Home | History | Annotate | Download | only in eap_peer

Lines Matching refs:avp

163 	struct ttls_avp_vendor *avp;
167 avp = (struct ttls_avp_vendor *) avphdr;
171 hdrlen = sizeof(*avp);
172 avp->vendor_id = host_to_be32(vendor_id);
177 avp->avp_code = host_to_be32(avp_code);
178 avp->avp_length = host_to_be32((flags << 24) | (u32) (hdrlen + len));
201 u8 *avp, *pos;
210 avp = wpabuf_mhead(msg);
211 pos = eap_ttls_avp_hdr(avp, avp_code, 0, mandatory, wpabuf_len(*resp));
214 AVP_PAD(avp, pos);
216 wpabuf_put(msg, pos - avp);
416 wpa_hexdump_buf(MSG_DEBUG, "EAP-TTLS: AVP encapsulate EAP Response",
625 * the data, so no separate encryption is used in the AVP itself.
804 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message");
833 struct ttls_avp *avp;
838 avp = (struct ttls_avp *) pos;
839 avp_code = be_to_host32(avp->avp_code);
840 avp_length = be_to_host32(avp->avp_length);
843 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x "
848 wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow "
854 if (avp_length < sizeof(*avp)) {
855 wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length %d",
860 dpos = (u8 *) (avp + 1);
861 dlen = avp_length - sizeof(*avp);
864 wpa_printf(MSG_WARNING, "EAP-TTLS: Vendor AVP "
869 wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d",
875 wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen);
883 wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: AVP - Reply-Message",
903 wpa_printf(MSG_WARNING, "EAP-TTLS: Unsupported mandatory AVP "
908 wpa_printf(MSG_DEBUG, "EAP-TTLS: Ignoring unsupported AVP "
928 wpa_printf(MSG_WARNING, "EAP-TTLS: Too short Phase 2 AVP frame"
1032 "AVP=%lu)",
1083 wpa_printf(MSG_WARNING, "EAP-TTLS: no MS-CHAP2-Success AVP "