/external/wpa_supplicant_8/src/ap/ |
authsrv.c | 53 size_t identity_len, int phase2, 59 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2);
|
ieee802_1x.c | 284 size_t identity_len; local 290 identity = eap_get_identity(sm->eap, &identity_len); 296 sm->identity = (u8 *) dup_binstr(identity, identity_len); 298 sm->identity_len = 0; 302 sm->identity_len = identity_len; 563 sm->identity, sm->identity_len)) { 1814 size_t identity_len; local [all...] |
ap_config.h | 117 size_t identity_len; member in struct:hostapd_eap_user
|
hostapd.h | 429 size_t identity_len, int phase2);
|
hostapd.c | 315 hapd->tmp_eap_user.identity_len); 636 size_t identity_len; local 638 &identity_len); 640 identity_len == attr->user_name_len && 641 os_memcmp(identity, attr->user_name, identity_len) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_mschapv2.c | 156 size_t identity_len, password_len; local 162 identity = eap_get_config_identity(sm, &identity_len); 167 ms_len = sizeof(*ms) + 1 + sizeof(*r) + identity_len; 207 if (mschapv2_derive_response(identity, identity_len, password, 221 wpabuf_put_data(resp, identity, identity_len);
|
eap_pax.c | 51 size_t identity_len, password_len; local 53 identity = eap_get_config_identity(sm, &identity_len); 71 data->cid = os_malloc(identity_len); 76 os_memcpy(data->cid, identity, identity_len); 77 data->cid_len = identity_len;
|
eap_psk.c | 37 size_t identity_len, password_len; local 57 identity = eap_get_config_identity(sm, &identity_len); 59 data->id_p = os_malloc(identity_len); 61 os_memcpy(data->id_p, identity, identity_len); 62 data->id_p_len = identity_len;
|
eap_sake.c | 72 size_t identity_len, password_len; local 86 identity = eap_get_config_identity(sm, &identity_len); 88 data->peerid = os_malloc(identity_len); 93 os_memcpy(data->peerid, identity, identity_len); 94 data->peerid_len = identity_len;
|
eap_wsc.c | 146 size_t identity_len; local 163 identity = eap_get_config_identity(sm, &identity_len); 165 if (identity && identity_len == WSC_ID_REGISTRAR_LEN && 168 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN && 173 identity, identity_len);
|
eap_eke.c | 72 size_t identity_len, password_len; local 86 identity = eap_get_config_identity(sm, &identity_len); 88 data->peerid = os_malloc(identity_len); 93 os_memcpy(data->peerid, identity, identity_len); 94 data->peerid_len = identity_len;
|
eap_gpsk.c | 83 size_t identity_len, password_len; local 97 identity = eap_get_config_identity(sm, &identity_len); 99 data->id_peer = os_malloc(identity_len); 104 os_memcpy(data->id_peer, identity, identity_len); 105 data->id_peer_len = identity_len;
|
eap_pwd.c | 87 size_t identity_len, password_len; local 96 identity = eap_get_config_identity(sm, &identity_len); 113 if ((data->id_peer = os_malloc(identity_len)) == NULL) { 120 os_memcpy(data->id_peer, identity, identity_len); 121 data->id_peer_len = identity_len;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_wsc.c | 85 if (sm->identity && sm->identity_len == WSC_ID_REGISTRAR_LEN && 89 else if (sm->identity && sm->identity_len == WSC_ID_ENROLLEE_LEN && 95 sm->identity, sm->identity_len);
|
eap_server_identity.c | 137 sm->identity_len = len;
|
eap_server_ttls.c | 691 username_len = sm->identity_len; 870 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { 874 sm->identity, sm->identity_len); 1008 sm->identity_len = parse.user_name_len;
|
eap_server.c | 84 * @identity_len: Length of identity in bytes 93 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, 110 identity_len, phase2, user) != 0) { 1192 if (eap_user_get(sm, sm->identity, sm->identity_len, 0) != 0) { [all...] |
eap_server_ikev2.c | 40 IDr_len = sm->identity_len;
|
eap_server_peap.c | 952 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { 956 sm->identity, sm->identity_len);
|
eap_server_mschapv2.c | 344 username_len = sm->identity_len;
|
eap_sim_db.c | 1143 * @identity_len: Length of identity [all...] |
/external/chromium_org/third_party/boringssl/src/ssl/ |
s3_clnt.c | 1897 size_t identity_len; local [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.c | 848 sm->identity_len = os_strlen(identity); 1001 size_t identity_len, int phase2, 1008 identity_len, phase2, user);
|
/external/wpa_supplicant_8/src/radius/ |
radius_server.c | 284 * @identity_len: identity buffer length in octets 294 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len, [all...] |
/external/openssl/ssl/ |
s3_clnt.c | 2477 size_t identity_len; local [all...] |