Searched refs:peerid_len (Results 1 – 7 of 7) sorted by relevance
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sake_common.c | 68 attr->peerid_len = len; in eap_sake_parse_add_attr() 319 const u8 *peerid, size_t peerid_len, in eap_sake_compute_mic() argument 327 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; in eap_sake_compute_mic() 334 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 335 pos += peerid_len; in eap_sake_compute_mic() 354 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 355 pos += peerid_len; in eap_sake_compute_mic()
|
D | eap_sake_common.h | 66 size_t peerid_len; member 90 const u8 *peerid, size_t peerid_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_sake.c | 31 size_t peerid_len; member 93 data->peerid_len = identity_len; in eap_sake_init() 168 resp = eap_sake_build_msg(data, id, 2 + data->peerid_len, in eap_sake_process_identity() 175 data->peerid, data->peerid_len); in eap_sake_process_identity() 246 rlen += 2 + data->peerid_len; in eap_sake_process_challenge() 258 data->peerid, data->peerid_len); in eap_sake_process_challenge() 267 data->peerid, data->peerid_len, 1, in eap_sake_process_challenge() 312 data->peerid, data->peerid_len, 0, in eap_sake_process_confirm() 349 data->peerid, data->peerid_len, 1, in eap_sake_process_confirm()
|
D | eap_eke.c | 23 size_t peerid_len; member 93 data->peerid_len = identity_len; in eap_eke_init() 322 2 + 4 + 1 + data->peerid_len, in eap_eke_process_id() 334 wpabuf_put_data(resp, data->peerid, data->peerid_len); in eap_eke_process_id() 405 data->peerid, data->peerid_len, key) < 0) { in eap_eke_process_commit() 432 data->peerid, data->peerid_len) < 0) { in eap_eke_process_commit() 558 data->peerid, data->peerid_len, in eap_eke_process_confirm() 605 data->peerid, data->peerid_len, in eap_eke_process_confirm()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_sake.c | 29 size_t peerid_len; member 202 data->peerid, data->peerid_len, 0, in eap_sake_build_confirm() 327 data->peerid_len = 0; in eap_sake_process_challenge() 329 data->peerid = os_memdup(attr.peerid, attr.peerid_len); in eap_sake_process_challenge() 332 data->peerid_len = attr.peerid_len; in eap_sake_process_challenge() 350 data->peerid, data->peerid_len, 1, in eap_sake_process_challenge() 387 data->peerid, data->peerid_len, 1, in eap_sake_process_confirm()
|
D | eap_server_eke.c | 24 size_t peerid_len; member 256 data->peerid, data->peerid_len, data->key) < 0) { in eap_eke_build_commit() 342 data->peerid, data->peerid_len, in eap_eke_build_confirm() 476 data->peerid_len = end - pos; in eap_eke_process_identity() 479 data->peerid, data->peerid_len); in eap_eke_process_identity() 481 if (eap_user_get(sm, data->peerid, data->peerid_len, data->phase2)) { in eap_eke_process_identity() 556 data->peerid, data->peerid_len) < 0) { in eap_eke_process_commit() 645 data->peerid, data->peerid_len, in eap_eke_process_confirm()
|
/external/tcpdump/ |
D | print-ppp.c | 915 int peerid_len, passwd_len, msg_len; in handle_pap() local 962 peerid_len = *p; /* Peer-ID Length */ in handle_pap() 964 if (length - (p - p0) < peerid_len) in handle_pap() 967 for (i = 0; i < peerid_len; i++) { in handle_pap()
|