Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching full:sizeof

156 	radius_msg_make_authenticator(msg, (u8 *) e, sizeof(*e));
160 if (len > sizeof(*hdr) && hdr->code == EAP_CODE_RESPONSE &&
164 e->eap_identity_len = len - sizeof(*hdr) - 1;
187 os_snprintf(buf, sizeof(buf), RADIUS_802_1X_ADDR_FORMAT,
209 os_snprintf(buf, sizeof(buf), "%s", e->connect_info);
348 ctx = os_zalloc(sizeof(*ctx));
376 os_memset(&eapol_conf, 0, sizeof(eapol_conf));
442 sizeof(*hdr) + 5);
503 if (len < sizeof(*hdr)) {
510 if (len > sizeof(*hdr))
511 eap_type = eap[sizeof(*hdr)];
516 os_snprintf(buf, sizeof(buf), "EAP-Request-%s (%d)",
521 os_snprintf(buf, sizeof(buf), "EAP Response-%s (%d)",
526 os_snprintf(buf, sizeof(buf), "EAP Success");
531 os_snprintf(buf, sizeof(buf), "EAP Failure");
535 os_snprintf(buf, sizeof(buf), "unknown EAP code");
551 dot1x = os_malloc(sizeof(*dot1x) + len);
558 (u8 *) dot1x, sizeof(*dot1x) + len);
674 os_strncpy(wpa_s->ifname, "test", sizeof(wpa_s->ifname));
676 e->radius_conf = os_zalloc(sizeof(struct hostapd_radius_servers));
679 as = os_zalloc(sizeof(struct hostapd_radius_server));
752 len = sizeof(imsi);
758 os_memset(_rand, 0, sizeof(_rand));
762 os_memset(_rand, 0xff, sizeof(_rand));
767 os_memset(rand_[i], i, sizeof(rand_[i]));
851 len = sizeof(imsi);
858 os_memset(_rand, i, sizeof(_rand));
936 os_memset(&eapol_test, 0, sizeof(eapol_test));
1015 os_memset(&wpa_s, 0, sizeof(wpa_s));