/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_psk.c | 27 size_t id_s_len, id_p_len; member in struct:eap_psk_data 118 data->id_s_len = len - sizeof(*hdr1); 119 data->id_s = os_malloc(data->id_s_len); 122 "ID_S (len=%lu)", (unsigned long) data->id_s_len); 126 os_memcpy(data->id_s, (u8 *) (hdr1 + 1), data->id_s_len); 128 data->id_s, data->id_s_len); 147 buflen = data->id_p_len + data->id_s_len + 2 * EAP_PSK_RAND_LEN; 155 os_memcpy(pos, data->id_s, data->id_s_len); 156 pos += data->id_s_len; 229 buflen = data->id_s_len [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_psk.c | 27 size_t id_s_len, id_p_len; member in struct:eap_psk_data 118 data->id_s_len = len - sizeof(*hdr1); 119 data->id_s = os_malloc(data->id_s_len); 122 "ID_S (len=%lu)", (unsigned long) data->id_s_len); 126 os_memcpy(data->id_s, (u8 *) (hdr1 + 1), data->id_s_len); 128 data->id_s, data->id_s_len); 147 buflen = data->id_p_len + data->id_s_len + 2 * EAP_PSK_RAND_LEN; 155 os_memcpy(pos, data->id_s, data->id_s_len); 156 pos += data->id_s_len; 229 buflen = data->id_s_len [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_psk.c | 27 size_t id_s_len, id_p_len; member in struct:eap_psk_data 118 data->id_s_len = len - sizeof(*hdr1); 119 data->id_s = os_malloc(data->id_s_len); 122 "ID_S (len=%lu)", (unsigned long) data->id_s_len); 126 os_memcpy(data->id_s, (u8 *) (hdr1 + 1), data->id_s_len); 128 data->id_s, data->id_s_len); 147 buflen = data->id_p_len + data->id_s_len + 2 * EAP_PSK_RAND_LEN; 155 os_memcpy(pos, data->id_s, data->id_s_len); 156 pos += data->id_s_len; 229 buflen = data->id_s_len [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 328 const u8 *id_s, size_t id_s_len, const u8 *id_p, 345 id = os_malloc(id_s_len + id_p_len); 348 os_memcpy(id, id_s, id_s_len); 349 os_memcpy(id + id_s_len, id_p, id_p_len); 351 id, id_s_len + id_p_len); 353 id, id_s_len + id_p_len, key, key_len) < 0) { 445 const u8 *id_s, size_t id_s_len, 475 data_len = label_len + id_s_len + id_p_len; 480 os_memcpy(data + label_len, id_s, id_s_len); 481 os_memcpy(data + label_len + id_s_len, id_ 326 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) argument 444 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 498 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 543 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.c | 328 const u8 *id_s, size_t id_s_len, const u8 *id_p, 345 id = os_malloc(id_s_len + id_p_len); 348 os_memcpy(id, id_s, id_s_len); 349 os_memcpy(id + id_s_len, id_p, id_p_len); 351 id, id_s_len + id_p_len); 353 id, id_s_len + id_p_len, key, key_len) < 0) { 445 const u8 *id_s, size_t id_s_len, 475 data_len = label_len + id_s_len + id_p_len; 480 os_memcpy(data + label_len, id_s, id_s_len); 481 os_memcpy(data + label_len + id_s_len, id_ 326 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) argument 444 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 498 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 543 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.c | 328 const u8 *id_s, size_t id_s_len, const u8 *id_p, 345 id = os_malloc(id_s_len + id_p_len); 348 os_memcpy(id, id_s, id_s_len); 349 os_memcpy(id + id_s_len, id_p, id_p_len); 351 id, id_s_len + id_p_len); 353 id, id_s_len + id_p_len, key, key_len) < 0) { 445 const u8 *id_s, size_t id_s_len, 475 data_len = label_len + id_s_len + id_p_len; 480 os_memcpy(data + label_len, id_s, id_s_len); 481 os_memcpy(data + label_len + id_s_len, id_ 326 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) argument 444 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) argument 498 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument 543 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |