Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching full:len

59 	u16 len;
254 size_t len;
260 len = l_end - rc->pos;
261 if (len >= buf_len)
262 len = buf_len - 1;
263 os_memcpy(buf, rc->pos, len);
264 buf[len] = '\0';
282 static u8 * eap_fast_parse_hex(const char *value, size_t *len)
292 *len = hlen / 2;
293 buf = os_malloc(*len);
296 if (hexstr2bin(value, buf, *len)) {
329 rc.end = (char *) blob->data + blob->len;
469 size_t len, int txt)
477 need = os_strlen(field) + len * 2 + 30;
479 need += os_strlen(field) + len + 20;
496 *pos += wpa_snprintf_hex(*pos, *buf + *buf_len - *pos, data, len);
508 for (i = 0; i < len; i++) {
590 blob->len = pos - buf;
923 char *label, size_t len)
933 out = os_malloc(block_size + len);
938 block_size + len) == 0) {
939 os_memmove(out, out + block_size, len);
958 keys.server_random_len, out, block_size + len))
961 os_memmove(out, out + block_size, len);
1049 size_t len = be_to_host16(hdr->length);
1053 if (len <= sizeof(struct eap_hdr)) {
1055 "Phase 2 request (len=%lu)", (unsigned long) len);
1124 &iret, (u8 *) hdr, len,
1145 static u8 * eap_fast_tlv_nak(int vendor_id, int tlv_type, size_t *len)
1148 *len = sizeof(*nak);
1149 nak = os_malloc(*len);
1160 static u8 * eap_fast_tlv_result(int status, int intermediate, size_t *len)
1163 *len = sizeof(*result);
1164 result = os_malloc(*len);
1177 static u8 * eap_fast_tlv_pac_ack(size_t *len)
1182 *len = sizeof(*res) + sizeof(*ack);
1183 res = os_zalloc(*len);
1204 static u8 * eap_fast_tlv_eap_payload(u8 *buf, size_t *len)
1209 tlv = os_malloc(sizeof(*tlv) + *len);
1219 tlv->length = host_to_be16(*len);
1220 os_memcpy(tlv + 1, buf, *len);
1222 *len += sizeof(*tlv);
1383 size_t left, len;
1393 len = be_to_host16(hdr->len);
1396 if (len > left) {
1398 "(type=%d len=%lu left=%lu)",
1399 type, (unsigned long) len,
1407 pos, len);
1408 if (len != EAP_FAST_PAC_KEY_LEN) {
1411 (unsigned long) len);
1415 os_memcpy(entry.pac_key, pos, len);
1419 pos, len);
1421 entry.pac_opaque_len = len;
1425 pos, len);
1427 entry.pac_info_len = len;
1435 pos += len;
1436 left -= len;
1451 len = be_to_host16(hdr->len);
1454 if (len > left) {
1456 "(type=%d len=%lu left=%lu)",
1457 type, (unsigned long) len,
1465 "A-ID", pos, len);
1467 entry.a_id_len = len;
1471 "I-ID", pos, len);
1473 entry.i_id_len = len;
1477 "A-ID-Info", pos, len);
1479 entry.a_id_info_len = len;
1487 pos += len;
1488 left -= len;
1528 int len_decrypted, len;
1582 "TLV frame (len=%d)", len_decrypted);
1593 len = WPA_GET_BE16(pos);
1595 if (pos + len > end) {
1602 tlv_type, len, mandatory ? " (mandatory)" : "");
1607 pos, len);
1609 eap_payload_tlv_len = len;
1613 pos, len);
1614 if (len < 2) {
1633 "Result TLV", pos, len);
1634 if (len < 2) {
1654 "TLV", pos, len);
1655 crypto_binding_len = sizeof(struct eap_tlv_hdr) + len;
1669 pos, len);
1671 pac_len = len;
1688 pos += len;
1712 "Payload TLV (len=%lu)",
1838 tlen = be_to_host16(hdr->len);
2004 int len, ret;
2006 len = eap_tls_status(sm, &data->ssl, buf, buflen, verbose);
2008 ret = os_snprintf(buf + len, buflen - len,
2011 if (ret < 0 || (size_t) ret >= buflen - len)
2012 return len;
2013 len += ret;
2015 return len;
2026 static u8 * eap_fast_getKey(struct eap_sm *sm, void *priv, size_t *len)
2038 *len = EAP_FAST_KEY_LEN;
2045 static u8 * eap_fast_get_emsk(struct eap_sm *sm, void *priv, size_t *len)
2057 *len = EAP_EMSK_LEN;