Home | History | Annotate | Download | only in eap_peer

Lines Matching refs:tlv

502 	wpa_printf(MSG_DEBUG, "EAP-FAST: Add %sResult TLV(status=%d)",
525 wpa_printf(MSG_DEBUG, "EAP-FAST: Add PAC TLV (ack)");
548 "Payload TLV (len=%lu)",
556 "EAP Payload TLV");
579 wpa_printf(MSG_DEBUG, "EAP-FAST: Crypto-Binding TLV: Version %d "
591 "Crypto-Binding TLV: Version %d "
618 wpa_printf(MSG_DEBUG, "EAP-FAST: Reply Crypto-Binding TLV: Version %d "
753 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for Compound "
846 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV overrun "
860 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV does not include "
916 /* RFC 5422, Section 4.2.6 - PAC-Type TLV */
1030 wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
1041 wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
1051 struct eap_fast_tlv_parse *tlv,
1057 os_memset(tlv, 0, sizeof(*tlv));
1069 wpa_printf(MSG_INFO, "EAP-FAST: TLV overflow");
1073 "TLV type %d length %d%s",
1076 res = eap_fast_parse_tlv(tlv, tlv_type, pos, len);
1082 "mandatory TLV type %d", tlv_type);
1087 "unknown optional TLV type %d",
1147 struct eap_fast_tlv_parse tlv;
1150 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0)
1156 if (tlv.result == EAP_TLV_RESULT_FAILURE) {
1162 if (tlv.iresult == EAP_TLV_RESULT_FAILURE) {
1168 if (tlv.crypto_binding) {
1170 tlv.crypto_binding,
1171 tlv.crypto_binding_len);
1178 if (tlv.iresult == EAP_TLV_RESULT_SUCCESS) {
1184 if (tlv.eap_payload_tlv) {
1186 sm, data, ret, tlv.eap_payload_tlv,
1187 tlv.eap_payload_tlv_len);
1191 if (tlv.pac && tlv.result != EAP_TLV_RESULT_SUCCESS) {
1192 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV without Result TLV "
1195 } else if (tlv.pac && tlv.result == EAP_TLV_RESULT_SUCCESS) {
1196 tmp = eap_fast_process_pac(sm, data, ret, tlv.pac,
1197 tlv.pac_len);
1202 !data->anon_provisioning && !tlv.pac &&
1203 (tlv.iresult == EAP_TLV_RESULT_SUCCESS ||
1204 tlv.result == EAP_TLV_RESULT_SUCCESS)) {
1214 if (tlv.result == EAP_TLV_RESULT_SUCCESS && !failed) {
1222 if (resp && tlv.result == EAP_TLV_RESULT_SUCCESS && !failed &&
1223 tlv.crypto_binding && data->phase2_success) {
1286 wpa_hexdump_buf(MSG_MSGDUMP, "EAP-FAST: Decrypted Phase 2 TLV(s)",
1291 "TLV frame (len=%lu)",
1313 * supports both raw A-ID and one inside an A-ID TLV.
1323 wpa_printf(MSG_DEBUG, "EAP-FAST: A-ID was in TLV "
1364 u8 *tlv;
1370 tlv = os_malloc(tlv_len);
1371 if (tlv) {
1372 ehdr = (struct eap_tlv_hdr *) tlv;
1377 if (tlv == NULL ||
1380 tlv, tlv_len) < 0) {
1383 os_free(tlv);
1386 os_free(tlv);