/external/wpa_supplicant_8/src/ap/ |
eap_user_db.c | 116 if (len <= user->identity_len && 132 size_t identity_len, int phase2) 139 if (identity_len >= sizeof(id_str)) 141 os_memcpy(id_str, identity, identity_len); 142 id_str[identity_len] = '\0'; 143 for (i = 0; i < identity_len; i++) { 163 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); 166 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); 197 user->identity_len = user->password_len; 213 size_t identity_len, int phase2 [all...] |
pmksa_cache_auth.c | 130 entry->identity = os_malloc(eapol->identity_len); 132 entry->identity_len = eapol->identity_len; 134 eapol->identity_len); 158 eapol->identity = os_malloc(entry->identity_len); 160 eapol->identity_len = entry->identity_len; 162 entry->identity_len); 165 eapol->identity, eapol->identity_len); 304 entry->identity = os_malloc(old_entry->identity_len); [all...] |
pmksa_cache_auth.h | 27 size_t identity_len; member in struct:rsn_pmksa_cache_entry
|
ieee802_1x.c | 390 size_t identity_len; local 396 identity = eap_get_identity(sm->eap, &identity_len); 402 sm->identity = os_malloc(identity_len + 1); 404 sm->identity_len = 0; 408 os_memcpy(sm->identity, identity, identity_len); 409 sm->identity_len = identity_len; 410 sm->identity[identity_len] = '\0'; 575 sm->identity, sm->identity_len)) { 1648 size_t identity_len; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
mschapv2.c | 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, 49 identity, identity_len); 50 username_len = identity_len;
|
eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 99 identity = eap_get_config_identity(sm, &identity_len); 103 plen += 9 + identity_len + 1; 110 wpabuf_put_data(resp, identity, identity_len);
|
eap_leap.c | 67 size_t identity_len, password_len, len; local 72 identity = eap_get_config_identity(sm, &identity_len); 110 3 + LEAP_RESPONSE_LEN + identity_len, 125 wpabuf_put_data(resp, identity, identity_len); 141 size_t identity_len; local 145 identity = eap_get_config_identity(sm, &identity_len); 157 3 + LEAP_CHALLENGE_LEN + identity_len, 175 wpabuf_put_data(resp, identity, identity_len);
|
eap_config.h | 25 * identity_len - EAP Identity length 27 size_t identity_len; member in struct:eap_peer_config
|
eap_sim.c | 300 size_t identity_len = 0; local 310 identity = eap_get_config_identity(sm, &identity_len); 312 for (realm = identity, realm_len = identity_len; 381 size_t identity_len = 0; local 387 identity_len = data->reauth_id_len; 392 identity_len = data->pseudonym_len; 395 identity = eap_get_config_identity(sm, &identity_len); 420 identity, identity_len); 421 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len, 422 identity, identity_len); 606 size_t identity_len; local [all...] |
eap_ttls.c | 422 size_t identity_len, password_len; local 427 identity = eap_get_config_identity(sm, &identity_len); 432 msg = wpabuf_alloc(identity_len + 1000); 442 identity, identity_len); 476 if (mschapv2_derive_response(identity, identity_len, password, 521 size_t identity_len, password_len; local 526 identity = eap_get_config_identity(sm, &identity_len); 531 msg = wpabuf_alloc(identity_len + 1000); 541 identity, identity_len); 604 size_t identity_len, password_len local 657 size_t identity_len, password_len; local [all...] |
eap_aka.c | 270 size_t identity_len = 0; local 280 identity = eap_get_config_identity(sm, &identity_len); 282 for (realm = identity, realm_len = identity_len; 492 size_t identity_len = 0; local 498 identity_len = data->reauth_id_len; 503 identity_len = data->pseudonym_len; 506 identity = eap_get_config_identity(sm, &identity_len); 521 identity, identity_len); 522 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len, 523 identity, identity_len); 781 size_t identity_len; local [all...] |
eap_ikev2.c | 62 size_t identity_len, password_len; local 64 identity = eap_get_config_identity(sm, &identity_len); 81 data->ikev2.IDr = os_malloc(identity_len); 84 os_memcpy(data->ikev2.IDr, identity, identity_len); 85 data->ikev2.IDr_len = identity_len;
|
eap.c | 1051 conf->identity_len = 1 + imsi_len; 1111 size_t identity_len; local 1121 &identity_len)) != NULL) { 1123 "identity", identity, identity_len); 1126 identity_len = config->anonymous_identity_len; 1128 identity, identity_len); 1131 identity_len = config->identity_len; 1133 identity, identity_len); 1143 identity_len = config->identity_len [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 109 size_t identity_len, 118 size_t identity_len, 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
|
eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 38 len[0] = identity_len; 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 63 len[0] = identity_len; 108 const u8 *identity, size_t identity_len, 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { 121 identity_len--; 124 len[0] = identity_len; 136 identity, identity_len); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gtc.c | 132 (pos2 - pos != (int) sm->identity_len || 133 os_memcmp(pos, sm->identity, sm->identity_len))) { 138 sm->identity, sm->identity_len); 143 sm->identity_len = pos2 - pos; 144 sm->identity = os_malloc(sm->identity_len); 149 os_memcpy(sm->identity, pos, sm->identity_len); 152 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { 156 sm->identity, sm->identity_len);
|
eap_i.h | 146 size_t identity_len; member in struct:eap_sm 193 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
eap_server_sim.c | 129 } else if (sm->identity && sm->identity_len > 0 && 263 sm->identity_len, data->nonce_s, data->mk, 418 size_t identity_len; local 437 if (!attr->identity || attr->identity_len == 0) { 443 new_identity = os_malloc(attr->identity_len); 448 os_memcpy(sm->identity, attr->identity, attr->identity_len); 449 sm->identity_len = attr->identity_len; 452 sm->identity, sm->identity_len); 453 username = sim_get_username(sm->identity, sm->identity_len); [all...] |
eap_server_aka.c | 138 username = sim_get_username(sm->identity, sm->identity_len); 370 } else if (sm->identity && sm->identity_len > 0 && 556 sm->identity_len, 563 sm->identity_len, data->nonce_s, 720 sm->identity, sm->identity_len); 722 username = sim_get_username(sm->identity, sm->identity_len); 786 size_t identity_len; local 826 identity_len = sm->identity_len; 827 while (identity_len > 0 && sm->identity[identity_len - 1] == '\0') [all...] |
eap_server_fast.c | 62 size_t identity_len; member in struct:eap_fast_data 132 size_t identity_len = 0; local 215 identity_len = pos[1]; 231 "PAC-Opaque", identity, identity_len); 233 data->identity = os_malloc(identity_len); 235 os_memcpy(data->identity, identity, identity_len); 236 data->identity_len = identity_len; 697 (2 + sm->identity_len) + 8; 717 *pos++ = sm->identity_len; [all...] |
eap.h | 79 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
eap_sim_db.h | 93 char * sim_get_username(const u8 *identity, size_t identity_len);
|
/external/wpa_supplicant_8/src/radius/ |
radius_server.h | 164 * @identity_len: identity buffer length in octets 174 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
link_test.c | 74 size_t identity_len, int phase2)
|
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.h | 62 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|