HomeSort by relevance Sort by last modified time
    Searched defs:identity_len (Results 1 - 25 of 27) sorted by null

1 2

  /external/wpa_supplicant_8/src/ap/
pmksa_cache_auth.h 27 size_t identity_len; member in struct:rsn_pmksa_cache_entry
hostapd.c 329 hapd->tmp_eap_user.identity_len);
774 size_t identity_len; local
779 &identity_len);
781 identity_len != attr->user_name_len ||
782 os_memcmp(identity, attr->user_name, identity_len)
    [all...]
ieee802_1x.c 307 size_t identity_len; local
319 identity = eap_get_identity(sm->eap, &identity_len);
325 sm->identity = (u8 *) dup_binstr(identity, identity_len);
327 sm->identity_len = 0;
331 sm->identity_len = identity_len;
620 sm->identity, sm->identity_len)) {
1969 size_t identity_len; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_gtc.c 51 size_t password_len, identity_len, len, plen; local
99 identity = eap_get_config_identity(sm, &identity_len);
103 plen += 9 + identity_len + 1;
110 wpabuf_put_data(resp, identity, identity_len);
eap_ikev2.c 62 size_t identity_len, password_len; local
65 identity = eap_get_config_identity(sm, &identity_len);
86 data->ikev2.IDr = os_malloc(identity_len);
89 os_memcpy(data->ikev2.IDr, identity, identity_len);
90 data->ikev2.IDr_len = identity_len;
eap_leap.c 67 size_t identity_len, password_len, len; local
72 identity = eap_get_config_identity(sm, &identity_len);
110 3 + LEAP_RESPONSE_LEN + identity_len,
125 wpabuf_put_data(resp, identity, identity_len);
141 size_t identity_len; local
145 identity = eap_get_config_identity(sm, &identity_len);
157 3 + LEAP_CHALLENGE_LEN + identity_len,
175 wpabuf_put_data(resp, identity, identity_len);
eap_pax.c 52 size_t identity_len, password_len; local
54 identity = eap_get_config_identity(sm, &identity_len);
72 data->cid = os_malloc(identity_len);
77 os_memcpy(data->cid, identity, identity_len);
78 data->cid_len = identity_len;
eap_psk.c 37 size_t identity_len, password_len; local
57 identity = eap_get_config_identity(sm, &identity_len);
59 data->id_p = os_malloc(identity_len);
61 os_memcpy(data->id_p, identity, identity_len);
62 data->id_p_len = identity_len;
eap_sake.c 72 size_t identity_len, password_len; local
86 identity = eap_get_config_identity(sm, &identity_len);
88 data->peerid = os_malloc(identity_len);
93 os_memcpy(data->peerid, identity, identity_len);
94 data->peerid_len = identity_len;
eap_wsc.c 142 size_t identity_len; local
159 identity = eap_get_config_identity(sm, &identity_len);
161 if (identity && identity_len == WSC_ID_REGISTRAR_LEN &&
164 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN &&
169 identity, identity_len);
eap_config.h 25 * identity_len - EAP Identity length
27 size_t identity_len; member in struct:eap_peer_config
eap_eke.c 72 size_t identity_len, password_len; local
86 identity = eap_get_config_identity(sm, &identity_len);
88 data->peerid = os_malloc(identity_len);
93 os_memcpy(data->peerid, identity, identity_len);
94 data->peerid_len = identity_len;
eap_gpsk.c 83 size_t identity_len, password_len; local
97 identity = eap_get_config_identity(sm, &identity_len);
99 data->id_peer = os_malloc(identity_len);
104 os_memcpy(data->id_peer, identity, identity_len);
105 data->id_peer_len = identity_len;
eap_mschapv2.c 156 size_t identity_len, password_len; local
162 identity = eap_get_config_identity(sm, &identity_len);
167 ms_len = sizeof(*ms) + 1 + sizeof(*r) + identity_len;
207 if (mschapv2_derive_response(identity, identity_len, password,
221 wpabuf_put_data(resp, identity, identity_len);
eap_pwd.c 89 size_t identity_len, password_len; local
99 identity = eap_get_config_identity(sm, &identity_len);
116 if ((data->id_peer = os_malloc(identity_len)) == NULL) {
123 os_memcpy(data->id_peer, identity, identity_len);
124 data->id_peer_len = identity_len;
eap_sim.c 397 size_t identity_len = 0; local
407 identity = eap_get_config_identity(sm, &identity_len);
409 for (realm = identity, realm_len = identity_len;
478 size_t identity_len = 0; local
484 identity_len = data->reauth_id_len;
489 identity_len = data->pseudonym_len;
492 identity = eap_get_config_identity(sm, &identity_len);
517 identity, identity_len);
518 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len,
519 identity, identity_len);
704 size_t identity_len; local
    [all...]
eap.c 384 for (i = 0; i < config->identity_len; i++) {
388 if (i < config->identity_len) {
389 realm_len = config->identity_len - i - 1;
1437 size_t identity_len; local
    [all...]
eap_aka.c 375 size_t identity_len = 0; local
385 identity = eap_get_config_identity(sm, &identity_len);
387 for (realm = identity, realm_len = identity_len;
597 size_t identity_len = 0; local
603 identity_len = data->reauth_id_len;
608 identity_len = data->pseudonym_len;
611 identity = eap_get_config_identity(sm, &identity_len);
626 identity, identity_len);
627 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len,
628 identity, identity_len);
887 size_t identity_len; local
    [all...]
eap_ttls.c 487 size_t identity_len, password_len;
492 identity = eap_get_config_identity(sm, &identity_len);
497 msg = wpabuf_alloc(identity_len + 1000);
507 identity, identity_len);
541 if (mschapv2_derive_response(identity, identity_len, password,
581 size_t identity_len, password_len;
586 identity = eap_get_config_identity(sm, &identity_len);
591 msg = wpabuf_alloc(identity_len + 1000);
601 identity, identity_len);
665 size_t identity_len, password_len local
    [all...]
  /external/curl/lib/
curl_ntlm_core.c 603 size_t identity_len = (userlen + domlen) * 2; local
604 unsigned char *identity = malloc(identity_len);
613 result = Curl_hmac_md5(ntlmhash, 16, identity, curlx_uztoui(identity_len),
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sim.c 129 } else if (sm->identity && sm->identity_len > 0 &&
263 sm->identity_len, data->nonce_s, data->mk,
418 size_t identity_len; local
437 if (!attr->identity || attr->identity_len == 0) {
443 new_identity = os_malloc(attr->identity_len);
448 os_memcpy(sm->identity, attr->identity, attr->identity_len);
449 sm->identity_len = attr->identity_len;
452 sm->identity, sm->identity_len);
453 username = sim_get_username(sm->identity, sm->identity_len);
    [all...]
eap_server_aka.c 138 username = sim_get_username(sm->identity, sm->identity_len);
370 } else if (sm->identity && sm->identity_len > 0 &&
556 sm->identity_len,
563 sm->identity_len, data->nonce_s,
720 sm->identity, sm->identity_len);
722 username = sim_get_username(sm->identity, sm->identity_len);
786 size_t identity_len; local
826 identity_len = sm->identity_len;
827 while (identity_len > 0 && sm->identity[identity_len - 1] == '\0')
    [all...]
eap_i.h 161 size_t identity_len; member in struct:eap_sm
220 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
eap_server_fast.c 62 size_t identity_len; member in struct:eap_fast_data
132 size_t identity_len = 0; local
219 identity_len = elen;
236 "PAC-Opaque", identity, identity_len);
238 data->identity = os_malloc(identity_len);
240 os_memcpy(data->identity, identity, identity_len);
241 data->identity_len = identity_len;
704 (2 + sm->identity_len) + 8;
724 *pos++ = sm->identity_len;
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.h 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
109 size_t identity_len,
118 size_t identity_len,
191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs

Completed in 294 milliseconds

1 2