Searched refs:IDi (Results 1 - 15 of 15) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dikev2.h37 u8 *IDi; member in struct:ikev2_responder_data
H A Dikev2.c22 os_free(data->IDi);
463 wpa_printf(MSG_INFO, "IKEV2: No IDi received");
468 wpa_printf(MSG_INFO, "IKEV2: Too short IDi payload");
476 wpa_printf(MSG_DEBUG, "IKEV2: IDi ID Type %d", id_type);
477 wpa_hexdump_ascii(MSG_DEBUG, "IKEV2: IDi", idi, idi_len);
478 os_free(data->IDi);
479 data->IDi = os_malloc(idi_len);
480 if (data->IDi == NULL)
482 os_memcpy(data->IDi, idi, idi_len);
548 /* msg | Nr | prf(SK_pi,IDi') */
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Dikev2.h36 u8 *IDi; member in struct:ikev2_initiator_data
H A Deap_server_ikev2.c106 data->ikev2.IDi = os_malloc(sm->server_id_len);
107 if (data->ikev2.IDi == NULL)
109 os_memcpy(data->ikev2.IDi, sm->server_id, sm->server_id_len);
H A Dikev2.c26 os_free(data->IDi);
1026 wpa_printf(MSG_DEBUG, "IKEV2: Adding IDi payload");
1028 if (data->IDi == NULL) {
1029 wpa_printf(MSG_INFO, "IKEV2: No IDi available");
1033 /* IDi - RFC 4306, Sect. 3.5 */
1039 wpabuf_put_data(msg, data->IDi, data->IDi_len);
1066 /* msg | Nr | prf(SK_pi,IDi') */
1068 data->IDi, data->IDi_len, ID_KEY_ID,
1157 /* build IKE_SA_AUTH: HDR, SK {IDi, [CERT,] [CERTREQ,] AUTH} */
/external/wpa_supplicant_8/src/eap_peer/
H A Dikev2.h37 u8 *IDi; member in struct:ikev2_responder_data
H A Dikev2.c22 os_free(data->IDi);
463 wpa_printf(MSG_INFO, "IKEV2: No IDi received");
468 wpa_printf(MSG_INFO, "IKEV2: Too short IDi payload");
476 wpa_printf(MSG_DEBUG, "IKEV2: IDi ID Type %d", id_type);
477 wpa_hexdump_ascii(MSG_DEBUG, "IKEV2: IDi", idi, idi_len);
478 os_free(data->IDi);
479 data->IDi = os_malloc(idi_len);
480 if (data->IDi == NULL)
482 os_memcpy(data->IDi, idi, idi_len);
548 /* msg | Nr | prf(SK_pi,IDi') */
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Dikev2.h36 u8 *IDi; member in struct:ikev2_initiator_data
H A Deap_server_ikev2.c106 data->ikev2.IDi = os_malloc(sm->server_id_len);
107 if (data->ikev2.IDi == NULL)
109 os_memcpy(data->ikev2.IDi, sm->server_id, sm->server_id_len);
H A Dikev2.c26 os_free(data->IDi);
1026 wpa_printf(MSG_DEBUG, "IKEV2: Adding IDi payload");
1028 if (data->IDi == NULL) {
1029 wpa_printf(MSG_INFO, "IKEV2: No IDi available");
1033 /* IDi - RFC 4306, Sect. 3.5 */
1039 wpabuf_put_data(msg, data->IDi, data->IDi_len);
1066 /* msg | Nr | prf(SK_pi,IDi') */
1068 data->IDi, data->IDi_len, ID_KEY_ID,
1157 /* build IKE_SA_AUTH: HDR, SK {IDi, [CERT,] [CERTREQ,] AUTH} */
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dikev2.h37 u8 *IDi; member in struct:ikev2_responder_data
H A Dikev2.c22 os_free(data->IDi);
463 wpa_printf(MSG_INFO, "IKEV2: No IDi received");
468 wpa_printf(MSG_INFO, "IKEV2: Too short IDi payload");
476 wpa_printf(MSG_DEBUG, "IKEV2: IDi ID Type %d", id_type);
477 wpa_hexdump_ascii(MSG_DEBUG, "IKEV2: IDi", idi, idi_len);
478 os_free(data->IDi);
479 data->IDi = os_malloc(idi_len);
480 if (data->IDi == NULL)
482 os_memcpy(data->IDi, idi, idi_len);
548 /* msg | Nr | prf(SK_pi,IDi') */
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Dikev2.h36 u8 *IDi; member in struct:ikev2_initiator_data
H A Deap_server_ikev2.c106 data->ikev2.IDi = os_malloc(sm->server_id_len);
107 if (data->ikev2.IDi == NULL)
109 os_memcpy(data->ikev2.IDi, sm->server_id, sm->server_id_len);
H A Dikev2.c26 os_free(data->IDi);
1026 wpa_printf(MSG_DEBUG, "IKEV2: Adding IDi payload");
1028 if (data->IDi == NULL) {
1029 wpa_printf(MSG_INFO, "IKEV2: No IDi available");
1033 /* IDi - RFC 4306, Sect. 3.5 */
1039 wpabuf_put_data(msg, data->IDi, data->IDi_len);
1066 /* msg | Nr | prf(SK_pi,IDi') */
1068 data->IDi, data->IDi_len, ID_KEY_ID,
1157 /* build IKE_SA_AUTH: HDR, SK {IDi, [CERT,] [CERTREQ,] AUTH} */

Completed in 218 milliseconds