| /src/external/bsd/wpa/dist/src/ap/ |
| eap_user_db.c | 120 if (len <= user->identity_len && 136 size_t identity_len, int phase2) 144 if (identity_len >= sizeof(id_str)) { 146 __func__, (int) identity_len, 150 os_memcpy(id_str, identity, identity_len); 151 id_str[identity_len] = '\0'; 152 for (i = 0; i < identity_len; i++) { 169 hapd->tmp_eap_user.identity_len); 174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); 177 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); [all...] |
| pmksa_cache_auth.c | 153 entry->identity = os_malloc(eapol->identity_len); 155 entry->identity_len = eapol->identity_len; 157 eapol->identity_len); 192 eapol->identity = os_malloc(entry->identity_len); 194 eapol->identity_len = entry->identity_len; 196 entry->identity_len); 199 eapol->identity, eapol->identity_len); 418 entry->identity = os_malloc(old_entry->identity_len); [all...] |
| pmksa_cache_auth.h | 31 size_t identity_len; member in struct:rsn_pmksa_cache_entry
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_gtc.c | 132 (pos2 - pos != (int) sm->identity_len || 133 os_memcmp(pos, sm->identity, sm->identity_len))) { 138 sm->identity, sm->identity_len); 143 sm->identity_len = pos2 - pos; 144 sm->identity = os_memdup(pos, sm->identity_len); 151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { 155 sm->identity, sm->identity_len);
|
| eap_server_sim.c | 119 username = sim_get_username(sm->identity, sm->identity_len); 148 } else if (sm->identity && sm->identity_len > 0 && 289 sm->identity_len, data->nonce_s, data->mk, 454 size_t identity_len; local 470 (!attr->identity || attr->identity_len == 0)) 477 if (!attr->identity || attr->identity_len == 0) { 483 new_identity = os_malloc(attr->identity_len); 488 os_memcpy(sm->identity, attr->identity, attr->identity_len); 489 sm->identity_len = attr->identity_len; [all...] |
| eap_server_aka.c | 160 size_t identity_len = sm->identity_len; local 164 identity_len = os_strlen(sm->sim_aka_permanent); 169 username = sim_get_username(identity, identity_len); 411 } else if (sm->identity && sm->identity_len > 0 && 604 sm->identity_len, 611 sm->identity_len, data->nonce_s, 777 sm->identity, sm->identity_len); 779 username = sim_get_username(sm->identity, sm->identity_len); 826 } else if (sm->identity_len > 1 && sm->identity[0] == '\0') 911 size_t identity_len; local [all...] |
| eap_i.h | 160 size_t identity_len; member in struct:eap_sm 204 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
| eap_server_fast.c | 62 size_t identity_len; member in struct:eap_fast_data 132 size_t identity_len = 0; local 219 identity_len = elen; 236 "PAC-Opaque", identity, identity_len); 238 data->identity = os_malloc(identity_len); 240 os_memcpy(data->identity, identity, identity_len); 241 data->identity_len = identity_len; 693 (2 + sm->identity_len) + 8; 713 *pos++ = sm->identity_len; [all...] |
| eap_server_teap.c | 68 size_t identity_len; member in struct:eap_teap_data 152 size_t identity_len = 0; local 237 identity_len = elen; 255 identity, identity_len); 257 data->identity = os_malloc(identity_len); 259 os_memcpy(data->identity, identity, identity_len); 260 data->identity_len = identity_len; 520 data->identity_len = os_strlen(subject); 739 (2 + sm->identity_len) + 8 [all...] |
| eap_sim_db.h | 93 char * sim_get_username(const u8 *identity, size_t identity_len);
|
| eap_server_ttls.c | 87 buf = wpabuf_alloc(1 + 1 + sm->identity_len); 94 if (sm->identity_len <= 255) 95 id_len = sm->identity_len; 656 sm->identity, sm->identity_len, 734 username_len = sm->identity_len; 928 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { 932 sm->identity, sm->identity_len); 1070 sm->identity_len = parse.user_name_len; 1242 sm->identity_len = 0; 1248 sm->identity_len = id_len [all...] |
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| mschapv2.c | 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, 49 identity, identity_len); 50 username_len = identity_len;
|
| eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 99 identity = eap_get_config_identity(sm, &identity_len); 103 plen += 9 + identity_len + 1; 110 wpabuf_put_data(resp, identity, identity_len);
|
| eap_leap.c | 67 size_t identity_len, password_len, len; local 72 identity = eap_get_config_identity(sm, &identity_len); 110 3 + LEAP_RESPONSE_LEN + identity_len, 129 wpabuf_put_data(resp, identity, identity_len); 145 size_t identity_len; local 149 identity = eap_get_config_identity(sm, &identity_len); 161 3 + LEAP_CHALLENGE_LEN + identity_len, 179 wpabuf_put_data(resp, identity, identity_len);
|
| eap_sim.c | 164 data->mk_identity = os_memdup(sm->identity, sm->identity_len); 165 data->mk_identity_len = sm->identity_len; 435 size_t identity_len = 0; local 445 identity = eap_get_config_identity(sm, &identity_len); 447 for (realm = identity, realm_len = identity_len; 515 const u8 *identity, size_t identity_len, 523 identity, identity_len); 525 imsi_buf = wpabuf_alloc_copy(identity, identity_len); 566 size_t identity_len = 0; local 576 identity_len = data->reauth_id_len 849 size_t identity_len; local [all...] |
| eap_config.h | 293 * identity_len - EAP Identity length 295 size_t identity_len; member in struct:eap_peer_config
|
| eap_aka.c | 146 data->mk_identity = os_memdup(sm->identity, sm->identity_len); 147 data->mk_identity_len = sm->identity_len; 409 size_t identity_len = 0; local 419 identity = eap_get_config_identity(sm, &identity_len); 421 for (realm = identity, realm_len = identity_len; 647 const u8 *identity, size_t identity_len, 655 identity, identity_len); 657 imsi_buf = wpabuf_alloc_copy(identity, identity_len); 699 size_t identity_len = 0; local 708 identity_len = data->reauth_id_len 1059 size_t identity_len; local [all...] |
| eap.c | 453 for (i = 0; i < config->identity_len; i++) { 457 if (i < config->identity_len) { 458 realm_len = config->identity_len - i - 1; 1623 conf->identity_len = 1 + imsi_len; 1676 size_t identity_len; local 1687 &identity_len)) != NULL) { 1689 "identity", identity, identity_len); 1692 identity_len = config->anonymous_identity_len; 1694 identity, identity_len); 1697 identity_len = config->machine_identity_len [all...] |
| eap_ttls.c | 543 size_t identity_len, password_len; 548 identity = eap_get_config_identity(sm, &identity_len); 553 msg = wpabuf_alloc(identity_len + 1000); 563 identity, identity_len); 597 if (mschapv2_derive_response(identity, identity_len, password, 637 size_t identity_len, password_len; 642 identity = eap_get_config_identity(sm, &identity_len); 647 msg = wpabuf_alloc(identity_len + 1000); 657 identity, identity_len); 737 size_t identity_len, password_len local [all...] |
| eap_ikev2.c | 62 size_t identity_len, password_len; local 65 identity = eap_get_config_identity(sm, &identity_len); 86 data->ikev2.IDr = os_memdup(identity, identity_len); 89 data->ikev2.IDr_len = identity_len;
|
| eap_sake.c | 72 size_t identity_len, password_len; local 86 identity = eap_get_config_identity(sm, &identity_len); 88 data->peerid = os_memdup(identity, identity_len); 93 data->peerid_len = identity_len;
|
| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 109 size_t identity_len, 118 size_t identity_len, 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
|
| eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 38 len[0] = identity_len; 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 63 len[0] = identity_len; 108 const u8 *identity, size_t identity_len, 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { 121 identity_len--; 124 len[0] = identity_len; 136 identity, identity_len); [all...] |
| /src/external/bsd/wpa/dist/src/radius/ |
| radius_server.h | 65 * @identity_len: identity buffer length in octets 75 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
| /src/external/bsd/wpa/dist/src/eapol_auth/ |
| eapol_auth_sm.h | 51 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|