Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching refs:pos

240 	const char *pos;
247 char *pos;
255 if (rc->pos >= rc->end)
257 l_end = rc->pos;
260 len = l_end - rc->pos;
263 os_memcpy(buf, rc->pos, len);
265 rc->pos = l_end + 1;
269 pos = buf;
270 while (*pos != '\0') {
271 if (*pos == '\n' || *pos == '\r') {
272 *pos = '\0';
275 pos++;
310 char *buf, *pos;
328 rc.pos = (char *) blob->data;
358 pos = os_strchr(buf, '=');
359 if (pos) {
360 *pos++ = '\0';
393 key = eap_fast_parse_hex(pos, &key_len);
407 eap_fast_parse_hex(pos, &pac->pac_opaque_len);
417 pac->a_id = eap_fast_parse_hex(pos, &pac->a_id_len);
426 pac->i_id = eap_fast_parse_hex(pos, &pac->i_id_len);
436 eap_fast_parse_hex(pos, &pac->a_id_info_len);
467 static void eap_fast_write(char **buf, char **pos, size_t *buf_len,
481 if (*pos - *buf + need > *buf_len) {
492 ret = os_snprintf(*pos, *buf + *buf_len - *pos, "%s=", field);
493 if (ret < 0 || ret >= *buf + *buf_len - *pos)
495 *pos += ret;
496 *pos += wpa_snprintf_hex(*pos, *buf + *buf_len - *pos, data, len);
497 ret = os_snprintf(*pos, *buf + *buf_len - *pos, "\n");
498 if (ret < 0 || ret >= *buf + *buf_len - *pos)
500 *pos += ret;
503 ret = os_snprintf(*pos, *buf + *buf_len - *pos,
505 if (ret < 0 || ret >= *buf + *buf_len - *pos)
507 *pos += ret;
509 ret = os_snprintf(*pos, *buf + *buf_len - *pos,
511 if (ret < 0 || ret >= *buf + *buf_len - *pos)
513 *pos += ret;
515 ret = os_snprintf(*pos, *buf + *buf_len - *pos, "\n");
516 if (ret < 0 || ret >= *buf + *buf_len - *pos)
518 *pos += ret;
529 char *buf, *pos;
536 pos = buf = os_malloc(buf_len);
540 ret = os_snprintf(pos, buf + buf_len - pos, "%s\n", pac_file_hdr);
541 if (ret < 0 || ret >= buf + buf_len - pos) {
545 pos += ret;
549 ret = os_snprintf(pos, buf + buf_len - pos, "START\n");
550 if (ret < 0 || ret >= buf + buf_len - pos) {
554 pos += ret;
555 eap_fast_write(&buf, &pos, &buf_len, "PAC-Key", pac->pac_key,
557 eap_fast_write(&buf, &pos, &buf_len, "PAC-Opaque",
559 eap_fast_write(&buf, &pos, &buf_len, "PAC-Info", pac->pac_info,
561 eap_fast_write(&buf, &pos, &buf_len, "A-ID", pac->a_id,
563 eap_fast_write(&buf, &pos, &buf_len, "I-ID", pac->i_id,
565 eap_fast_write(&buf, &pos, &buf_len, "A-ID-Info",
572 ret = os_snprintf(pos, buf + buf_len - pos, "END\n");
573 if (ret < 0 || ret >= buf + buf_len - pos) {
577 pos += ret;
590 blob->len = pos - buf;
638 char *start, *pos, *buf;
649 pos = os_strstr(start, "auth=");
650 if (pos == NULL)
652 if (start != pos && *(pos - 1) != ' ') {
653 start = pos + 5;
657 start = pos + 5;
658 pos = os_strchr(start, ' ');
659 if (pos)
660 *pos++ = '\0';
682 start = pos;
759 u8 *pos;
771 pos = (u8 *) (resp + 1);
772 *pos++ = EAP_TYPE_FAST;
773 *pos++ = data->fast_version;
777 pos, data->ssl.tls_out_limit);
797 u8 *pos = (u8 *) (hdr + 1);
801 wpa_printf(MSG_DEBUG, "EAP-FAST: Phase 2 Request: Nak type=%d", *pos);
813 pos = (u8 *) (resp_hdr + 1);
814 *pos++ = EAP_TYPE_NAK;
819 *pos++ = data->phase2_types[i].method;
1050 u8 *pos;
1058 pos = (u8 *) (hdr + 1);
1059 wpa_printf(MSG_DEBUG, "EAP-FAST: Phase 2 Request: type=%d", *pos);
1060 switch (*pos) {
1071 data->phase2_types[i].method != *pos)
1085 if (*pos != data->phase2_type.method ||
1086 *pos == EAP_TYPE_NONE) {
1117 "Phase 2 EAP method %d", *pos);
1382 u8 *pos;
1388 pos = pac;
1391 hdr = (struct pac_tlv_hdr *) pos;
1394 pos += sizeof(*hdr);
1407 pos, len);
1415 os_memcpy(entry.pac_key, pos, len);
1419 pos, len);
1420 entry.pac_opaque = pos;
1425 pos, len);
1426 entry.pac_info = pos;
1435 pos += len;
1446 pos = entry.pac_info;
1449 hdr = (struct pac_tlv_hdr *) pos;
1452 pos += sizeof(*hdr);
1465 "A-ID", pos, len);
1466 entry.a_id = pos;
1471 "I-ID", pos, len);
1472 entry.i_id = pos;
1477 "A-ID-Info", pos, len);
1478 entry.a_id_info = pos;
1487 pos += len;
1527 u8 *in_decrypted, *pos, *end;
1586 pos = in_decrypted;
1589 while (pos + 4 < end && !stop) {
1590 mandatory = pos[0] & 0x80;
1591 tlv_type = WPA_GET_BE16(pos) & 0x3fff;
1592 pos += 2;
1593 len = WPA_GET_BE16(pos);
1594 pos += 2;
1595 if (pos + len > end) {
1607 pos, len);
1608 eap_payload_tlv = pos;
1613 pos, len);
1620 result = WPA_GET_BE16(pos);
1633 "Result TLV", pos, len);
1640 iresult = WPA_GET_BE16(pos);
1654 "TLV", pos, len);
1660 pos = end;
1665 (pos - sizeof(struct eap_tlv_hdr));
1669 pos, len);
1670 pac = pos;
1688 pos += len;
1810 const u8 *pos;
1813 pos = eap_tls_process_init(sm, &data->ssl, EAP_TYPE_FAST, ret,
1815 if (pos == NULL)
1833 a_id = pos;
1837 hdr = (struct pac_tlv_hdr *) pos;
1928 res = eap_fast_decrypt(sm, data, ret, req, pos, left,
1938 if (eap_fast_set_tls_master_secret(sm, data, pos, left) < 0) {
1947 data->fast_version, id, pos, left,