Home | History | Annotate | Download | only in eap_peer

Lines Matching refs:tlv

517 	wpa_printf(MSG_DEBUG, "EAP-FAST: Add %sResult TLV(status=%d)",
540 wpa_printf(MSG_DEBUG, "EAP-FAST: Add PAC TLV (ack)");
563 "Payload TLV (len=%lu)",
571 "EAP Payload TLV");
594 wpa_printf(MSG_DEBUG, "EAP-FAST: Crypto-Binding TLV: Version %d "
606 "Crypto-Binding TLV: Version %d "
633 wpa_printf(MSG_DEBUG, "EAP-FAST: Reply Crypto-Binding TLV: Version %d "
768 wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for Compound "
876 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV overrun "
890 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV does not include "
946 /* RFC 5422, Section 4.2.6 - PAC-Type TLV */
1060 wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
1072 wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
1082 struct eap_fast_tlv_parse *tlv,
1089 os_memset(tlv, 0, sizeof(*tlv));
1101 wpa_printf(MSG_INFO, "EAP-FAST: TLV overflow");
1105 "TLV type %d length %u%s",
1109 res = eap_fast_parse_tlv(tlv, tlv_type, pos, len);
1115 "mandatory TLV type %d", tlv_type);
1120 "unknown optional TLV type %d",
1180 struct eap_fast_tlv_parse tlv;
1183 if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0)
1189 if (tlv.result == EAP_TLV_RESULT_FAILURE) {
1195 if (tlv.iresult == EAP_TLV_RESULT_FAILURE) {
1201 tlv.crypto_binding) {
1203 tlv.crypto_binding,
1204 tlv.crypto_binding_len);
1211 if (tlv.iresult == EAP_TLV_RESULT_SUCCESS) {
1217 if (tlv.eap_payload_tlv) {
1219 sm, data, ret, tlv.eap_payload_tlv,
1220 tlv.eap_payload_tlv_len);
1224 if (tlv.pac && tlv.result != EAP_TLV_RESULT_SUCCESS) {
1225 wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV without Result TLV "
1228 } else if (tlv.pac && tlv.result == EAP_TLV_RESULT_SUCCESS) {
1229 tmp = eap_fast_process_pac(sm, data, ret, tlv.pac,
1230 tlv.pac_len);
1235 !data->anon_provisioning && !tlv.pac &&
1236 (tlv.iresult == EAP_TLV_RESULT_SUCCESS ||
1237 tlv.result == EAP_TLV_RESULT_SUCCESS)) {
1247 if (tlv.result == EAP_TLV_RESULT_SUCCESS && !failed) {
1255 if (resp && tlv.result == EAP_TLV_RESULT_SUCCESS && !failed &&
1256 tlv.crypto_binding && data->phase2_success) {
1320 wpa_hexdump_buf(MSG_MSGDUMP, "EAP-FAST: Decrypted Phase 2 TLV(s)",
1325 "TLV frame (len=%lu)",
1347 * supports both raw A-ID and one inside an A-ID TLV.
1357 wpa_printf(MSG_DEBUG, "EAP-FAST: A-ID was in TLV "
1398 u8 *tlv;
1404 tlv = os_malloc(tlv_len);
1405 if (tlv) {
1406 ehdr = (struct eap_tlv_hdr *) tlv;
1411 if (tlv == NULL ||
1414 tlv, tlv_len) < 0) {
1417 os_free(tlv);
1420 os_free(tlv);