Searched defs:identity (Results 226 - 250 of 304) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_sim_db.c1013 * This function is used to generate a fast re-authentication identity for
1143 * @identity_len: Length of identity
1161 "identity '%s'", reauth_id, permanent);
1204 "identity '%s'", reauth_id, permanent);
1225 * eap_sim_db_get_permanent - EAP-SIM DB: Get permanent identity
1482 * sim_get_username - Extract username from SIM identity
1483 * @identity: Identity
1485 * Returns: Allocated buffer with the username part of the identity
1489 char * sim_get_username(const u8 *identity, size_t identity_len) argument
1493 if (identity
[all...]
/external/wpa_supplicant_8/hostapd/src/eapol_auth/
H A Deapol_auth_sm_i.h154 u8 *identity; member in struct:eapol_state_machine
/external/wpa_supplicant_8/src/ap/
H A Dhostapd.c314 bin_clear_free(hapd->tmp_eap_user.identity,
635 u8 *identity; local
637 identity = ieee802_1x_get_identity(sta->eapol_sm,
639 if (identity &&
641 os_memcmp(identity, attr->user_name, identity_len)
H A Dieee802_11.c557 char *identity = NULL; local
634 &psk, &identity, &radius_cui);
680 sta->identity = identity;
681 identity = NULL;
746 os_free(identity);
H A Dieee802_1x.c283 const u8 *identity; local
290 identity = eap_get_identity(sm->eap, &identity_len);
291 if (identity == NULL)
294 /* Save station identity for future RADIUS packets */
295 os_free(sm->identity);
296 sm->identity = (u8 *) dup_binstr(identity, identity_len);
297 if (sm->identity == NULL) {
304 HOSTAPD_LEVEL_DEBUG, "STA identity '%s'", sm->identity);
1287 u8 *buf, *identity; local
1813 const u8 *identity; local
1860 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
108 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument
117 const u8 *identity,
186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Deap.c1035 wpa_printf(MSG_WARNING, "Too short IMSI for SIM identity");
1040 wpa_printf(MSG_WARNING, "Could not add realm to SIM identity");
1060 os_free(conf->identity);
1061 conf->identity = os_malloc(1 + imsi_len);
1062 if (conf->identity == NULL) {
1064 "IMSI-based identity");
1070 conf->identity[0] = '1';
1073 conf->identity[0] = '0';
1076 conf->identity[0] = '6';
1079 os_memcpy(conf->identity
1139 const u8 *identity; local
[all...]
H A Deap_aka.c374 const u8 *identity = NULL; local
384 /* Look for the realm of the permanent identity */
385 identity = eap_get_config_identity(sm, &identity_len);
386 if (identity) {
387 for (realm = identity, realm_len = identity_len;
596 const u8 *identity = NULL; local
602 identity = data->reauth_id;
607 identity = data->pseudonym;
611 identity = eap_get_config_identity(sm, &identity_len);
612 if (identity) {
886 const u8 *identity; local
[all...]
H A Deap_ttls.c430 const u8 *identity, *password; local
436 identity = eap_get_config_identity(sm, &identity_len);
438 if (identity == NULL || password == NULL)
451 identity, identity_len);
485 if (mschapv2_derive_response(identity, identity_len, password,
519 const u8 *identity, *password; local
525 identity = eap_get_config_identity(sm, &identity_len);
527 if (identity == NULL || password == NULL)
540 identity, identity_len);
602 const u8 *identity, *passwor local
655 const u8 *identity, *password; local
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_i.h145 u8 *identity; member in struct:eap_sm
147 /* Whether Phase 2 method should validate identity match */
200 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
H A Deap_server_fast.c61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data
131 u8 *identity = NULL; local
214 identity = pos + 2;
230 if (identity) {
232 "PAC-Opaque", identity, identity_len);
233 os_free(data->identity);
234 data->identity = os_malloc(identity_len);
235 if (data->identity) {
236 os_memcpy(data->identity, identity, identity_le
[all...]
H A Deap_sim_db.c1013 * This function is used to generate a fast re-authentication identity for
1143 * @identity_len: Length of identity
1161 "identity '%s'", reauth_id, permanent);
1204 "identity '%s'", reauth_id, permanent);
1225 * eap_sim_db_get_permanent - EAP-SIM DB: Get permanent identity
1482 * sim_get_username - Extract username from SIM identity
1483 * @identity: Identity
1485 * Returns: Allocated buffer with the username part of the identity
1489 char * sim_get_username(const u8 *identity, size_t identity_len) argument
1493 if (identity
[all...]
/external/wpa_supplicant_8/src/eapol_auth/
H A Deapol_auth_sm_i.h154 u8 *identity; member in struct:eapol_state_machine
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dhostapd.c314 bin_clear_free(hapd->tmp_eap_user.identity,
635 u8 *identity; local
637 identity = ieee802_1x_get_identity(sta->eapol_sm,
639 if (identity &&
641 os_memcmp(identity, attr->user_name, identity_len)
H A Dieee802_11.c557 char *identity = NULL; local
634 &psk, &identity, &radius_cui);
680 sta->identity = identity;
681 identity = NULL;
746 os_free(identity);
H A Dieee802_1x.c283 const u8 *identity; local
290 identity = eap_get_identity(sm->eap, &identity_len);
291 if (identity == NULL)
294 /* Save station identity for future RADIUS packets */
295 os_free(sm->identity);
296 sm->identity = (u8 *) dup_binstr(identity, identity_len);
297 if (sm->identity == NULL) {
304 HOSTAPD_LEVEL_DEBUG, "STA identity '%s'", sm->identity);
1287 u8 *buf, *identity; local
1813 const u8 *identity; local
1860 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
108 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument
117 const u8 *identity,
186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap.c1035 wpa_printf(MSG_WARNING, "Too short IMSI for SIM identity");
1040 wpa_printf(MSG_WARNING, "Could not add realm to SIM identity");
1060 os_free(conf->identity);
1061 conf->identity = os_malloc(1 + imsi_len);
1062 if (conf->identity == NULL) {
1064 "IMSI-based identity");
1070 conf->identity[0] = '1';
1073 conf->identity[0] = '0';
1076 conf->identity[0] = '6';
1079 os_memcpy(conf->identity
1139 const u8 *identity; local
[all...]
H A Deap_aka.c374 const u8 *identity = NULL; local
384 /* Look for the realm of the permanent identity */
385 identity = eap_get_config_identity(sm, &identity_len);
386 if (identity) {
387 for (realm = identity, realm_len = identity_len;
596 const u8 *identity = NULL; local
602 identity = data->reauth_id;
607 identity = data->pseudonym;
611 identity = eap_get_config_identity(sm, &identity_len);
612 if (identity) {
886 const u8 *identity; local
[all...]
H A Deap_ttls.c430 const u8 *identity, *password; local
436 identity = eap_get_config_identity(sm, &identity_len);
438 if (identity == NULL || password == NULL)
451 identity, identity_len);
485 if (mschapv2_derive_response(identity, identity_len, password,
519 const u8 *identity, *password; local
525 identity = eap_get_config_identity(sm, &identity_len);
527 if (identity == NULL || password == NULL)
540 identity, identity_len);
602 const u8 *identity, *passwor local
655 const u8 *identity, *password; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_i.h145 u8 *identity; member in struct:eap_sm
147 /* Whether Phase 2 method should validate identity match */
200 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
H A Deap_server_fast.c61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data
131 u8 *identity = NULL; local
214 identity = pos + 2;
230 if (identity) {
232 "PAC-Opaque", identity, identity_len);
233 os_free(data->identity);
234 data->identity = os_malloc(identity_len);
235 if (data->identity) {
236 os_memcpy(data->identity, identity, identity_le
[all...]
H A Deap_sim_db.c1013 * This function is used to generate a fast re-authentication identity for
1143 * @identity_len: Length of identity
1161 "identity '%s'", reauth_id, permanent);
1204 "identity '%s'", reauth_id, permanent);
1225 * eap_sim_db_get_permanent - EAP-SIM DB: Get permanent identity
1482 * sim_get_username - Extract username from SIM identity
1483 * @identity: Identity
1485 * Returns: Allocated buffer with the username part of the identity
1489 char * sim_get_username(const u8 *identity, size_t identity_len) argument
1493 if (identity
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/
H A Deapol_auth_sm_i.h154 u8 *identity; member in struct:eapol_state_machine
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.ecf.filetransfer_4.0.0.v20100529-0735.jar ... org/eclipse/ecf/filetransfer/events/socketfactory/ org/eclipse/ecf/filetransfer/identity/ org/eclipse/ecf/filetransfer/service/ org/eclipse/ecf/internal/ org ...

Completed in 230 milliseconds

1234567891011>>