Searched defs:id (Results 201 - 225 of 4123) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_1x.c636 u16 id; local
641 id = WPA_GET_LE16(pos + 1);
643 id = 0;
644 WPA_PUT_BE16(buf + 1, id);
688 "id=%d len=%d) from STA: EAP Response-%s (%d)",
1176 "id=%d len=%d) from RADIUS server: %s",
H A Dwpa_auth.h112 u8 id[FT_R0KH_ID_MAX_LEN]; member in struct:ft_remote_r0kh
121 u8 id[FT_R1KH_ID_LEN]; member in struct:ft_remote_r1kh
H A Dwpa_auth_ft.c313 os_memcmp_const(r0kh->id, sm->r0kh_id, sm->r0kh_id_len) ==
508 u8 *pos, u8 *end, u8 id, u8 descr_count,
514 wpa_printf(MSG_DEBUG, "FT: Resource Request: id=%d descr_count=%d",
515 id, descr_count);
527 rdie->id = id;
628 pos = wpa_ft_process_rdie(sm, pos, end, rdie->id,
1722 os_memcpy(f.r1kh_id, r1kh->id, FT_R1KH_ID_LEN);
1725 wpa_derive_pmk_r1(pmk_r0->pmk_r0, pmk_r0->pmk_r0_name, r1kh->id,
1727 wpa_printf(MSG_DEBUG, "FT: R1KH-ID " MACSTR, MAC2STR(r1kh->id));
507 wpa_ft_process_rdie(struct wpa_state_machine *sm, u8 *pos, u8 *end, u8 id, u8 descr_count, const u8 *ies, size_t ies_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dieee802_11_common.c171 u8 id, elen; local
173 id = *pos++;
180 "parse failed (id=%d elen=%d "
182 id, elen, (unsigned long) left);
188 switch (id) {
298 "ignored unknown element (id=%d elen=%d)",
299 id, elen);
H A Dwpa_common.h318 u8 id; member in struct:rsn_rdie
H A Dwpa_helpers.c248 int set_network(const char *ifname, int id, const char *field, argument
252 snprintf(buf, sizeof(buf), "SET_NETWORK %d %s %s", id, field, value);
257 int set_network_quoted(const char *ifname, int id, const char *field, argument
262 id, field, value);
277 int set_cred(const char *ifname, int id, const char *field, const char *value) argument
280 snprintf(buf, sizeof(buf), "SET_CRED %d %s %s", id, field, value);
285 int set_cred_quoted(const char *ifname, int id, const char *field, argument
290 id, field, value);
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Ddh_groups.c1150 #define DH_GROUP(id,safe) \
1151 { id, dh_group ## id ## _generator, sizeof(dh_group ## id ## _generator), \
1152 dh_group ## id ## _prime, sizeof(dh_group ## id ## _prime), \
1153 dh_group ## id ## _order, sizeof(dh_group ## id ## _order), safe }
1175 const struct dh_group * dh_groups_get(int id) argument
1180 if (dh_groups[i].id
[all...]
H A Ddh_groups.h13 int id; member in struct:dh_group
23 const struct dh_group * dh_groups_get(int id);
H A Dtls_openssl.c608 * @id: the engine id of the engine to load (only required if post is not %NULL
615 const char *post[], const char *id)
620 engine = ENGINE_by_id(id);
624 "available", id);
656 engine = ENGINE_by_id(id);
659 id, ERR_error_string(ERR_get_error(), NULL));
929 wpa_printf(MSG_ERROR, "ENGINE: cannot load private key with id"
1823 * Set session id context in order to avoid fatal errors when client
2084 wpa_printf(MSG_ERROR, "ENGINE: cannot load client cert with id"
614 tls_engine_load_dynamic_generic(const char *pre[], const char *post[], const char *id) argument
3027 OCSP_CERTID *id; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_nl80211.c719 int id; member in struct:family_data
759 res->id = nla_get_u32(tb2[CTRL_ATTR_MCAST_GRP_ID]);
784 ret = res.id;
4153 int id = -1; local
4165 id = genl_family_get_id(nl80211);
4173 return id;
H A Ddriver_openbsd.c50 struct ieee80211_bssid id; local
52 os_strlcpy(id.i_name, drv->ifname, sizeof(id.i_name));
53 if (ioctl(drv->sock, SIOCG80211BSSID, &id) < 0)
56 os_memcpy(bssid, id.i_bssid, IEEE80211_ADDR_LEN);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Dchap.c15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument
21 addr[0] = &id;
H A Deap_eke_common.c339 u8 *id; local
350 id = os_malloc(id_s_len + id_p_len);
351 if (id == NULL)
353 os_memcpy(id, id_s, id_s_len);
354 os_memcpy(id + id_s_len, id_p, id_p_len);
356 id, id_s_len + id_p_len);
358 id, id_s_len + id_p_len, key, key_len) < 0) {
359 os_free(id);
362 os_free(id);
H A Deap_ikev2_common.c51 struct wpabuf * eap_ikev2_build_frag_ack(u8 id, u8 code) argument
55 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, 0, code, id);
H A Deap_sim_common.c978 struct eap_sim_msg * eap_sim_msg_init(int code, int id, int type, int subtype) argument
995 eap->identifier = id;
H A Deap_wsc_common.c17 struct wpabuf * eap_wsc_build_frag_ack(u8 id, u8 code) argument
21 msg = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, 2, code, id);
H A Dikev2_common.c43 const struct ikev2_integ_alg * ikev2_get_integ(int id) argument
48 if (ikev2_integ_algs[i].id == id)
82 const struct ikev2_prf_alg * ikev2_get_prf(int id) argument
87 if (ikev2_prf_algs[i].id == id)
163 const struct ikev2_encr_alg * ikev2_get_encr(int id) argument
168 if (ikev2_encr_algs[i].id == id)
391 if (ikev2_prf_hash(prf->id, SK_
[all...]
H A Dikev2_common.h253 int id; member in struct:ikev2_integ_alg
259 int id; member in struct:ikev2_prf_alg
265 int id; member in struct:ikev2_encr_alg
270 const struct ikev2_integ_alg * ikev2_get_integ(int id);
273 const struct ikev2_prf_alg * ikev2_get_prf(int id);
280 const struct ikev2_encr_alg * ikev2_get_encr(int id);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap.c40 static struct wpabuf * eap_sm_buildNak(struct eap_sm *sm, int id);
44 static struct wpabuf * eap_sm_buildNotify(int id);
652 * AS is incorrectly using the same id again; and
828 struct eap_sm *sm, int id, const struct eap_method *methods,
839 8 + 8 * (count + 1), EAP_CODE_RESPONSE, id);
874 static struct wpabuf * eap_sm_buildNak(struct eap_sm *sm, int id) argument
889 return eap_sm_build_expanded_nak(sm, id, methods, count);
894 EAP_CODE_RESPONSE, id);
1127 * @id: EAP identifier for the packet
1135 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, in argument
827 eap_sm_build_expanded_nak( struct eap_sm *sm, int id, const struct eap_method *methods, size_t count) argument
1220 eap_sm_buildNotify(int id) argument
2425 eap_set_anon_id(struct eap_sm *sm, const u8 *id, size_t len) argument
[all...]
H A Deap_aka.c346 struct eap_aka_data *data, int id)
348 if ((id & CLEAR_PSEUDONYM) && data->pseudonym) {
355 if ((id & CLEAR_REAUTH_ID) && data->reauth_id) {
361 if ((id & CLEAR_EAP_ID) && data->last_eap_identity) {
537 static struct wpabuf * eap_aka_client_error(struct eap_aka_data *data, u8 id, argument
548 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
556 u8 id)
565 "(id=%d)", id);
566 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, dat
345 eap_aka_clear_identities(struct eap_sm *sm, struct eap_aka_data *data, int id) argument
555 eap_aka_authentication_reject(struct eap_aka_data *data, u8 id) argument
572 eap_aka_synchronization_failure( struct eap_aka_data *data, u8 id) argument
591 eap_aka_response_identity(struct eap_sm *sm, struct eap_aka_data *data, u8 id, enum eap_sim_id_req id_req) argument
635 eap_aka_response_challenge(struct eap_aka_data *data, u8 id) argument
658 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument
701 eap_aka_response_notification(struct eap_aka_data *data, u8 id, u16 notification) argument
734 eap_aka_process_identity(struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument
797 eap_aka_prime_kdf_select(struct eap_aka_data *data, u8 id, u16 kdf) argument
814 eap_aka_prime_kdf_neg(struct eap_aka_data *data, u8 id, struct eap_sim_attrs *attr) argument
880 eap_aka_process_challenge(struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument
1119 eap_aka_process_notification( struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument
1154 eap_aka_process_reauthentication( struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument
1283 u8 subtype, id; local
1454 u8 *id; local
[all...]
H A Deap_eke.c145 static struct wpabuf * eap_eke_build_msg(struct eap_eke_data *data, int id, argument
154 EAP_CODE_RESPONSE, id);
H A Deap_fast.c1528 u8 flags, id; local
1539 id = req->identifier;
1568 data->fast_version, id, pos,
1608 return eap_peer_tls_build_ack(id, EAP_TYPE_FAST,
1706 u8 *id; local
1711 id = os_malloc(data->id_len);
1712 if (id == NULL)
1716 os_memcpy(id, data->session_id, data->id_len);
1718 return id;
H A Deap_gtc.c53 u8 id; local
60 id = eap_get_id(reqData);
73 0, EAP_CODE_RESPONSE, id);
105 EAP_CODE_RESPONSE, id);
H A Deap_ikev2.c137 struct eap_method_ret *ret, u8 id)
177 EAP_CODE_RESPONSE, id);
290 u8 id, u8 flags,
318 return eap_ikev2_build_frag_ack(id, EAP_CODE_RESPONSE);
329 u8 flags, id; local
339 id = eap_get_id(reqData);
386 return eap_ikev2_build_msg(data, ret, id);
395 return eap_ikev2_process_fragment(data, ret, id, flags,
428 return eap_ikev2_build_msg(data, ret, id);
136 eap_ikev2_build_msg(struct eap_ikev2_data *data, struct eap_method_ret *ret, u8 id) argument
288 eap_ikev2_process_fragment(struct eap_ikev2_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
H A Deap_md5.c35 u8 *rpos, id; local
87 id = eap_get_id(resp);
89 if (chap_md5(id, password, password_len, challenge, challenge_len,

Completed in 2424 milliseconds

1234567891011>>