Searched defs:identity (Results 126 - 150 of 224) sorted by relevance

123456789

/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dap_config.c367 os_free(user->identity);
625 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, argument
632 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0) {
641 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0) {
654 if (!phase2 && user->identity == NULL) {
661 os_memcmp(user->identity, identity, user->identity_len) ==
669 os_memcmp(user->identity, identity, identity_len) == 0)
H A Dhostapd.c560 u8 *identity; local
562 identity = ieee802_1x_get_identity(sta->eapol_sm,
564 if (identity &&
566 os_memcmp(identity, attr->user_name, identity_len)
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_gpsk.c81 const u8 *identity, *password; local
95 identity = eap_get_config_identity(sm, &identity_len);
96 if (identity) {
102 os_memcpy(data->id_peer, identity, identity_len);
H A Deap_pwd.c82 const u8 *identity, *password; local
91 identity = eap_get_config_identity(sm, &identity_len);
92 if (identity == NULL) {
93 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!");
115 os_memcpy(data->id_peer, identity, identity_len);
221 os_memcpy(data->id_server, id->identity, data->id_server_len);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server.c83 * @identity: Identity (User-Name) of the user
84 * @identity_len: Length of identity in bytes
89 * selected based on the specified identity. sm->user and
93 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, argument
109 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity,
133 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) {
543 * stores the identity into sm->identity.
607 * Start reauthentication with identity request even though we know the
608 * previously used identity
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/
H A Deapol_auth_sm.c761 const char *identity, const char *radius_cui)
842 if (identity) {
843 sm->identity = (u8 *) os_strdup(identity);
844 if (sm->identity)
845 sm->identity_len = os_strlen(identity);
997 static int eapol_sm_get_eap_user(void *ctx, const u8 *identity, argument
1002 return sm->eapol->cb.get_eap_user(sm->eapol->conf.ctx, identity,
758 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr, int flags, const struct wpabuf *assoc_wps_ie, const struct wpabuf *assoc_p2p_ie, void *sta_ctx, const char *identity, const char *radius_cui) argument
/external/stlport/stlport/stl/
H A D_function.h321 // identity is an extension: it is not part of the standard.
322 template <class _Tp> struct identity : public _STLP_PRIV _Identity<_Tp> {}; struct in inherits:_STLP_PRIV_Identity
/external/webkit/Source/WebCore/platform/graphics/chromium/
H A DGraphicsLayerChromium.cpp577 TransformationMatrix identity; local
578 m_layer->setTransform(identity);
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_sim_common.c33 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument
42 addr[0] = identity;
61 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument
67 addr[0] = identity;
113 const u8 *identity, size_t identity_len,
123 while (identity_len > 0 && identity[identity_len - 1] == 0) {
125 "character from the end of identity");
128 addr[0] = identity;
141 identity, identity_len);
281 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument
112 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
330 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_mschapv2.c162 const u8 *identity, *password; local
167 identity = eap_get_config_identity(sm, &identity_len);
169 if (identity == NULL || password == NULL)
212 mschapv2_derive_response(identity, identity_len, password,
221 wpabuf_put_data(resp, identity, identity_len);
H A Deap_sim.c353 const u8 *identity = NULL; local
359 identity = data->reauth_id;
364 identity = data->pseudonym;
368 identity = eap_get_config_identity(sm, &identity_len);
369 if (identity) {
391 if (identity) {
393 identity, identity_len);
395 identity, identity_len);
577 const u8 *identity; local
630 identity
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_aka.c274 if (eap_sim_db_identity_known(sm->eap_sim_db_priv, sm->identity,
280 * RFC 4187, Chap. 4.1.4 recommends that identity from EAP is
282 * identity.
451 sm->identity,
458 eap_sim_derive_keys_reauth(data->counter, sm->identity,
614 const u8 *identity; local
618 identity = NULL;
622 identity = data->reauth->identity;
624 } else if (sm->identity
805 const u8 *identity; local
957 const u8 *identity, *id2; local
[all...]
H A Deap_sim_db.c34 u8 *identity; member in struct:eap_sim_pseudonym
431 os_free(p->identity);
439 os_free(r->identity);
523 * @identity: User name identity
524 * @identity_len: Length of identity in bytes
547 int eap_sim_db_get_gsm_triplets(void *priv, const u8 *identity, argument
558 if (identity_len < 2 || identity[0] != EAP_SIM_PERMANENT_PREFIX) {
559 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM DB: unexpected identity",
560 identity, identity_le
646 eap_sim_db_get_pseudonym(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument
686 eap_sim_db_get_pseudonym_id(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument
709 eap_sim_db_get_reauth(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument
749 eap_sim_db_get_reauth_id(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument
788 eap_sim_db_identity_known(void *priv, const u8 *identity, size_t identity_len) argument
900 eap_sim_db_add_pseudonym(void *priv, const u8 *identity, size_t identity_len, char *pseudonym) argument
946 eap_sim_db_add_reauth_data(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter) argument
1007 eap_sim_db_add_reauth(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *mk) argument
1045 eap_sim_db_add_reauth_prime(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
1076 eap_sim_db_get_permanent(void *priv, const u8 *identity, size_t identity_len, size_t *len) argument
1105 eap_sim_db_get_reauth_entry(void *priv, const u8 *identity, size_t identity_len) argument
1174 eap_sim_db_get_aka_auth(void *priv, const u8 *identity, size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
1281 eap_sim_db_resynchronize(void *priv, const u8 *identity, size_t identity_len, const u8 *auts, const u8 *_rand) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dhostapd.c560 u8 *identity; local
562 identity = ieee802_1x_get_identity(sta->eapol_sm,
564 if (identity &&
566 os_memcmp(identity, attr->user_name, identity_len)
H A Dieee802_11.c314 char *identity = NULL; local
377 psk, &has_psk, &identity, &radius_cui);
426 sta->identity = identity;
427 identity = NULL;
492 os_free(identity);
H A Dsta_info.h100 char *identity; /* User-Name from RADIUS */ member in struct:sta_info
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument
37 addr[0] = identity;
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument
62 addr[0] = identity;
108 const u8 *identity, size_t identity_len,
118 while (identity_len > 0 && identity[identity_len - 1] == 0) {
120 "character from the end of identity");
123 addr[0] = identity;
136 identity, identity_len);
276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_mschapv2.c157 const u8 *identity, *password; local
162 identity = eap_get_config_identity(sm, &identity_len);
164 if (identity == NULL || password == NULL)
207 if (mschapv2_derive_response(identity, identity_len, password,
221 wpabuf_put_data(resp, identity, identity_len);
H A Deap_sim.c299 const u8 *identity = NULL; local
309 /* Look for the realm of the permanent identity */
310 identity = eap_get_config_identity(sm, &identity_len);
311 if (identity) {
312 for (realm = identity, realm_len = identity_len;
380 const u8 *identity = NULL; local
386 identity = data->reauth_id;
391 identity = data->pseudonym;
395 identity = eap_get_config_identity(sm, &identity_len);
396 if (identity) {
605 const u8 *identity; local
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dhostapd.c560 u8 *identity; local
562 identity = ieee802_1x_get_identity(sta->eapol_sm,
564 if (identity &&
566 os_memcmp(identity, attr->user_name, identity_len)
H A Dieee802_11.c314 char *identity = NULL; local
377 psk, &has_psk, &identity, &radius_cui);
426 sta->identity = identity;
427 identity = NULL;
492 os_free(identity);
H A Dsta_info.h100 char *identity; /* User-Name from RADIUS */ member in struct:sta_info
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument
37 addr[0] = identity;
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument
62 addr[0] = identity;
108 const u8 *identity, size_t identity_len,
118 while (identity_len > 0 && identity[identity_len - 1] == 0) {
120 "character from the end of identity");
123 addr[0] = identity;
136 identity, identity_len);
276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_mschapv2.c157 const u8 *identity, *password; local
162 identity = eap_get_config_identity(sm, &identity_len);
164 if (identity == NULL || password == NULL)
207 if (mschapv2_derive_response(identity, identity_len, password,
221 wpabuf_put_data(resp, identity, identity_len);
H A Deap_sim.c299 const u8 *identity = NULL; local
309 /* Look for the realm of the permanent identity */
310 identity = eap_get_config_identity(sm, &identity_len);
311 if (identity) {
312 for (realm = identity, realm_len = identity_len;
380 const u8 *identity = NULL; local
386 identity = data->reauth_id;
391 identity = data->pseudonym;
395 identity = eap_get_config_identity(sm, &identity_len);
396 if (identity) {
605 const u8 *identity; local
[all...]

Completed in 295 milliseconds

123456789