/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_eke_common.c | 305 const u8 *id_s, size_t id_s_len, const u8 *id_p, in eap_eke_derive_key() 322 id = os_malloc(id_s_len + id_p_len); in eap_eke_derive_key() 325 os_memcpy(id, id_s, id_s_len); in eap_eke_derive_key() 326 os_memcpy(id + id_s_len, id_p, id_p_len); in eap_eke_derive_key() 328 id, id_s_len + id_p_len); in eap_eke_derive_key() 330 id, id_s_len + id_p_len, key, key_len) < 0) { in eap_eke_derive_key() 423 const u8 *id_s, size_t id_s_len, in eap_eke_derive_ke_ki() 453 data_len = label_len + id_s_len + id_p_len; in eap_eke_derive_ke_ki() 458 os_memcpy(data + label_len, id_s, id_s_len); in eap_eke_derive_ke_ki() 459 os_memcpy(data + label_len + id_s_len, id_ in eap_eke_derive_ke_ki() 303 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) eap_eke_derive_key() argument 422 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) eap_eke_derive_ke_ki() argument 476 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) eap_eke_derive_ka() argument 521 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_eke_derive_msk() argument [all...] |
H A D | eap_eke_common.h | 87 const u8 *id_s, size_t id_s_len, const u8 *id_p, 94 const u8 *id_s, size_t id_s_len, 97 const u8 *id_s, size_t id_s_len, 101 const u8 *id_s, size_t id_s_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_eke_common.c | 305 const u8 *id_s, size_t id_s_len, const u8 *id_p, in eap_eke_derive_key() 322 id = os_malloc(id_s_len + id_p_len); in eap_eke_derive_key() 325 os_memcpy(id, id_s, id_s_len); in eap_eke_derive_key() 326 os_memcpy(id + id_s_len, id_p, id_p_len); in eap_eke_derive_key() 328 id, id_s_len + id_p_len); in eap_eke_derive_key() 330 id, id_s_len + id_p_len, key, key_len) < 0) { in eap_eke_derive_key() 423 const u8 *id_s, size_t id_s_len, in eap_eke_derive_ke_ki() 453 data_len = label_len + id_s_len + id_p_len; in eap_eke_derive_ke_ki() 458 os_memcpy(data + label_len, id_s, id_s_len); in eap_eke_derive_ke_ki() 459 os_memcpy(data + label_len + id_s_len, id_ in eap_eke_derive_ke_ki() 303 eap_eke_derive_key(struct eap_eke_session *sess, const u8 *password, size_t password_len, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, u8 *key) eap_eke_derive_key() argument 422 eap_eke_derive_ke_ki(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len) eap_eke_derive_ke_ki() argument 476 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) eap_eke_derive_ka() argument 521 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_eke_derive_msk() argument [all...] |
H A D | eap_eke_common.h | 87 const u8 *id_s, size_t id_s_len, const u8 *id_p, 94 const u8 *id_s, size_t id_s_len, 97 const u8 *id_s, size_t id_s_len, 101 const u8 *id_s, size_t id_s_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_psk.c | 27 size_t id_s_len, id_p_len; member 118 data->id_s_len = len - sizeof(*hdr1); in eap_psk_process_1() 119 data->id_s = os_memdup(hdr1 + 1, data->id_s_len); in eap_psk_process_1() 122 "ID_S (len=%lu)", (unsigned long) data->id_s_len); in eap_psk_process_1() 127 data->id_s, data->id_s_len); in eap_psk_process_1() 146 buflen = data->id_p_len + data->id_s_len + 2 * EAP_PSK_RAND_LEN; in eap_psk_process_1() 154 os_memcpy(pos, data->id_s, data->id_s_len); in eap_psk_process_1() 155 pos += data->id_s_len; in eap_psk_process_1() 228 buflen = data->id_s_len + EAP_PSK_RAND_LEN; in eap_psk_process_3() 232 os_memcpy(buf, data->id_s, data->id_s_len); in eap_psk_process_3() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_psk.c | 27 size_t id_s_len, id_p_len; member 118 data->id_s_len = len - sizeof(*hdr1); in eap_psk_process_1() 119 data->id_s = os_memdup(hdr1 + 1, data->id_s_len); in eap_psk_process_1() 122 "ID_S (len=%lu)", (unsigned long) data->id_s_len); in eap_psk_process_1() 127 data->id_s, data->id_s_len); in eap_psk_process_1() 146 buflen = data->id_p_len + data->id_s_len + 2 * EAP_PSK_RAND_LEN; in eap_psk_process_1() 154 os_memcpy(pos, data->id_s, data->id_s_len); in eap_psk_process_1() 155 pos += data->id_s_len; in eap_psk_process_1() 228 buflen = data->id_s_len + EAP_PSK_RAND_LEN; in eap_psk_process_3() 232 os_memcpy(buf, data->id_s, data->id_s_len); in eap_psk_process_3() [all...] |