Lines Matching defs:tlv
1206 struct eap_tlv_hdr *tlv;
1208 /* Encapsulate EAP packet in EAP Payload TLV */
1209 tlv = os_malloc(sizeof(*tlv) + *len);
1210 if (tlv == NULL) {
1212 "allocate memory for TLV "
1217 tlv->tlv_type = host_to_be16(EAP_TLV_TYPE_MANDATORY |
1219 tlv->length = host_to_be16(*len);
1220 os_memcpy(tlv + 1, buf, *len);
1222 *len += sizeof(*tlv);
1223 return (u8 *) tlv;
1240 wpa_printf(MSG_DEBUG, "EAP-FAST: Crypto-Binding TLV: Version %d "
1252 "Crypto-Binding TLV: Version %d "
1306 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for Compound "
1357 wpa_printf(MSG_DEBUG, "EAP-FAST: Reply Crypto-Binding TLV: Version %d "
1397 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV overrun "
1440 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV does not include "
1507 wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
1512 wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
1576 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Decrypted Phase 2 TLV(s)",
1582 "TLV frame (len=%d)", len_decrypted);
1597 wpa_printf(MSG_INFO, "EAP-FAST: TLV overflow");
1601 "TLV type %d length %d%s",
1606 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: EAP Payload TLV",
1612 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Result TLV",
1616 "Result TLV");
1633 "Result TLV", pos, len);
1636 "Intermediate Result TLV");
1654 "TLV", pos, len);
1658 "Crypto-Binding TLV");
1668 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: PAC TLV",
1676 "mandatory TLV type %d", tlv_type);
1682 "unknown optional TLV type %d",
1712 "Payload TLV (len=%lu)",
1720 "in EAP Payload TLV");
1758 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV without Result TLV "
1869 u8 *tlv;
1874 tlv = os_malloc(tlv_len);
1875 if (tlv) {
1876 ehdr = (struct eap_tlv_hdr *) tlv;
1883 if (tlv == NULL ||
1886 TLS_EXT_PAC_OPAQUE, tlv, tlv_len) < 0) {
1889 os_free(tlv);
1892 os_free(tlv);