/external/wpa_supplicant/ |
D | eap_sake.c | 37 size_t peerid_len; member 103 data->peerid_len = config->nai_len; in eap_sake_init() 183 *respDataLen = 2 + data->peerid_len; in eap_sake_process_identity() 191 *rpos++ = 2 + data->peerid_len; in eap_sake_process_identity() 193 os_memcpy(rpos, data->peerid, data->peerid_len); in eap_sake_process_identity() 264 *respDataLen += 2 + data->peerid_len; in eap_sake_process_challenge() 279 *rpos++ = 2 + data->peerid_len; in eap_sake_process_challenge() 280 os_memcpy(rpos, data->peerid, data->peerid_len); in eap_sake_process_challenge() 281 rpos += data->peerid_len; in eap_sake_process_challenge() 289 data->peerid, data->peerid_len, 1, in eap_sake_process_challenge() [all …]
|
D | eap_sake_common.c | 73 attr->peerid_len = pos[1] - 2; in eap_sake_parse_add_attr() 324 const u8 *peerid, size_t peerid_len, in eap_sake_compute_mic() argument 332 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; in eap_sake_compute_mic() 339 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 340 pos += peerid_len; in eap_sake_compute_mic() 359 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 360 pos += peerid_len; in eap_sake_compute_mic()
|
D | eap_sake_common.h | 76 size_t peerid_len; member 100 const u8 *peerid, size_t peerid_len,
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sake_common.c | 74 attr->peerid_len = pos[1] - 2; in eap_sake_parse_add_attr() 325 const u8 *peerid, size_t peerid_len, in eap_sake_compute_mic() argument 333 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; in eap_sake_compute_mic() 340 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 341 pos += peerid_len; in eap_sake_compute_mic() 360 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 361 pos += peerid_len; in eap_sake_compute_mic()
|
D | eap_sake_common.h | 72 size_t peerid_len; member 96 const u8 *peerid, size_t peerid_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | eap_sake_common.c | 74 attr->peerid_len = pos[1] - 2; in eap_sake_parse_add_attr() 325 const u8 *peerid, size_t peerid_len, in eap_sake_compute_mic() argument 333 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; in eap_sake_compute_mic() 340 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 341 pos += peerid_len; in eap_sake_compute_mic() 360 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 361 pos += peerid_len; in eap_sake_compute_mic()
|
D | eap_sake_common.h | 72 size_t peerid_len; member 96 const u8 *peerid, size_t peerid_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_sake.c | 37 size_t peerid_len; member 100 data->peerid_len = identity_len; in eap_sake_init() 176 2 + data->peerid_len, in eap_sake_process_identity() 183 data->peerid, data->peerid_len); in eap_sake_process_identity() 255 rlen += 2 + data->peerid_len; in eap_sake_process_challenge() 268 data->peerid, data->peerid_len); in eap_sake_process_challenge() 277 data->peerid, data->peerid_len, 1, in eap_sake_process_challenge() 321 data->peerid, data->peerid_len, 0, in eap_sake_process_confirm() 350 data->peerid, data->peerid_len, 1, in eap_sake_process_confirm()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_sake.c | 36 size_t peerid_len; member 99 data->peerid_len = identity_len; in eap_sake_init() 175 2 + data->peerid_len, in eap_sake_process_identity() 182 data->peerid, data->peerid_len); in eap_sake_process_identity() 254 rlen += 2 + data->peerid_len; in eap_sake_process_challenge() 267 data->peerid, data->peerid_len); in eap_sake_process_challenge() 276 data->peerid, data->peerid_len, 1, in eap_sake_process_challenge() 320 data->peerid, data->peerid_len, 0, in eap_sake_process_confirm() 349 data->peerid, data->peerid_len, 1, in eap_sake_process_confirm()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_sake.c | 34 size_t peerid_len; member 222 data->peerid, data->peerid_len, 0, in eap_sake_build_confirm() 347 data->peerid_len = 0; in eap_sake_process_challenge() 349 data->peerid = os_malloc(attr.peerid_len); in eap_sake_process_challenge() 352 os_memcpy(data->peerid, attr.peerid, attr.peerid_len); in eap_sake_process_challenge() 353 data->peerid_len = attr.peerid_len; in eap_sake_process_challenge() 371 data->peerid, data->peerid_len, 1, in eap_sake_process_challenge() 408 data->peerid, data->peerid_len, 1, in eap_sake_process_confirm()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_sake.c | 35 size_t peerid_len; member 223 data->peerid, data->peerid_len, 0, in eap_sake_build_confirm() 348 data->peerid_len = 0; in eap_sake_process_challenge() 350 data->peerid = os_malloc(attr.peerid_len); in eap_sake_process_challenge() 353 os_memcpy(data->peerid, attr.peerid, attr.peerid_len); in eap_sake_process_challenge() 354 data->peerid_len = attr.peerid_len; in eap_sake_process_challenge() 372 data->peerid, data->peerid_len, 1, in eap_sake_process_challenge() 409 data->peerid, data->peerid_len, 1, in eap_sake_process_confirm()
|
/external/tcpdump/ |
D | print-ppp.c | 880 int peerid_len, passwd_len, msg_len; in handle_pap() local 924 peerid_len = *p; /* Peer-ID Length */ in handle_pap() 926 if (length - (p - p0) < peerid_len) in handle_pap() 929 for (i = 0; i < peerid_len; i++) { in handle_pap()
|