/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sake_common.c | 67 attr->peerid = pos + 2; 308 * @peerid: PEERID 319 const u8 *peerid, size_t peerid_len, 333 if (peerid) { 334 os_memcpy(pos, peerid, peerid_len); 353 if (peerid) { 354 os_memcpy(pos, peerid, peerid_len); 316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
H A D | eap_sake_common.h | 65 const u8 *peerid; member in struct:eap_sake_parse_attr 90 const u8 *peerid, size_t peerid_len,
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_sake.c | 30 u8 *peerid; member in struct:eap_sake_data 88 data->peerid = os_malloc(identity_len); 89 if (data->peerid == NULL) { 93 os_memcpy(data->peerid, identity, identity_len); 110 os_free(data->peerid); 177 data->peerid, data->peerid_len); 248 if (data->peerid) 259 if (data->peerid) { 262 data->peerid, data->peerid_len); 271 data->peerid, dat [all...] |
H A D | eap_eke.c | 22 u8 *peerid; member in struct:eap_eke_data 88 data->peerid = os_malloc(identity_len); 89 if (data->peerid == NULL) { 93 os_memcpy(data->peerid, identity, identity_len); 139 os_free(data->peerid); 335 if (data->peerid) 336 wpabuf_put_data(resp, data->peerid, data->peerid_len); 406 data->peerid, data->peerid_len, key) < 0) { 433 data->peerid, data->peerid_len) < 0) { 557 data->peerid, dat [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_sake.c | 28 u8 *peerid; member in struct:eap_sake_data 85 os_free(data->peerid); 202 data->peerid, data->peerid_len, 0, 325 os_free(data->peerid); 326 data->peerid = NULL; 328 if (attr.peerid) { 329 data->peerid = os_malloc(attr.peerid_len); 330 if (data->peerid == NULL) 332 os_memcpy(data->peerid, attr.peerid, att [all...] |
H A D | eap_server_eke.c | 23 u8 *peerid; member in struct:eap_eke_data 105 os_free(data->peerid); 256 data->peerid, data->peerid_len, data->key) < 0) { 342 data->peerid, data->peerid_len, 469 os_free(data->peerid); 470 data->peerid = os_malloc(end - pos); 471 if (data->peerid == NULL) { 472 wpa_printf(MSG_INFO, "EAP-EKE: Failed to allocate memory for peerid"); 476 os_memcpy(data->peerid, pos, end - pos); 480 data->peerid, dat [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sake_common.c | 67 attr->peerid = pos + 2; 308 * @peerid: PEERID 319 const u8 *peerid, size_t peerid_len, 333 if (peerid) { 334 os_memcpy(pos, peerid, peerid_len); 353 if (peerid) { 354 os_memcpy(pos, peerid, peerid_len); 316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
H A D | eap_sake_common.h | 65 const u8 *peerid; member in struct:eap_sake_parse_attr 90 const u8 *peerid, size_t peerid_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_sake.c | 30 u8 *peerid; member in struct:eap_sake_data 88 data->peerid = os_malloc(identity_len); 89 if (data->peerid == NULL) { 93 os_memcpy(data->peerid, identity, identity_len); 110 os_free(data->peerid); 177 data->peerid, data->peerid_len); 248 if (data->peerid) 259 if (data->peerid) { 262 data->peerid, data->peerid_len); 271 data->peerid, dat [all...] |
H A D | eap_eke.c | 22 u8 *peerid; member in struct:eap_eke_data 88 data->peerid = os_malloc(identity_len); 89 if (data->peerid == NULL) { 93 os_memcpy(data->peerid, identity, identity_len); 139 os_free(data->peerid); 335 if (data->peerid) 336 wpabuf_put_data(resp, data->peerid, data->peerid_len); 406 data->peerid, data->peerid_len, key) < 0) { 433 data->peerid, data->peerid_len) < 0) { 557 data->peerid, dat [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_sake.c | 28 u8 *peerid; member in struct:eap_sake_data 85 os_free(data->peerid); 202 data->peerid, data->peerid_len, 0, 325 os_free(data->peerid); 326 data->peerid = NULL; 328 if (attr.peerid) { 329 data->peerid = os_malloc(attr.peerid_len); 330 if (data->peerid == NULL) 332 os_memcpy(data->peerid, attr.peerid, att [all...] |
H A D | eap_server_eke.c | 23 u8 *peerid; member in struct:eap_eke_data 105 os_free(data->peerid); 256 data->peerid, data->peerid_len, data->key) < 0) { 342 data->peerid, data->peerid_len, 469 os_free(data->peerid); 470 data->peerid = os_malloc(end - pos); 471 if (data->peerid == NULL) { 472 wpa_printf(MSG_INFO, "EAP-EKE: Failed to allocate memory for peerid"); 476 os_memcpy(data->peerid, pos, end - pos); 480 data->peerid, dat [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sake_common.c | 67 attr->peerid = pos + 2; 308 * @peerid: PEERID 319 const u8 *peerid, size_t peerid_len, 333 if (peerid) { 334 os_memcpy(pos, peerid, peerid_len); 353 if (peerid) { 354 os_memcpy(pos, peerid, peerid_len); 316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
|
H A D | eap_sake_common.h | 65 const u8 *peerid; member in struct:eap_sake_parse_attr 90 const u8 *peerid, size_t peerid_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_sake.c | 30 u8 *peerid; member in struct:eap_sake_data 88 data->peerid = os_malloc(identity_len); 89 if (data->peerid == NULL) { 93 os_memcpy(data->peerid, identity, identity_len); 110 os_free(data->peerid); 177 data->peerid, data->peerid_len); 248 if (data->peerid) 259 if (data->peerid) { 262 data->peerid, data->peerid_len); 271 data->peerid, dat [all...] |
H A D | eap_eke.c | 22 u8 *peerid; member in struct:eap_eke_data 88 data->peerid = os_malloc(identity_len); 89 if (data->peerid == NULL) { 93 os_memcpy(data->peerid, identity, identity_len); 139 os_free(data->peerid); 335 if (data->peerid) 336 wpabuf_put_data(resp, data->peerid, data->peerid_len); 406 data->peerid, data->peerid_len, key) < 0) { 433 data->peerid, data->peerid_len) < 0) { 557 data->peerid, dat [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_sake.c | 28 u8 *peerid; member in struct:eap_sake_data 85 os_free(data->peerid); 202 data->peerid, data->peerid_len, 0, 325 os_free(data->peerid); 326 data->peerid = NULL; 328 if (attr.peerid) { 329 data->peerid = os_malloc(attr.peerid_len); 330 if (data->peerid == NULL) 332 os_memcpy(data->peerid, attr.peerid, att [all...] |
H A D | eap_server_eke.c | 23 u8 *peerid; member in struct:eap_eke_data 105 os_free(data->peerid); 256 data->peerid, data->peerid_len, data->key) < 0) { 342 data->peerid, data->peerid_len, 469 os_free(data->peerid); 470 data->peerid = os_malloc(end - pos); 471 if (data->peerid == NULL) { 472 wpa_printf(MSG_INFO, "EAP-EKE: Failed to allocate memory for peerid"); 476 os_memcpy(data->peerid, pos, end - pos); 480 data->peerid, dat [all...] |