/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_sim_db.c | 1013 * This function is used to generate a fast re-authentication identity for 1143 * @identity_len: Length of identity 1161 "identity '%s'", reauth_id, permanent); 1204 "identity '%s'", reauth_id, permanent); 1225 * eap_sim_db_get_permanent - EAP-SIM DB: Get permanent identity 1482 * sim_get_username - Extract username from SIM identity 1483 * @identity: Identity 1485 * Returns: Allocated buffer with the username part of the identity 1489 char * sim_get_username(const u8 *identity, size_t identity_len) argument 1493 if (identity [all...] |
/external/wpa_supplicant_8/hostapd/src/eapol_auth/ |
H A D | eapol_auth_sm_i.h | 154 u8 *identity; member in struct:eapol_state_machine
|
/external/wpa_supplicant_8/src/ap/ |
H A D | hostapd.c | 314 bin_clear_free(hapd->tmp_eap_user.identity, 635 u8 *identity; local 637 identity = ieee802_1x_get_identity(sta->eapol_sm, 639 if (identity && 641 os_memcmp(identity, attr->user_name, identity_len)
|
H A D | ieee802_11.c | 557 char *identity = NULL; local 634 &psk, &identity, &radius_cui); 680 sta->identity = identity; 681 identity = NULL; 746 os_free(identity);
|
H A D | ieee802_1x.c | 283 const u8 *identity; local 290 identity = eap_get_identity(sm->eap, &identity_len); 291 if (identity == NULL) 294 /* Save station identity for future RADIUS packets */ 295 os_free(sm->identity); 296 sm->identity = (u8 *) dup_binstr(identity, identity_len); 297 if (sm->identity == NULL) { 304 HOSTAPD_LEVEL_DEBUG, "STA identity '%s'", sm->identity); 1287 u8 *buf, *identity; local 1813 const u8 *identity; local 1860 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 108 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument 117 const u8 *identity, 186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap.c | 1035 wpa_printf(MSG_WARNING, "Too short IMSI for SIM identity"); 1040 wpa_printf(MSG_WARNING, "Could not add realm to SIM identity"); 1060 os_free(conf->identity); 1061 conf->identity = os_malloc(1 + imsi_len); 1062 if (conf->identity == NULL) { 1064 "IMSI-based identity"); 1070 conf->identity[0] = '1'; 1073 conf->identity[0] = '0'; 1076 conf->identity[0] = '6'; 1079 os_memcpy(conf->identity 1139 const u8 *identity; local [all...] |
H A D | eap_aka.c | 374 const u8 *identity = NULL; local 384 /* Look for the realm of the permanent identity */ 385 identity = eap_get_config_identity(sm, &identity_len); 386 if (identity) { 387 for (realm = identity, realm_len = identity_len; 596 const u8 *identity = NULL; local 602 identity = data->reauth_id; 607 identity = data->pseudonym; 611 identity = eap_get_config_identity(sm, &identity_len); 612 if (identity) { 886 const u8 *identity; local [all...] |
H A D | eap_ttls.c | 430 const u8 *identity, *password; local 436 identity = eap_get_config_identity(sm, &identity_len); 438 if (identity == NULL || password == NULL) 451 identity, identity_len); 485 if (mschapv2_derive_response(identity, identity_len, password, 519 const u8 *identity, *password; local 525 identity = eap_get_config_identity(sm, &identity_len); 527 if (identity == NULL || password == NULL) 540 identity, identity_len); 602 const u8 *identity, *passwor local 655 const u8 *identity, *password; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_i.h | 145 u8 *identity; member in struct:eap_sm 147 /* Whether Phase 2 method should validate identity match */ 200 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
H A D | eap_server_fast.c | 61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data 131 u8 *identity = NULL; local 214 identity = pos + 2; 230 if (identity) { 232 "PAC-Opaque", identity, identity_len); 233 os_free(data->identity); 234 data->identity = os_malloc(identity_len); 235 if (data->identity) { 236 os_memcpy(data->identity, identity, identity_le [all...] |
H A D | eap_sim_db.c | 1013 * This function is used to generate a fast re-authentication identity for 1143 * @identity_len: Length of identity 1161 "identity '%s'", reauth_id, permanent); 1204 "identity '%s'", reauth_id, permanent); 1225 * eap_sim_db_get_permanent - EAP-SIM DB: Get permanent identity 1482 * sim_get_username - Extract username from SIM identity 1483 * @identity: Identity 1485 * Returns: Allocated buffer with the username part of the identity 1489 char * sim_get_username(const u8 *identity, size_t identity_len) argument 1493 if (identity [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
H A D | eapol_auth_sm_i.h | 154 u8 *identity; member in struct:eapol_state_machine
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | hostapd.c | 314 bin_clear_free(hapd->tmp_eap_user.identity, 635 u8 *identity; local 637 identity = ieee802_1x_get_identity(sta->eapol_sm, 639 if (identity && 641 os_memcmp(identity, attr->user_name, identity_len)
|
H A D | ieee802_11.c | 557 char *identity = NULL; local 634 &psk, &identity, &radius_cui); 680 sta->identity = identity; 681 identity = NULL; 746 os_free(identity);
|
H A D | ieee802_1x.c | 283 const u8 *identity; local 290 identity = eap_get_identity(sm->eap, &identity_len); 291 if (identity == NULL) 294 /* Save station identity for future RADIUS packets */ 295 os_free(sm->identity); 296 sm->identity = (u8 *) dup_binstr(identity, identity_len); 297 if (sm->identity == NULL) { 304 HOSTAPD_LEVEL_DEBUG, "STA identity '%s'", sm->identity); 1287 u8 *buf, *identity; local 1813 const u8 *identity; local 1860 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 108 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument 117 const u8 *identity, 186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 1035 wpa_printf(MSG_WARNING, "Too short IMSI for SIM identity"); 1040 wpa_printf(MSG_WARNING, "Could not add realm to SIM identity"); 1060 os_free(conf->identity); 1061 conf->identity = os_malloc(1 + imsi_len); 1062 if (conf->identity == NULL) { 1064 "IMSI-based identity"); 1070 conf->identity[0] = '1'; 1073 conf->identity[0] = '0'; 1076 conf->identity[0] = '6'; 1079 os_memcpy(conf->identity 1139 const u8 *identity; local [all...] |
H A D | eap_aka.c | 374 const u8 *identity = NULL; local 384 /* Look for the realm of the permanent identity */ 385 identity = eap_get_config_identity(sm, &identity_len); 386 if (identity) { 387 for (realm = identity, realm_len = identity_len; 596 const u8 *identity = NULL; local 602 identity = data->reauth_id; 607 identity = data->pseudonym; 611 identity = eap_get_config_identity(sm, &identity_len); 612 if (identity) { 886 const u8 *identity; local [all...] |
H A D | eap_ttls.c | 430 const u8 *identity, *password; local 436 identity = eap_get_config_identity(sm, &identity_len); 438 if (identity == NULL || password == NULL) 451 identity, identity_len); 485 if (mschapv2_derive_response(identity, identity_len, password, 519 const u8 *identity, *password; local 525 identity = eap_get_config_identity(sm, &identity_len); 527 if (identity == NULL || password == NULL) 540 identity, identity_len); 602 const u8 *identity, *passwor local 655 const u8 *identity, *password; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_i.h | 145 u8 *identity; member in struct:eap_sm 147 /* Whether Phase 2 method should validate identity match */ 200 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
H A D | eap_server_fast.c | 61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data 131 u8 *identity = NULL; local 214 identity = pos + 2; 230 if (identity) { 232 "PAC-Opaque", identity, identity_len); 233 os_free(data->identity); 234 data->identity = os_malloc(identity_len); 235 if (data->identity) { 236 os_memcpy(data->identity, identity, identity_le [all...] |
H A D | eap_sim_db.c | 1013 * This function is used to generate a fast re-authentication identity for 1143 * @identity_len: Length of identity 1161 "identity '%s'", reauth_id, permanent); 1204 "identity '%s'", reauth_id, permanent); 1225 * eap_sim_db_get_permanent - EAP-SIM DB: Get permanent identity 1482 * sim_get_username - Extract username from SIM identity 1483 * @identity: Identity 1485 * Returns: Allocated buffer with the username part of the identity 1489 char * sim_get_username(const u8 *identity, size_t identity_len) argument 1493 if (identity [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/ |
H A D | eapol_auth_sm_i.h | 154 u8 *identity; member in struct:eapol_state_machine
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.ecf.filetransfer_4.0.0.v20100529-0735.jar | ... org/eclipse/ecf/filetransfer/events/socketfactory/ org/eclipse/ecf/filetransfer/identity/ org/eclipse/ecf/filetransfer/service/ org/eclipse/ecf/internal/ org ... |