/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.h | 63 const u8 *serverid; member in struct:eap_sake_parse_attr 89 const u8 *serverid, size_t serverid_len,
|
eap_sake_common.c | 62 attr->serverid = pos + 2; 306 * @serverid: SERVERID 307 * @serverid_len: SERVERID length 318 const u8 *serverid, size_t serverid_len, 338 if (serverid) { 339 os_memcpy(pos, serverid, serverid_len); 348 if (serverid) { 349 os_memcpy(pos, serverid, serverid_len);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 32 u8 *serverid; member in struct:eap_sake_data 109 os_free(data->serverid); 228 os_free(data->serverid); 229 data->serverid = NULL; 231 if (attr.serverid) { 232 wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-SAKE: SERVERID", 233 attr.serverid, attr.serverid_len); 234 data->serverid = os_malloc(attr.serverid_len); 235 if (data->serverid == NULL) 237 os_memcpy(data->serverid, attr.serverid, attr.serverid_len) [all...] |
eap_eke.c | 24 u8 *serverid; member in struct:eap_eke_data 138 os_free(data->serverid); 312 os_free(data->serverid); 313 data->serverid = os_malloc(end - pos); 314 if (data->serverid == NULL) { 318 os_memcpy(data->serverid, pos, end - pos); 405 data->serverid, data->serverid_len, 432 data->serverid, data->serverid_len, 556 if (eap_eke_derive_ka(&data->sess, data->serverid, data->serverid_len, 603 if (eap_eke_derive_msk(&data->sess, data->serverid, data->serverid_len [all...] |