Searched refs:peerid_len (Results 1 – 7 of 7) sorted by relevance
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sake_common.c | 68 attr->peerid_len = len; in eap_sake_parse_add_attr() 319 const u8 *peerid, size_t peerid_len, in eap_sake_compute_mic() argument 327 tmplen = serverid_len + 1 + peerid_len + 1 + eap_len; in eap_sake_compute_mic() 334 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 335 pos += peerid_len; in eap_sake_compute_mic() 354 os_memcpy(pos, peerid, peerid_len); in eap_sake_compute_mic() 355 pos += peerid_len; in eap_sake_compute_mic()
|
D | eap_sake_common.h | 66 size_t peerid_len; member 90 const u8 *peerid, size_t peerid_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_sake.c | 31 size_t peerid_len; member 94 data->peerid_len = identity_len; in eap_sake_init() 169 resp = eap_sake_build_msg(data, id, 2 + data->peerid_len, in eap_sake_process_identity() 176 data->peerid, data->peerid_len); in eap_sake_process_identity() 248 rlen += 2 + data->peerid_len; in eap_sake_process_challenge() 260 data->peerid, data->peerid_len); in eap_sake_process_challenge() 269 data->peerid, data->peerid_len, 1, in eap_sake_process_challenge() 314 data->peerid, data->peerid_len, 0, in eap_sake_process_confirm() 342 data->peerid, data->peerid_len, 1, in eap_sake_process_confirm()
|
D | eap_eke.c | 23 size_t peerid_len; member 94 data->peerid_len = identity_len; in eap_eke_init() 324 2 + 4 + 1 + data->peerid_len, in eap_eke_process_id() 336 wpabuf_put_data(resp, data->peerid, data->peerid_len); in eap_eke_process_id() 407 data->peerid, data->peerid_len, key) < 0) { in eap_eke_process_commit() 434 data->peerid, data->peerid_len) < 0) { in eap_eke_process_commit() 560 data->peerid, data->peerid_len, in eap_eke_process_confirm() 607 data->peerid, data->peerid_len, in eap_eke_process_confirm()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_sake.c | 29 size_t peerid_len; member 202 data->peerid, data->peerid_len, 0, in eap_sake_build_confirm() 327 data->peerid_len = 0; in eap_sake_process_challenge() 329 data->peerid = os_malloc(attr.peerid_len); in eap_sake_process_challenge() 332 os_memcpy(data->peerid, attr.peerid, attr.peerid_len); in eap_sake_process_challenge() 333 data->peerid_len = attr.peerid_len; in eap_sake_process_challenge() 351 data->peerid, data->peerid_len, 1, in eap_sake_process_challenge() 388 data->peerid, data->peerid_len, 1, in eap_sake_process_confirm()
|
D | eap_server_eke.c | 24 size_t peerid_len; member 256 data->peerid, data->peerid_len, data->key) < 0) { in eap_eke_build_commit() 342 data->peerid, data->peerid_len, in eap_eke_build_confirm() 477 data->peerid_len = end - pos; in eap_eke_process_identity() 480 data->peerid, data->peerid_len); in eap_eke_process_identity() 482 if (eap_user_get(sm, data->peerid, data->peerid_len, data->phase2)) { in eap_eke_process_identity() 557 data->peerid, data->peerid_len) < 0) { in eap_eke_process_commit() 646 data->peerid, data->peerid_len, in eap_eke_process_confirm()
|
/external/tcpdump/ |
D | print-ppp.c | 905 int peerid_len, passwd_len, msg_len; in handle_pap() local 949 peerid_len = *p; /* Peer-ID Length */ in handle_pap() 951 if (length - (p - p0) < peerid_len) in handle_pap() 954 for (i = 0; i < peerid_len; i++) { in handle_pap()
|