/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_config.c | 367 os_free(user->identity); 625 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, argument 632 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0) { 641 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0) { 654 if (!phase2 && user->identity == NULL) { 661 os_memcmp(user->identity, identity, user->identity_len) == 669 os_memcmp(user->identity, identity, identity_len) == 0)
|
H A D | hostapd.c | 560 u8 *identity; local 562 identity = ieee802_1x_get_identity(sta->eapol_sm, 564 if (identity && 566 os_memcmp(identity, attr->user_name, identity_len)
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_gpsk.c | 81 const u8 *identity, *password; local 95 identity = eap_get_config_identity(sm, &identity_len); 96 if (identity) { 102 os_memcpy(data->id_peer, identity, identity_len);
|
H A D | eap_pwd.c | 82 const u8 *identity, *password; local 91 identity = eap_get_config_identity(sm, &identity_len); 92 if (identity == NULL) { 93 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); 115 os_memcpy(data->id_peer, identity, identity_len); 221 os_memcpy(data->id_server, id->identity, data->id_server_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server.c | 83 * @identity: Identity (User-Name) of the user 84 * @identity_len: Length of identity in bytes 89 * selected based on the specified identity. sm->user and 93 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, argument 109 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity, 133 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) { 543 * stores the identity into sm->identity. 607 * Start reauthentication with identity request even though we know the 608 * previously used identity [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 761 const char *identity, const char *radius_cui) 842 if (identity) { 843 sm->identity = (u8 *) os_strdup(identity); 844 if (sm->identity) 845 sm->identity_len = os_strlen(identity); 997 static int eapol_sm_get_eap_user(void *ctx, const u8 *identity, argument 1002 return sm->eapol->cb.get_eap_user(sm->eapol->conf.ctx, identity, 758 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr, int flags, const struct wpabuf *assoc_wps_ie, const struct wpabuf *assoc_p2p_ie, void *sta_ctx, const char *identity, const char *radius_cui) argument
|
/external/stlport/stlport/stl/ |
H A D | _function.h | 321 // identity is an extension: it is not part of the standard. 322 template <class _Tp> struct identity : public _STLP_PRIV _Identity<_Tp> {}; struct in inherits:_STLP_PRIV_Identity
|
/external/webkit/Source/WebCore/platform/graphics/chromium/ |
H A D | GraphicsLayerChromium.cpp | 577 TransformationMatrix identity; local 578 m_layer->setTransform(identity);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 33 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument 42 addr[0] = identity; 61 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument 67 addr[0] = identity; 113 const u8 *identity, size_t identity_len, 123 while (identity_len > 0 && identity[identity_len - 1] == 0) { 125 "character from the end of identity"); 128 addr[0] = identity; 141 identity, identity_len); 281 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument 112 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 330 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_mschapv2.c | 162 const u8 *identity, *password; local 167 identity = eap_get_config_identity(sm, &identity_len); 169 if (identity == NULL || password == NULL) 212 mschapv2_derive_response(identity, identity_len, password, 221 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_sim.c | 353 const u8 *identity = NULL; local 359 identity = data->reauth_id; 364 identity = data->pseudonym; 368 identity = eap_get_config_identity(sm, &identity_len); 369 if (identity) { 391 if (identity) { 393 identity, identity_len); 395 identity, identity_len); 577 const u8 *identity; local 630 identity [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_aka.c | 274 if (eap_sim_db_identity_known(sm->eap_sim_db_priv, sm->identity, 280 * RFC 4187, Chap. 4.1.4 recommends that identity from EAP is 282 * identity. 451 sm->identity, 458 eap_sim_derive_keys_reauth(data->counter, sm->identity, 614 const u8 *identity; local 618 identity = NULL; 622 identity = data->reauth->identity; 624 } else if (sm->identity 805 const u8 *identity; local 957 const u8 *identity, *id2; local [all...] |
H A D | eap_sim_db.c | 34 u8 *identity; member in struct:eap_sim_pseudonym 431 os_free(p->identity); 439 os_free(r->identity); 523 * @identity: User name identity 524 * @identity_len: Length of identity in bytes 547 int eap_sim_db_get_gsm_triplets(void *priv, const u8 *identity, argument 558 if (identity_len < 2 || identity[0] != EAP_SIM_PERMANENT_PREFIX) { 559 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM DB: unexpected identity", 560 identity, identity_le 646 eap_sim_db_get_pseudonym(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 686 eap_sim_db_get_pseudonym_id(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 709 eap_sim_db_get_reauth(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 749 eap_sim_db_get_reauth_id(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 788 eap_sim_db_identity_known(void *priv, const u8 *identity, size_t identity_len) argument 900 eap_sim_db_add_pseudonym(void *priv, const u8 *identity, size_t identity_len, char *pseudonym) argument 946 eap_sim_db_add_reauth_data(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter) argument 1007 eap_sim_db_add_reauth(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *mk) argument 1045 eap_sim_db_add_reauth_prime(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument 1076 eap_sim_db_get_permanent(void *priv, const u8 *identity, size_t identity_len, size_t *len) argument 1105 eap_sim_db_get_reauth_entry(void *priv, const u8 *identity, size_t identity_len) argument 1174 eap_sim_db_get_aka_auth(void *priv, const u8 *identity, size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1281 eap_sim_db_resynchronize(void *priv, const u8 *identity, size_t identity_len, const u8 *auts, const u8 *_rand) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | hostapd.c | 560 u8 *identity; local 562 identity = ieee802_1x_get_identity(sta->eapol_sm, 564 if (identity && 566 os_memcmp(identity, attr->user_name, identity_len)
|
H A D | ieee802_11.c | 314 char *identity = NULL; local 377 psk, &has_psk, &identity, &radius_cui); 426 sta->identity = identity; 427 identity = NULL; 492 os_free(identity);
|
H A D | sta_info.h | 100 char *identity; /* User-Name from RADIUS */ member in struct:sta_info
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument 37 addr[0] = identity; 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument 62 addr[0] = identity; 108 const u8 *identity, size_t identity_len, 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { 120 "character from the end of identity"); 123 addr[0] = identity; 136 identity, identity_len); 276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_mschapv2.c | 157 const u8 *identity, *password; local 162 identity = eap_get_config_identity(sm, &identity_len); 164 if (identity == NULL || password == NULL) 207 if (mschapv2_derive_response(identity, identity_len, password, 221 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_sim.c | 299 const u8 *identity = NULL; local 309 /* Look for the realm of the permanent identity */ 310 identity = eap_get_config_identity(sm, &identity_len); 311 if (identity) { 312 for (realm = identity, realm_len = identity_len; 380 const u8 *identity = NULL; local 386 identity = data->reauth_id; 391 identity = data->pseudonym; 395 identity = eap_get_config_identity(sm, &identity_len); 396 if (identity) { 605 const u8 *identity; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | hostapd.c | 560 u8 *identity; local 562 identity = ieee802_1x_get_identity(sta->eapol_sm, 564 if (identity && 566 os_memcmp(identity, attr->user_name, identity_len)
|
H A D | ieee802_11.c | 314 char *identity = NULL; local 377 psk, &has_psk, &identity, &radius_cui); 426 sta->identity = identity; 427 identity = NULL; 492 os_free(identity);
|
H A D | sta_info.h | 100 char *identity; /* User-Name from RADIUS */ member in struct:sta_info
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument 37 addr[0] = identity; 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument 62 addr[0] = identity; 108 const u8 *identity, size_t identity_len, 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { 120 "character from the end of identity"); 123 addr[0] = identity; 136 identity, identity_len); 276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_mschapv2.c | 157 const u8 *identity, *password; local 162 identity = eap_get_config_identity(sm, &identity_len); 164 if (identity == NULL || password == NULL) 207 if (mschapv2_derive_response(identity, identity_len, password, 221 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_sim.c | 299 const u8 *identity = NULL; local 309 /* Look for the realm of the permanent identity */ 310 identity = eap_get_config_identity(sm, &identity_len); 311 if (identity) { 312 for (realm = identity, realm_len = identity_len; 380 const u8 *identity = NULL; local 386 identity = data->reauth_id; 391 identity = data->pseudonym; 395 identity = eap_get_config_identity(sm, &identity_len); 396 if (identity) { 605 const u8 *identity; local [all...] |