Lines Matching defs:pos

33 	const u8 *pos, *end;
46 pos = in_data;
53 if (*pos != TLS_HANDSHAKE_TYPE_SERVER_HELLO) {
55 "message %d (expected ServerHello)", *pos);
61 pos++;
63 len = WPA_GET_BE24(pos);
64 pos += 3;
72 wpa_hexdump(MSG_MSGDUMP, "TLSv1: ServerHello", pos, len);
73 end = pos + len;
76 if (end - pos < 2)
78 tls_version = WPA_GET_BE16(pos);
81 "ServerHello %u.%u", pos[0], pos[1]);
86 pos += 2;
93 if (end - pos < TLS_RANDOM_LEN)
96 os_memcpy(conn->server_random, pos, TLS_RANDOM_LEN);
97 pos += TLS_RANDOM_LEN;
102 if (end - pos < 1)
104 if (end - pos < 1 + *pos || *pos > TLS_SESSION_ID_MAX_LEN)
106 if (conn->session_id_len && conn->session_id_len == *pos &&
107 os_memcmp(conn->session_id, pos + 1, conn->session_id_len) == 0) {
108 pos += 1 + conn->session_id_len;
112 conn->session_id_len = *pos;
113 pos++;
114 os_memcpy(conn->session_id, pos, conn->session_id_len);
115 pos += conn->session_id_len;
121 if (end - pos < 2)
123 cipher_suite = WPA_GET_BE16(pos);
124 pos += 2;
157 if (end - pos < 1)
159 if (*pos != TLS_COMPRESSION_NULL) {
161 "compression 0x%02x", *pos);
166 pos++;
168 if (end != pos) {
171 "end of ServerHello", pos, end - pos);
217 const u8 *pos, *end;
231 pos = in_data;
241 type = *pos++;
242 len = WPA_GET_BE24(pos);
243 pos += 3;
285 end = pos + len;
287 if (end - pos < 3) {
294 list_len = WPA_GET_BE24(pos);
295 pos += 3;
297 if ((size_t) (end - pos) != list_len) {
301 (unsigned long) (end - pos));
307 while (pos < end) {
308 if (end - pos < 3) {
317 cert_len = WPA_GET_BE24(pos);
318 pos += 3;
320 if ((size_t) (end - pos) < cert_len) {
324 (unsigned long) (end - pos));
336 if (tls_parse_cert(pos, cert_len,
347 cert = x509_certificate_parse(pos, cert_len);
364 pos += cert_len;
415 const u8 *pos, *end;
419 pos = buf;
422 if (end - pos < 3)
424 conn->dh_p_len = WPA_GET_BE16(pos);
425 pos += 2;
426 if (conn->dh_p_len == 0 || end - pos < (int) conn->dh_p_len) {
434 os_memcpy(conn->dh_p, pos, conn->dh_p_len);
435 pos += conn->dh_p_len;
439 if (end - pos < 3)
441 conn->dh_g_len = WPA_GET_BE16(pos);
442 pos += 2;
443 if (conn->dh_g_len == 0 || end - pos < (int) conn->dh_g_len)
448 os_memcpy(conn->dh_g, pos, conn->dh_g_len);
449 pos += conn->dh_g_len;
455 if (end - pos < 3)
457 conn->dh_ys_len = WPA_GET_BE16(pos);
458 pos += 2;
459 if (conn->dh_ys_len == 0 || end - pos < (int) conn->dh_ys_len)
464 os_memcpy(conn->dh_ys, pos, conn->dh_ys_len);
465 pos += conn->dh_ys_len;
481 const u8 *pos, *end;
494 pos = in_data;
504 type = *pos++;
505 len = WPA_GET_BE24(pos);
506 pos += 3;
517 end = pos + len;
544 wpa_hexdump(MSG_DEBUG, "TLSv1: ServerKeyExchange", pos, len);
547 if (tlsv1_process_diffie_hellman(conn, pos, len) < 0) {
570 const u8 *pos, *end;
582 pos = in_data;
592 type = *pos++;
593 len = WPA_GET_BE24(pos);
594 pos += 3;
605 end = pos + len;
634 const u8 *pos, *end;
646 pos = in_data;
656 type = *pos++;
657 len = WPA_GET_BE24(pos);
658 pos += 3;
668 end = pos + len;
692 const u8 *pos;
725 pos = in_data;
734 if (*pos != TLS_CHANGE_CIPHER_SPEC) {
736 "received data 0x%x", *pos);
751 *in_len = pos + 1 - in_data;
762 const u8 *pos, *end;
775 pos = in_data;
787 if (pos[0] != TLS_HANDSHAKE_TYPE_FINISHED) {
789 "type 0x%x", pos[0]);
795 len = WPA_GET_BE24(pos + 1);
797 pos += 4;
808 end = pos + len;
818 pos, TLS_VERIFY_DATA_LEN);
874 if (os_memcmp(pos, verify_data, TLS_VERIFY_DATA_LEN) != 0) {
894 const u8 *pos;
905 pos = in_data;
909 pos, left);
913 os_memcpy(*out_data, pos, left);