/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | ikev2.h | 37 u8 *IDi; member in struct:ikev2_responder_data
|
H A D | ikev2.c | 22 os_free(data->IDi); 463 wpa_printf(MSG_INFO, "IKEV2: No IDi received"); 468 wpa_printf(MSG_INFO, "IKEV2: Too short IDi payload"); 476 wpa_printf(MSG_DEBUG, "IKEV2: IDi ID Type %d", id_type); 477 wpa_hexdump_ascii(MSG_DEBUG, "IKEV2: IDi", idi, idi_len); 478 os_free(data->IDi); 479 data->IDi = os_malloc(idi_len); 480 if (data->IDi == NULL) 482 os_memcpy(data->IDi, idi, idi_len); 548 /* msg | Nr | prf(SK_pi,IDi') */ [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | ikev2.h | 36 u8 *IDi; member in struct:ikev2_initiator_data
|
H A D | eap_server_ikev2.c | 106 data->ikev2.IDi = os_malloc(sm->server_id_len); 107 if (data->ikev2.IDi == NULL) 109 os_memcpy(data->ikev2.IDi, sm->server_id, sm->server_id_len);
|
H A D | ikev2.c | 26 os_free(data->IDi); 1026 wpa_printf(MSG_DEBUG, "IKEV2: Adding IDi payload"); 1028 if (data->IDi == NULL) { 1029 wpa_printf(MSG_INFO, "IKEV2: No IDi available"); 1033 /* IDi - RFC 4306, Sect. 3.5 */ 1039 wpabuf_put_data(msg, data->IDi, data->IDi_len); 1066 /* msg | Nr | prf(SK_pi,IDi') */ 1068 data->IDi, data->IDi_len, ID_KEY_ID, 1157 /* build IKE_SA_AUTH: HDR, SK {IDi, [CERT,] [CERTREQ,] AUTH} */
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | ikev2.h | 37 u8 *IDi; member in struct:ikev2_responder_data
|
H A D | ikev2.c | 22 os_free(data->IDi); 463 wpa_printf(MSG_INFO, "IKEV2: No IDi received"); 468 wpa_printf(MSG_INFO, "IKEV2: Too short IDi payload"); 476 wpa_printf(MSG_DEBUG, "IKEV2: IDi ID Type %d", id_type); 477 wpa_hexdump_ascii(MSG_DEBUG, "IKEV2: IDi", idi, idi_len); 478 os_free(data->IDi); 479 data->IDi = os_malloc(idi_len); 480 if (data->IDi == NULL) 482 os_memcpy(data->IDi, idi, idi_len); 548 /* msg | Nr | prf(SK_pi,IDi') */ [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | ikev2.h | 36 u8 *IDi; member in struct:ikev2_initiator_data
|
H A D | eap_server_ikev2.c | 106 data->ikev2.IDi = os_malloc(sm->server_id_len); 107 if (data->ikev2.IDi == NULL) 109 os_memcpy(data->ikev2.IDi, sm->server_id, sm->server_id_len);
|
H A D | ikev2.c | 26 os_free(data->IDi); 1026 wpa_printf(MSG_DEBUG, "IKEV2: Adding IDi payload"); 1028 if (data->IDi == NULL) { 1029 wpa_printf(MSG_INFO, "IKEV2: No IDi available"); 1033 /* IDi - RFC 4306, Sect. 3.5 */ 1039 wpabuf_put_data(msg, data->IDi, data->IDi_len); 1066 /* msg | Nr | prf(SK_pi,IDi') */ 1068 data->IDi, data->IDi_len, ID_KEY_ID, 1157 /* build IKE_SA_AUTH: HDR, SK {IDi, [CERT,] [CERTREQ,] AUTH} */
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | ikev2.h | 37 u8 *IDi; member in struct:ikev2_responder_data
|
H A D | ikev2.c | 22 os_free(data->IDi); 463 wpa_printf(MSG_INFO, "IKEV2: No IDi received"); 468 wpa_printf(MSG_INFO, "IKEV2: Too short IDi payload"); 476 wpa_printf(MSG_DEBUG, "IKEV2: IDi ID Type %d", id_type); 477 wpa_hexdump_ascii(MSG_DEBUG, "IKEV2: IDi", idi, idi_len); 478 os_free(data->IDi); 479 data->IDi = os_malloc(idi_len); 480 if (data->IDi == NULL) 482 os_memcpy(data->IDi, idi, idi_len); 548 /* msg | Nr | prf(SK_pi,IDi') */ [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | ikev2.h | 36 u8 *IDi; member in struct:ikev2_initiator_data
|
H A D | eap_server_ikev2.c | 106 data->ikev2.IDi = os_malloc(sm->server_id_len); 107 if (data->ikev2.IDi == NULL) 109 os_memcpy(data->ikev2.IDi, sm->server_id, sm->server_id_len);
|
H A D | ikev2.c | 26 os_free(data->IDi); 1026 wpa_printf(MSG_DEBUG, "IKEV2: Adding IDi payload"); 1028 if (data->IDi == NULL) { 1029 wpa_printf(MSG_INFO, "IKEV2: No IDi available"); 1033 /* IDi - RFC 4306, Sect. 3.5 */ 1039 wpabuf_put_data(msg, data->IDi, data->IDi_len); 1066 /* msg | Nr | prf(SK_pi,IDi') */ 1068 data->IDi, data->IDi_len, ID_KEY_ID, 1157 /* build IKE_SA_AUTH: HDR, SK {IDi, [CERT,] [CERTREQ,] AUTH} */
|