Searched defs:id_peer (Results 1 - 18 of 18) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_gpsk_common.c266 * @id_peer: ID_Peer
281 const u8 *id_peer, size_t id_peer_len,
308 os_memcpy(pos, id_peer, id_peer_len);
407 * @id_peer: ID_Peer
419 const u8 *id_peer, size_t id_peer_len,
452 os_memcpy(pos, id_peer, id_peer_len);
278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument
H A Deap_pwd_common.c91 u8 *id_peer, int id_peer_len, u8 *token)
183 eap_pwd_h_update(hash, id_peer, id_peer_len);
88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_gpsk.c27 u8 *id_peer; member in struct:eap_gpsk_data
97 os_free(data->id_peer);
269 os_free(data->id_peer);
270 data->id_peer = os_malloc(alen);
271 if (data->id_peer == NULL) {
276 os_memcpy(data->id_peer, pos, alen);
279 data->id_peer, data->id_peer_len);
410 data->id_peer, data->id_peer_len,
H A Deap_server_pwd.c21 u8 *id_peer; member in struct:eap_pwd_data
145 bin_clear_free(data->id_peer, data->id_peer_len);
597 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id));
598 if (data->id_peer == NULL) {
603 os_memcpy(data->id_peer, id->identity, data->id_peer_len);
605 data->id_peer, data->id_peer_len);
616 data->id_peer, data->id_peer_len,
/external/wpa_supplicant_8/src/eap_common/
H A Deap_gpsk_common.c266 * @id_peer: ID_Peer
281 const u8 *id_peer, size_t id_peer_len,
308 os_memcpy(pos, id_peer, id_peer_len);
407 * @id_peer: ID_Peer
419 const u8 *id_peer, size_t id_peer_len,
452 os_memcpy(pos, id_peer, id_peer_len);
278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument
H A Deap_pwd_common.c91 u8 *id_peer, int id_peer_len, u8 *token)
183 eap_pwd_h_update(hash, id_peer, id_peer_len);
88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_gpsk.c27 u8 *id_peer; member in struct:eap_gpsk_data
97 os_free(data->id_peer);
269 os_free(data->id_peer);
270 data->id_peer = os_malloc(alen);
271 if (data->id_peer == NULL) {
276 os_memcpy(data->id_peer, pos, alen);
279 data->id_peer, data->id_peer_len);
410 data->id_peer, data->id_peer_len,
H A Deap_server_pwd.c21 u8 *id_peer; member in struct:eap_pwd_data
145 bin_clear_free(data->id_peer, data->id_peer_len);
597 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id));
598 if (data->id_peer == NULL) {
603 os_memcpy(data->id_peer, id->identity, data->id_peer_len);
605 data->id_peer, data->id_peer_len);
616 data->id_peer, data->id_peer_len,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_gpsk_common.c266 * @id_peer: ID_Peer
281 const u8 *id_peer, size_t id_peer_len,
308 os_memcpy(pos, id_peer, id_peer_len);
407 * @id_peer: ID_Peer
419 const u8 *id_peer, size_t id_peer_len,
452 os_memcpy(pos, id_peer, id_peer_len);
278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument
H A Deap_pwd_common.c91 u8 *id_peer, int id_peer_len, u8 *token)
183 eap_pwd_h_update(hash, id_peer, id_peer_len);
88 compute_password_element(EAP_PWD_group *grp, u16 num, u8 *password, int password_len, u8 *id_server, int id_server_len, u8 *id_peer, int id_peer_len, u8 *token) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_gpsk.c27 u8 *id_peer; member in struct:eap_gpsk_data
97 os_free(data->id_peer);
269 os_free(data->id_peer);
270 data->id_peer = os_malloc(alen);
271 if (data->id_peer == NULL) {
276 os_memcpy(data->id_peer, pos, alen);
279 data->id_peer, data->id_peer_len);
410 data->id_peer, data->id_peer_len,
H A Deap_server_pwd.c21 u8 *id_peer; member in struct:eap_pwd_data
145 bin_clear_free(data->id_peer, data->id_peer_len);
597 data->id_peer = os_malloc(payload_len - sizeof(struct eap_pwd_id));
598 if (data->id_peer == NULL) {
603 os_memcpy(data->id_peer, id->identity, data->id_peer_len);
605 data->id_peer, data->id_peer_len);
616 data->id_peer, data->id_peer_len,
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_gpsk.c28 u8 *id_peer; member in struct:eap_gpsk_data
99 data->id_peer = os_malloc(identity_len);
100 if (data->id_peer == NULL) {
104 os_memcpy(data->id_peer, identity, identity_len);
136 os_free(data->id_peer);
341 data->id_peer, data->id_peer_len);
343 wpabuf_put_data(resp, data->id_peer, data->id_peer_len);
370 data->id_peer, data->id_peer_len,
384 data->id_peer, data->id_peer_len,
H A Deap_pwd.c22 u8 *id_peer; member in struct:eap_pwd_data
113 if ((data->id_peer = os_malloc(identity_len)) == NULL) {
120 os_memcpy(data->id_peer, identity, identity_len);
126 bin_clear_free(data->id_peer, data->id_peer_len);
158 bin_clear_free(data->id_peer, data->id_peer_len);
267 data->id_peer, data->id_peer_len,
288 wpabuf_put_data(data->outbuf, data->id_peer, data->id_peer_len);
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_gpsk.c28 u8 *id_peer; member in struct:eap_gpsk_data
99 data->id_peer = os_malloc(identity_len);
100 if (data->id_peer == NULL) {
104 os_memcpy(data->id_peer, identity, identity_len);
136 os_free(data->id_peer);
341 data->id_peer, data->id_peer_len);
343 wpabuf_put_data(resp, data->id_peer, data->id_peer_len);
370 data->id_peer, data->id_peer_len,
384 data->id_peer, data->id_peer_len,
H A Deap_pwd.c22 u8 *id_peer; member in struct:eap_pwd_data
113 if ((data->id_peer = os_malloc(identity_len)) == NULL) {
120 os_memcpy(data->id_peer, identity, identity_len);
126 bin_clear_free(data->id_peer, data->id_peer_len);
158 bin_clear_free(data->id_peer, data->id_peer_len);
267 data->id_peer, data->id_peer_len,
288 wpabuf_put_data(data->outbuf, data->id_peer, data->id_peer_len);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_gpsk.c28 u8 *id_peer; member in struct:eap_gpsk_data
99 data->id_peer = os_malloc(identity_len);
100 if (data->id_peer == NULL) {
104 os_memcpy(data->id_peer, identity, identity_len);
136 os_free(data->id_peer);
341 data->id_peer, data->id_peer_len);
343 wpabuf_put_data(resp, data->id_peer, data->id_peer_len);
370 data->id_peer, data->id_peer_len,
384 data->id_peer, data->id_peer_len,
H A Deap_pwd.c22 u8 *id_peer; member in struct:eap_pwd_data
113 if ((data->id_peer = os_malloc(identity_len)) == NULL) {
120 os_memcpy(data->id_peer, identity, identity_len);
126 bin_clear_free(data->id_peer, data->id_peer_len);
158 bin_clear_free(data->id_peer, data->id_peer_len);
267 data->id_peer, data->id_peer_len,
288 wpabuf_put_data(data->outbuf, data->id_peer, data->id_peer_len);

Completed in 209 milliseconds