result()
224 if (data->res_len > EAP_AKA_RES_MAX_LEN) { in eap_aka_ext_sim_result()
225 data->res_len = 0; in eap_aka_ext_sim_result()
228 if (hexstr2bin(pos, data->res, data->res_len) < 0) in eap_aka_ext_sim_result()
230 wpa_hexdump_key(MSG_DEBUG, "EAP-AKA: RES", data->res, data->res_len); in eap_aka_ext_sim_result()
261 data->autn, data->res, &data->res_len, in eap_aka_umts_auth()
296 data->res, &data->res_len, data->auts); in eap_aka_umts_auth()
307 data->res_len = EAP_AKA_RES_MAX_LEN; in eap_aka_umts_auth()
644 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len * 8, in eap_aka_response_challenge()
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server_aka.c33 size_t res_len; member
791 data->ck, data->res, &data->res_len, sm); in eap_aka_fullauth()
964 if (attr->res == NULL || attr->res_len < data->res_len || in eap_aka_process_challenge()
965 attr->res_len_bits != data->res_len * 8 || in eap_aka_process_challenge()
966 os_memcmp_const(attr->res, data->res, data->res_len) != 0) { in eap_aka_process_challenge()
970 (unsigned long) attr->res_len, in eap_aka_process_challenge()
972 (unsigned long) data->res_len * 8); in eap_aka_process_challenge()
Deap_sim_db.c55 size_t res_len; member
548 entry->u.aka.res_len = (end - start) / 2; in eap_sim_db_aka_resp_auth()
549 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { in eap_sim_db_aka_resp_auth()
551 entry->u.aka.res_len = 0; in eap_sim_db_aka_resp_auth()
554 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) in eap_sim_db_aka_resp_auth()
1336 u8 *res, size_t *res_len, void *cb_session_ctx) in eap_sim_db_get_aka_auth() argument
1377 *res_len = entry->u.aka.res_len; in eap_sim_db_get_aka_auth()
Deap_sim_db.h87 u8 *res, size_t *res_len, void *cb_session_ctx);
/external/ppp/pppd/plugins/pppoatm/
Dans.c41 static int ans(const char *text,int wanted,void *result,int res_len) in ans() argument
114 res_len) < 0) return FATAL; in ans()
/external/wpa_supplicant_8/src/eap_common/
Deap_sim_common.c235 u8 *res, size_t res_len) in prf_prime() argument
263 while (res_len) { in prf_prime()
268 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len; in prf_prime()
271 res_len -= hlen; in prf_prime()
805 attr->res_len = alen; in eap_sim_parse_attr()
Dikev2_common.h323 size_t *res_len);
Deap_sim_common.h191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member
Dikev2_common.c433 size_t *res_len) in ikev2_decrypt_payload() argument
516 *res_len = decrypted_len; in ikev2_decrypt_payload()
/external/wpa_supplicant_8/src/wps/
Dwps_common.c25 const char *label, u8 *res, size_t res_len) in wps_kdf() argument
34 WPA_PUT_BE32(key_bits, res_len * 8); in wps_kdf()
45 iter = (res_len + SHA256_MAC_LEN - 1) / SHA256_MAC_LEN; in wps_kdf()
47 left = res_len; in wps_kdf()
Dwps_i.h133 const char *label, u8 *res, size_t res_len);
/external/wpa_supplicant_8/wpa_supplicant/
Dconfig.c61 size_t res_len, *dst_len; in wpa_config_parse_str() local
68 res_len = 0; in wpa_config_parse_str()
72 tmp = wpa_config_parse_string(value, &res_len); in wpa_config_parse_str()
82 (u8 *) tmp, res_len); in wpa_config_parse_str()
85 (u8 *) tmp, res_len); in wpa_config_parse_str()
88 if (data->param3 && res_len < (size_t) data->param3) { in wpa_config_parse_str()
91 (unsigned long) res_len, (long) data->param3); in wpa_config_parse_str()
96 if (data->param4 && res_len > (size_t) data->param4) { in wpa_config_parse_str()
99 (unsigned long) res_len, (long) data->param4); in wpa_config_parse_str()
110 *dst_len = res_len; in wpa_config_parse_str()
[all …]