HomeSort by relevance Sort by last modified time
    Searched refs:identity_len (Results 1 - 25 of 52) sorted by null

1 2 3

  /external/wpa_supplicant_8/src/ap/
eap_user_db.c 116 if (len <= user->identity_len &&
132 size_t identity_len, int phase2)
139 if (identity_len >= sizeof(id_str))
141 os_memcpy(id_str, identity, identity_len);
142 id_str[identity_len] = '\0';
143 for (i = 0; i < identity_len; i++) {
163 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1);
166 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len);
197 user->identity_len = user->password_len;
213 size_t identity_len, int phase2
    [all...]
pmksa_cache_auth.c 130 entry->identity = os_malloc(eapol->identity_len);
132 entry->identity_len = eapol->identity_len;
134 eapol->identity_len);
158 eapol->identity = os_malloc(entry->identity_len);
160 eapol->identity_len = entry->identity_len;
162 entry->identity_len);
165 eapol->identity, eapol->identity_len);
304 entry->identity = os_malloc(old_entry->identity_len);
    [all...]
pmksa_cache_auth.h 27 size_t identity_len; member in struct:rsn_pmksa_cache_entry
ieee802_1x.c 390 size_t identity_len; local
396 identity = eap_get_identity(sm->eap, &identity_len);
402 sm->identity = os_malloc(identity_len + 1);
404 sm->identity_len = 0;
408 os_memcpy(sm->identity, identity, identity_len);
409 sm->identity_len = identity_len;
410 sm->identity[identity_len] = '\0';
575 sm->identity, sm->identity_len)) {
1648 size_t identity_len; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
mschapv2.c 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len,
49 identity, identity_len);
50 username_len = identity_len;
eap_gtc.c 51 size_t password_len, identity_len, len, plen; local
99 identity = eap_get_config_identity(sm, &identity_len);
103 plen += 9 + identity_len + 1;
110 wpabuf_put_data(resp, identity, identity_len);
eap_leap.c 67 size_t identity_len, password_len, len; local
72 identity = eap_get_config_identity(sm, &identity_len);
110 3 + LEAP_RESPONSE_LEN + identity_len,
125 wpabuf_put_data(resp, identity, identity_len);
141 size_t identity_len; local
145 identity = eap_get_config_identity(sm, &identity_len);
157 3 + LEAP_CHALLENGE_LEN + identity_len,
175 wpabuf_put_data(resp, identity, identity_len);
eap_config.h 25 * identity_len - EAP Identity length
27 size_t identity_len; member in struct:eap_peer_config
eap_sim.c 300 size_t identity_len = 0; local
310 identity = eap_get_config_identity(sm, &identity_len);
312 for (realm = identity, realm_len = identity_len;
381 size_t identity_len = 0; local
387 identity_len = data->reauth_id_len;
392 identity_len = data->pseudonym_len;
395 identity = eap_get_config_identity(sm, &identity_len);
420 identity, identity_len);
421 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len,
422 identity, identity_len);
606 size_t identity_len; local
    [all...]
eap_ttls.c 422 size_t identity_len, password_len; local
427 identity = eap_get_config_identity(sm, &identity_len);
432 msg = wpabuf_alloc(identity_len + 1000);
442 identity, identity_len);
476 if (mschapv2_derive_response(identity, identity_len, password,
521 size_t identity_len, password_len; local
526 identity = eap_get_config_identity(sm, &identity_len);
531 msg = wpabuf_alloc(identity_len + 1000);
541 identity, identity_len);
604 size_t identity_len, password_len local
657 size_t identity_len, password_len; local
    [all...]
eap_aka.c 270 size_t identity_len = 0; local
280 identity = eap_get_config_identity(sm, &identity_len);
282 for (realm = identity, realm_len = identity_len;
492 size_t identity_len = 0; local
498 identity_len = data->reauth_id_len;
503 identity_len = data->pseudonym_len;
506 identity = eap_get_config_identity(sm, &identity_len);
521 identity, identity_len);
522 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len,
523 identity, identity_len);
781 size_t identity_len; local
    [all...]
eap_ikev2.c 62 size_t identity_len, password_len; local
64 identity = eap_get_config_identity(sm, &identity_len);
81 data->ikev2.IDr = os_malloc(identity_len);
84 os_memcpy(data->ikev2.IDr, identity, identity_len);
85 data->ikev2.IDr_len = identity_len;
eap.c 1051 conf->identity_len = 1 + imsi_len;
1111 size_t identity_len; local
1121 &identity_len)) != NULL) {
1123 "identity", identity, identity_len);
1126 identity_len = config->anonymous_identity_len;
1128 identity, identity_len);
1131 identity_len = config->identity_len;
1133 identity, identity_len);
1143 identity_len = config->identity_len
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.h 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
109 size_t identity_len,
118 size_t identity_len,
191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
eap_sim_common.c 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
38 len[0] = identity_len;
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
63 len[0] = identity_len;
108 const u8 *identity, size_t identity_len,
118 while (identity_len > 0 && identity[identity_len - 1] == 0) {
121 identity_len--;
124 len[0] = identity_len;
136 identity, identity_len);
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gtc.c 132 (pos2 - pos != (int) sm->identity_len ||
133 os_memcmp(pos, sm->identity, sm->identity_len))) {
138 sm->identity, sm->identity_len);
143 sm->identity_len = pos2 - pos;
144 sm->identity = os_malloc(sm->identity_len);
149 os_memcpy(sm->identity, pos, sm->identity_len);
152 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) {
156 sm->identity, sm->identity_len);
eap_i.h 146 size_t identity_len; member in struct:eap_sm
193 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
eap_server_sim.c 129 } else if (sm->identity && sm->identity_len > 0 &&
263 sm->identity_len, data->nonce_s, data->mk,
418 size_t identity_len; local
437 if (!attr->identity || attr->identity_len == 0) {
443 new_identity = os_malloc(attr->identity_len);
448 os_memcpy(sm->identity, attr->identity, attr->identity_len);
449 sm->identity_len = attr->identity_len;
452 sm->identity, sm->identity_len);
453 username = sim_get_username(sm->identity, sm->identity_len);
    [all...]
eap_server_aka.c 138 username = sim_get_username(sm->identity, sm->identity_len);
370 } else if (sm->identity && sm->identity_len > 0 &&
556 sm->identity_len,
563 sm->identity_len, data->nonce_s,
720 sm->identity, sm->identity_len);
722 username = sim_get_username(sm->identity, sm->identity_len);
786 size_t identity_len; local
826 identity_len = sm->identity_len;
827 while (identity_len > 0 && sm->identity[identity_len - 1] == '\0')
    [all...]
eap_server_fast.c 62 size_t identity_len; member in struct:eap_fast_data
132 size_t identity_len = 0; local
215 identity_len = pos[1];
231 "PAC-Opaque", identity, identity_len);
233 data->identity = os_malloc(identity_len);
235 os_memcpy(data->identity, identity, identity_len);
236 data->identity_len = identity_len;
697 (2 + sm->identity_len) + 8;
717 *pos++ = sm->identity_len;
    [all...]
eap.h 79 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
eap_sim_db.h 93 char * sim_get_username(const u8 *identity, size_t identity_len);
  /external/wpa_supplicant_8/src/radius/
radius_server.h 164 * @identity_len: identity buffer length in octets
174 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
  /external/wpa_supplicant_8/wpa_supplicant/tests/
link_test.c 74 size_t identity_len, int phase2)
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.h 62 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,

Completed in 408 milliseconds

1 2 3