/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_psk.c | 27 size_t id_s_len, id_p_len; member in struct:eap_psk_data 62 data->id_p_len = identity_len; 137 sizeof(*hdr2) + data->id_p_len, EAP_CODE_RESPONSE, 145 wpabuf_put_data(resp, data->id_p, data->id_p_len); 147 buflen = data->id_p_len + data->id_s_len + 2 * EAP_PSK_RAND_LEN; 153 os_memcpy(buf, data->id_p, data->id_p_len); 154 pos = buf + data->id_p_len; 170 data->id_p, data->id_p_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_psk.c | 26 size_t id_p_len; member in struct:eap_psk_data 246 data->id_p_len = left; 248 data->id_p, data->id_p_len); 250 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) { 252 data->id_p, data->id_p_len); 272 data->id_p, data->id_p_len); 281 data->id_p, data->id_p_len); 297 buflen = data->id_p_len + sm->server_id_len + 2 * EAP_PSK_RAND_LEN; 303 os_memcpy(buf, data->id_p, data->id_p_len); 304 pos = buf + data->id_p_len; [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_psk.c | 27 size_t id_s_len, id_p_len; member in struct:eap_psk_data 62 data->id_p_len = identity_len; 137 sizeof(*hdr2) + data->id_p_len, EAP_CODE_RESPONSE, 145 wpabuf_put_data(resp, data->id_p, data->id_p_len); 147 buflen = data->id_p_len + data->id_s_len + 2 * EAP_PSK_RAND_LEN; 153 os_memcpy(buf, data->id_p, data->id_p_len); 154 pos = buf + data->id_p_len; 170 data->id_p, data->id_p_len);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_psk.c | 26 size_t id_p_len; member in struct:eap_psk_data 246 data->id_p_len = left; 248 data->id_p, data->id_p_len); 250 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) { 252 data->id_p, data->id_p_len); 272 data->id_p, data->id_p_len); 281 data->id_p, data->id_p_len); 297 buflen = data->id_p_len + sm->server_id_len + 2 * EAP_PSK_RAND_LEN; 303 os_memcpy(buf, data->id_p, data->id_p_len); 304 pos = buf + data->id_p_len; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_psk.c | 27 size_t id_s_len, id_p_len; member in struct:eap_psk_data 62 data->id_p_len = identity_len; 137 sizeof(*hdr2) + data->id_p_len, EAP_CODE_RESPONSE, 145 wpabuf_put_data(resp, data->id_p, data->id_p_len); 147 buflen = data->id_p_len + data->id_s_len + 2 * EAP_PSK_RAND_LEN; 153 os_memcpy(buf, data->id_p, data->id_p_len); 154 pos = buf + data->id_p_len; 170 data->id_p, data->id_p_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_psk.c | 26 size_t id_p_len; member in struct:eap_psk_data 246 data->id_p_len = left; 248 data->id_p, data->id_p_len); 250 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) { 252 data->id_p, data->id_p_len); 272 data->id_p, data->id_p_len); 281 data->id_p, data->id_p_len); 297 buflen = data->id_p_len + sm->server_id_len + 2 * EAP_PSK_RAND_LEN; 303 os_memcpy(buf, data->id_p, data->id_p_len); 304 pos = buf + data->id_p_len; [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 334 size_t id_p_len, u8 *key) 350 id = os_malloc(id_s_len + id_p_len); 354 os_memcpy(id + id_s_len, id_p, id_p_len); 356 id, id_s_len + id_p_len); 358 id, id_s_len + id_p_len, key, key_len) < 0) { 454 const u8 *id_p, size_t id_p_len) 483 data_len = label_len + id_s_len + id_p_len; 489 os_memcpy(data + label_len + id_s_len, id_p, id_p_len); 508 const u8 *id_p, size_t id_p_len, 524 data_len = label_len + id_s_len + id_p_len 331 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) argument 452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.c | 334 size_t id_p_len, u8 *key) 350 id = os_malloc(id_s_len + id_p_len); 354 os_memcpy(id + id_s_len, id_p, id_p_len); 356 id, id_s_len + id_p_len); 358 id, id_s_len + id_p_len, key, key_len) < 0) { 454 const u8 *id_p, size_t id_p_len) 483 data_len = label_len + id_s_len + id_p_len; 489 os_memcpy(data + label_len + id_s_len, id_p, id_p_len); 508 const u8 *id_p, size_t id_p_len, 524 data_len = label_len + id_s_len + id_p_len 331 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) argument 452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.c | 334 size_t id_p_len, u8 *key) 350 id = os_malloc(id_s_len + id_p_len); 354 os_memcpy(id + id_s_len, id_p, id_p_len); 356 id, id_s_len + id_p_len); 358 id, id_s_len + id_p_len, key, key_len) < 0) { 454 const u8 *id_p, size_t id_p_len) 483 data_len = label_len + id_s_len + id_p_len; 489 os_memcpy(data + label_len + id_s_len, id_p, id_p_len); 508 const u8 *id_p, size_t id_p_len, 524 data_len = label_len + id_s_len + id_p_len 331 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) argument 452 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |