/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_gpsk_common.c | 412 * @sid: Buffer for 17-byte Session ID 421 u8 method_type, u8 *sid, size_t *sid_len) 465 sid[0] = method_type; 466 os_memcpy(sid + 1, kdf_out, sizeof(kdf_out)); 416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_eke.c | 750 u8 *sid; local 757 sid = os_malloc(sid_len); 758 if (sid == NULL) 760 sid[0] = EAP_TYPE_EKE; 761 os_memcpy(sid + 1, data->nonce_p, data->sess.nonce_len); 762 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s, 766 return sid;
|
H A D | eap_gpsk.c | 756 u8 *sid; local 761 sid = os_malloc(data->id_len); 762 if (sid == NULL) 764 os_memcpy(sid, data->session_id, data->id_len); 767 return sid;
|
H A D | eap_ikev2.c | 486 u8 *sid; local 494 sid = os_malloc(sid_len); 495 if (sid) { 497 sid[offset] = EAP_TYPE_IKEV2; 499 os_memcpy(sid + offset, data->ikev2.i_nonce, 502 os_memcpy(sid + offset, data->ikev2.r_nonce, 506 sid, sid_len); 509 return sid;
|
H A D | eap_pax.c | 508 u8 *sid; local 513 sid = os_malloc(1 + EAP_PAX_MID_LEN); 514 if (sid == NULL) 518 sid[0] = EAP_TYPE_PAX; 519 os_memcpy(sid + 1, data->mid, EAP_PAX_MID_LEN); 521 return sid;
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_eke.c | 772 u8 *sid; local 779 sid = os_malloc(sid_len); 780 if (sid == NULL) 782 sid[0] = EAP_TYPE_EKE; 783 os_memcpy(sid + 1, data->nonce_p, data->sess.nonce_len); 784 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s, 788 return sid;
|
H A D | eap_server_gpsk.c | 616 u8 *sid; local 621 sid = os_malloc(data->id_len); 622 if (sid == NULL) 624 os_memcpy(sid, data->session_id, data->id_len); 627 return sid;
|
H A D | eap_server_ikev2.c | 523 u8 *sid; local 531 sid = os_malloc(sid_len); 532 if (sid) { 534 sid[offset] = EAP_TYPE_IKEV2; 536 os_memcpy(sid + offset, data->ikev2.i_nonce, 539 os_memcpy(sid + offset, data->ikev2.r_nonce, 543 sid, sid_len); 546 return sid;
|
H A D | eap_server_pax.c | 548 u8 *sid; local 553 sid = os_malloc(1 + EAP_PAX_MID_LEN); 554 if (sid == NULL) 558 sid[0] = EAP_TYPE_PAX; 559 os_memcpy(sid + 1, data->mid, EAP_PAX_MID_LEN); 561 return sid;
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_key.c | 100 const u8 *mac2, const u8 *sid, 112 os_memcpy(context, sid, sid_bytes); 99 ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1, const u8 *mac2, const u8 *sid, size_t sid_bytes, u8 *ckn) argument
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_er.c | 226 char sid[100]; local 250 uuid_bin2str(ap->sid, sid, sizeof(sid)); 256 path, inet_ntoa(dst.sin_addr), ntohs(dst.sin_port), sid); 367 static int wps_er_get_sid(struct wps_er_ap *ap, char *sid) argument 372 if (!sid) { 378 pos = os_strstr(sid, "uuid:"); 382 sid); 387 if (uuid_str2bin(pos, ap->sid) < [all...] |
H A D | wps_er.h | 62 u8 sid[WPS_UUID_LEN]; member in struct:wps_er_ap
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_gpsk_common.c | 412 * @sid: Buffer for 17-byte Session ID 421 u8 method_type, u8 *sid, size_t *sid_len) 465 sid[0] = method_type; 466 os_memcpy(sid + 1, kdf_out, sizeof(kdf_out)); 416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_eke.c | 750 u8 *sid; local 757 sid = os_malloc(sid_len); 758 if (sid == NULL) 760 sid[0] = EAP_TYPE_EKE; 761 os_memcpy(sid + 1, data->nonce_p, data->sess.nonce_len); 762 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s, 766 return sid;
|
H A D | eap_gpsk.c | 756 u8 *sid; local 761 sid = os_malloc(data->id_len); 762 if (sid == NULL) 764 os_memcpy(sid, data->session_id, data->id_len); 767 return sid;
|
H A D | eap_ikev2.c | 486 u8 *sid; local 494 sid = os_malloc(sid_len); 495 if (sid) { 497 sid[offset] = EAP_TYPE_IKEV2; 499 os_memcpy(sid + offset, data->ikev2.i_nonce, 502 os_memcpy(sid + offset, data->ikev2.r_nonce, 506 sid, sid_len); 509 return sid;
|
H A D | eap_pax.c | 508 u8 *sid; local 513 sid = os_malloc(1 + EAP_PAX_MID_LEN); 514 if (sid == NULL) 518 sid[0] = EAP_TYPE_PAX; 519 os_memcpy(sid + 1, data->mid, EAP_PAX_MID_LEN); 521 return sid;
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_eke.c | 772 u8 *sid; local 779 sid = os_malloc(sid_len); 780 if (sid == NULL) 782 sid[0] = EAP_TYPE_EKE; 783 os_memcpy(sid + 1, data->nonce_p, data->sess.nonce_len); 784 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s, 788 return sid;
|
H A D | eap_server_gpsk.c | 616 u8 *sid; local 621 sid = os_malloc(data->id_len); 622 if (sid == NULL) 624 os_memcpy(sid, data->session_id, data->id_len); 627 return sid;
|
H A D | eap_server_ikev2.c | 523 u8 *sid; local 531 sid = os_malloc(sid_len); 532 if (sid) { 534 sid[offset] = EAP_TYPE_IKEV2; 536 os_memcpy(sid + offset, data->ikev2.i_nonce, 539 os_memcpy(sid + offset, data->ikev2.r_nonce, 543 sid, sid_len); 546 return sid;
|
H A D | eap_server_pax.c | 548 u8 *sid; local 553 sid = os_malloc(1 + EAP_PAX_MID_LEN); 554 if (sid == NULL) 558 sid[0] = EAP_TYPE_PAX; 559 os_memcpy(sid + 1, data->mid, EAP_PAX_MID_LEN); 561 return sid;
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_key.c | 100 const u8 *mac2, const u8 *sid, 112 os_memcpy(context, sid, sid_bytes); 99 ieee802_1x_ckn_128bits_aes_cmac(const u8 *msk, const u8 *mac1, const u8 *mac2, const u8 *sid, size_t sid_bytes, u8 *ckn) argument
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_er.c | 226 char sid[100]; local 250 uuid_bin2str(ap->sid, sid, sizeof(sid)); 256 path, inet_ntoa(dst.sin_addr), ntohs(dst.sin_port), sid); 367 static int wps_er_get_sid(struct wps_er_ap *ap, char *sid) argument 372 if (!sid) { 378 pos = os_strstr(sid, "uuid:"); 382 sid); 387 if (uuid_str2bin(pos, ap->sid) < [all...] |
H A D | wps_er.h | 62 u8 sid[WPS_UUID_LEN]; member in struct:wps_er_ap
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_gpsk_common.c | 412 * @sid: Buffer for 17-byte Session ID 421 u8 method_type, u8 *sid, size_t *sid_len) 465 sid[0] = method_type; 466 os_memcpy(sid + 1, kdf_out, sizeof(kdf_out)); 416 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) argument
|