/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_sake.c | 30 u8 *peerid; member 88 data->peerid = os_memdup(identity, identity_len); in eap_sake_init() 89 if (data->peerid == NULL) { in eap_sake_init() 109 os_free(data->peerid); in eap_sake_deinit() 175 data->peerid, data->peerid_len); in eap_sake_process_identity() 249 if (data->peerid) in eap_sake_process_challenge() 259 if (data->peerid) { in eap_sake_process_challenge() 262 data->peerid, data->peerid_len); in eap_sake_process_challenge() 271 data->peerid, data->peerid_len, 1, in eap_sake_process_challenge() 316 data->peerid, dat in eap_sake_process_confirm() [all...] |
H A D | eap_eke.c | 22 u8 *peerid; member 88 data->peerid = os_memdup(identity, identity_len); in eap_eke_init() 89 if (data->peerid == NULL) { in eap_eke_init() 138 os_free(data->peerid); in eap_eke_deinit() 333 if (data->peerid) in eap_eke_process_id() 334 wpabuf_put_data(resp, data->peerid, data->peerid_len); in eap_eke_process_id() 405 data->peerid, data->peerid_len, key) < 0) { in eap_eke_process_commit() 432 data->peerid, data->peerid_len) < 0) { in eap_eke_process_commit() 558 data->peerid, data->peerid_len, in eap_eke_process_confirm() 605 data->peerid, dat in eap_eke_process_confirm() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_sake.c | 28 u8 *peerid; member 85 os_free(data->peerid); in eap_sake_reset() 202 data->peerid, data->peerid_len, 0, in eap_sake_build_confirm() 325 os_free(data->peerid); in eap_sake_process_challenge() 326 data->peerid = NULL; in eap_sake_process_challenge() 328 if (attr.peerid) { in eap_sake_process_challenge() 329 data->peerid = os_memdup(attr.peerid, attr.peerid_len); in eap_sake_process_challenge() 330 if (data->peerid == NULL) in eap_sake_process_challenge() 355 data->peerid, dat in eap_sake_process_challenge() [all...] |
H A D | eap_server_eke.c | 23 u8 *peerid; member 105 os_free(data->peerid); in eap_eke_reset() 256 data->peerid, data->peerid_len, data->key) < 0) { in eap_eke_build_commit() 342 data->peerid, data->peerid_len, in eap_eke_build_confirm() 469 os_free(data->peerid); in eap_eke_process_identity() 470 data->peerid = os_memdup(pos, end - pos); in eap_eke_process_identity() 471 if (data->peerid == NULL) { in eap_eke_process_identity() 472 wpa_printf(MSG_INFO, "EAP-EKE: Failed to allocate memory for peerid"); in eap_eke_process_identity() 479 data->peerid, data->peerid_len); in eap_eke_process_identity() 481 if (eap_user_get(sm, data->peerid, dat in eap_eke_process_identity() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_sake.c | 30 u8 *peerid; member 88 data->peerid = os_memdup(identity, identity_len); in eap_sake_init() 89 if (data->peerid == NULL) { in eap_sake_init() 109 os_free(data->peerid); in eap_sake_deinit() 175 data->peerid, data->peerid_len); in eap_sake_process_identity() 249 if (data->peerid) in eap_sake_process_challenge() 259 if (data->peerid) { in eap_sake_process_challenge() 262 data->peerid, data->peerid_len); in eap_sake_process_challenge() 271 data->peerid, data->peerid_len, 1, in eap_sake_process_challenge() 316 data->peerid, dat in eap_sake_process_confirm() [all...] |
H A D | eap_eke.c | 22 u8 *peerid; member 88 data->peerid = os_memdup(identity, identity_len); in eap_eke_init() 89 if (data->peerid == NULL) { in eap_eke_init() 138 os_free(data->peerid); in eap_eke_deinit() 333 if (data->peerid) in eap_eke_process_id() 334 wpabuf_put_data(resp, data->peerid, data->peerid_len); in eap_eke_process_id() 405 data->peerid, data->peerid_len, key) < 0) { in eap_eke_process_commit() 432 data->peerid, data->peerid_len) < 0) { in eap_eke_process_commit() 558 data->peerid, data->peerid_len, in eap_eke_process_confirm() 605 data->peerid, dat in eap_eke_process_confirm() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_sake.c | 28 u8 *peerid; member 85 os_free(data->peerid); in eap_sake_reset() 202 data->peerid, data->peerid_len, 0, in eap_sake_build_confirm() 325 os_free(data->peerid); in eap_sake_process_challenge() 326 data->peerid = NULL; in eap_sake_process_challenge() 328 if (attr.peerid) { in eap_sake_process_challenge() 329 data->peerid = os_memdup(attr.peerid, attr.peerid_len); in eap_sake_process_challenge() 330 if (data->peerid == NULL) in eap_sake_process_challenge() 355 data->peerid, dat in eap_sake_process_challenge() [all...] |
H A D | eap_server_eke.c | 23 u8 *peerid; member 105 os_free(data->peerid); in eap_eke_reset() 256 data->peerid, data->peerid_len, data->key) < 0) { in eap_eke_build_commit() 342 data->peerid, data->peerid_len, in eap_eke_build_confirm() 469 os_free(data->peerid); in eap_eke_process_identity() 470 data->peerid = os_memdup(pos, end - pos); in eap_eke_process_identity() 471 if (data->peerid == NULL) { in eap_eke_process_identity() 472 wpa_printf(MSG_INFO, "EAP-EKE: Failed to allocate memory for peerid"); in eap_eke_process_identity() 479 data->peerid, data->peerid_len); in eap_eke_process_identity() 481 if (eap_user_get(sm, data->peerid, dat in eap_eke_process_identity() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_sake_common.c | 67 attr->peerid = data; in eap_sake_parse_add_attr() 319 * @peerid: PEERID 331 const u8 *peerid, size_t peerid_len, in eap_sake_compute_mic() 346 if (peerid) { in eap_sake_compute_mic() 347 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 366 if (peerid) { in eap_sake_compute_mic() 367 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 328 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) eap_sake_compute_mic() argument
|
H A D | eap_sake_common.h | 65 const u8 *peerid; member 90 const u8 *peerid, size_t peerid_len,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_sake_common.c | 67 attr->peerid = data; in eap_sake_parse_add_attr() 319 * @peerid: PEERID 331 const u8 *peerid, size_t peerid_len, in eap_sake_compute_mic() 346 if (peerid) { in eap_sake_compute_mic() 347 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 366 if (peerid) { in eap_sake_compute_mic() 367 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 328 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) eap_sake_compute_mic() argument
|
H A D | eap_sake_common.h | 65 const u8 *peerid; member 90 const u8 *peerid, size_t peerid_len,
|