/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_sake_common.c | 68 attr->peerid_len = len; in eap_sake_parse_add_attr() 331 const u8 *peerid, size_t peerid_len, in eap_sake_compute_mic() argument 340 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; in eap_sake_compute_mic() 347 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 348 pos += peerid_len; in eap_sake_compute_mic() 367 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 368 pos += peerid_len; in eap_sake_compute_mic()
|
D | eap_sake_common.h | 66 size_t peerid_len; member 90 const u8 *peerid, size_t peerid_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_sake_common.c | 68 attr->peerid_len = len; in eap_sake_parse_add_attr() 331 const u8 *peerid, size_t peerid_len, in eap_sake_compute_mic() argument 340 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; in eap_sake_compute_mic() 347 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 348 pos += peerid_len; in eap_sake_compute_mic() 367 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 368 pos += peerid_len; in eap_sake_compute_mic()
|
D | eap_sake_common.h | 66 size_t peerid_len; member 90 const u8 *peerid, size_t peerid_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_sake.c | 31 size_t peerid_len; member 93 data->peerid_len = identity_len; in eap_sake_init() 168 resp = eap_sake_build_msg(data, id, 2 + data->peerid_len, in eap_sake_process_identity() 175 data->peerid, data->peerid_len); in eap_sake_process_identity() 250 rlen += 2 + data->peerid_len; in eap_sake_process_challenge() 262 data->peerid, data->peerid_len); in eap_sake_process_challenge() 271 data->peerid, data->peerid_len, 1, in eap_sake_process_challenge() 316 data->peerid, data->peerid_len, 0, in eap_sake_process_confirm() 353 data->peerid, data->peerid_len, 1, in eap_sake_process_confirm()
|
D | eap_eke.c | 23 size_t peerid_len; member 93 data->peerid_len = identity_len; in eap_eke_init() 322 2 + 4 + 1 + data->peerid_len, in eap_eke_process_id() 334 wpabuf_put_data(resp, data->peerid, data->peerid_len); in eap_eke_process_id() 405 data->peerid, data->peerid_len, key) < 0) { in eap_eke_process_commit() 432 data->peerid, data->peerid_len) < 0) { in eap_eke_process_commit() 558 data->peerid, data->peerid_len, in eap_eke_process_confirm() 605 data->peerid, data->peerid_len, in eap_eke_process_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_sake.c | 31 size_t peerid_len; member 93 data->peerid_len = identity_len; in eap_sake_init() 168 resp = eap_sake_build_msg(data, id, 2 + data->peerid_len, in eap_sake_process_identity() 175 data->peerid, data->peerid_len); in eap_sake_process_identity() 250 rlen += 2 + data->peerid_len; in eap_sake_process_challenge() 262 data->peerid, data->peerid_len); in eap_sake_process_challenge() 271 data->peerid, data->peerid_len, 1, in eap_sake_process_challenge() 316 data->peerid, data->peerid_len, 0, in eap_sake_process_confirm() 353 data->peerid, data->peerid_len, 1, in eap_sake_process_confirm()
|
D | eap_eke.c | 23 size_t peerid_len; member 93 data->peerid_len = identity_len; in eap_eke_init() 322 2 + 4 + 1 + data->peerid_len, in eap_eke_process_id() 334 wpabuf_put_data(resp, data->peerid, data->peerid_len); in eap_eke_process_id() 405 data->peerid, data->peerid_len, key) < 0) { in eap_eke_process_commit() 432 data->peerid, data->peerid_len) < 0) { in eap_eke_process_commit() 558 data->peerid, data->peerid_len, in eap_eke_process_confirm() 605 data->peerid, data->peerid_len, in eap_eke_process_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_sake.c | 29 size_t peerid_len; member 202 data->peerid, data->peerid_len, 0, in eap_sake_build_confirm() 327 data->peerid_len = 0; in eap_sake_process_challenge() 329 data->peerid = os_memdup(attr.peerid, attr.peerid_len); in eap_sake_process_challenge() 332 data->peerid_len = attr.peerid_len; in eap_sake_process_challenge() 355 data->peerid, data->peerid_len, 1, in eap_sake_process_challenge() 396 data->peerid, data->peerid_len, 1, in eap_sake_process_confirm()
|
D | eap_server_eke.c | 24 size_t peerid_len; member 256 data->peerid, data->peerid_len, data->key) < 0) { in eap_eke_build_commit() 342 data->peerid, data->peerid_len, in eap_eke_build_confirm() 476 data->peerid_len = end - pos; in eap_eke_process_identity() 479 data->peerid, data->peerid_len); in eap_eke_process_identity() 481 if (eap_user_get(sm, data->peerid, data->peerid_len, data->phase2)) { in eap_eke_process_identity() 556 data->peerid, data->peerid_len) < 0) { in eap_eke_process_commit() 645 data->peerid, data->peerid_len, in eap_eke_process_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_sake.c | 29 size_t peerid_len; member 202 data->peerid, data->peerid_len, 0, in eap_sake_build_confirm() 327 data->peerid_len = 0; in eap_sake_process_challenge() 329 data->peerid = os_memdup(attr.peerid, attr.peerid_len); in eap_sake_process_challenge() 332 data->peerid_len = attr.peerid_len; in eap_sake_process_challenge() 355 data->peerid, data->peerid_len, 1, in eap_sake_process_challenge() 396 data->peerid, data->peerid_len, 1, in eap_sake_process_confirm()
|
D | eap_server_eke.c | 24 size_t peerid_len; member 256 data->peerid, data->peerid_len, data->key) < 0) { in eap_eke_build_commit() 342 data->peerid, data->peerid_len, in eap_eke_build_confirm() 476 data->peerid_len = end - pos; in eap_eke_process_identity() 479 data->peerid, data->peerid_len); in eap_eke_process_identity() 481 if (eap_user_get(sm, data->peerid, data->peerid_len, data->phase2)) { in eap_eke_process_identity() 556 data->peerid, data->peerid_len) < 0) { in eap_eke_process_commit() 646 data->peerid, data->peerid_len, in eap_eke_process_confirm()
|