/external/wpa_supplicant/ |
eap_defs.h | 43 EAP_TYPE_IDENTITY = 1 /* RFC 3748 */,
|
eap_peap.c | 296 case EAP_TYPE_IDENTITY: 476 in_decrypted[4] == EAP_TYPE_IDENTITY) { 525 in_decrypted[4] == EAP_TYPE_IDENTITY) {
|
eapol_test.c | 161 pos[0] == EAP_TYPE_IDENTITY) { 438 *pos = EAP_TYPE_IDENTITY; 458 case EAP_TYPE_IDENTITY: return "Identity";
|
eap.c | 638 sm->reqMethod == EAP_TYPE_IDENTITY) 642 sm->reqMethod != EAP_TYPE_IDENTITY && 1001 *pos++ = EAP_TYPE_IDENTITY; [all...] |
eap_ttls.c | 537 case EAP_TYPE_IDENTITY: 1150 in_decrypted[sizeof(*hdr)] = EAP_TYPE_IDENTITY; [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_defs.h | 47 EAP_TYPE_IDENTITY = 1 /* RFC 3748 */,
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_defs.h | 47 EAP_TYPE_IDENTITY = 1 /* RFC 3748 */,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_identity.c | 73 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, req_data_len, 94 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, 122 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, 162 EAP_VENDOR_IETF, EAP_TYPE_IDENTITY,
|
eap.c | 348 if (sm->currentMethod == EAP_TYPE_IDENTITY || 1060 next = EAP_TYPE_IDENTITY; 1085 if (sm->m && sm->currentMethod != EAP_TYPE_IDENTITY && 1110 if (sm->user && sm->currentMethod == EAP_TYPE_IDENTITY && 1112 sm->user->methods[0].method == EAP_TYPE_IDENTITY) 1121 sm->user->methods[0].method == EAP_TYPE_IDENTITY) { 1155 return method == EAP_TYPE_IDENTITY ? TRUE : FALSE; [all...] |
eap_peap.c | 1207 if (eap_peap_phase2_init(sm, data, EAP_TYPE_IDENTITY)) [all...] |
eap_fast.c | [all...] |
eap_ttls.c | 1086 if (eap_ttls_phase2_eap_init(sm, data, EAP_TYPE_IDENTITY) < 0) [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_identity.c | 73 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, req_data_len, 94 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, 122 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, 162 EAP_VENDOR_IETF, EAP_TYPE_IDENTITY,
|
eap_server.c | 355 if (sm->currentMethod == EAP_TYPE_IDENTITY || 1076 next = EAP_TYPE_IDENTITY; 1101 if (sm->m && sm->currentMethod != EAP_TYPE_IDENTITY && 1126 if (sm->user && sm->currentMethod == EAP_TYPE_IDENTITY && 1128 sm->user->methods[0].method == EAP_TYPE_IDENTITY) 1137 sm->user->methods[0].method == EAP_TYPE_IDENTITY) { 1171 return method == EAP_TYPE_IDENTITY ? TRUE : FALSE; [all...] |
eap_server_peap.c | 1183 if (eap_peap_phase2_init(sm, data, EAP_TYPE_IDENTITY)) [all...] |
eap_server_fast.c | [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
eapol_test.c | 195 pos[0] == EAP_TYPE_IDENTITY) { 492 *pos = EAP_TYPE_IDENTITY; 512 case EAP_TYPE_IDENTITY: return "Identity";
|
/external/wpa_supplicant_8/wpa_supplicant/ |
eapol_test.c | 197 pos[0] == EAP_TYPE_IDENTITY) { 520 *pos = EAP_TYPE_IDENTITY; 540 case EAP_TYPE_IDENTITY: return "Identity";
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap.c | 633 sm->reqMethod == EAP_TYPE_IDENTITY) 637 sm->reqMethod != EAP_TYPE_IDENTITY && 1010 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, identity_len, [all...] |
eap_peap.c | 631 case EAP_TYPE_IDENTITY: 812 eap_get_type(in_decrypted) == EAP_TYPE_IDENTITY) { [all...] |
eap_ttls.c | 593 case EAP_TYPE_IDENTITY: [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 631 case EAP_TYPE_IDENTITY: 812 eap_get_type(in_decrypted) == EAP_TYPE_IDENTITY) { [all...] |
eap.c | 642 sm->reqMethod == EAP_TYPE_IDENTITY) 646 sm->reqMethod != EAP_TYPE_IDENTITY && 1019 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, identity_len, [all...] |
eap_ttls.c | 593 case EAP_TYPE_IDENTITY: [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.c | 138 if (eap_get_type(sm->eap_if->eapReqData) == EAP_TYPE_IDENTITY)
|