/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_1x.c | 636 u16 id; local 641 id = WPA_GET_LE16(pos + 1); 643 id = 0; 644 WPA_PUT_BE16(buf + 1, id); 688 "id=%d len=%d) from STA: EAP Response-%s (%d)", 1176 "id=%d len=%d) from RADIUS server: %s",
|
H A D | wpa_auth.h | 112 u8 id[FT_R0KH_ID_MAX_LEN]; member in struct:ft_remote_r0kh 121 u8 id[FT_R1KH_ID_LEN]; member in struct:ft_remote_r1kh
|
H A D | wpa_auth_ft.c | 313 os_memcmp_const(r0kh->id, sm->r0kh_id, sm->r0kh_id_len) == 508 u8 *pos, u8 *end, u8 id, u8 descr_count, 514 wpa_printf(MSG_DEBUG, "FT: Resource Request: id=%d descr_count=%d", 515 id, descr_count); 527 rdie->id = id; 628 pos = wpa_ft_process_rdie(sm, pos, end, rdie->id, 1722 os_memcpy(f.r1kh_id, r1kh->id, FT_R1KH_ID_LEN); 1725 wpa_derive_pmk_r1(pmk_r0->pmk_r0, pmk_r0->pmk_r0_name, r1kh->id, 1727 wpa_printf(MSG_DEBUG, "FT: R1KH-ID " MACSTR, MAC2STR(r1kh->id)); 507 wpa_ft_process_rdie(struct wpa_state_machine *sm, u8 *pos, u8 *end, u8 id, u8 descr_count, const u8 *ies, size_t ies_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | ieee802_11_common.c | 171 u8 id, elen; local 173 id = *pos++; 180 "parse failed (id=%d elen=%d " 182 id, elen, (unsigned long) left); 188 switch (id) { 298 "ignored unknown element (id=%d elen=%d)", 299 id, elen);
|
H A D | wpa_common.h | 318 u8 id; member in struct:rsn_rdie
|
H A D | wpa_helpers.c | 248 int set_network(const char *ifname, int id, const char *field, argument 252 snprintf(buf, sizeof(buf), "SET_NETWORK %d %s %s", id, field, value); 257 int set_network_quoted(const char *ifname, int id, const char *field, argument 262 id, field, value); 277 int set_cred(const char *ifname, int id, const char *field, const char *value) argument 280 snprintf(buf, sizeof(buf), "SET_CRED %d %s %s", id, field, value); 285 int set_cred_quoted(const char *ifname, int id, const char *field, argument 290 id, field, value);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | dh_groups.c | 1150 #define DH_GROUP(id,safe) \ 1151 { id, dh_group ## id ## _generator, sizeof(dh_group ## id ## _generator), \ 1152 dh_group ## id ## _prime, sizeof(dh_group ## id ## _prime), \ 1153 dh_group ## id ## _order, sizeof(dh_group ## id ## _order), safe } 1175 const struct dh_group * dh_groups_get(int id) argument 1180 if (dh_groups[i].id [all...] |
H A D | dh_groups.h | 13 int id; member in struct:dh_group 23 const struct dh_group * dh_groups_get(int id);
|
H A D | tls_openssl.c | 608 * @id: the engine id of the engine to load (only required if post is not %NULL 615 const char *post[], const char *id) 620 engine = ENGINE_by_id(id); 624 "available", id); 656 engine = ENGINE_by_id(id); 659 id, ERR_error_string(ERR_get_error(), NULL)); 929 wpa_printf(MSG_ERROR, "ENGINE: cannot load private key with id" 1823 * Set session id context in order to avoid fatal errors when client 2084 wpa_printf(MSG_ERROR, "ENGINE: cannot load client cert with id" 614 tls_engine_load_dynamic_generic(const char *pre[], const char *post[], const char *id) argument 3027 OCSP_CERTID *id; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_nl80211.c | 719 int id; member in struct:family_data 759 res->id = nla_get_u32(tb2[CTRL_ATTR_MCAST_GRP_ID]); 784 ret = res.id; 4153 int id = -1; local 4165 id = genl_family_get_id(nl80211); 4173 return id;
|
H A D | driver_openbsd.c | 50 struct ieee80211_bssid id; local 52 os_strlcpy(id.i_name, drv->ifname, sizeof(id.i_name)); 53 if (ioctl(drv->sock, SIOCG80211BSSID, &id) < 0) 56 os_memcpy(bssid, id.i_bssid, IEEE80211_ADDR_LEN);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 21 addr[0] = &id;
|
H A D | eap_eke_common.c | 339 u8 *id; local 350 id = os_malloc(id_s_len + id_p_len); 351 if (id == NULL) 353 os_memcpy(id, id_s, id_s_len); 354 os_memcpy(id + id_s_len, id_p, id_p_len); 356 id, id_s_len + id_p_len); 358 id, id_s_len + id_p_len, key, key_len) < 0) { 359 os_free(id); 362 os_free(id);
|
H A D | eap_ikev2_common.c | 51 struct wpabuf * eap_ikev2_build_frag_ack(u8 id, u8 code) argument 55 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, 0, code, id);
|
H A D | eap_sim_common.c | 978 struct eap_sim_msg * eap_sim_msg_init(int code, int id, int type, int subtype) argument 995 eap->identifier = id;
|
H A D | eap_wsc_common.c | 17 struct wpabuf * eap_wsc_build_frag_ack(u8 id, u8 code) argument 21 msg = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, 2, code, id);
|
H A D | ikev2_common.c | 43 const struct ikev2_integ_alg * ikev2_get_integ(int id) argument 48 if (ikev2_integ_algs[i].id == id) 82 const struct ikev2_prf_alg * ikev2_get_prf(int id) argument 87 if (ikev2_prf_algs[i].id == id) 163 const struct ikev2_encr_alg * ikev2_get_encr(int id) argument 168 if (ikev2_encr_algs[i].id == id) 391 if (ikev2_prf_hash(prf->id, SK_ [all...] |
H A D | ikev2_common.h | 253 int id; member in struct:ikev2_integ_alg 259 int id; member in struct:ikev2_prf_alg 265 int id; member in struct:ikev2_encr_alg 270 const struct ikev2_integ_alg * ikev2_get_integ(int id); 273 const struct ikev2_prf_alg * ikev2_get_prf(int id); 280 const struct ikev2_encr_alg * ikev2_get_encr(int id);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 40 static struct wpabuf * eap_sm_buildNak(struct eap_sm *sm, int id); 44 static struct wpabuf * eap_sm_buildNotify(int id); 652 * AS is incorrectly using the same id again; and 828 struct eap_sm *sm, int id, const struct eap_method *methods, 839 8 + 8 * (count + 1), EAP_CODE_RESPONSE, id); 874 static struct wpabuf * eap_sm_buildNak(struct eap_sm *sm, int id) argument 889 return eap_sm_build_expanded_nak(sm, id, methods, count); 894 EAP_CODE_RESPONSE, id); 1127 * @id: EAP identifier for the packet 1135 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, in argument 827 eap_sm_build_expanded_nak( struct eap_sm *sm, int id, const struct eap_method *methods, size_t count) argument 1220 eap_sm_buildNotify(int id) argument 2425 eap_set_anon_id(struct eap_sm *sm, const u8 *id, size_t len) argument [all...] |
H A D | eap_aka.c | 346 struct eap_aka_data *data, int id) 348 if ((id & CLEAR_PSEUDONYM) && data->pseudonym) { 355 if ((id & CLEAR_REAUTH_ID) && data->reauth_id) { 361 if ((id & CLEAR_EAP_ID) && data->last_eap_identity) { 537 static struct wpabuf * eap_aka_client_error(struct eap_aka_data *data, u8 id, argument 548 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method, 556 u8 id) 565 "(id=%d)", id); 566 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, dat 345 eap_aka_clear_identities(struct eap_sm *sm, struct eap_aka_data *data, int id) argument 555 eap_aka_authentication_reject(struct eap_aka_data *data, u8 id) argument 572 eap_aka_synchronization_failure( struct eap_aka_data *data, u8 id) argument 591 eap_aka_response_identity(struct eap_sm *sm, struct eap_aka_data *data, u8 id, enum eap_sim_id_req id_req) argument 635 eap_aka_response_challenge(struct eap_aka_data *data, u8 id) argument 658 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument 701 eap_aka_response_notification(struct eap_aka_data *data, u8 id, u16 notification) argument 734 eap_aka_process_identity(struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 797 eap_aka_prime_kdf_select(struct eap_aka_data *data, u8 id, u16 kdf) argument 814 eap_aka_prime_kdf_neg(struct eap_aka_data *data, u8 id, struct eap_sim_attrs *attr) argument 880 eap_aka_process_challenge(struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1119 eap_aka_process_notification( struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1154 eap_aka_process_reauthentication( struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1283 u8 subtype, id; local 1454 u8 *id; local [all...] |
H A D | eap_eke.c | 145 static struct wpabuf * eap_eke_build_msg(struct eap_eke_data *data, int id, argument 154 EAP_CODE_RESPONSE, id);
|
H A D | eap_fast.c | 1528 u8 flags, id; local 1539 id = req->identifier; 1568 data->fast_version, id, pos, 1608 return eap_peer_tls_build_ack(id, EAP_TYPE_FAST, 1706 u8 *id; local 1711 id = os_malloc(data->id_len); 1712 if (id == NULL) 1716 os_memcpy(id, data->session_id, data->id_len); 1718 return id;
|
H A D | eap_gtc.c | 53 u8 id; local 60 id = eap_get_id(reqData); 73 0, EAP_CODE_RESPONSE, id); 105 EAP_CODE_RESPONSE, id);
|
H A D | eap_ikev2.c | 137 struct eap_method_ret *ret, u8 id) 177 EAP_CODE_RESPONSE, id); 290 u8 id, u8 flags, 318 return eap_ikev2_build_frag_ack(id, EAP_CODE_RESPONSE); 329 u8 flags, id; local 339 id = eap_get_id(reqData); 386 return eap_ikev2_build_msg(data, ret, id); 395 return eap_ikev2_process_fragment(data, ret, id, flags, 428 return eap_ikev2_build_msg(data, ret, id); 136 eap_ikev2_build_msg(struct eap_ikev2_data *data, struct eap_method_ret *ret, u8 id) argument 288 eap_ikev2_process_fragment(struct eap_ikev2_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
|
H A D | eap_md5.c | 35 u8 *rpos, id; local 87 id = eap_get_id(resp); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|