Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching refs:pos

136 				      const u8 *pos, const u8 *end)
140 if (end - pos < 2) {
144 alen = WPA_GET_BE16(pos);
145 pos += 2;
146 if (end - pos < alen) {
156 os_memcpy(data->id_server, pos, alen);
160 pos += alen;
162 return pos;
167 const u8 *pos, const u8 *end)
169 if (pos == NULL)
172 if (end - pos < EAP_GPSK_RAND_LEN) {
176 os_memcpy(data->rand_server, pos, EAP_GPSK_RAND_LEN);
179 pos += EAP_GPSK_RAND_LEN;
181 return pos;
227 const u8 *pos, const u8 *end)
229 if (pos == NULL)
232 if (end - pos < 2) {
236 *list_len = WPA_GET_BE16(pos);
237 pos += 2;
238 if (end - pos < (int) *list_len) {
247 *list = pos;
248 pos += *list_len;
253 return pos;
265 const u8 *csuite_list, *pos, *end;
278 pos = eap_gpsk_process_id_server(data, payload, end);
279 pos = eap_gpsk_process_rand_server(data, pos, end);
280 pos = eap_gpsk_process_csuite_list(sm, data, &csuite_list,
281 &csuite_list_len, pos, end);
282 if (pos == NULL) {
393 const u8 * eap_gpsk_validate_rand(struct eap_gpsk_data *data, const u8 *pos,
396 if (end - pos < EAP_GPSK_RAND_LEN) {
401 if (os_memcmp(pos, data->rand_peer, EAP_GPSK_RAND_LEN) != 0) {
407 pos, EAP_GPSK_RAND_LEN);
410 pos += EAP_GPSK_RAND_LEN;
412 if (end - pos < EAP_GPSK_RAND_LEN) {
417 if (os_memcmp(pos, data->rand_server, EAP_GPSK_RAND_LEN) != 0) {
423 pos, EAP_GPSK_RAND_LEN);
426 pos += EAP_GPSK_RAND_LEN;
428 return pos;
433 const u8 *pos, const u8 *end)
437 if (pos == NULL)
440 if (end - pos < (int) 2) {
446 len = WPA_GET_BE16(pos);
447 pos += 2;
449 if (end - pos < (int) len) {
456 os_memcmp(pos, data->id_server, len) != 0) {
462 pos, len);
466 pos += len;
468 return pos;
472 const u8 * eap_gpsk_validate_csuite(struct eap_gpsk_data *data, const u8 *pos,
478 if (pos == NULL)
481 if (end - pos < (int) sizeof(*csuite)) {
486 csuite = (const struct eap_gpsk_csuite *) pos;
489 pos += sizeof(*csuite);
497 return pos;
502 const u8 *pos, const u8 *end)
506 if (pos == NULL)
509 if (end - pos < 2) {
514 alen = WPA_GET_BE16(pos);
515 pos += 2;
516 if (end - pos < alen) {
521 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_2", pos, alen);
522 pos += alen;
524 return pos;
530 const u8 *pos, const u8 *end)
535 if (pos == NULL)
539 if (end - pos < (int) miclen) {
542 (unsigned long) (end - pos),
547 data->specifier, payload, pos - payload, mic)
552 if (os_memcmp(mic, pos, miclen) != 0) {
554 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
558 pos += miclen;
560 return pos;
573 const u8 *pos, *end;
584 pos = eap_gpsk_validate_rand(data, payload, end);
585 pos = eap_gpsk_validate_id_server(data, pos, end);
586 pos = eap_gpsk_validate_csuite(data, pos, end);
587 pos = eap_gpsk_validate_pd_payload_2(data, pos, end);
588 pos = eap_gpsk_validate_gpsk_3_mic(data, payload, pos, end);
590 if (pos == NULL) {
594 if (pos != end) {
597 (unsigned long) (end - pos));
655 const u8 *pos;
658 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GPSK,
660 if (pos == NULL || len < 1) {
665 wpa_printf(MSG_DEBUG, "EAP-GPSK: Received frame: opcode %d", *pos);
672 switch (*pos) {
675 reqDataLen, pos + 1, len - 1,
680 reqDataLen, pos + 1, len - 1,
685 "unknown opcode %d", *pos);