Home
last modified time | relevance | path

Searched refs:id_p_len (Results 1 - 8 of 8) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_eke_common.c306 size_t id_p_len, u8 *key) in eap_eke_derive_key()
322 id = os_malloc(id_s_len + id_p_len); in eap_eke_derive_key()
326 os_memcpy(id + id_s_len, id_p, id_p_len); in eap_eke_derive_key()
328 id, id_s_len + id_p_len); in eap_eke_derive_key()
330 id, id_s_len + id_p_len, key, key_len) < 0) { in eap_eke_derive_key()
424 const u8 *id_p, size_t id_p_len) in eap_eke_derive_ke_ki()
453 data_len = label_len + id_s_len + id_p_len; in eap_eke_derive_ke_ki()
459 os_memcpy(data + label_len + id_s_len, id_p, id_p_len); in eap_eke_derive_ke_ki()
478 const u8 *id_p, size_t id_p_len, in eap_eke_derive_ka()
494 data_len = label_len + id_s_len + id_p_len in eap_eke_derive_ka()
303 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) eap_eke_derive_key() argument
422 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) eap_eke_derive_ke_ki() argument
476 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) eap_eke_derive_ka() argument
521 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_eke_derive_msk() argument
[all...]
H A Deap_eke_common.h88 size_t id_p_len, u8 *key);
95 const u8 *id_p, size_t id_p_len);
98 const u8 *id_p, size_t id_p_len,
102 const u8 *id_p, size_t id_p_len,
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_eke_common.c306 size_t id_p_len, u8 *key) in eap_eke_derive_key()
322 id = os_malloc(id_s_len + id_p_len); in eap_eke_derive_key()
326 os_memcpy(id + id_s_len, id_p, id_p_len); in eap_eke_derive_key()
328 id, id_s_len + id_p_len); in eap_eke_derive_key()
330 id, id_s_len + id_p_len, key, key_len) < 0) { in eap_eke_derive_key()
424 const u8 *id_p, size_t id_p_len) in eap_eke_derive_ke_ki()
453 data_len = label_len + id_s_len + id_p_len; in eap_eke_derive_ke_ki()
459 os_memcpy(data + label_len + id_s_len, id_p, id_p_len); in eap_eke_derive_ke_ki()
478 const u8 *id_p, size_t id_p_len, in eap_eke_derive_ka()
494 data_len = label_len + id_s_len + id_p_len in eap_eke_derive_ka()
303 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) eap_eke_derive_key() argument
422 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) eap_eke_derive_ke_ki() argument
476 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) eap_eke_derive_ka() argument
521 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_eke_derive_msk() argument
[all...]
H A Deap_eke_common.h88 size_t id_p_len, u8 *key);
95 const u8 *id_p, size_t id_p_len);
98 const u8 *id_p, size_t id_p_len,
102 const u8 *id_p, size_t id_p_len,
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_psk.c26 size_t id_p_len; member
245 data->id_p_len = left; in eap_psk_process_2()
247 data->id_p, data->id_p_len); in eap_psk_process_2()
249 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) { in eap_psk_process_2()
251 data->id_p, data->id_p_len); in eap_psk_process_2()
271 data->id_p, data->id_p_len); in eap_psk_process_2()
280 data->id_p, data->id_p_len); in eap_psk_process_2()
296 buflen = data->id_p_len + sm->server_id_len + 2 * EAP_PSK_RAND_LEN; in eap_psk_process_2()
302 os_memcpy(buf, data->id_p, data->id_p_len); in eap_psk_process_2()
303 pos = buf + data->id_p_len; in eap_psk_process_2()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_psk.c26 size_t id_p_len; member
245 data->id_p_len = left; in eap_psk_process_2()
247 data->id_p, data->id_p_len); in eap_psk_process_2()
249 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) { in eap_psk_process_2()
251 data->id_p, data->id_p_len); in eap_psk_process_2()
271 data->id_p, data->id_p_len); in eap_psk_process_2()
280 data->id_p, data->id_p_len); in eap_psk_process_2()
296 buflen = data->id_p_len + sm->cfg->server_id_len + 2 * EAP_PSK_RAND_LEN; in eap_psk_process_2()
302 os_memcpy(buf, data->id_p, data->id_p_len); in eap_psk_process_2()
303 pos = buf + data->id_p_len; in eap_psk_process_2()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
H A Deap_psk.c27 size_t id_s_len, id_p_len; member
62 data->id_p_len = identity_len; in eap_psk_init()
136 sizeof(*hdr2) + data->id_p_len, EAP_CODE_RESPONSE, in eap_psk_process_1()
144 wpabuf_put_data(resp, data->id_p, data->id_p_len); in eap_psk_process_1()
146 buflen = data->id_p_len + data->id_s_len + 2 * EAP_PSK_RAND_LEN; in eap_psk_process_1()
152 os_memcpy(buf, data->id_p, data->id_p_len); in eap_psk_process_1()
153 pos = buf + data->id_p_len; in eap_psk_process_1()
169 data->id_p, data->id_p_len); in eap_psk_process_1()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
H A Deap_psk.c27 size_t id_s_len, id_p_len; member
62 data->id_p_len = identity_len; in eap_psk_init()
136 sizeof(*hdr2) + data->id_p_len, EAP_CODE_RESPONSE, in eap_psk_process_1()
144 wpabuf_put_data(resp, data->id_p, data->id_p_len); in eap_psk_process_1()
146 buflen = data->id_p_len + data->id_s_len + 2 * EAP_PSK_RAND_LEN; in eap_psk_process_1()
152 os_memcpy(buf, data->id_p, data->id_p_len); in eap_psk_process_1()
153 pos = buf + data->id_p_len; in eap_psk_process_1()
169 data->id_p, data->id_p_len); in eap_psk_process_1()

Completed in 7 milliseconds