/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.h | 66 size_t peerid_len; member in struct:eap_sake_parse_attr 90 const u8 *peerid, size_t peerid_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 31 size_t peerid_len; member in struct:eap_sake_data 94 data->peerid_len = identity_len; 169 resp = eap_sake_build_msg(data, id, 2 + data->peerid_len, 176 data->peerid, data->peerid_len); 248 rlen += 2 + data->peerid_len; 260 data->peerid, data->peerid_len); 269 data->peerid, data->peerid_len, 1, 314 data->peerid, data->peerid_len, 0, 342 data->peerid, data->peerid_len, 1,
|
eap_eke.c | 23 size_t peerid_len; member in struct:eap_eke_data 94 data->peerid_len = identity_len; 324 2 + 4 + 1 + data->peerid_len, 336 wpabuf_put_data(resp, data->peerid, data->peerid_len); 407 data->peerid, data->peerid_len, key) < 0) { 434 data->peerid, data->peerid_len) < 0) { 560 data->peerid, data->peerid_len, 607 data->peerid, data->peerid_len,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sake.c | 29 size_t peerid_len; member in struct:eap_sake_data 202 data->peerid, data->peerid_len, 0, 327 data->peerid_len = 0; 329 data->peerid = os_malloc(attr.peerid_len); 332 os_memcpy(data->peerid, attr.peerid, attr.peerid_len); 333 data->peerid_len = attr.peerid_len; 351 data->peerid, data->peerid_len, 1, 388 data->peerid, data->peerid_len, 1,
|
eap_server_eke.c | 24 size_t peerid_len; member in struct:eap_eke_data 256 data->peerid, data->peerid_len, data->key) < 0) { 342 data->peerid, data->peerid_len, 477 data->peerid_len = end - pos; 480 data->peerid, data->peerid_len); 482 if (eap_user_get(sm, data->peerid, data->peerid_len, data->phase2)) { 557 data->peerid, data->peerid_len) < 0) { 646 data->peerid, data->peerid_len,
|
/external/tcpdump/ |
print-ppp.c | 905 int peerid_len, passwd_len, msg_len; local 949 peerid_len = *p; /* Peer-ID Length */ 951 if (length - (p - p0) < peerid_len) 954 for (i = 0; i < peerid_len; i++) { [all...] |