/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.h | 29 size_t identity_len, int max_chal, 37 size_t identity_len); 44 size_t identity_len, char *pseudonym); 47 size_t identity_len, char *reauth_id, u16 counter, 50 size_t identity_len, char *reauth_id, 55 size_t identity_len, size_t *len); 60 size_t identity_len; member in struct:eap_sim_reauth 72 size_t identity_len); 77 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, 82 size_t identity_len, const u8 *auts [all...] |
eap_sim_db.c | 30 size_t identity_len; member in struct:eap_sim_pseudonym 519 * @identity_len: Length of identity in bytes 543 size_t identity_len, int max_chal, 553 if (identity_len < 2 || identity[0] != EAP_SIM_PERMANENT_PREFIX) { 555 identity, identity_len); 559 identity_len--; 560 for (i = 0; i < identity_len; i++) { 562 identity_len = i; 566 if (identity_len + 1 > sizeof(entry->imsi)) { 568 identity, identity_len); [all...] |
eap_server_sim.c | 109 sm->identity_len)) { 238 sm->identity_len, data->nonce_s, data->mk, 390 size_t identity_len; local 397 sm->identity = os_malloc(attr->identity_len); 400 attr->identity_len); 401 sm->identity_len = attr->identity_len; 406 identity_len = 0; 408 if (sm->identity && sm->identity_len > 0 && 411 identity_len = sm->identity_len 509 size_t identity_len; local 561 size_t identity_len, id2_len; local [all...] |
eap_server_aka.c | 268 sm->identity_len)) { 445 sm->identity_len, 452 sm->identity_len, data->nonce_s, 608 size_t identity_len; local 612 identity_len = 0; 616 identity_len = data->reauth->identity_len; 617 } else if (sm->identity && sm->identity_len > 0 && 620 identity_len = sm->identity_len; 799 size_t identity_len; local 951 size_t identity_len, id2_len; local [all...] |
eap_server_gtc.c | 132 (pos2 - pos != (int) sm->identity_len || 133 os_memcmp(pos, sm->identity, sm->identity_len))) { 138 sm->identity, sm->identity_len); 143 sm->identity_len = pos2 - pos; 144 sm->identity = os_malloc(sm->identity_len); 149 os_memcpy(sm->identity, pos, sm->identity_len); 152 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { 156 sm->identity, sm->identity_len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sim_db.h | 37 size_t identity_len, int max_chal, 45 size_t identity_len); 52 size_t identity_len, char *pseudonym); 55 size_t identity_len, char *reauth_id, u16 counter, 58 size_t identity_len, char *reauth_id, 63 size_t identity_len, size_t *len); 68 size_t identity_len; member in struct:eap_sim_reauth 80 size_t identity_len); 85 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, 90 size_t identity_len, const u8 *auts [all...] |
eap_sim_db.c | 35 size_t identity_len; member in struct:eap_sim_pseudonym 524 * @identity_len: Length of identity in bytes 548 size_t identity_len, int max_chal, 558 if (identity_len < 2 || identity[0] != EAP_SIM_PERMANENT_PREFIX) { 560 identity, identity_len); 564 identity_len--; 565 for (i = 0; i < identity_len; i++) { 567 identity_len = i; 571 if (identity_len + 1 > sizeof(entry->imsi)) { 573 identity, identity_len); [all...] |
eap_sim.c | 114 sm->identity_len)) { 243 sm->identity_len, data->nonce_s, data->mk, 395 size_t identity_len; local 402 sm->identity = os_malloc(attr->identity_len); 405 attr->identity_len); 406 sm->identity_len = attr->identity_len; 411 identity_len = 0; 413 if (sm->identity && sm->identity_len > 0 && 416 identity_len = sm->identity_len 514 size_t identity_len; local 566 size_t identity_len, id2_len; local [all...] |
eap_aka.c | 275 sm->identity_len)) { 452 sm->identity_len, 459 sm->identity_len, data->nonce_s, 615 size_t identity_len; local 619 identity_len = 0; 623 identity_len = data->reauth->identity_len; 624 } else if (sm->identity && sm->identity_len > 0 && 627 identity_len = sm->identity_len; 806 size_t identity_len; local 958 size_t identity_len, id2_len; local [all...] |
eap_gtc.c | 138 (pos2 - pos != (int) sm->identity_len || 139 os_memcmp(pos, sm->identity, sm->identity_len))) { 144 sm->identity, sm->identity_len); 149 sm->identity_len = pos2 - pos; 150 sm->identity = os_malloc(sm->identity_len); 155 os_memcpy(sm->identity, pos, sm->identity_len); 158 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { 162 sm->identity, sm->identity_len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.h | 80 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 84 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 89 const u8 *identity, size_t identity_len, 98 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 102 const u8 *identity, size_t identity_len, 115 size_t identity_len, 124 size_t identity_len, 197 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 109 size_t identity_len, 118 size_t identity_len, 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.c | 131 entry->identity = os_malloc(eapol->identity_len); 133 entry->identity_len = eapol->identity_len; 135 eapol->identity_len); 156 eapol->identity = os_malloc(entry->identity_len); 158 eapol->identity_len = entry->identity_len; 160 entry->identity_len); 163 eapol->identity, eapol->identity_len); 295 entry->identity = os_malloc(old_entry->identity_len); [all...] |
pmksa_cache_auth.h | 27 size_t identity_len; member in struct:rsn_pmksa_cache_entry
|
ap_config.c | 583 size_t identity_len, int phase2) 588 if (conf->wps_state && identity_len == WSC_ID_ENROLLEE_LEN && 597 if (conf->wps_state && identity_len == WSC_ID_REGISTRAR_LEN && 617 identity_len >= user->identity_len && 618 os_memcmp(user->identity, identity, user->identity_len) == 625 user->identity_len == identity_len && 626 os_memcmp(user->identity, identity, identity_len) == 0)
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
mschapv2.c | 42 void mschapv2_derive_response(const u8 *identity, size_t identity_len, 55 identity, identity_len); 56 username_len = identity_len;
|
eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 105 identity = eap_get_config_identity(sm, &identity_len); 109 plen += 9 + identity_len + 1; 116 wpabuf_put_data(resp, identity, identity_len);
|
eap_leap.c | 72 size_t identity_len, password_len, len; local 77 identity = eap_get_config_identity(sm, &identity_len); 115 3 + LEAP_RESPONSE_LEN + identity_len, 130 wpabuf_put_data(resp, identity, identity_len); 146 size_t identity_len; local 150 identity = eap_get_config_identity(sm, &identity_len); 162 3 + LEAP_CHALLENGE_LEN + identity_len, 180 wpabuf_put_data(resp, identity, identity_len);
|
/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, 49 identity, identity_len); 50 username_len = identity_len;
|
eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 99 identity = eap_get_config_identity(sm, &identity_len); 103 plen += 9 + identity_len + 1; 110 wpabuf_put_data(resp, identity, identity_len);
|
eap_leap.c | 67 size_t identity_len, password_len, len; local 72 identity = eap_get_config_identity(sm, &identity_len); 110 3 + LEAP_RESPONSE_LEN + identity_len, 125 wpabuf_put_data(resp, identity, identity_len); 141 size_t identity_len; local 145 identity = eap_get_config_identity(sm, &identity_len); 157 3 + LEAP_CHALLENGE_LEN + identity_len, 175 wpabuf_put_data(resp, identity, identity_len);
|
eap_sim.c | 289 size_t identity_len = 0; local 299 identity = eap_get_config_identity(sm, &identity_len); 301 for (realm = identity, realm_len = identity_len; 367 size_t identity_len = 0; local 373 identity_len = data->reauth_id_len; 378 identity_len = data->pseudonym_len; 381 identity = eap_get_config_identity(sm, &identity_len); 406 identity, identity_len); 407 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len, 408 identity, identity_len); 591 size_t identity_len; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius_server.h | 38 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
link_test.c | 74 size_t identity_len, int phase2)
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
link_test.c | 74 size_t identity_len, int phase2)
|