Home | History | Annotate | Download | only in eap_peer

Lines Matching refs:tlv

507 	wpa_printf(MSG_DEBUG, "EAP-FAST: Add %sResult TLV(status=%d)",
530 wpa_printf(MSG_DEBUG, "EAP-FAST: Add PAC TLV (ack)");
553 "Payload TLV (len=%lu)",
561 "EAP Payload TLV");
584 wpa_printf(MSG_DEBUG, "EAP-FAST: Crypto-Binding TLV: Version %d "
596 "Crypto-Binding TLV: Version %d "
623 wpa_printf(MSG_DEBUG, "EAP-FAST: Reply Crypto-Binding TLV: Version %d "
758 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for Compound "
851 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV overrun "
865 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV does not include "
921 /* RFC 5422, Section 4.2.6 - PAC-Type TLV */
1035 wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
1042 wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
1052 struct eap_fast_tlv_parse *tlv,
1058 os_memset(tlv, 0, sizeof(*tlv));
1070 wpa_printf(MSG_INFO, "EAP-FAST: TLV overflow");
1074 "TLV type %d length %d%s",
1077 res = eap_fast_parse_tlv(tlv, tlv_type, pos, len);
1083 "mandatory TLV type %d", tlv_type);
1088 "unknown optional TLV type %d",
1148 struct eap_fast_tlv_parse tlv;
1151 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0)
1157 if (tlv.result == EAP_TLV_RESULT_FAILURE) {
1163 if (tlv.iresult == EAP_TLV_RESULT_FAILURE) {
1169 if (tlv.crypto_binding) {
1171 tlv.crypto_binding,
1172 tlv.crypto_binding_len);
1179 if (tlv.iresult == EAP_TLV_RESULT_SUCCESS) {
1185 if (tlv.eap_payload_tlv) {
1187 sm, data, ret, req, tlv.eap_payload_tlv,
1188 tlv.eap_payload_tlv_len);
1192 if (tlv.pac && tlv.result != EAP_TLV_RESULT_SUCCESS) {
1193 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV without Result TLV "
1196 } else if (tlv.pac && tlv.result == EAP_TLV_RESULT_SUCCESS) {
1197 tmp = eap_fast_process_pac(sm, data, ret, tlv.pac,
1198 tlv.pac_len);
1203 tlv.pac &&
1204 (tlv.iresult == EAP_TLV_RESULT_SUCCESS ||
1205 tlv.result == EAP_TLV_RESULT_SUCCESS)) {
1215 if (tlv.result == EAP_TLV_RESULT_SUCCESS && !failed) {
1223 if (resp && tlv.result == EAP_TLV_RESULT_SUCCESS && !failed &&
1224 tlv.crypto_binding && data->phase2_success) {
1287 wpa_hexdump_buf(MSG_MSGDUMP, "EAP-FAST: Decrypted Phase 2 TLV(s)",
1292 "TLV frame (len=%lu)",
1314 * supports both raw A-ID and one inside an A-ID TLV.
1324 wpa_printf(MSG_DEBUG, "EAP-FAST: A-ID was in TLV "
1365 u8 *tlv;
1371 tlv = os_malloc(tlv_len);
1372 if (tlv) {
1373 ehdr = (struct eap_tlv_hdr *) tlv;
1378 if (tlv == NULL ||
1381 tlv, tlv_len) < 0) {
1384 os_free(tlv);
1387 os_free(tlv);