Lines Matching refs:payload
572 payload = struct.pack("B", EAP_SAKE_AT_ANY_ID_REQ)
574 4 + 1 + 3 + len(payload),
576 EAP_SAKE_SUBTYPE_IDENTITY) + payload
581 payload = struct.pack("BB", EAP_SAKE_AT_IV, 2)
583 4 + 1 + 3 + len(payload),
585 EAP_SAKE_SUBTYPE_IDENTITY) + payload
590 payload = struct.pack("BBBB", 255, 2, 127, 2)
592 4 + 1 + 3 + len(payload),
594 EAP_SAKE_SUBTYPE_IDENTITY) + payload
599 payload = struct.pack("BB", EAP_SAKE_AT_RAND_P, 2)
601 4 + 1 + 3 + len(payload),
603 EAP_SAKE_SUBTYPE_IDENTITY) + payload
608 payload = struct.pack("BB", EAP_SAKE_AT_MIC_P, 2)
610 4 + 1 + 3 + len(payload),
612 EAP_SAKE_SUBTYPE_IDENTITY) + payload
617 payload = struct.pack("BBBBBBBBBBBBBB",
625 4 + 1 + 3 + len(payload),
627 EAP_SAKE_SUBTYPE_IDENTITY) + payload
632 payload = struct.pack("BBBBBB",
636 4 + 1 + 3 + len(payload),
638 EAP_SAKE_SUBTYPE_IDENTITY) + payload
643 payload = struct.pack(">BBLBBH",
647 4 + 1 + 3 + len(payload),
649 EAP_SAKE_SUBTYPE_IDENTITY) + payload
654 payload = struct.pack("BB", EAP_SAKE_AT_ANY_ID_REQ, 0)
656 4 + 1 + 3 + len(payload),
658 EAP_SAKE_SUBTYPE_IDENTITY) + payload
6660 payload = struct.pack('BBB', 49, 0x40, 0)
6661 msg = struct.pack('>BBHBBH', 1, 0, 4 + len(payload), 2, id, 4 + len(payload)) + payload
6666 payload = struct.pack('BB', 49, 0x40) + 255*b'\x00'
6667 msg = struct.pack('>BBHBBH', 1, 0, 4 + len(payload), 2, id, 4 + len(payload)) + payload
6678 payload = struct.pack('BB', 49, 0) + b'\x00'
6679 msg = struct.pack('>BBHBBH', 1, 0, 4 + len(payload), 2, id, 4 + len(payload)) + payload
6699 for txt, payload in tests:
6704 msg = struct.pack('>BBHBBH', 1, 0, 4 + len(payload), 2, id, 4 + len(payload)) + payload
6769 payload = b'C=12'
6771 4 + 1 + 4 + len(payload),
6773 4, 0, 4 + len(payload)) + payload
6782 payload = b'C=12 V=3'
6784 4 + 1 + 4 + len(payload),
6786 4, 0, 4 + len(payload)) + payload
6795 payload = b'C=00112233445566778899aabbccddeefQ '
6797 4 + 1 + 4 + len(payload),
6799 4, 0, 4 + len(payload)) + payload
6808 payload = b'E=648 R=1 C=00112233445566778899aabbccddeeff V=3 M=Password expired'
6810 4 + 1 + 4 + len(payload),
6812 4, 0, 4 + len(payload)) + payload
6816 payload = b"S=1122334455667788990011223344556677889900"
6818 4 + 1 + 4 + len(payload),
6820 3, 0, 4 + len(payload)) + payload
6848 payload = b'E=648 R=1 C=00112233445566778899aabbccddeeff V=3 M=Password expired'
6850 4 + 1 + 4 + len(payload),
6852 4, 0, 4 + len(payload)) + payload
6882 payload = b"S=" + binascii.hexlify(auth_resp).decode().upper().encode()
6883 logger.info("Success message payload: " + payload.decode())
6885 4 + 1 + 4 + len(payload),
6887 3, 0, 4 + len(payload)) + payload
6896 payload = b'E=648 R=1 C=00112233445566778899aabbccddeeff V=3 M=Password expired'
6898 4 + 1 + 4 + len(payload),
6900 4, 0, 4 + len(payload)) + payload
6930 payload = b"S=" + binascii.hexlify(auth_resp).decode().upper().encode()
6931 logger.info("Success message payload: " + payload.decode())
6933 4 + 1 + 4 + len(payload),
6935 3, 0, 4 + len(payload)) + payload
6951 payload = b'E=691 R=1 C=00112233445566778899aabbccddeeff V=3 M=Authentication failed'
6953 4 + 1 + 4 + len(payload),
6955 4, 0, 4 + len(payload)) + payload
6967 … payload = b'E=691 R=1 C=00112233445566778899aabbccddeeff V=3 M=Authentication failed (2)'
6969 4 + 1 + 4 + len(payload),
6971 4, 0, 4 + len(payload)) + payload
7080 payload = b'E=648 R=1 C=00112233445566778899aabbccddeeff V=3 M=Password expired'
7082 4 + 1 + 4 + len(payload),
7084 4, 0, 4 + len(payload)) + payload
7089 payload = b"S=1122334455667788990011223344556677889900"
7114 payload = b"S=" + binascii.hexlify(auth_resp).decode().upper().encode()
7116 4 + 1 + 4 + len(payload),
7118 3, 0, 4 + len(payload)) + payload
7317 payload = struct.pack("B", 0x80)
7319 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7325 payload = struct.pack(">BH", 0x80, 65535)
7327 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7335 payload = struct.pack(">BH", 0xc0, 10)
7337 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7343 payload = struct.pack(">BH", 0x80, 0)
7345 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7353 payload = struct.pack(">BH", 0x80, 0)
7355 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7363 payload = struct.pack(">BHB", 0x80, 0, 0)
7365 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7373 payload = struct.pack(">BHB", 0xc0, 2, 1)
7375 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7380 payload = struct.pack(">BBB", 0x0, 2, 3)
7382 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7389 payload = struct.pack(">B", 0x01)
7391 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7398 payload = struct.pack(">BHBBLB", 0x01, 0, 0, 0, 0, 0)
7400 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7407 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 0, 0, 0)
7409 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7417 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 255)
7419 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7426 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 0)
7428 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7434 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 0)
7436 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7443 payload = struct.pack(">B", 0x02)
7445 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7452 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 0)
7454 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7460 payload = struct.pack(">B", 0x02)
7462 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7469 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 0)
7471 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7476 payload = struct.pack(">B", 0x02) + 96*b'\0'
7478 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7485 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 0)
7487 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7495 payload = struct.pack(">B", 0x02) + element + scalar
7497 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7502 payload = struct.pack(">B", 0x03)
7504 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7511 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 0)
7513 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7521 payload = struct.pack(">B", 0x02) + element + scalar
7523 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7528 payload = struct.pack(">B", 0x03) + 32*b'\0'
7530 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7537 payload = struct.pack(">B", 0x03)
7539 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7547 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 2)
7549 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7556 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 1)
7558 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7564 payload = struct.pack(">B", 0x02)
7566 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7573 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 3)
7575 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7581 payload = struct.pack(">B", 0x02)
7583 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7590 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 3)
7592 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7598 payload = struct.pack(">BB", 0x02, 0)
7600 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7607 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 3)
7609 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7615 payload = struct.pack(">BB", 0x02, 1)
7617 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7624 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 4)
7626 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7632 payload = struct.pack(">B", 0x02)
7634 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7641 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 4)
7643 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7649 payload = struct.pack(">BB", 0x02, 0)
7651 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7658 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 4)
7660 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7666 payload = struct.pack(">BB", 0x02, 1)
7668 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7675 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 5)
7677 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7683 payload = struct.pack(">B", 0x02)
7685 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7692 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 5)
7694 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7700 payload = struct.pack(">BB", 0x02, 0)
7702 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7709 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 5)
7711 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7717 payload = struct.pack(">BB", 0x02, 1)
7719 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7797 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 0)
7799 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7803 …payload = struct.pack(">B", 0x02) + binascii.unhexlify("67feb2b46d59e6dd3af3a429ec9c04a94933756461…
7805 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7811 payload = struct.pack(">B", 0x03) + 32*b'\0'
7813 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7872 payload = struct.pack(">BHBBLB", 0x01, 19, 1, 1, 0, 0)
7874 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7878 payload = struct.pack(">B", 0x02) + element + 31*b'\0' + b'\x02'
7880 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
7886 payload = struct.pack(">B", 0x03) + 32*b'\0'
7888 4 + 1 + len(payload), EAP_TYPE_PWD) + payload
8519 payload = b""
8521 4 + 1 + 1 + len(payload),
8522 EAP_ERP_TYPE_REAUTH_START, 0) + payload
8527 payload = struct.pack("B", 191)
8529 4 + 1 + 1 + len(payload),
8530 EAP_ERP_TYPE_REAUTH_START, 0) + payload
8535 payload = struct.pack("BB", 191, 1)
8537 4 + 1 + 1 + len(payload),
8538 EAP_ERP_TYPE_REAUTH_START, 0) + payload
8543 payload = struct.pack("BBB", 191, 0, 192)
8545 4 + 1 + 1 + len(payload),
8546 EAP_ERP_TYPE_REAUTH_START, 0) + payload
8551 payload = struct.pack("BBBB", EAP_ERP_TLV_KEYNAME_NAI, 0,
8554 4 + 1 + 1 + len(payload),
8555 EAP_ERP_TYPE_REAUTH_START, 0) + payload
8560 payload = struct.pack("B", EAP_ERP_TLV_KEYNAME_NAI)
8562 4 + 1 + 1 + len(payload),
8563 EAP_ERP_TYPE_REAUTH_START, 0) + payload
8568 payload = struct.pack("BB", EAP_ERP_TLV_KEYNAME_NAI, 1)
8570 4 + 1 + 1 + len(payload),
8571 EAP_ERP_TYPE_REAUTH_START, 0) + payload
8576 payload = struct.pack(">BLBH", EAP_ERP_TV_RRK_LIFETIME, 0,
8579 4 + 1 + 1 + len(payload),
8580 EAP_ERP_TYPE_REAUTH_START, 0) + payload
9270 payload = 1450*b'A'
9272 4 + 1 + 1 + 4 + len(payload),
9273 EAP_TYPE_TLS, 0xc0, 65536) + payload
9280 payload = 1470*b'A'
9282 4 + 1 + 1 + len(payload),
9283 EAP_TYPE_TLS, 0x40) + payload
10166 def process_clienthello(ctx, payload): argument
10178 ctx['conn'].bio_write(payload)
10190 def process_clientkeyexchange(ctx, payload, appl_data): argument
10193 ctx['conn'].bio_write(payload)
10408 for title, payload, failure in tests:
10410 run_eap_fast_phase2(dev, payload, failure)