/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.h | 66 size_t peerid_len; member in struct:eap_sake_parse_attr 90 const u8 *peerid, size_t peerid_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 31 size_t peerid_len; member in struct:eap_sake_data 94 data->peerid_len = identity_len; 170 2 + data->peerid_len, 177 data->peerid, data->peerid_len); 249 rlen += 2 + data->peerid_len; 262 data->peerid, data->peerid_len); 271 data->peerid, data->peerid_len, 1, 315 data->peerid, data->peerid_len, 0, 344 data->peerid, data->peerid_len, 1,
|
eap_eke.c | 23 size_t peerid_len; member in struct:eap_eke_data 89 data->peerid_len = identity_len; 282 2 + 4 + 1 + data->peerid_len, 294 wpabuf_put_data(resp, data->peerid, data->peerid_len); 364 data->peerid, data->peerid_len, key) < 0) { 391 data->peerid, data->peerid_len) < 0) { 515 data->peerid, data->peerid_len, 562 data->peerid, data->peerid_len,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sake.c | 29 size_t peerid_len; member in struct:eap_sake_data 202 data->peerid, data->peerid_len, 0, 327 data->peerid_len = 0; 329 data->peerid = os_malloc(attr.peerid_len); 332 os_memcpy(data->peerid, attr.peerid, attr.peerid_len); 333 data->peerid_len = attr.peerid_len; 351 data->peerid, data->peerid_len, 1, 388 data->peerid, data->peerid_len, 1,
|
eap_server_eke.c | 24 size_t peerid_len; member in struct:eap_eke_data 256 data->peerid, data->peerid_len, data->key) < 0) { 342 data->peerid, data->peerid_len, 477 data->peerid_len = end - pos; 480 data->peerid, data->peerid_len); 482 if (eap_user_get(sm, data->peerid, data->peerid_len, data->phase2)) { 557 data->peerid, data->peerid_len) < 0) { 646 data->peerid, data->peerid_len,
|
/external/tcpdump/ |
print-ppp.c | 880 int peerid_len, passwd_len, msg_len; local 924 peerid_len = *p; /* Peer-ID Length */ 926 if (length - (p - p0) < peerid_len) 929 for (i = 0; i < peerid_len; i++) { [all...] |