Searched refs:os_malloc (Results 26 - 50 of 166) sorted by relevance

1234567

/freebsd-11.0-release/contrib/wpa/src/eap_server/
H A Deap_server_pwd.c107 data->password = os_malloc(sm->user->password_len);
257 if (((scalar = os_malloc(BN_num_bytes(data->grp->order))) == NULL) ||
258 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) ==
318 if (((cruft = os_malloc(BN_num_bytes(data->grp->prime))) == NULL) ||
605 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id));
806 if (((cruft = os_malloc(BN_num_bytes(data->grp->prime))) == NULL) ||
1031 key = os_malloc(EAP_MSK_LEN);
1050 key = os_malloc(EAP_EMSK_LEN);
1083 id = os_malloc(1 + SHA256_MAC_LEN);
H A Deap_server_gpsk.c272 data->id_peer = os_malloc(alen);
578 key = os_malloc(EAP_MSK_LEN);
596 key = os_malloc(EAP_EMSK_LEN);
621 sid = os_malloc(data->id_len);
H A Deap_server_ikev2.c106 data->ikev2.IDi = os_malloc(sm->server_id_len);
492 key = os_malloc(EAP_MSK_LEN);
510 key = os_malloc(EAP_EMSK_LEN);
531 sid = os_malloc(sid_len);
H A Deap_server_pax.c330 data->cid = os_malloc(data->cid_len);
503 key = os_malloc(EAP_MSK_LEN);
524 key = os_malloc(EAP_EMSK_LEN);
553 sid = os_malloc(1 + EAP_PAX_MID_LEN);
H A Deap_server_sake.c329 data->peerid = os_malloc(attr.peerid_len);
463 key = os_malloc(EAP_MSK_LEN);
481 key = os_malloc(EAP_EMSK_LEN);
507 id = os_malloc(*len);
H A Deap_server_vendor_test.c149 key = os_malloc(key_len);
H A Deap_server_fast.c157 buf = os_malloc(pac_opaque_len - 8);
233 data->identity = os_malloc(identity_len);
468 data->srv_id = os_malloc(sm->eap_fast_a_id_len);
698 pac_buf = os_malloc(pac_len);
728 pac_opaque = os_malloc(pac_len + 8);
1558 eapKeyData = os_malloc(EAP_FAST_KEY_LEN);
1577 eapKeyData = os_malloc(EAP_EMSK_LEN);
/freebsd-11.0-release/contrib/wpa/src/ap/
H A Dpmksa_cache_auth.c133 entry->identity = os_malloc(eapol->identity_len);
164 eapol->identity = os_malloc(entry->identity_len);
327 entry->identity = os_malloc(old_entry->identity_len);
/freebsd-11.0-release/contrib/wpa/src/eap_peer/
H A Deap_tls.c301 key = os_malloc(EAP_TLS_KEY_LEN);
320 key = os_malloc(EAP_EMSK_LEN);
339 id = os_malloc(data->id_len);
H A Deap_pax.c72 data->cid = os_malloc(identity_len);
470 key = os_malloc(EAP_MSK_LEN);
491 key = os_malloc(EAP_EMSK_LEN);
513 sid = os_malloc(1 + EAP_PAX_MID_LEN);
H A Deap_vendor_test.c157 key = os_malloc(key_len);
H A Deap_gpsk.c99 data->id_peer = os_malloc(identity_len);
120 data->psk = os_malloc(password_len);
161 data->id_server = os_malloc(alen);
725 key = os_malloc(EAP_MSK_LEN);
743 key = os_malloc(EAP_EMSK_LEN);
761 sid = os_malloc(data->id_len);
H A Deap_aka.c105 data->pseudonym = os_malloc(config->anonymous_identity_len);
393 data->pseudonym = os_malloc(attr->next_pseudonym_len +
413 data->reauth_id = os_malloc(attr->next_reauth_id_len);
911 data->network_name = os_malloc(attr->kdf_input_len);
1440 key = os_malloc(EAP_SIM_KEYING_DATA_LEN);
1460 id = os_malloc(*len);
1481 key = os_malloc(EAP_EMSK_LEN);
H A Deap_sim.c119 data->pseudonym = os_malloc(config->anonymous_identity_len);
413 data->pseudonym = os_malloc(attr->next_pseudonym_len +
433 data->reauth_id = os_malloc(attr->next_reauth_id_len);
636 data->ver_list = os_malloc(attr->version_list_len);
1182 key = os_malloc(EAP_SIM_KEYING_DATA_LEN);
1202 id = os_malloc(*len);
1224 key = os_malloc(EAP_EMSK_LEN);
H A Deap_eke.c88 data->peerid = os_malloc(identity_len);
313 data->serverid = os_malloc(end - pos);
719 key = os_malloc(EAP_MSK_LEN);
737 key = os_malloc(EAP_EMSK_LEN);
757 sid = os_malloc(sid_len);
/freebsd-11.0-release/contrib/wpa/src/crypto/
H A Daes-internal-enc.c102 rk = os_malloc(AES_PRIV_SIZE);
/freebsd-11.0-release/contrib/wpa/src/eap_common/
H A Deap_eke_common.c350 id = os_malloc(id_s_len + id_p_len);
484 data = os_malloc(data_len);
525 data = os_malloc(data_len);
570 data = os_malloc(data_len);
H A Deap_pwd_common.c159 if ((prfbuf = os_malloc(primebytelen)) == NULL) {
297 if ((cruft = os_malloc(BN_num_bytes(grp->prime))) == NULL)
/freebsd-11.0-release/contrib/wpa/src/wps/
H A Dwps.c50 data->dev_password = os_malloc(cfg->pin_len);
74 os_malloc(wpabuf_len(cfg->wps->ap_nfc_dev_pw));
123 os_malloc(sizeof(*data->new_ap_settings));
616 char *str = os_malloc(attr.dev_name_len + 1);
/freebsd-11.0-release/contrib/wpa/src/l2_packet/
H A Dl2_packet_freebsd.c60 struct l2_ethhdr *eth = os_malloc(sizeof(*eth) + len);
198 if ((buf = os_malloc(len)) == NULL)
/freebsd-11.0-release/contrib/wpa/wpa_supplicant/
H A Dwpa_priv.c150 buf = os_malloc(60000);
687 iface->sock_name = os_malloc(len + 1);
791 buf = os_malloc(buflen);
827 buf = os_malloc(buflen);
892 buf = os_malloc(sizeof(int) + len);
917 buf = os_malloc(len);
H A Dwpas_glue.c67 hdr = os_malloc(*msg_len);
102 char *hex = os_malloc(hex_len);
566 data = os_malloc(data_len);
807 buf = os_malloc(buflen);
933 str = os_malloc(len * 2 + 1);
/freebsd-11.0-release/contrib/wpa/src/radius/
H A Dradius.c920 * The returned payload is allocated with os_malloc() and caller must free it
968 data = os_malloc(len);
1011 ppos = plain = os_malloc(plen);
1045 res = os_malloc(plain[0]);
1203 buf = os_malloc(hlen + send_key_len + 16);
1228 buf = os_malloc(hlen + recv_key_len + 16);
1264 buf = os_malloc(alen);
1550 buf = os_malloc(fdlen);
1601 ret = os_malloc(*keylen);
1640 dst->attr[i].data = os_malloc(sr
[all...]
H A Dradius_server.c375 buf = os_malloc(buflen);
658 sess->username = os_malloc(user_len * 4 + 1);
794 buf = os_malloc(1 + url_len);
1203 buf = os_malloc(RADIUS_MAX_MSG_LEN);
1315 buf = os_malloc(RADIUS_MAX_MSG_LEN);
1549 buf = os_malloc(buf_size);
1716 data->pac_opaque_encr_key = os_malloc(16);
1723 data->eap_fast_a_id = os_malloc(conf->eap_fast_a_id_len);
1742 data->eap_req_id_text = os_malloc(conf->eap_req_id_text_len);
/freebsd-11.0-release/contrib/wpa/src/drivers/
H A Ddriver_privsep.c123 buf = os_malloc(reply_len);
171 r = os_malloc(len);
517 buf = os_malloc(buflen);
690 drv->own_socket_path = os_malloc(len);
700 drv->own_cmd_path = os_malloc(len);

Completed in 274 milliseconds

1234567