/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.h | 27 size_t identity_len; member in struct:rsn_pmksa_cache_entry
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 105 identity = eap_get_config_identity(sm, &identity_len); 109 plen += 9 + identity_len + 1; 116 wpabuf_put_data(resp, identity, identity_len);
|
eap_config.h | 31 * identity_len - EAP Identity length 33 size_t identity_len; member in struct:eap_peer_config
|
eap_ikev2.c | 68 size_t identity_len, password_len; local 70 identity = eap_get_config_identity(sm, &identity_len); 87 data->ikev2.IDr = os_malloc(identity_len); 90 os_memcpy(data->ikev2.IDr, identity, identity_len); 91 data->ikev2.IDr_len = identity_len;
|
eap_leap.c | 72 size_t identity_len, password_len, len; local 77 identity = eap_get_config_identity(sm, &identity_len); 115 3 + LEAP_RESPONSE_LEN + identity_len, 130 wpabuf_put_data(resp, identity, identity_len); 146 size_t identity_len; local 150 identity = eap_get_config_identity(sm, &identity_len); 162 3 + LEAP_CHALLENGE_LEN + identity_len, 180 wpabuf_put_data(resp, identity, identity_len);
|
eap_pax.c | 58 size_t identity_len, password_len; local 60 identity = eap_get_config_identity(sm, &identity_len); 78 data->cid = os_malloc(identity_len); 83 os_memcpy(data->cid, identity, identity_len); 84 data->cid_len = identity_len;
|
eap_psk.c | 41 size_t identity_len, password_len; local 61 identity = eap_get_config_identity(sm, &identity_len); 63 data->id_p = os_malloc(identity_len); 65 os_memcpy(data->id_p, identity, identity_len); 66 data->id_p_len = identity_len;
|
eap_sake.c | 77 size_t identity_len, password_len; local 91 identity = eap_get_config_identity(sm, &identity_len); 93 data->peerid = os_malloc(identity_len); 98 os_memcpy(data->peerid, identity, identity_len); 99 data->peerid_len = identity_len;
|
eap_wsc.c | 72 size_t identity_len; local 85 identity = eap_get_config_identity(sm, &identity_len); 87 if (identity && identity_len == WSC_ID_REGISTRAR_LEN && 90 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN && 95 identity, identity_len);
|
eap_gpsk.c | 87 size_t identity_len, password_len; local 100 identity = eap_get_config_identity(sm, &identity_len); 102 data->id_peer = os_malloc(identity_len); 107 os_memcpy(data->id_peer, identity, identity_len); 108 data->id_peer_len = identity_len;
|
eap_aka.c | 465 size_t identity_len = 0; local 471 identity_len = data->reauth_id_len; 476 identity_len = data->pseudonym_len; 479 identity = eap_get_config_identity(sm, &identity_len); 494 identity, identity_len); 495 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len, 496 identity, identity_len); 754 size_t identity_len; local 860 identity_len = data->last_eap_identity_len; 863 identity_len = data->pseudonym_len [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 99 identity = eap_get_config_identity(sm, &identity_len); 103 plen += 9 + identity_len + 1; 110 wpabuf_put_data(resp, identity, identity_len);
|
eap_config.h | 25 * identity_len - EAP Identity length 27 size_t identity_len; member in struct:eap_peer_config
|
eap_ikev2.c | 62 size_t identity_len, password_len; local 64 identity = eap_get_config_identity(sm, &identity_len); 81 data->ikev2.IDr = os_malloc(identity_len); 84 os_memcpy(data->ikev2.IDr, identity, identity_len); 85 data->ikev2.IDr_len = identity_len;
|
eap_leap.c | 67 size_t identity_len, password_len, len; local 72 identity = eap_get_config_identity(sm, &identity_len); 110 3 + LEAP_RESPONSE_LEN + identity_len, 125 wpabuf_put_data(resp, identity, identity_len); 141 size_t identity_len; local 145 identity = eap_get_config_identity(sm, &identity_len); 157 3 + LEAP_CHALLENGE_LEN + identity_len, 175 wpabuf_put_data(resp, identity, identity_len);
|
eap_pax.c | 51 size_t identity_len, password_len; local 53 identity = eap_get_config_identity(sm, &identity_len); 71 data->cid = os_malloc(identity_len); 76 os_memcpy(data->cid, identity, identity_len); 77 data->cid_len = identity_len;
|
eap_psk.c | 36 size_t identity_len, password_len; local 56 identity = eap_get_config_identity(sm, &identity_len); 58 data->id_p = os_malloc(identity_len); 60 os_memcpy(data->id_p, identity, identity_len); 61 data->id_p_len = identity_len;
|
eap_sake.c | 72 size_t identity_len, password_len; local 86 identity = eap_get_config_identity(sm, &identity_len); 88 data->peerid = os_malloc(identity_len); 93 os_memcpy(data->peerid, identity, identity_len); 94 data->peerid_len = identity_len;
|
eap_wsc.c | 132 size_t identity_len; local 147 identity = eap_get_config_identity(sm, &identity_len); 149 if (identity && identity_len == WSC_ID_REGISTRAR_LEN && 152 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN && 157 identity, identity_len);
|
eap_gpsk.c | 82 size_t identity_len, password_len; local 95 identity = eap_get_config_identity(sm, &identity_len); 97 data->id_peer = os_malloc(identity_len); 102 os_memcpy(data->id_peer, identity, identity_len); 103 data->id_peer_len = identity_len;
|
eap_pwd.c | 82 size_t identity_len, password_len; local 90 identity = eap_get_config_identity(sm, &identity_len); 107 if ((data->id_peer = os_malloc(identity_len)) == NULL) { 114 os_memcpy(data->id_peer, identity, identity_len); 115 data->id_peer_len = identity_len;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 29 size_t identity_len, int max_chal, 37 size_t identity_len); 44 size_t identity_len, char *pseudonym); 47 size_t identity_len, char *reauth_id, u16 counter, 50 size_t identity_len, char *reauth_id, 55 size_t identity_len, size_t *len); 60 size_t identity_len; member in struct:eap_sim_reauth 72 size_t identity_len); 77 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, 82 size_t identity_len, const u8 *auts [all...] |
eap_server_sim.c | 109 sm->identity_len)) { 238 sm->identity_len, data->nonce_s, data->mk, 390 size_t identity_len; local 397 sm->identity = os_malloc(attr->identity_len); 400 attr->identity_len); 401 sm->identity_len = attr->identity_len; 406 identity_len = 0; 408 if (sm->identity && sm->identity_len > 0 && 411 identity_len = sm->identity_len 509 size_t identity_len; local 561 size_t identity_len, id2_len; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim_db.h | 37 size_t identity_len, int max_chal, 45 size_t identity_len); 52 size_t identity_len, char *pseudonym); 55 size_t identity_len, char *reauth_id, u16 counter, 58 size_t identity_len, char *reauth_id, 63 size_t identity_len, size_t *len); 68 size_t identity_len; member in struct:eap_sim_reauth 80 size_t identity_len); 85 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, 90 size_t identity_len, const u8 *auts [all...] |
eap_sim.c | 114 sm->identity_len)) { 243 sm->identity_len, data->nonce_s, data->mk, 395 size_t identity_len; local 402 sm->identity = os_malloc(attr->identity_len); 405 attr->identity_len); 406 sm->identity_len = attr->identity_len; 411 identity_len = 0; 413 if (sm->identity && sm->identity_len > 0 && 416 identity_len = sm->identity_len 514 size_t identity_len; local 566 size_t identity_len, id2_len; local [all...] |