/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.h | 37 size_t identity_len, int max_chal, 45 size_t identity_len); 52 size_t identity_len, char *pseudonym); 55 size_t identity_len, char *reauth_id, u16 counter, 58 size_t identity_len, char *reauth_id, 63 size_t identity_len, size_t *len); 68 size_t identity_len; member in struct:eap_sim_reauth 80 size_t identity_len); 85 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, 90 size_t identity_len, cons [all...] |
H A D | eap_sim_db.c | 35 size_t identity_len; member in struct:eap_sim_pseudonym 524 * @identity_len: Length of identity in bytes 548 size_t identity_len, int max_chal, 558 if (identity_len < 2 || identity[0] != EAP_SIM_PERMANENT_PREFIX) { 560 identity, identity_len); 564 identity_len--; 565 for (i = 0; i < identity_len; i++) { 567 identity_len = i; 571 if (identity_len + 1 > sizeof(entry->imsi)) { 573 identity, identity_len); 547 eap_sim_db_get_gsm_triplets(void *priv, const u8 *identity, size_t identity_len, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument 646 eap_sim_db_get_pseudonym(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 686 eap_sim_db_get_pseudonym_id(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 709 eap_sim_db_get_reauth(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 749 eap_sim_db_get_reauth_id(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 788 eap_sim_db_identity_known(void *priv, const u8 *identity, size_t identity_len) argument 900 eap_sim_db_add_pseudonym(void *priv, const u8 *identity, size_t identity_len, char *pseudonym) argument 946 eap_sim_db_add_reauth_data(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter) argument 1007 eap_sim_db_add_reauth(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *mk) argument 1045 eap_sim_db_add_reauth_prime(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument 1076 eap_sim_db_get_permanent(void *priv, const u8 *identity, size_t identity_len, size_t *len) argument 1105 eap_sim_db_get_reauth_entry(void *priv, const u8 *identity, size_t identity_len) argument 1174 eap_sim_db_get_aka_auth(void *priv, const u8 *identity, size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1281 eap_sim_db_resynchronize(void *priv, const u8 *identity, size_t identity_len, const u8 *auts, const u8 *_rand) argument [all...] |
H A D | eap_sim.c | 114 sm->identity_len)) { 243 sm->identity_len, data->nonce_s, data->mk, 395 size_t identity_len; local 402 sm->identity = os_malloc(attr->identity_len); 405 attr->identity_len); 406 sm->identity_len = attr->identity_len; 411 identity_len = 0; 413 if (sm->identity && sm->identity_len > 0 && 416 identity_len 514 size_t identity_len; local 566 size_t identity_len, id2_len; local [all...] |
H A D | eap_aka.c | 275 sm->identity_len)) { 452 sm->identity_len, 459 sm->identity_len, data->nonce_s, 615 size_t identity_len; local 619 identity_len = 0; 623 identity_len = data->reauth->identity_len; 624 } else if (sm->identity && sm->identity_len > 0 && 627 identity_len = sm->identity_len; 806 size_t identity_len; local 958 size_t identity_len, id2_len; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_sim_db.h | 35 size_t identity_len, int max_chal, 43 size_t identity_len); 50 size_t identity_len, char *pseudonym); 53 size_t identity_len, char *reauth_id, u16 counter, 56 size_t identity_len, char *reauth_id, 61 size_t identity_len, size_t *len); 66 size_t identity_len; member in struct:eap_sim_reauth 78 size_t identity_len); 83 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, 88 size_t identity_len, cons [all...] |
H A D | eap_sim_db.c | 36 size_t identity_len; member in struct:eap_sim_pseudonym 525 * @identity_len: Length of identity in bytes 549 size_t identity_len, int max_chal, 559 if (identity_len < 2 || identity[0] != EAP_SIM_PERMANENT_PREFIX) { 561 identity, identity_len); 565 identity_len--; 566 for (i = 0; i < identity_len; i++) { 568 identity_len = i; 572 if (identity_len + 1 > sizeof(entry->imsi)) { 574 identity, identity_len); 548 eap_sim_db_get_gsm_triplets(void *priv, const u8 *identity, size_t identity_len, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument 647 eap_sim_db_get_pseudonym(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 687 eap_sim_db_get_pseudonym_id(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 710 eap_sim_db_get_reauth(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 750 eap_sim_db_get_reauth_id(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 789 eap_sim_db_identity_known(void *priv, const u8 *identity, size_t identity_len) argument 901 eap_sim_db_add_pseudonym(void *priv, const u8 *identity, size_t identity_len, char *pseudonym) argument 947 eap_sim_db_add_reauth_data(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter) argument 1008 eap_sim_db_add_reauth(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *mk) argument 1046 eap_sim_db_add_reauth_prime(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument 1077 eap_sim_db_get_permanent(void *priv, const u8 *identity, size_t identity_len, size_t *len) argument 1106 eap_sim_db_get_reauth_entry(void *priv, const u8 *identity, size_t identity_len) argument 1175 eap_sim_db_get_aka_auth(void *priv, const u8 *identity, size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1282 eap_sim_db_resynchronize(void *priv, const u8 *identity, size_t identity_len, const u8 *auts, const u8 *_rand) argument [all...] |
H A D | eap_server_sim.c | 115 sm->identity_len)) { 244 sm->identity_len, data->nonce_s, data->mk, 396 size_t identity_len; local 403 sm->identity = os_malloc(attr->identity_len); 406 attr->identity_len); 407 sm->identity_len = attr->identity_len; 412 identity_len = 0; 414 if (sm->identity && sm->identity_len > 0 && 417 identity_len 515 size_t identity_len; local 567 size_t identity_len, id2_len; local [all...] |
H A D | eap_server_aka.c | 275 sm->identity_len)) { 452 sm->identity_len, 459 sm->identity_len, data->nonce_s, 615 size_t identity_len; local 619 identity_len = 0; 623 identity_len = data->reauth->identity_len; 624 } else if (sm->identity && sm->identity_len > 0 && 627 identity_len = sm->identity_len; 806 size_t identity_len; local 958 size_t identity_len, id2_len; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_sim_db.h | 35 size_t identity_len, int max_chal, 43 size_t identity_len); 50 size_t identity_len, char *pseudonym); 53 size_t identity_len, char *reauth_id, u16 counter, 56 size_t identity_len, char *reauth_id, 61 size_t identity_len, size_t *len); 66 size_t identity_len; member in struct:eap_sim_reauth 78 size_t identity_len); 83 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, 88 size_t identity_len, cons [all...] |
H A D | eap_sim_db.c | 36 size_t identity_len; member in struct:eap_sim_pseudonym 525 * @identity_len: Length of identity in bytes 549 size_t identity_len, int max_chal, 559 if (identity_len < 2 || identity[0] != EAP_SIM_PERMANENT_PREFIX) { 561 identity, identity_len); 565 identity_len--; 566 for (i = 0; i < identity_len; i++) { 568 identity_len = i; 572 if (identity_len + 1 > sizeof(entry->imsi)) { 574 identity, identity_len); 548 eap_sim_db_get_gsm_triplets(void *priv, const u8 *identity, size_t identity_len, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument 647 eap_sim_db_get_pseudonym(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 687 eap_sim_db_get_pseudonym_id(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 710 eap_sim_db_get_reauth(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 750 eap_sim_db_get_reauth_id(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 789 eap_sim_db_identity_known(void *priv, const u8 *identity, size_t identity_len) argument 901 eap_sim_db_add_pseudonym(void *priv, const u8 *identity, size_t identity_len, char *pseudonym) argument 947 eap_sim_db_add_reauth_data(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter) argument 1008 eap_sim_db_add_reauth(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *mk) argument 1046 eap_sim_db_add_reauth_prime(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument 1077 eap_sim_db_get_permanent(void *priv, const u8 *identity, size_t identity_len, size_t *len) argument 1106 eap_sim_db_get_reauth_entry(void *priv, const u8 *identity, size_t identity_len) argument 1175 eap_sim_db_get_aka_auth(void *priv, const u8 *identity, size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1282 eap_sim_db_resynchronize(void *priv, const u8 *identity, size_t identity_len, const u8 *auts, const u8 *_rand) argument [all...] |
H A D | eap_server_sim.c | 115 sm->identity_len)) { 244 sm->identity_len, data->nonce_s, data->mk, 396 size_t identity_len; local 403 sm->identity = os_malloc(attr->identity_len); 406 attr->identity_len); 407 sm->identity_len = attr->identity_len; 412 identity_len = 0; 414 if (sm->identity && sm->identity_len > 0 && 417 identity_len 515 size_t identity_len; local 567 size_t identity_len, id2_len; local [all...] |
H A D | eap_server_aka.c | 275 sm->identity_len)) { 452 sm->identity_len, 459 sm->identity_len, data->nonce_s, 615 size_t identity_len; local 619 identity_len = 0; 623 identity_len = data->reauth->identity_len; 624 } else if (sm->identity && sm->identity_len > 0 && 627 identity_len = sm->identity_len; 806 size_t identity_len; local 958 size_t identity_len, id2_len; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.h | 35 size_t identity_len, int max_chal, 43 size_t identity_len); 50 size_t identity_len, char *pseudonym); 53 size_t identity_len, char *reauth_id, u16 counter, 56 size_t identity_len, char *reauth_id, 61 size_t identity_len, size_t *len); 66 size_t identity_len; member in struct:eap_sim_reauth 78 size_t identity_len); 83 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, 88 size_t identity_len, cons [all...] |
H A D | eap_sim_db.c | 36 size_t identity_len; member in struct:eap_sim_pseudonym 525 * @identity_len: Length of identity in bytes 549 size_t identity_len, int max_chal, 559 if (identity_len < 2 || identity[0] != EAP_SIM_PERMANENT_PREFIX) { 561 identity, identity_len); 565 identity_len--; 566 for (i = 0; i < identity_len; i++) { 568 identity_len = i; 572 if (identity_len + 1 > sizeof(entry->imsi)) { 574 identity, identity_len); 548 eap_sim_db_get_gsm_triplets(void *priv, const u8 *identity, size_t identity_len, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument 647 eap_sim_db_get_pseudonym(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 687 eap_sim_db_get_pseudonym_id(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 710 eap_sim_db_get_reauth(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 750 eap_sim_db_get_reauth_id(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 789 eap_sim_db_identity_known(void *priv, const u8 *identity, size_t identity_len) argument 901 eap_sim_db_add_pseudonym(void *priv, const u8 *identity, size_t identity_len, char *pseudonym) argument 947 eap_sim_db_add_reauth_data(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter) argument 1008 eap_sim_db_add_reauth(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *mk) argument 1046 eap_sim_db_add_reauth_prime(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument 1077 eap_sim_db_get_permanent(void *priv, const u8 *identity, size_t identity_len, size_t *len) argument 1106 eap_sim_db_get_reauth_entry(void *priv, const u8 *identity, size_t identity_len) argument 1175 eap_sim_db_get_aka_auth(void *priv, const u8 *identity, size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1282 eap_sim_db_resynchronize(void *priv, const u8 *identity, size_t identity_len, const u8 *auts, const u8 *_rand) argument [all...] |
H A D | eap_server_sim.c | 115 sm->identity_len)) { 244 sm->identity_len, data->nonce_s, data->mk, 396 size_t identity_len; local 403 sm->identity = os_malloc(attr->identity_len); 406 attr->identity_len); 407 sm->identity_len = attr->identity_len; 412 identity_len = 0; 414 if (sm->identity && sm->identity_len > 0 && 417 identity_len 515 size_t identity_len; local 567 size_t identity_len, id2_len; local [all...] |
H A D | eap_server_aka.c | 275 sm->identity_len)) { 452 sm->identity_len, 459 sm->identity_len, data->nonce_s, 615 size_t identity_len; local 619 identity_len = 0; 623 identity_len = data->reauth->identity_len; 624 } else if (sm->identity && sm->identity_len > 0 && 627 identity_len = sm->identity_len; 806 size_t identity_len; local 958 size_t identity_len, id2_len; local [all...] |
/external/wpa_supplicant/ |
H A D | eap_gtc.c | 59 size_t password_len, identity_len, len, plen; local 108 identity = eap_get_config_identity(sm, &identity_len); 112 plen += 9 + identity_len + 1; 120 os_memcpy(rpos, identity, identity_len); 121 rpos += identity_len;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | mschapv2.c | 42 void mschapv2_derive_response(const u8 *identity, size_t identity_len, argument 55 identity, identity_len); 56 username_len = identity_len;
|
H A D | eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 105 identity = eap_get_config_identity(sm, &identity_len); 109 plen += 9 + identity_len + 1; 116 wpabuf_put_data(resp, identity, identity_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | mschapv2.c | 42 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument 55 identity, identity_len); 56 username_len = identity_len;
|
H A D | eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 105 identity = eap_get_config_identity(sm, &identity_len); 109 plen += 9 + identity_len + 1; 116 wpabuf_put_data(resp, identity, identity_len);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | mschapv2.c | 42 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument 55 identity, identity_len); 56 username_len = identity_len;
|
H A D | eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 105 identity = eap_get_config_identity(sm, &identity_len); 109 plen += 9 + identity_len + 1; 116 wpabuf_put_data(resp, identity, identity_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | mschapv2.c | 42 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument 55 identity, identity_len); 56 username_len = identity_len;
|
H A D | eap_gtc.c | 57 size_t password_len, identity_len, len, plen; local 105 identity = eap_get_config_identity(sm, &identity_len); 109 plen += 9 + identity_len + 1; 116 wpabuf_put_data(resp, identity, identity_len);
|