/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.h | 88 size_t id_p_len, u8 *key); 95 const u8 *id_p, size_t id_p_len); 98 const u8 *id_p, size_t id_p_len, 102 const u8 *id_p, size_t id_p_len,
|
eap_eke_common.c | 329 size_t id_p_len, u8 *key) 345 id = os_malloc(id_s_len + id_p_len); 349 os_memcpy(id + id_s_len, id_p, id_p_len); 351 id, id_s_len + id_p_len); 353 id, id_s_len + id_p_len, key, key_len) < 0) { 446 const u8 *id_p, size_t id_p_len) 475 data_len = label_len + id_s_len + id_p_len; 481 os_memcpy(data + label_len + id_s_len, id_p, id_p_len); 500 const u8 *id_p, size_t id_p_len, 516 data_len = label_len + id_s_len + id_p_len + 2 * sess->nonce_len [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 26 size_t id_p_len; member in struct:eap_psk_data 245 data->id_p_len = left; 247 data->id_p, data->id_p_len); 249 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) { 251 data->id_p, data->id_p_len); 271 data->id_p, data->id_p_len); 280 data->id_p, data->id_p_len); 296 buflen = data->id_p_len + sm->server_id_len + 2 * EAP_PSK_RAND_LEN; 302 os_memcpy(buf, data->id_p, data->id_p_len); 303 pos = buf + data->id_p_len; [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 27 size_t id_s_len, id_p_len; member in struct:eap_psk_data 62 data->id_p_len = identity_len; 136 sizeof(*hdr2) + data->id_p_len, EAP_CODE_RESPONSE, 144 wpabuf_put_data(resp, data->id_p, data->id_p_len); 146 buflen = data->id_p_len + data->id_s_len + 2 * EAP_PSK_RAND_LEN; 152 os_memcpy(buf, data->id_p, data->id_p_len); 153 pos = buf + data->id_p_len; 169 data->id_p, data->id_p_len);
|