Searched defs:id (Results 226 - 250 of 4123) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_mschapv2.c148 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id,
169 EAP_CODE_RESPONSE, id);
223 "(response)", id, ms->mschapv2_id);
235 * @id: EAP identifier used in the request
242 size_t req_len, u8 id)
292 return eap_mschapv2_challenge_reply(sm, data, id, req->mschapv2_id,
340 * @id: EAP identifier used in th erequest
348 size_t req_len, u8 id)
378 EAP_CODE_RESPONSE, id);
505 struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id)
147 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument
239 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument
344 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument
503 eap_mschapv2_change_password( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id) argument
638 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument
772 u8 id; local
[all...]
H A Deap_pax.c94 u8 id, u8 op_code, size_t plen)
100 sizeof(*pax) + plen, EAP_CODE_RESPONSE, id);
116 struct eap_method_ret *ret, u8 id,
191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen);
232 struct eap_method_ret *ret, u8 id,
301 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_ACK, EAP_PAX_ICV_LEN);
329 u8 icvbuf[EAP_PAX_ICV_LEN], id; local
339 id = eap_get_id(reqData);
434 resp = eap_pax_process_std_1(data, ret, id, req, flen);
437 resp = eap_pax_process_std_3(data, ret, id, re
93 eap_pax_alloc_resp(const struct eap_pax_hdr *req, u8 id, u8 op_code, size_t plen) argument
115 eap_pax_process_std_1(struct eap_pax_data *data, struct eap_method_ret *ret, u8 id, const struct eap_pax_hdr *req, size_t req_plen) argument
231 eap_pax_process_std_3(struct eap_pax_data *data, struct eap_method_ret *ret, u8 id, const struct eap_pax_hdr *req, size_t req_plen) argument
[all...]
H A Deap_peap.c200 * @id: EAP identifier for the header
207 static struct wpabuf * eap_tlv_build_nak(int id, u16 nak_type) argument
212 EAP_CODE_RESPONSE, id);
350 * @id: EAP identifier for the header
360 int id, u16 status)
372 EAP_CODE_RESPONSE, id);
967 u8 flags, id; local
977 id = req->identifier;
1010 data->peap_version, id, pos,
1099 return eap_peer_tls_build_ack(id, EAP_TYPE_PEA
357 eap_tlv_build_result(struct eap_sm *sm, struct eap_peap_data *data, int crypto_tlv_used, int id, u16 status) argument
1215 u8 *id; local
[all...]
H A Deap_psk.c442 u8 *id; local
448 id = os_malloc(*len);
449 if (id == NULL)
452 id[0] = EAP_TYPE_PSK;
453 os_memcpy(id + 1, data->rand_p, EAP_PSK_RAND_LEN);
454 os_memcpy(id + 1 + EAP_PSK_RAND_LEN, data->rand_s, EAP_PSK_RAND_LEN);
455 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Derived Session-Id", id, *len);
457 return id;
H A Deap_pwd.c114 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail");
196 u8 *id; local
201 id = os_malloc(1 + SHA256_MAC_LEN);
202 if (id == NULL)
205 os_memcpy(id, data->session_id, 1 + SHA256_MAC_LEN);
208 return id;
218 struct eap_pwd_id *id; local
232 id = (struct eap_pwd_id *) payload;
233 data->group_num = be_to_host16(id->group_num);
234 if ((id
[all...]
H A Deap_sake.c116 int id, size_t length, u8 subtype)
125 EAP_CODE_RESPONSE, id);
458 u8 *id; local
464 id = os_malloc(*len);
465 if (id == NULL)
468 id[0] = EAP_TYPE_SAKE;
469 os_memcpy(id + 1, data->rand_s, EAP_SAKE_RAND_LEN);
470 os_memcpy(id + 1 + EAP_SAKE_RAND_LEN, data->rand_s, EAP_SAKE_RAND_LEN);
471 wpa_hexdump(MSG_DEBUG, "EAP-SAKE: Derived Session-Id", id, *len);
473 return id;
115 eap_sake_build_msg(struct eap_sake_data *data, int id, size_t length, u8 subtype) argument
[all...]
H A Deap_sim.c366 struct eap_sim_data *data, int id)
368 if ((id & CLEAR_PSEUDONYM) && data->pseudonym) {
375 if ((id & CLEAR_REAUTH_ID) && data->reauth_id) {
381 if ((id & CLEAR_EAP_ID) && data->last_eap_identity) {
453 static struct wpabuf * eap_sim_client_error(struct eap_sim_data *data, u8 id, argument
464 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, EAP_TYPE_SIM,
472 struct eap_sim_data *data, u8 id,
499 wpa_printf(MSG_DEBUG, "Generating EAP-SIM Start (id=%d)", id);
500 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id,
365 eap_sim_clear_identities(struct eap_sm *sm, struct eap_sim_data *data, int id) argument
471 eap_sim_response_start(struct eap_sm *sm, struct eap_sim_data *data, u8 id, enum eap_sim_id_req id_req) argument
524 eap_sim_response_challenge(struct eap_sim_data *data, u8 id) argument
544 eap_sim_response_reauth(struct eap_sim_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument
586 eap_sim_response_notification(struct eap_sim_data *data, u8 id, u16 notification) argument
619 eap_sim_process_start(struct eap_sm *sm, struct eap_sim_data *data, u8 id, struct eap_sim_attrs *attr) argument
695 eap_sim_process_challenge(struct eap_sm *sm, struct eap_sim_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument
882 eap_sim_process_notification( struct eap_sm *sm, struct eap_sim_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument
917 eap_sim_process_reauthentication( struct eap_sm *sm, struct eap_sim_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument
1030 u8 subtype, id; local
1196 u8 *id; local
[all...]
H A Deap_tls.c152 struct wpabuf *resp, u8 id)
181 return eap_peer_tls_build_ack(id, data->eap_type, 0);
228 u8 flags, id; local
236 id = eap_get_id(reqData);
246 id, pos, left, &resp);
249 return eap_tls_failure(sm, data, ret, res, resp, id);
257 return eap_peer_tls_build_ack(id, data->eap_type, 0);
346 u8 *id; local
351 id = os_malloc(data->id_len);
352 if (id
149 eap_tls_failure(struct eap_sm *sm, struct eap_tls_data *data, struct eap_method_ret *ret, int res, struct wpabuf *resp, u8 id) argument
[all...]
H A Deap_tls_common.c569 * @id: EAP identifier for the response
575 int peap_version, u8 id, int ret,
618 EAP_CODE_RESPONSE, id);
649 * @id: EAP identifier for the response
674 u8 id, const u8 *in_data, size_t in_len,
739 return eap_tls_process_output(data, eap_type, peap_version, id, ret,
746 * @id: EAP identifier for the response
751 struct wpabuf * eap_peer_tls_build_ack(u8 id, EapType eap_type, argument
756 resp = eap_tls_msg_alloc(eap_type, 1, EAP_CODE_RESPONSE, id);
759 wpa_printf(MSG_DEBUG, "SSL: Building ACK (type=%d id
574 eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, int ret, struct wpabuf **out_data) argument
672 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument
990 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument
[all...]
H A Deap_tnc.c65 static struct wpabuf * eap_tnc_build_frag_ack(u8 id, u8 code) argument
69 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, code, id);
84 struct eap_method_ret *ret, u8 id)
109 EAP_CODE_RESPONSE, id);
164 u8 id, u8 flags,
192 return eap_tnc_build_frag_ack(id, EAP_CODE_RESPONSE);
209 u8 flags, id; local
221 id = eap_get_id(reqData);
268 return eap_tnc_build_msg(data, ret, id);
277 return eap_tnc_process_fragment(data, ret, id, flag
83 eap_tnc_build_msg(struct eap_tnc_data *data, struct eap_method_ret *ret, u8 id) argument
162 eap_tnc_process_fragment(struct eap_tnc_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
[all...]
H A Deap_ttls.c1471 u8 flags, id; local
1480 id = eap_get_id(reqData);
1500 res = eap_ttls_decrypt(sm, data, ret, id, &msg, &resp);
1502 res = eap_ttls_process_handshake(sm, data, ret, id,
1512 return eap_peer_tls_build_ack(id, EAP_TYPE_TTLS,
1632 u8 *id; local
1637 id = os_malloc(data->id_len);
1638 if (id == NULL)
1642 os_memcpy(id, data->session_id, data->id_len);
1644 return id;
[all...]
H A Deap_wsc.c217 u16 id = atoi(pos + 10); local
218 if (id == DEV_PW_NFC_CONNECTION_HANDOVER)
220 if (cfg.pin || id == DEV_PW_NFC_CONNECTION_HANDOVER)
221 cfg.dev_pw_id = id;
302 struct eap_method_ret *ret, u8 id)
326 EAP_CODE_RESPONSE, id);
396 u8 id, u8 flags, u8 op_code,
425 return eap_wsc_build_frag_ack(id, EAP_CODE_RESPONSE);
436 u8 op_code, flags, id; local
449 id
301 eap_wsc_build_msg(struct eap_wsc_data *data, struct eap_method_ret *ret, u8 id) argument
394 eap_wsc_process_fragment(struct eap_wsc_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u8 op_code, u16 message_length, const u8 *buf, size_t len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server.c37 static struct wpabuf * eap_sm_buildSuccess(struct eap_sm *sm, u8 id);
38 static struct wpabuf * eap_sm_buildFailure(struct eap_sm *sm, u8 id);
39 static int eap_sm_nextId(struct eap_sm *sm, int id);
990 wpa_printf(MSG_DEBUG, "EAP: getId: id=%d", hdr->identifier);
995 static struct wpabuf * eap_sm_buildSuccess(struct eap_sm *sm, u8 id) argument
999 wpa_printf(MSG_DEBUG, "EAP: Building EAP-Success (id=%d)", id);
1006 resp->identifier = id;
1013 static struct wpabuf * eap_sm_buildFailure(struct eap_sm *sm, u8 id) argument
1017 wpa_printf(MSG_DEBUG, "EAP: Building EAP-Failure (id
1031 eap_sm_nextId(struct eap_sm *sm, int id) argument
[all...]
H A Deap_server_aka.c349 struct eap_aka_data *data, u8 id)
355 msg = eap_sim_msg_init(EAP_CODE_REQUEST, id, data->eap_method,
373 /* Reauth id may have expired - try fullauth */
385 data->pending_id = id;
467 u8 id)
472 msg = eap_sim_msg_init(EAP_CODE_REQUEST, id, data->eap_method,
542 struct eap_aka_data *data, u8 id)
567 msg = eap_sim_msg_init(EAP_CODE_REQUEST, id, data->eap_method,
590 u8 id)
595 msg = eap_sim_msg_init(EAP_CODE_REQUEST, id, dat
348 eap_aka_build_identity(struct eap_sm *sm, struct eap_aka_data *data, u8 id) argument
465 eap_aka_build_challenge(struct eap_sm *sm, struct eap_aka_data *data, u8 id) argument
541 eap_aka_build_reauth(struct eap_sm *sm, struct eap_aka_data *data, u8 id) argument
588 eap_aka_build_notification(struct eap_sm *sm, struct eap_aka_data *data, u8 id) argument
627 eap_aka_buildReq(struct eap_sm *sm, void *priv, u8 id) argument
[all...]
H A Deap_server_eke.c112 u8 id, size_t length, u8 eke_exch)
120 EAP_CODE_REQUEST, id);
162 static struct wpabuf * eap_eke_build_failure(struct eap_eke_data *data, u8 id) argument
169 msg = eap_eke_build_msg(data, id, 4, EAP_EKE_FAILURE);
182 u8 id)
190 msg = eap_eke_build_msg(data, id, plen, EAP_EKE_ID);
240 struct eap_eke_data *data, u8 id)
250 return eap_eke_build_failure(data, id);
259 return eap_eke_build_failure(data, id);
262 msg = eap_eke_build_msg(data, id, dat
111 eap_eke_build_msg(struct eap_eke_data *data, u8 id, size_t length, u8 eke_exch) argument
180 eap_eke_build_identity(struct eap_sm *sm, struct eap_eke_data *data, u8 id) argument
239 eap_eke_build_commit(struct eap_sm *sm, struct eap_eke_data *data, u8 id) argument
303 eap_eke_build_confirm(struct eap_sm *sm, struct eap_eke_data *data, u8 id) argument
361 eap_eke_buildReq(struct eap_sm *sm, void *priv, u8 id) argument
[all...]
H A Deap_server_fast.c520 struct eap_fast_data *data, u8 id)
526 EAP_CODE_REQUEST, id);
574 u8 id)
583 req = data->phase2_method->buildReq(sm, data->phase2_priv, id);
848 static struct wpabuf * eap_fast_buildReq(struct eap_sm *sm, void *priv, u8 id) argument
855 return eap_server_tls_build_ack(id, EAP_TYPE_FAST,
861 data->fast_version, id);
866 return eap_fast_build_start(sm, data, id);
881 req = eap_fast_build_phase2_req(sm, data, id);
888 req = eap_fast_build_phase2_req(sm, data, id);
519 eap_fast_build_start(struct eap_sm *sm, struct eap_fast_data *data, u8 id) argument
572 eap_fast_build_phase2_req(struct eap_sm *sm, struct eap_fast_data *data, u8 id) argument
[all...]
H A Deap_server_gpsk.c103 struct eap_gpsk_data *data, u8 id)
121 EAP_CODE_REQUEST, id);
143 struct eap_gpsk_data *data, u8 id)
156 EAP_CODE_REQUEST, id);
191 static struct wpabuf * eap_gpsk_buildReq(struct eap_sm *sm, void *priv, u8 id) argument
197 return eap_gpsk_build_gpsk_1(sm, data, id);
199 return eap_gpsk_build_gpsk_3(sm, data, id);
102 eap_gpsk_build_gpsk_1(struct eap_sm *sm, struct eap_gpsk_data *data, u8 id) argument
142 eap_gpsk_build_gpsk_3(struct eap_sm *sm, struct eap_gpsk_data *data, u8 id) argument
H A Deap_server_gtc.c50 static struct wpabuf * eap_gtc_buildReq(struct eap_sm *sm, void *priv, u8 id) argument
61 EAP_CODE_REQUEST, id);
H A Deap_server_identity.c53 u8 id)
68 EAP_CODE_REQUEST, id);
52 eap_identity_buildReq(struct eap_sm *sm, void *priv, u8 id) argument
H A Deap_server_ikev2.c134 static struct wpabuf * eap_ikev2_build_msg(struct eap_ikev2_data *data, u8 id) argument
172 EAP_CODE_REQUEST, id);
212 static struct wpabuf * eap_ikev2_buildReq(struct eap_sm *sm, void *priv, u8 id) argument
229 return eap_ikev2_build_msg(data, id);
231 return eap_ikev2_build_frag_ack(id, EAP_CODE_REQUEST);
H A Deap_server_md5.c45 static struct wpabuf * eap_md5_buildReq(struct eap_sm *sm, void *priv, u8 id) argument
57 EAP_CODE_REQUEST, id);
104 u8 hash[CHAP_MD5_LEN], id; local
121 id = eap_get_id(respData);
122 if (chap_md5(id, sm->user->password, sm->user->password_len,
H A Deap_server_mschapv2.c99 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id)
115 EAP_CODE_REQUEST, id);
125 ms->mschapv2_id = id;
142 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id)
153 EAP_CODE_REQUEST, id);
186 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id)
196 EAP_CODE_REQUEST, id);
219 u8 id)
225 return eap_mschapv2_build_challenge(sm, data, id);
227 return eap_mschapv2_build_success_req(sm, data, id);
98 eap_mschapv2_build_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id) argument
141 eap_mschapv2_build_success_req( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id) argument
185 eap_mschapv2_build_failure_req( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id) argument
218 eap_mschapv2_buildReq(struct eap_sm *sm, void *priv, u8 id) argument
[all...]
H A Deap_server_pax.c72 struct eap_pax_data *data, u8 id)
88 EAP_PAX_ICV_LEN, EAP_CODE_REQUEST, id);
119 struct eap_pax_data *data, u8 id)
129 EAP_PAX_ICV_LEN, EAP_CODE_REQUEST, id);
165 static struct wpabuf * eap_pax_buildReq(struct eap_sm *sm, void *priv, u8 id) argument
171 return eap_pax_build_std_1(sm, data, id);
173 return eap_pax_build_std_3(sm, data, id);
71 eap_pax_build_std_1(struct eap_sm *sm, struct eap_pax_data *data, u8 id) argument
118 eap_pax_build_std_3(struct eap_sm *sm, struct eap_pax_data *data, u8 id) argument
H A Deap_server_peap.c180 struct eap_peap_data *data, u8 id)
185 EAP_CODE_REQUEST, id);
203 u8 id)
213 buf = data->phase2_method->buildReq(sm, data->phase2_priv, id);
239 u8 id)
250 EAP_CODE_REQUEST, id);
341 u8 id)
355 EAP_CODE_REQUEST, id);
431 u8 id, int success)
443 hdr->identifier = id;
179 eap_peap_build_start(struct eap_sm *sm, struct eap_peap_data *data, u8 id) argument
201 eap_peap_build_phase2_req(struct eap_sm *sm, struct eap_peap_data *data, u8 id) argument
237 eap_peap_build_phase2_soh(struct eap_sm *sm, struct eap_peap_data *data, u8 id) argument
339 eap_peap_build_phase2_tlv(struct eap_sm *sm, struct eap_peap_data *data, u8 id) argument
429 eap_peap_build_phase2_term(struct eap_sm *sm, struct eap_peap_data *data, u8 id, int success) argument
457 eap_peap_buildReq(struct eap_sm *sm, void *priv, u8 id) argument
[all...]
H A Deap_server_psk.c55 struct eap_psk_data *data, u8 id)
72 EAP_CODE_REQUEST, id);
90 struct eap_psk_data *data, u8 id)
100 sizeof(*psk) + 4 + 16 + 1, EAP_CODE_REQUEST, id);
156 static struct wpabuf * eap_psk_buildReq(struct eap_sm *sm, void *priv, u8 id) argument
162 return eap_psk_build_1(sm, data, id);
164 return eap_psk_build_3(sm, data, id);
54 eap_psk_build_1(struct eap_sm *sm, struct eap_psk_data *data, u8 id) argument
89 eap_psk_build_3(struct eap_sm *sm, struct eap_psk_data *data, u8 id) argument

Completed in 203 milliseconds

1234567891011>>