HomeSort by relevance Sort by last modified time
    Searched full:identity_len (Results 1 - 25 of 52) sorted by null

1 2 3

  /external/wpa_supplicant_8/src/ap/
eap_user_db.c 118 if (len <= user->identity_len &&
134 size_t identity_len, int phase2)
141 if (identity_len >= sizeof(id_str)) {
143 __func__, (int) identity_len,
147 os_memcpy(id_str, identity, identity_len);
148 id_str[identity_len] = '\0';
149 for (i = 0; i < identity_len; i++) {
166 hapd->tmp_eap_user.identity_len);
171 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1);
174 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len);
    [all...]
pmksa_cache_auth.c 150 entry->identity = os_malloc(eapol->identity_len);
152 entry->identity_len = eapol->identity_len;
154 eapol->identity_len);
189 eapol->identity = os_malloc(entry->identity_len);
191 eapol->identity_len = entry->identity_len;
193 entry->identity_len);
196 eapol->identity, eapol->identity_len);
356 entry->identity = os_malloc(old_entry->identity_len);
    [all...]
pmksa_cache_auth.h 27 size_t identity_len; member in struct:rsn_pmksa_cache_entry
authsrv.c 53 size_t identity_len, int phase2,
60 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2);
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.h 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
109 size_t identity_len,
118 size_t identity_len,
191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
eap_sim_common.c 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
38 len[0] = identity_len;
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
63 len[0] = identity_len;
108 const u8 *identity, size_t identity_len,
118 while (identity_len > 0 && identity[identity_len - 1] == 0) {
121 identity_len--;
124 len[0] = identity_len;
136 identity, identity_len);
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_gtc.c 132 (pos2 - pos != (int) sm->identity_len ||
133 os_memcmp(pos, sm->identity, sm->identity_len))) {
138 sm->identity, sm->identity_len);
143 sm->identity_len = pos2 - pos;
144 sm->identity = os_malloc(sm->identity_len);
149 os_memcpy(sm->identity, pos, sm->identity_len);
152 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) {
156 sm->identity, sm->identity_len);
eap_server_sim.c 129 } else if (sm->identity && sm->identity_len > 0 &&
263 sm->identity_len, data->nonce_s, data->mk,
418 size_t identity_len; local
437 if (!attr->identity || attr->identity_len == 0) {
443 new_identity = os_malloc(attr->identity_len);
448 os_memcpy(sm->identity, attr->identity, attr->identity_len);
449 sm->identity_len = attr->identity_len;
452 sm->identity, sm->identity_len);
453 username = sim_get_username(sm->identity, sm->identity_len);
    [all...]
eap_server_aka.c 138 username = sim_get_username(sm->identity, sm->identity_len);
370 } else if (sm->identity && sm->identity_len > 0 &&
556 sm->identity_len,
563 sm->identity_len, data->nonce_s,
720 sm->identity, sm->identity_len);
722 username = sim_get_username(sm->identity, sm->identity_len);
786 size_t identity_len; local
826 identity_len = sm->identity_len;
827 while (identity_len > 0 && sm->identity[identity_len - 1] == '\0')
    [all...]
eap_sim_db.h 93 char * sim_get_username(const u8 *identity, size_t identity_len);
eap_server_fast.c 62 size_t identity_len; member in struct:eap_fast_data
132 size_t identity_len = 0; local
219 identity_len = elen;
236 "PAC-Opaque", identity, identity_len);
238 data->identity = os_malloc(identity_len);
240 os_memcpy(data->identity, identity, identity_len);
241 data->identity_len = identity_len;
704 (2 + sm->identity_len) + 8;
724 *pos++ = sm->identity_len;
    [all...]
eap_server_ttls.c 87 buf = wpabuf_alloc(1 + 1 + sm->identity_len);
94 if (sm->identity_len <= 255)
95 id_len = sm->identity_len;
655 sm->identity, sm->identity_len,
730 username_len = sm->identity_len;
921 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) {
925 sm->identity, sm->identity_len);
1060 sm->identity_len = parse.user_name_len;
    [all...]
eap_i.h 161 size_t identity_len; member in struct:eap_sm
220 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
  /external/wpa_supplicant_8/src/eap_peer/
mschapv2.c 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len,
49 identity, identity_len);
50 username_len = identity_len;
eap_gtc.c 51 size_t password_len, identity_len, len, plen; local
99 identity = eap_get_config_identity(sm, &identity_len);
103 plen += 9 + identity_len + 1;
110 wpabuf_put_data(resp, identity, identity_len);
eap_leap.c 67 size_t identity_len, password_len, len; local
72 identity = eap_get_config_identity(sm, &identity_len);
110 3 + LEAP_RESPONSE_LEN + identity_len,
125 wpabuf_put_data(resp, identity, identity_len);
141 size_t identity_len; local
145 identity = eap_get_config_identity(sm, &identity_len);
157 3 + LEAP_CHALLENGE_LEN + identity_len,
175 wpabuf_put_data(resp, identity, identity_len);
eap_sim.c 397 size_t identity_len = 0; local
407 identity = eap_get_config_identity(sm, &identity_len);
409 for (realm = identity, realm_len = identity_len;
478 size_t identity_len = 0; local
484 identity_len = data->reauth_id_len;
489 identity_len = data->pseudonym_len;
492 identity = eap_get_config_identity(sm, &identity_len);
517 identity, identity_len);
518 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len,
519 identity, identity_len);
704 size_t identity_len; local
    [all...]
eap_sake.c 72 size_t identity_len, password_len; local
86 identity = eap_get_config_identity(sm, &identity_len);
88 data->peerid = os_malloc(identity_len);
93 os_memcpy(data->peerid, identity, identity_len);
94 data->peerid_len = identity_len;
eap_ttls.c 487 size_t identity_len, password_len;
492 identity = eap_get_config_identity(sm, &identity_len);
497 msg = wpabuf_alloc(identity_len + 1000);
507 identity, identity_len);
541 if (mschapv2_derive_response(identity, identity_len, password,
581 size_t identity_len, password_len;
586 identity = eap_get_config_identity(sm, &identity_len);
591 msg = wpabuf_alloc(identity_len + 1000);
601 identity, identity_len);
665 size_t identity_len, password_len local
    [all...]
eap_aka.c 375 size_t identity_len = 0; local
385 identity = eap_get_config_identity(sm, &identity_len);
387 for (realm = identity, realm_len = identity_len;
597 size_t identity_len = 0; local
603 identity_len = data->reauth_id_len;
608 identity_len = data->pseudonym_len;
611 identity = eap_get_config_identity(sm, &identity_len);
626 identity, identity_len);
627 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len,
628 identity, identity_len);
887 size_t identity_len; local
    [all...]
eap_ikev2.c 62 size_t identity_len, password_len; local
65 identity = eap_get_config_identity(sm, &identity_len);
86 data->ikev2.IDr = os_malloc(identity_len);
89 os_memcpy(data->ikev2.IDr, identity, identity_len);
90 data->ikev2.IDr_len = identity_len;
eap_pax.c 52 size_t identity_len, password_len; local
54 identity = eap_get_config_identity(sm, &identity_len);
72 data->cid = os_malloc(identity_len);
77 os_memcpy(data->cid, identity, identity_len);
78 data->cid_len = identity_len;
eap_psk.c 37 size_t identity_len, password_len; local
57 identity = eap_get_config_identity(sm, &identity_len);
59 data->id_p = os_malloc(identity_len);
61 os_memcpy(data->id_p, identity, identity_len);
62 data->id_p_len = identity_len;
eap_wsc.c 142 size_t identity_len; local
159 identity = eap_get_config_identity(sm, &identity_len);
161 if (identity && identity_len == WSC_ID_REGISTRAR_LEN &&
164 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN &&
169 identity, identity_len);
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.h 70 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,

Completed in 492 milliseconds

1 2 3