Home | History | Annotate | Download | only in eap_server

Lines Matching refs:idr

18 			     const u8 *idr, size_t idr_len);
27 os_free(data->IDr);
472 if (pl.idr)
473 ret = ikev2_process_idr(data, pl.idr, pl.idr_len);
497 "try to get IDr from it");
514 const u8 *idr, size_t idr_len)
518 if (idr == NULL) {
519 wpa_printf(MSG_INFO, "IKEV2: No IDr received");
524 wpa_printf(MSG_INFO, "IKEV2: Too short IDr payload");
528 id_type = idr[0];
529 idr += 4;
532 wpa_printf(MSG_DEBUG, "IKEV2: IDr ID Type %d", id_type);
533 wpa_hexdump_ascii(MSG_DEBUG, "IKEV2: IDr", idr, idr_len);
534 if (data->IDr) {
536 os_memcmp(idr, data->IDr, idr_len) != 0) {
537 wpa_printf(MSG_INFO, "IKEV2: IDr differs from the one "
539 wpa_printf(MSG_DEBUG, "IKEV2: Previous IDr ID Type %d",
541 wpa_hexdump_ascii(MSG_DEBUG, "Previous IKEV2: IDr",
542 data->IDr, data->IDr_len);
545 os_free(data->IDr);
547 data->IDr = os_malloc(idr_len);
548 if (data->IDr == NULL)
550 os_memcpy(data->IDr, idr, idr_len);
616 /* msg | Ni | prf(SK_pr,IDr') */
618 data->IDr, data->IDr_len, data->IDr_type,
703 if (ikev2_process_idr(data, pl.idr, pl.idr_len) < 0 ||
746 * [SK{IDr}] */
760 * HDR, SK {IDr, [CERT,] [CERTREQ,] [NFID,] AUTH}
1131 secret = data->get_shared_secret(data->cb_ctx, data->IDr,