Searched defs:peerid (Results 1 - 18 of 18) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sake_common.c67 attr->peerid = pos + 2;
308 * @peerid: PEERID
319 const u8 *peerid, size_t peerid_len,
333 if (peerid) {
334 os_memcpy(pos, peerid, peerid_len);
353 if (peerid) {
354 os_memcpy(pos, peerid, peerid_len);
316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
H A Deap_sake_common.h65 const u8 *peerid; member in struct:eap_sake_parse_attr
90 const u8 *peerid, size_t peerid_len,
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_sake.c30 u8 *peerid; member in struct:eap_sake_data
88 data->peerid = os_malloc(identity_len);
89 if (data->peerid == NULL) {
93 os_memcpy(data->peerid, identity, identity_len);
110 os_free(data->peerid);
177 data->peerid, data->peerid_len);
248 if (data->peerid)
259 if (data->peerid) {
262 data->peerid, data->peerid_len);
271 data->peerid, dat
[all...]
H A Deap_eke.c22 u8 *peerid; member in struct:eap_eke_data
88 data->peerid = os_malloc(identity_len);
89 if (data->peerid == NULL) {
93 os_memcpy(data->peerid, identity, identity_len);
139 os_free(data->peerid);
335 if (data->peerid)
336 wpabuf_put_data(resp, data->peerid, data->peerid_len);
406 data->peerid, data->peerid_len, key) < 0) {
433 data->peerid, data->peerid_len) < 0) {
557 data->peerid, dat
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_sake.c28 u8 *peerid; member in struct:eap_sake_data
85 os_free(data->peerid);
202 data->peerid, data->peerid_len, 0,
325 os_free(data->peerid);
326 data->peerid = NULL;
328 if (attr.peerid) {
329 data->peerid = os_malloc(attr.peerid_len);
330 if (data->peerid == NULL)
332 os_memcpy(data->peerid, attr.peerid, att
[all...]
H A Deap_server_eke.c23 u8 *peerid; member in struct:eap_eke_data
105 os_free(data->peerid);
256 data->peerid, data->peerid_len, data->key) < 0) {
342 data->peerid, data->peerid_len,
469 os_free(data->peerid);
470 data->peerid = os_malloc(end - pos);
471 if (data->peerid == NULL) {
472 wpa_printf(MSG_INFO, "EAP-EKE: Failed to allocate memory for peerid");
476 os_memcpy(data->peerid, pos, end - pos);
480 data->peerid, dat
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sake_common.c67 attr->peerid = pos + 2;
308 * @peerid: PEERID
319 const u8 *peerid, size_t peerid_len,
333 if (peerid) {
334 os_memcpy(pos, peerid, peerid_len);
353 if (peerid) {
354 os_memcpy(pos, peerid, peerid_len);
316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
H A Deap_sake_common.h65 const u8 *peerid; member in struct:eap_sake_parse_attr
90 const u8 *peerid, size_t peerid_len,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_sake.c30 u8 *peerid; member in struct:eap_sake_data
88 data->peerid = os_malloc(identity_len);
89 if (data->peerid == NULL) {
93 os_memcpy(data->peerid, identity, identity_len);
110 os_free(data->peerid);
177 data->peerid, data->peerid_len);
248 if (data->peerid)
259 if (data->peerid) {
262 data->peerid, data->peerid_len);
271 data->peerid, dat
[all...]
H A Deap_eke.c22 u8 *peerid; member in struct:eap_eke_data
88 data->peerid = os_malloc(identity_len);
89 if (data->peerid == NULL) {
93 os_memcpy(data->peerid, identity, identity_len);
139 os_free(data->peerid);
335 if (data->peerid)
336 wpabuf_put_data(resp, data->peerid, data->peerid_len);
406 data->peerid, data->peerid_len, key) < 0) {
433 data->peerid, data->peerid_len) < 0) {
557 data->peerid, dat
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_sake.c28 u8 *peerid; member in struct:eap_sake_data
85 os_free(data->peerid);
202 data->peerid, data->peerid_len, 0,
325 os_free(data->peerid);
326 data->peerid = NULL;
328 if (attr.peerid) {
329 data->peerid = os_malloc(attr.peerid_len);
330 if (data->peerid == NULL)
332 os_memcpy(data->peerid, attr.peerid, att
[all...]
H A Deap_server_eke.c23 u8 *peerid; member in struct:eap_eke_data
105 os_free(data->peerid);
256 data->peerid, data->peerid_len, data->key) < 0) {
342 data->peerid, data->peerid_len,
469 os_free(data->peerid);
470 data->peerid = os_malloc(end - pos);
471 if (data->peerid == NULL) {
472 wpa_printf(MSG_INFO, "EAP-EKE: Failed to allocate memory for peerid");
476 os_memcpy(data->peerid, pos, end - pos);
480 data->peerid, dat
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sake_common.c67 attr->peerid = pos + 2;
308 * @peerid: PEERID
319 const u8 *peerid, size_t peerid_len,
333 if (peerid) {
334 os_memcpy(pos, peerid, peerid_len);
353 if (peerid) {
354 os_memcpy(pos, peerid, peerid_len);
316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
H A Deap_sake_common.h65 const u8 *peerid; member in struct:eap_sake_parse_attr
90 const u8 *peerid, size_t peerid_len,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_sake.c30 u8 *peerid; member in struct:eap_sake_data
88 data->peerid = os_malloc(identity_len);
89 if (data->peerid == NULL) {
93 os_memcpy(data->peerid, identity, identity_len);
110 os_free(data->peerid);
177 data->peerid, data->peerid_len);
248 if (data->peerid)
259 if (data->peerid) {
262 data->peerid, data->peerid_len);
271 data->peerid, dat
[all...]
H A Deap_eke.c22 u8 *peerid; member in struct:eap_eke_data
88 data->peerid = os_malloc(identity_len);
89 if (data->peerid == NULL) {
93 os_memcpy(data->peerid, identity, identity_len);
139 os_free(data->peerid);
335 if (data->peerid)
336 wpabuf_put_data(resp, data->peerid, data->peerid_len);
406 data->peerid, data->peerid_len, key) < 0) {
433 data->peerid, data->peerid_len) < 0) {
557 data->peerid, dat
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_sake.c28 u8 *peerid; member in struct:eap_sake_data
85 os_free(data->peerid);
202 data->peerid, data->peerid_len, 0,
325 os_free(data->peerid);
326 data->peerid = NULL;
328 if (attr.peerid) {
329 data->peerid = os_malloc(attr.peerid_len);
330 if (data->peerid == NULL)
332 os_memcpy(data->peerid, attr.peerid, att
[all...]
H A Deap_server_eke.c23 u8 *peerid; member in struct:eap_eke_data
105 os_free(data->peerid);
256 data->peerid, data->peerid_len, data->key) < 0) {
342 data->peerid, data->peerid_len,
469 os_free(data->peerid);
470 data->peerid = os_malloc(end - pos);
471 if (data->peerid == NULL) {
472 wpa_printf(MSG_INFO, "EAP-EKE: Failed to allocate memory for peerid");
476 os_memcpy(data->peerid, pos, end - pos);
480 data->peerid, dat
[all...]

Completed in 703 milliseconds