/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.h | 27 size_t identity_len; member in struct:rsn_pmksa_cache_entry
|
ieee802_1x.c | 309 size_t identity_len; local 322 identity = eap_get_identity(sm->eap, &identity_len); 328 sm->identity = (u8 *) dup_binstr(identity, identity_len); 330 sm->identity_len = 0; 334 sm->identity_len = identity_len; 624 sm->identity, sm->identity_len)) { 2011 size_t identity_len; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 99 identity = eap_get_config_identity(sm, &identity_len); 103 plen += 9 + identity_len + 1; 110 wpabuf_put_data(resp, identity, identity_len);
|
eap_ikev2.c | 62 size_t identity_len, password_len; local 65 identity = eap_get_config_identity(sm, &identity_len); 86 data->ikev2.IDr = os_memdup(identity, identity_len); 89 data->ikev2.IDr_len = identity_len;
|
eap_leap.c | 67 size_t identity_len, password_len, len; local 72 identity = eap_get_config_identity(sm, &identity_len); 110 3 + LEAP_RESPONSE_LEN + identity_len, 129 wpabuf_put_data(resp, identity, identity_len); 145 size_t identity_len; local 149 identity = eap_get_config_identity(sm, &identity_len); 161 3 + LEAP_CHALLENGE_LEN + identity_len, 179 wpabuf_put_data(resp, identity, identity_len);
|
eap_pax.c | 52 size_t identity_len, password_len; local 54 identity = eap_get_config_identity(sm, &identity_len); 72 data->cid = os_memdup(identity, identity_len); 77 data->cid_len = identity_len;
|
eap_psk.c | 37 size_t identity_len, password_len; local 57 identity = eap_get_config_identity(sm, &identity_len); 59 data->id_p = os_malloc(identity_len); 61 os_memcpy(data->id_p, identity, identity_len); 62 data->id_p_len = identity_len;
|
eap_sake.c | 72 size_t identity_len, password_len; local 86 identity = eap_get_config_identity(sm, &identity_len); 88 data->peerid = os_memdup(identity, identity_len); 93 data->peerid_len = identity_len;
|
eap_wsc.c | 142 size_t identity_len; local 159 identity = eap_get_config_identity(sm, &identity_len); 161 if (identity && identity_len == WSC_ID_REGISTRAR_LEN && 164 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN && 169 identity, identity_len);
|
eap_config.h | 25 * identity_len - EAP Identity length 27 size_t identity_len; member in struct:eap_peer_config
|
eap_eke.c | 72 size_t identity_len, password_len; local 86 identity = eap_get_config_identity(sm, &identity_len); 88 data->peerid = os_memdup(identity, identity_len); 93 data->peerid_len = identity_len;
|
eap_gpsk.c | 83 size_t identity_len, password_len; local 97 identity = eap_get_config_identity(sm, &identity_len); 99 data->id_peer = os_memdup(identity, identity_len); 104 data->id_peer_len = identity_len;
|
eap_mschapv2.c | 154 size_t identity_len, password_len; local 160 identity = eap_get_config_identity(sm, &identity_len); 165 ms_len = sizeof(*ms) + 1 + sizeof(*r) + identity_len; 205 if (mschapv2_derive_response(identity, identity_len, password, 219 wpabuf_put_data(resp, identity, identity_len);
|
eap_pwd.c | 89 size_t identity_len, password_len; local 99 identity = eap_get_config_identity(sm, &identity_len); 116 if ((data->id_peer = os_malloc(identity_len)) == NULL) { 123 os_memcpy(data->id_peer, identity, identity_len); 124 data->id_peer_len = identity_len;
|
eap_sim.c | 404 size_t identity_len = 0; local 414 identity = eap_get_config_identity(sm, &identity_len); 416 for (realm = identity, realm_len = identity_len; 486 size_t identity_len = 0; local 492 identity_len = data->reauth_id_len; 497 identity_len = data->pseudonym_len; 500 identity = eap_get_config_identity(sm, &identity_len); 525 identity, identity_len); 526 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len, 527 identity, identity_len); 711 size_t identity_len; local [all...] |
eap_aka.c | 384 size_t identity_len = 0; local 394 identity = eap_get_config_identity(sm, &identity_len); 396 for (realm = identity, realm_len = identity_len; 616 size_t identity_len = 0; local 622 identity_len = data->reauth_id_len; 627 identity_len = data->pseudonym_len; 630 identity = eap_get_config_identity(sm, &identity_len); 645 identity, identity_len); 646 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len, 647 identity, identity_len); 916 size_t identity_len; local [all...] |
eap_proxy_qmi_oc.c | 1660 u8 identity_len = 0, ret; local [all...] |
eap_ttls.c | 487 size_t identity_len, password_len; 492 identity = eap_get_config_identity(sm, &identity_len); 497 msg = wpabuf_alloc(identity_len + 1000); 507 identity, identity_len); 541 if (mschapv2_derive_response(identity, identity_len, password, 581 size_t identity_len, password_len; 586 identity = eap_get_config_identity(sm, &identity_len); 591 msg = wpabuf_alloc(identity_len + 1000); 601 identity, identity_len); 681 size_t identity_len, password_len local [all...] |
/external/curl/lib/ |
curl_ntlm_core.c | 667 size_t identity_len; local 678 identity_len = (userlen + domlen) * 2; 679 identity = malloc(identity_len); 687 result = Curl_hmac_md5(ntlmhash, 16, identity, curlx_uztoui(identity_len),
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sim.c | 129 } else if (sm->identity && sm->identity_len > 0 && 263 sm->identity_len, data->nonce_s, data->mk, 418 size_t identity_len; local 437 if (!attr->identity || attr->identity_len == 0) { 443 new_identity = os_malloc(attr->identity_len); 448 os_memcpy(sm->identity, attr->identity, attr->identity_len); 449 sm->identity_len = attr->identity_len; 452 sm->identity, sm->identity_len); 453 username = sim_get_username(sm->identity, sm->identity_len); [all...] |
eap_server_aka.c | 138 username = sim_get_username(sm->identity, sm->identity_len); 370 } else if (sm->identity && sm->identity_len > 0 && 556 sm->identity_len, 563 sm->identity_len, data->nonce_s, 720 sm->identity, sm->identity_len); 722 username = sim_get_username(sm->identity, sm->identity_len); 786 size_t identity_len; local 826 identity_len = sm->identity_len; 827 while (identity_len > 0 && sm->identity[identity_len - 1] == '\0') [all...] |
eap_i.h | 161 size_t identity_len; member in struct:eap_sm 221 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
eap_server_fast.c | 62 size_t identity_len; member in struct:eap_fast_data 132 size_t identity_len = 0; local 219 identity_len = elen; 236 "PAC-Opaque", identity, identity_len); 238 data->identity = os_malloc(identity_len); 240 os_memcpy(data->identity, identity, identity_len); 241 data->identity_len = identity_len; 702 (2 + sm->identity_len) + 8; 722 *pos++ = sm->identity_len; [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 109 size_t identity_len, 118 size_t identity_len, 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm_i.h | 155 size_t identity_len; member in struct:eapol_state_machine
|