/external/wpa_supplicant/tests/ |
test_sha1.c | 99 u8 tlv[] = { local 156 memset(tlv + sizeof(tlv) - 20, 0, 20); 157 hmac_sha1(cmk, 20, tlv, sizeof(tlv), tlv + sizeof(tlv) - 20); 158 if (memcmp(tlv + sizeof(tlv) - 20, compound_mac, sizeof(compound_mac))
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 110 u8 tlv[] = { local 175 memset(tlv + sizeof(tlv) - 20, 0, 20); 176 hmac_sha1(cmk, 20, tlv, sizeof(tlv), tlv + sizeof(tlv) - 20); 177 if (memcmp(tlv + sizeof(tlv) - 20, compound_mac, sizeof(compound_mac))
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_peap.c | 194 * eap_tlv_build_nak - Build EAP-TLV NAK message 196 * @nak_type: TLV type (EAP_TLV_*) 197 * Returns: Buffer to the allocated EAP-TLV NAK message or %NULL on failure 199 * This funtion builds an EAP-TLV NAK message. The caller is responsible for 312 /* Compound_MAC: HMAC-SHA1-160(cryptobinding TLV | EAP type) */ 344 * eap_tlv_build_result - Build EAP-TLV Result message 347 * Returns: Buffer to the allocated EAP-TLV Result message or %NULL on failure 349 * This funtion builds an EAP-TLV Result message. The caller is responsible for 365 len += 60; /* Cryptobinding TLV */ 399 wpa_printf(MSG_DEBUG, "EAP-PEAP: Invalid cryptobinding TLV " 587 struct eap_tlv_hdr *tlv; local 842 struct eap_tlv_hdr *tlv; local [all...] |
eap_fast.c | 507 wpa_printf(MSG_DEBUG, "EAP-FAST: Add %sResult TLV(status=%d)", 530 wpa_printf(MSG_DEBUG, "EAP-FAST: Add PAC TLV (ack)"); 553 "Payload TLV (len=%lu)", 561 "EAP Payload TLV"); 584 wpa_printf(MSG_DEBUG, "EAP-FAST: Crypto-Binding TLV: Version %d " 596 "Crypto-Binding TLV: Version %d " 623 wpa_printf(MSG_DEBUG, "EAP-FAST: Reply Crypto-Binding TLV: Version %d " 758 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for Compound " 851 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV overrun " 865 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV does not include 1148 struct eap_fast_tlv_parse tlv; local 1365 u8 *tlv; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_fast.c | 30 /* Private PAC-Opaque TLV types */ 119 /* TODO: send Result TLV(FAILURE) */ 615 wpa_printf(MSG_DEBUG, "EAP-FAST: Add Intermediate-Result TLV " 626 /* Result TLV */ 627 wpa_printf(MSG_DEBUG, "EAP-FAST: Add Result TLV " 636 /* Crypto-Binding TLV */ 662 * Compound-MAC = HMAC-SHA1( CMK, Crypto-Binding TLV ) 669 wpa_printf(MSG_DEBUG, "EAP-FAST: Add Crypto-Binding TLV: Version %d " 760 /* Result TLV */ 761 wpa_printf(MSG_DEBUG, "EAP-FAST: Add Result TLV (status=SUCCESS)") 1229 struct eap_tlv_pac_type_tlv *tlv; local 1246 struct eap_fast_tlv_parse tlv; local [all...] |
eap_peap.c | 110 struct eap_tlv_hdr *tlv; local 115 /* Encapsulate EAP packet in EAP-Payload TLV */ 116 wpa_printf(MSG_DEBUG, "EAP-PEAPv2: Add EAP-Payload TLV"); 117 e = wpabuf_alloc(sizeof(*tlv) + wpabuf_len(buf)); 120 "for TLV encapsulation"); 124 tlv = wpabuf_put(e, sizeof(*tlv)); 125 tlv->tlv_type = host_to_be16(EAP_TLV_TYPE_MANDATORY | 127 tlv->length = host_to_be16(wpabuf_len(buf)); 375 len = 6; /* Result TLV */ 1110 struct eap_tlv_hdr *tlv; local [all...] |
/external/wpa_supplicant/ |
eap_fast.c | 1206 struct eap_tlv_hdr *tlv; local 1208 /* Encapsulate EAP packet in EAP Payload TLV */ 1209 tlv = os_malloc(sizeof(*tlv) + *len); 1210 if (tlv == NULL) { 1212 "allocate memory for TLV " 1217 tlv->tlv_type = host_to_be16(EAP_TLV_TYPE_MANDATORY | 1219 tlv->length = host_to_be16(*len); 1220 os_memcpy(tlv + 1, buf, *len); 1222 *len += sizeof(*tlv); 1869 u8 *tlv; local [all...] |
/frameworks/base/telephony/java/com/android/internal/telephony/gsm/ |
SIMRecords.java | 828 SimTlv tlv = new SimTlv(data, 0, data.length); local 830 for ( ; tlv.isValidObject() ; tlv.nextObject()) { 831 if (tlv.getTag() == TAG_FULL_NETWORK_NAME) { 834 tlv.getData(), 0, tlv.getData().length); 1425 SimTlv tlv = new SimTlv(data, 0, data.length); local [all...] |