/external/wpa_supplicant_8/src/crypto/ |
milenage.c | 171 * @res_len: Max length for res; set to used length or 0 on failure 175 u8 *ck, u8 *res, size_t *res_len) 180 if (*res_len < 8) { 181 *res_len = 0; 186 *res_len = 0; 189 *res_len = 8; 266 * @res_len: Variable that will be set to RES length 271 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, 284 *res_len = 8; 285 wpa_hexdump_key(MSG_DEBUG, "Milenage: RES", res, *res_len); [all...] |
milenage.h | 14 u8 *ck, u8 *res, size_t *res_len); 20 const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len,
|
tls_internal.c | 342 size_t res_len, ad_len; local 352 &res_len, &ad, &ad_len, need_more_data); 355 out = wpabuf_alloc_ext_data(res, res_len); 385 size_t res_len; local 395 wpabuf_len(in_data), &res_len); 400 out = wpabuf_alloc_ext_data(res, res_len);
|
/external/wpa_supplicant_8/src/utils/ |
common.c | 579 size_t merge_byte_arrays(u8 *res, size_t res_len, 585 os_memset(res, 0, res_len); 588 if (src1_len >= res_len) { 589 os_memcpy(res, src1, res_len); 590 return res_len; 598 if (len + src2_len >= res_len) { 599 os_memcpy(res + len, src2, res_len - len); 600 return res_len;
|
pcsc_funcs.h | 30 unsigned char *res, size_t *res_len,
|
pcsc_funcs.c | [all...] |
common.h | 488 size_t merge_byte_arrays(u8 *res, size_t res_len,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 87 u8 *res, size_t *res_len, void *cb_session_ctx);
|
eap_server_aka.c | 33 size_t res_len; member in struct:eap_aka_data 791 data->ck, data->res, &data->res_len, sm); 964 if (attr->res == NULL || attr->res_len < data->res_len || 965 attr->res_len_bits != data->res_len * 8 || 966 os_memcmp(attr->res, data->res, data->res_len) != 0) { 970 (unsigned long) attr->res_len, 972 (unsigned long) data->res_len * 8); [all...] |
eap_sim_db.c | 56 size_t res_len; member in struct:eap_sim_db_pending::__anon30724::__anon30726 549 entry->u.aka.res_len = (end - start) / 2; 550 if (entry->u.aka.res_len > EAP_AKA_RES_MAX_LEN) { 552 entry->u.aka.res_len = 0; 555 if (hexstr2bin(start, entry->u.aka.res, entry->u.aka.res_len)) [all...] |
/external/ppp/pppd/plugins/pppoatm/ |
ans.c | 41 static int ans(const char *text,int wanted,void *result,int res_len) 114 res_len) < 0) return FATAL;
|
/external/wpa_supplicant_8/src/wps/ |
wps_common.c | 22 const char *label, u8 *res, size_t res_len) 31 WPA_PUT_BE32(key_bits, res_len * 8); 42 iter = (res_len + SHA256_MAC_LEN - 1) / SHA256_MAC_LEN; 44 left = res_len;
|
wps_i.h | 130 const char *label, u8 *res, size_t res_len);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.c | 235 u8 *res, size_t res_len) 263 while (res_len) { 268 hlen = res_len > SHA256_MAC_LEN ? SHA256_MAC_LEN : res_len; 271 res_len -= hlen; 805 attr->res_len = alen;
|
eap_sim_common.h | 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
|
ikev2_common.h | 327 size_t *res_len);
|
ikev2_common.c | 494 size_t *res_len) 577 *res_len = decrypted_len;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
config.c | 60 size_t res_len, *dst_len; local 67 res_len = 0; 71 tmp = wpa_config_parse_string(value, &res_len); 81 (u8 *) tmp, res_len); 84 (u8 *) tmp, res_len); 87 if (data->param3 && res_len < (size_t) data->param3) { 90 (unsigned long) res_len, (long) data->param3); 95 if (data->param4 && res_len > (size_t) data->param4) { 98 (unsigned long) res_len, (long) data->param4); 109 *dst_len = res_len; 1087 size_t res_len; local [all...] |
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 724 size_t res_len; local 733 res_len = EAP_AKA_RES_MAX_LEN; 743 autn, ik, ck, res, &res_len); 753 res_len = EAP_AKA_RES_MAX_LEN; 780 pos += wpa_snprintf_hex(pos, end - pos, res, res_len);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 24 size_t res_len; member in struct:eap_aka_data 156 data->autn, data->res, &data->res_len, 191 data->res, &data->res_len, data->auts); 202 data->res_len = EAP_AKA_RES_MAX_LEN; 539 eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len * 8, 540 data->res, data->res_len); [all...] |