Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching refs:pos

72 	const u8 *pos, *challenge, *identity, *password;
84 pos = (const u8 *) (req + 1);
85 if (reqDataLen < sizeof(*req) + 4 || *pos != EAP_TYPE_LEAP) {
90 pos++;
92 if (*pos != LEAP_VERSION) {
94 "%d", *pos);
98 pos++;
100 pos++; /* skip unused byte */
102 challenge_len = *pos++;
111 challenge = pos;
146 u8 *pos;
167 EAP_CODE_REQUEST, req->identifier, &pos);
170 *pos++ = LEAP_VERSION;
171 *pos++ = 0; /* unused */
172 *pos++ = LEAP_CHALLENGE_LEN;
173 if (hostapd_get_rand(pos, LEAP_CHALLENGE_LEN)) {
180 os_memcpy(data->ap_challenge, pos, LEAP_CHALLENGE_LEN);
181 wpa_hexdump(MSG_MSGDUMP, "EAP-LEAP: Challenge to AP/AS", pos,
183 pos += LEAP_CHALLENGE_LEN;
184 os_memcpy(pos, identity, identity_len);
198 const u8 *pos, *password;
210 pos = (const u8 *) (resp + 1);
211 if (reqDataLen < sizeof(*resp) + 4 || *pos != EAP_TYPE_LEAP) {
216 pos++;
218 if (*pos != LEAP_VERSION) {
220 "%d", *pos);
224 pos++;
226 pos++; /* skip unused byte */
228 response_len = *pos++;
239 pos, LEAP_RESPONSE_LEN);
240 os_memcpy(data->ap_response, pos, LEAP_RESPONSE_LEN);
249 if (os_memcmp(pos, expected, LEAP_RESPONSE_LEN) != 0) {