Home
last modified time | relevance | path

Searched refs:left (Results 1 – 25 of 62) sorted by relevance

123

/hostap-latest/src/tls/
Dtlsv1_client_read.c82 size_t left, len, i; in tls_process_server_hello() local
95 left = *in_len; in tls_process_server_hello()
97 if (left < 4) in tls_process_server_hello()
113 left -= 4; in tls_process_server_hello()
115 if (len > left) in tls_process_server_hello()
358 size_t left, len, list_len, cert_len, idx; in tls_process_certificate() local
372 left = *in_len; in tls_process_certificate()
374 if (left < 4) { in tls_process_certificate()
376 "(len=%lu)", (unsigned long) left); in tls_process_certificate()
384 left -= 4; in tls_process_certificate()
[all …]
Dtlsv1_server_read.c125 size_t left, len, i, j; in tls_process_client_hello() local
140 left = *in_len; in tls_process_client_hello()
142 if (left < 4) { in tls_process_client_hello()
161 left -= 4; in tls_process_client_hello()
163 if (len > left) { in tls_process_client_hello()
166 (int) len, (int) left); in tls_process_client_hello()
400 size_t left, len, list_len, cert_len, idx; in tls_process_certificate() local
414 left = *in_len; in tls_process_certificate()
416 if (left < 4) { in tls_process_certificate()
418 (unsigned long) left); in tls_process_certificate()
[all …]
/hostap-latest/src/crypto/
Daes-omac1.c49 size_t i, e, left, total_len; in omac1_aes_vector() local
62 left = total_len; in omac1_aes_vector()
68 while (left >= AES_BLOCK_SIZE) { in omac1_aes_vector()
77 left == AES_BLOCK_SIZE) in omac1_aes_vector()
84 if (left > AES_BLOCK_SIZE) in omac1_aes_vector()
86 left -= AES_BLOCK_SIZE; in omac1_aes_vector()
93 if (left || total_len == 0) { in omac1_aes_vector()
94 for (i = 0; i < left; i++) { in omac1_aes_vector()
101 if (i + 1 == left) in omac1_aes_vector()
108 cbc[left] ^= 0x80; in omac1_aes_vector()
Drandom.c163 size_t left; in random_get_bytes() local
174 left = len; in random_get_bytes()
175 while (left) { in random_get_bytes()
181 siz = left > EXTRACT_LEN ? EXTRACT_LEN : left; in random_get_bytes()
184 left -= siz; in random_get_bytes()
190 left = len; in random_get_bytes()
191 while (left) { in random_get_bytes()
201 siz = left > EXTRACT_LEN ? EXTRACT_LEN : left; in random_get_bytes()
204 left -= siz; in random_get_bytes()
Daes-ctr.c29 size_t j, len, left = data_len; in aes_ctr_encrypt() local
39 while (left > 0) { in aes_ctr_encrypt()
42 len = (left < AES_BLOCK_SIZE) ? left : AES_BLOCK_SIZE; in aes_ctr_encrypt()
46 left -= len; in aes_ctr_encrypt()
Dsha1-pbkdf2.c79 size_t left = buflen, plen; in pbkdf2_sha1() local
82 while (left > 0) { in pbkdf2_sha1()
87 plen = left > SHA1_MAC_LEN ? SHA1_MAC_LEN : left; in pbkdf2_sha1()
90 left -= plen; in pbkdf2_sha1()
/hostap-latest/src/eap_server/
Deap_server_psk.c219 size_t left, buflen; in eap_psk_process_2() local
229 &left); in eap_psk_process_2()
230 if (cpos == NULL || left < sizeof(*resp)) { in eap_psk_process_2()
236 left -= sizeof(*resp); in eap_psk_process_2()
239 data->id_p = os_memdup(cpos, left); in eap_psk_process_2()
245 data->id_p_len = left; in eap_psk_process_2()
334 size_t left; in eap_psk_process_4() local
342 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PSK, respData, &left); in eap_psk_process_4()
343 if (pos == NULL || left < sizeof(*resp)) { in eap_psk_process_4()
349 left -= sizeof(*resp); in eap_psk_process_4()
[all …]
Deap_server_tls_common.c436 const u8 **pos, size_t *left) in eap_server_tls_reassemble() argument
439 const u8 *end = *pos + *left; in eap_server_tls_reassemble()
441 wpa_hexdump(MSG_MSGDUMP, "SSL: Received data", *pos, *left); in eap_server_tls_reassemble()
444 if (*left < 4) { in eap_server_tls_reassemble()
453 *left -= 4; in eap_server_tls_reassemble()
455 if (*left > tls_msg_len) { in eap_server_tls_reassemble()
458 "bytes)", (int) tls_msg_len, (int) *left); in eap_server_tls_reassemble()
467 if (*left != 0) { in eap_server_tls_reassemble()
537 size_t left; in eap_server_tls_process() local
543 &left); in eap_server_tls_process()
[all …]
Deap_server_pax.c310 size_t len, left, cid_len; in eap_pax_process_std_2() local
324 left = len - sizeof(*resp); in eap_pax_process_std_2()
326 if (left < 2 + EAP_PAX_RAND_LEN || in eap_pax_process_std_2()
332 left -= 2; in eap_pax_process_std_2()
337 left -= EAP_PAX_RAND_LEN; in eap_pax_process_std_2()
339 if (left < 2 || (size_t) 2 + WPA_GET_BE16(pos) > left) { in eap_pax_process_std_2()
357 left -= 2 + data->cid_len; in eap_pax_process_std_2()
361 if (left < 2 + EAP_PAX_MAC_LEN || in eap_pax_process_std_2()
367 left -= 2; in eap_pax_process_std_2()
437 left -= EAP_PAX_MAC_LEN; in eap_pax_process_std_2()
[all …]
Deap_server_peap.c712 size_t left; in eap_peap_process_phase2_tlv() local
717 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, in_data, &left); in eap_peap_process_phase2_tlv()
724 wpa_hexdump(MSG_DEBUG, "EAP-PEAP: Received TLVs", pos, left); in eap_peap_process_phase2_tlv()
725 while (left >= 4) { in eap_peap_process_phase2_tlv()
731 left -= 4; in eap_peap_process_phase2_tlv()
732 if ((size_t) tlv_len > left) { in eap_peap_process_phase2_tlv()
735 (unsigned long) left); in eap_peap_process_phase2_tlv()
761 left -= tlv_len; in eap_peap_process_phase2_tlv()
763 if (left) { in eap_peap_process_phase2_tlv()
765 "Request (left=%lu)", (unsigned long) left); in eap_peap_process_phase2_tlv()
[all …]
/hostap-latest/src/common/
Dwpa_common.c1859 int left; in wpa_parse_wpa_ie_rsn() local
1887 left = rsn_ie_len - 6; in wpa_parse_wpa_ie_rsn()
1900 left = rsn_ie_len - 2 - 4 - 2; in wpa_parse_wpa_ie_rsn()
1915 left = rsn_ie_len - sizeof(*hdr); in wpa_parse_wpa_ie_rsn()
1918 if (left >= RSN_SELECTOR_LEN) { in wpa_parse_wpa_ie_rsn()
1936 left -= RSN_SELECTOR_LEN; in wpa_parse_wpa_ie_rsn()
1937 } else if (left > 0) { in wpa_parse_wpa_ie_rsn()
1939 __func__, left); in wpa_parse_wpa_ie_rsn()
1943 if (left >= 2) { in wpa_parse_wpa_ie_rsn()
1947 left -= 2; in wpa_parse_wpa_ie_rsn()
[all …]
/hostap-latest/src/eap_peer/
Deap_pax.c123 size_t left, plen; in eap_pax_process_std_1() local
141 left = req_plen - sizeof(*req); in eap_pax_process_std_1()
143 if (left < 2 + EAP_PAX_RAND_LEN) { in eap_pax_process_std_1()
160 left -= 2; in eap_pax_process_std_1()
165 left -= EAP_PAX_RAND_LEN; in eap_pax_process_std_1()
167 if (left > 0) { in eap_pax_process_std_1()
169 pos, left); in eap_pax_process_std_1()
239 size_t left; in eap_pax_process_std_3() local
257 left = req_plen - sizeof(*req); in eap_pax_process_std_3()
259 if (left < 2 + EAP_PAX_MAC_LEN) { in eap_pax_process_std_3()
[all …]
Deap_psk.c187 size_t buflen, left, data_len, len, plen; in eap_psk_process_3() local
204 left = len - sizeof(*hdr3); in eap_psk_process_3()
217 wpa_hexdump(MSG_DEBUG, "EAP-PSK: PCHANNEL", pchannel, left); in eap_psk_process_3()
219 if (left < 4 + 16 + 1) { in eap_psk_process_3()
222 (unsigned long) left); in eap_psk_process_3()
261 left -= 4; in eap_psk_process_3()
265 left -= 16; in eap_psk_process_3()
273 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: PCHANNEL - cipher msg", msg, left); in eap_psk_process_3()
275 decrypted = os_memdup(msg, left); in eap_psk_process_3()
286 left, tag)) { in eap_psk_process_3()
[all …]
Deap_teap.c970 size_t left, len; in eap_teap_process_pac_tlv() local
974 left = pac_len; in eap_teap_process_pac_tlv()
976 while (left > sizeof(*hdr)) { in eap_teap_process_pac_tlv()
981 left -= sizeof(*hdr); in eap_teap_process_pac_tlv()
982 if (len > left) { in eap_teap_process_pac_tlv()
986 (unsigned long) left); in eap_teap_process_pac_tlv()
993 left -= len; in eap_teap_process_pac_tlv()
1089 size_t left, len; in eap_teap_process_pac_info() local
1098 left = entry->pac_info_len; in eap_teap_process_pac_info()
1099 while (left > sizeof(*hdr)) { in eap_teap_process_pac_info()
[all …]
Deap_fast.c878 size_t left, len; in eap_fast_process_pac_tlv() local
882 left = pac_len; in eap_fast_process_pac_tlv()
884 while (left > sizeof(*hdr)) { in eap_fast_process_pac_tlv()
889 left -= sizeof(*hdr); in eap_fast_process_pac_tlv()
890 if (len > left) { in eap_fast_process_pac_tlv()
894 (unsigned long) left); in eap_fast_process_pac_tlv()
901 left -= len; in eap_fast_process_pac_tlv()
998 size_t left, len; in eap_fast_process_pac_info() local
1007 left = entry->pac_info_len; in eap_fast_process_pac_info()
1008 while (left > sizeof(*hdr)) { in eap_fast_process_pac_info()
[all …]
Deap_tls_common.c920 size_t left; in eap_peer_tls_process_init() local
932 &left); in eap_peer_tls_process_init()
936 &left); in eap_peer_tls_process_init()
939 &left); in eap_peer_tls_process_init()
944 if (left == 0) { in eap_peer_tls_process_init()
957 left--; in eap_peer_tls_process_init()
963 if (left < 4) { in eap_peer_tls_process_init()
979 left -= 4; in eap_peer_tls_process_init()
981 if (left > tls_msg_len) { in eap_peer_tls_process_init()
984 "bytes)", (int) tls_msg_len, (int) left); in eap_peer_tls_process_init()
[all …]
Deap_peap.c505 size_t left, tlv_len; in eap_tlv_process() local
512 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, req, &left); in eap_tlv_process()
515 wpa_hexdump(MSG_DEBUG, "EAP-TLV: Received TLVs", pos, left); in eap_tlv_process()
516 while (left >= 4) { in eap_tlv_process()
522 left -= 4; in eap_tlv_process()
523 if (tlv_len > left) { in eap_tlv_process()
527 (unsigned long) left); in eap_tlv_process()
555 left -= tlv_len; in eap_tlv_process()
557 if (left) { in eap_tlv_process()
559 "Request (left=%lu)", (unsigned long) left); in eap_tlv_process()
[all …]
/hostap-latest/src/drivers/
Dnetlink.c40 int left; in netlink_receive() local
48 left = recvfrom(sock, buf, sizeof(buf), MSG_DONTWAIT, in netlink_receive()
50 if (left < 0) { in netlink_receive()
58 while (NLMSG_OK(h, left)) { in netlink_receive()
70 h = NLMSG_NEXT(h, left); in netlink_receive()
73 if (left > 0) { in netlink_receive()
75 "netlink message", left); in netlink_receive()
/hostap-latest/src/eap_common/
Deap_pax_common.c39 size_t num_blocks, left; in eap_pax_kdf() local
57 left = output_len; in eap_pax_kdf()
59 size_t clen = left > EAP_PAX_MAC_LEN ? EAP_PAX_MAC_LEN : left; in eap_pax_kdf()
64 left -= clen; in eap_pax_kdf()
Deap_gpsk_common.c43 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_cmac() local
56 left = len; in eap_gpsk_gkdf_cmac()
62 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_cmac()
65 left -= clen; in eap_gpsk_gkdf_cmac()
78 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_sha256() local
91 left = len; in eap_gpsk_gkdf_sha256()
97 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_sha256()
100 left -= clen; in eap_gpsk_gkdf_sha256()
/hostap-latest/src/ap/
Dfils_hlp.c165 size_t left, len; in fils_dhcp_handler() local
292 left = wpabuf_len(resp); in fils_dhcp_handler()
295 if (left <= 254) in fils_dhcp_handler()
296 len = 1 + left; in fils_dhcp_handler()
307 left -= len - 1; in fils_dhcp_handler()
308 while (left) { in fils_dhcp_handler()
310 len = left > 255 ? 255 : left; in fils_dhcp_handler()
314 left -= len; in fils_dhcp_handler()
577 const u8 *pos, int left) in fils_process_hlp() argument
579 const u8 *end = pos + left; in fils_process_hlp()
Dvlan_full.c700 int left; in vlan_event_receive() local
707 left = recvfrom(sock, buf, sizeof(buf), MSG_DONTWAIT, in vlan_event_receive()
709 if (left < 0) { in vlan_event_receive()
717 while (NLMSG_OK(h, left)) { in vlan_event_receive()
722 if (len > left || plen < 0) { in vlan_event_receive()
725 len, left, plen); in vlan_event_receive()
738 h = NLMSG_NEXT(h, left); in vlan_event_receive()
741 if (left > 0) { in vlan_event_receive()
743 "netlink message", __func__, left); in vlan_event_receive()
/hostap-latest/src/utils/
Dos_zephyr.c269 size_t left = siz; in os_strlcpy() local
271 if (left) { in os_strlcpy()
273 while (--left != 0) { in os_strlcpy()
280 if (left == 0) { in os_strlcpy()
Dos_win32.c246 size_t left = siz; in os_strlcpy() local
248 if (left) { in os_strlcpy()
250 while (--left != 0) { in os_strlcpy()
256 if (left == 0) { in os_strlcpy()
/hostap-latest/src/radius/
Dradius.c884 size_t left = data_len; in radius_msg_add_eap() local
886 while (left > 0) { in radius_msg_add_eap()
888 if (left > RADIUS_MAX_ATTR_LEN) in radius_msg_add_eap()
891 len = left; in radius_msg_add_eap()
898 left -= len; in radius_msg_add_eap()
1091 size_t left; in radius_msg_get_vendor_attr() local
1099 left = attr->length - sizeof(*attr); in radius_msg_get_vendor_attr()
1100 if (left < 4) in radius_msg_get_vendor_attr()
1107 left -= 4; in radius_msg_get_vendor_attr()
1112 while (left >= sizeof(*vhdr)) { in radius_msg_get_vendor_attr()
[all …]

123