/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_openbsd.c | 50 struct ieee80211_bssid id; local 52 os_strlcpy(id.i_name, drv->ifname, sizeof(id.i_name)); 53 if (ioctl(drv->sock, SIOCG80211BSSID, &id) < 0) 56 os_memcpy(bssid, id.i_bssid, IEEE80211_ADDR_LEN);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | chap.c | 15 int chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, argument 21 addr[0] = &id;
|
H A D | eap_eke_common.c | 339 u8 *id; local 350 id = os_malloc(id_s_len + id_p_len); 351 if (id == NULL) 353 os_memcpy(id, id_s, id_s_len); 354 os_memcpy(id + id_s_len, id_p, id_p_len); 356 id, id_s_len + id_p_len); 358 id, id_s_len + id_p_len, key, key_len) < 0) { 359 os_free(id); 362 os_free(id);
|
H A D | eap_ikev2_common.c | 51 struct wpabuf * eap_ikev2_build_frag_ack(u8 id, u8 code) argument 55 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, 0, code, id);
|
H A D | eap_sim_common.c | 978 struct eap_sim_msg * eap_sim_msg_init(int code, int id, int type, int subtype) argument 995 eap->identifier = id;
|
H A D | eap_wsc_common.c | 17 struct wpabuf * eap_wsc_build_frag_ack(u8 id, u8 code) argument 21 msg = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, 2, code, id);
|
H A D | ikev2_common.c | 43 const struct ikev2_integ_alg * ikev2_get_integ(int id) argument 48 if (ikev2_integ_algs[i].id == id) 82 const struct ikev2_prf_alg * ikev2_get_prf(int id) argument 87 if (ikev2_prf_algs[i].id == id) 163 const struct ikev2_encr_alg * ikev2_get_encr(int id) argument 168 if (ikev2_encr_algs[i].id == id) 391 if (ikev2_prf_hash(prf->id, SK_ [all...] |
H A D | ikev2_common.h | 253 int id; member in struct:ikev2_integ_alg 259 int id; member in struct:ikev2_prf_alg 265 int id; member in struct:ikev2_encr_alg 270 const struct ikev2_integ_alg * ikev2_get_integ(int id); 273 const struct ikev2_prf_alg * ikev2_get_prf(int id); 280 const struct ikev2_encr_alg * ikev2_get_encr(int id);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 40 static struct wpabuf * eap_sm_buildNak(struct eap_sm *sm, int id); 44 static struct wpabuf * eap_sm_buildNotify(int id); 652 * AS is incorrectly using the same id again; and 828 struct eap_sm *sm, int id, const struct eap_method *methods, 839 8 + 8 * (count + 1), EAP_CODE_RESPONSE, id); 874 static struct wpabuf * eap_sm_buildNak(struct eap_sm *sm, int id) argument 889 return eap_sm_build_expanded_nak(sm, id, methods, count); 894 EAP_CODE_RESPONSE, id); 1127 * @id: EAP identifier for the packet 1135 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, in argument 827 eap_sm_build_expanded_nak( struct eap_sm *sm, int id, const struct eap_method *methods, size_t count) argument 1220 eap_sm_buildNotify(int id) argument 2425 eap_set_anon_id(struct eap_sm *sm, const u8 *id, size_t len) argument [all...] |
H A D | eap_aka.c | 346 struct eap_aka_data *data, int id) 348 if ((id & CLEAR_PSEUDONYM) && data->pseudonym) { 355 if ((id & CLEAR_REAUTH_ID) && data->reauth_id) { 361 if ((id & CLEAR_EAP_ID) && data->last_eap_identity) { 537 static struct wpabuf * eap_aka_client_error(struct eap_aka_data *data, u8 id, argument 548 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method, 556 u8 id) 565 "(id=%d)", id); 566 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, dat 345 eap_aka_clear_identities(struct eap_sm *sm, struct eap_aka_data *data, int id) argument 555 eap_aka_authentication_reject(struct eap_aka_data *data, u8 id) argument 572 eap_aka_synchronization_failure( struct eap_aka_data *data, u8 id) argument 591 eap_aka_response_identity(struct eap_sm *sm, struct eap_aka_data *data, u8 id, enum eap_sim_id_req id_req) argument 635 eap_aka_response_challenge(struct eap_aka_data *data, u8 id) argument 658 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument 701 eap_aka_response_notification(struct eap_aka_data *data, u8 id, u16 notification) argument 734 eap_aka_process_identity(struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 797 eap_aka_prime_kdf_select(struct eap_aka_data *data, u8 id, u16 kdf) argument 814 eap_aka_prime_kdf_neg(struct eap_aka_data *data, u8 id, struct eap_sim_attrs *attr) argument 880 eap_aka_process_challenge(struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1119 eap_aka_process_notification( struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1154 eap_aka_process_reauthentication( struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1283 u8 subtype, id; local 1454 u8 *id; local [all...] |
H A D | eap_eke.c | 145 static struct wpabuf * eap_eke_build_msg(struct eap_eke_data *data, int id, argument 154 EAP_CODE_RESPONSE, id);
|
H A D | eap_fast.c | 1528 u8 flags, id; local 1539 id = req->identifier; 1568 data->fast_version, id, pos, 1608 return eap_peer_tls_build_ack(id, EAP_TYPE_FAST, 1706 u8 *id; local 1711 id = os_malloc(data->id_len); 1712 if (id == NULL) 1716 os_memcpy(id, data->session_id, data->id_len); 1718 return id;
|
H A D | eap_gtc.c | 53 u8 id; local 60 id = eap_get_id(reqData); 73 0, EAP_CODE_RESPONSE, id); 105 EAP_CODE_RESPONSE, id);
|
H A D | eap_ikev2.c | 137 struct eap_method_ret *ret, u8 id) 177 EAP_CODE_RESPONSE, id); 290 u8 id, u8 flags, 318 return eap_ikev2_build_frag_ack(id, EAP_CODE_RESPONSE); 329 u8 flags, id; local 339 id = eap_get_id(reqData); 386 return eap_ikev2_build_msg(data, ret, id); 395 return eap_ikev2_process_fragment(data, ret, id, flags, 428 return eap_ikev2_build_msg(data, ret, id); 136 eap_ikev2_build_msg(struct eap_ikev2_data *data, struct eap_method_ret *ret, u8 id) argument 288 eap_ikev2_process_fragment(struct eap_ikev2_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u32 message_length, const u8 *buf, size_t len) argument
|
H A D | eap_md5.c | 35 u8 *rpos, id; local 87 id = eap_get_id(resp); 89 if (chap_md5(id, password, password_len, challenge, challenge_len,
|
H A D | eap_mschapv2.c | 148 struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, 169 EAP_CODE_RESPONSE, id); 223 "(response)", id, ms->mschapv2_id); 235 * @id: EAP identifier used in the request 242 size_t req_len, u8 id) 292 return eap_mschapv2_challenge_reply(sm, data, id, req->mschapv2_id, 340 * @id: EAP identifier used in th erequest 348 size_t req_len, u8 id) 378 EAP_CODE_RESPONSE, id); 505 struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id) 147 eap_mschapv2_challenge_reply( struct eap_sm *sm, struct eap_mschapv2_data *data, u8 id, u8 mschapv2_id, const u8 *auth_challenge) argument 239 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 344 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 503 eap_mschapv2_change_password( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id) argument 638 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 772 u8 id; local [all...] |
H A D | eap_pax.c | 94 u8 id, u8 op_code, size_t plen) 100 sizeof(*pax) + plen, EAP_CODE_RESPONSE, id); 116 struct eap_method_ret *ret, u8 id, 191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); 232 struct eap_method_ret *ret, u8 id, 301 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_ACK, EAP_PAX_ICV_LEN); 329 u8 icvbuf[EAP_PAX_ICV_LEN], id; local 339 id = eap_get_id(reqData); 434 resp = eap_pax_process_std_1(data, ret, id, req, flen); 437 resp = eap_pax_process_std_3(data, ret, id, re 93 eap_pax_alloc_resp(const struct eap_pax_hdr *req, u8 id, u8 op_code, size_t plen) argument 115 eap_pax_process_std_1(struct eap_pax_data *data, struct eap_method_ret *ret, u8 id, const struct eap_pax_hdr *req, size_t req_plen) argument 231 eap_pax_process_std_3(struct eap_pax_data *data, struct eap_method_ret *ret, u8 id, const struct eap_pax_hdr *req, size_t req_plen) argument [all...] |
H A D | eap_peap.c | 200 * @id: EAP identifier for the header 207 static struct wpabuf * eap_tlv_build_nak(int id, u16 nak_type) argument 212 EAP_CODE_RESPONSE, id); 350 * @id: EAP identifier for the header 360 int id, u16 status) 372 EAP_CODE_RESPONSE, id); 967 u8 flags, id; local 977 id = req->identifier; 1010 data->peap_version, id, pos, 1099 return eap_peer_tls_build_ack(id, EAP_TYPE_PEA 357 eap_tlv_build_result(struct eap_sm *sm, struct eap_peap_data *data, int crypto_tlv_used, int id, u16 status) argument 1215 u8 *id; local [all...] |
H A D | eap_psk.c | 442 u8 *id; local 448 id = os_malloc(*len); 449 if (id == NULL) 452 id[0] = EAP_TYPE_PSK; 453 os_memcpy(id + 1, data->rand_p, EAP_PSK_RAND_LEN); 454 os_memcpy(id + 1 + EAP_PSK_RAND_LEN, data->rand_s, EAP_PSK_RAND_LEN); 455 wpa_hexdump(MSG_DEBUG, "EAP-PSK: Derived Session-Id", id, *len); 457 return id;
|
H A D | eap_pwd.c | 114 wpa_printf(MSG_INFO, "EAP-PWD: memory allocation id fail"); 196 u8 *id; local 201 id = os_malloc(1 + SHA256_MAC_LEN); 202 if (id == NULL) 205 os_memcpy(id, data->session_id, 1 + SHA256_MAC_LEN); 208 return id; 218 struct eap_pwd_id *id; local 232 id = (struct eap_pwd_id *) payload; 233 data->group_num = be_to_host16(id->group_num); 234 if ((id [all...] |
H A D | eap_sake.c | 116 int id, size_t length, u8 subtype) 125 EAP_CODE_RESPONSE, id); 458 u8 *id; local 464 id = os_malloc(*len); 465 if (id == NULL) 468 id[0] = EAP_TYPE_SAKE; 469 os_memcpy(id + 1, data->rand_s, EAP_SAKE_RAND_LEN); 470 os_memcpy(id + 1 + EAP_SAKE_RAND_LEN, data->rand_s, EAP_SAKE_RAND_LEN); 471 wpa_hexdump(MSG_DEBUG, "EAP-SAKE: Derived Session-Id", id, *len); 473 return id; 115 eap_sake_build_msg(struct eap_sake_data *data, int id, size_t length, u8 subtype) argument [all...] |
H A D | eap_sim.c | 366 struct eap_sim_data *data, int id) 368 if ((id & CLEAR_PSEUDONYM) && data->pseudonym) { 375 if ((id & CLEAR_REAUTH_ID) && data->reauth_id) { 381 if ((id & CLEAR_EAP_ID) && data->last_eap_identity) { 453 static struct wpabuf * eap_sim_client_error(struct eap_sim_data *data, u8 id, argument 464 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, EAP_TYPE_SIM, 472 struct eap_sim_data *data, u8 id, 499 wpa_printf(MSG_DEBUG, "Generating EAP-SIM Start (id=%d)", id); 500 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, 365 eap_sim_clear_identities(struct eap_sm *sm, struct eap_sim_data *data, int id) argument 471 eap_sim_response_start(struct eap_sm *sm, struct eap_sim_data *data, u8 id, enum eap_sim_id_req id_req) argument 524 eap_sim_response_challenge(struct eap_sim_data *data, u8 id) argument 544 eap_sim_response_reauth(struct eap_sim_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument 586 eap_sim_response_notification(struct eap_sim_data *data, u8 id, u16 notification) argument 619 eap_sim_process_start(struct eap_sm *sm, struct eap_sim_data *data, u8 id, struct eap_sim_attrs *attr) argument 695 eap_sim_process_challenge(struct eap_sm *sm, struct eap_sim_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 882 eap_sim_process_notification( struct eap_sm *sm, struct eap_sim_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 917 eap_sim_process_reauthentication( struct eap_sm *sm, struct eap_sim_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1030 u8 subtype, id; local 1196 u8 *id; local [all...] |
H A D | eap_tls.c | 152 struct wpabuf *resp, u8 id) 181 return eap_peer_tls_build_ack(id, data->eap_type, 0); 228 u8 flags, id; local 236 id = eap_get_id(reqData); 246 id, pos, left, &resp); 249 return eap_tls_failure(sm, data, ret, res, resp, id); 257 return eap_peer_tls_build_ack(id, data->eap_type, 0); 346 u8 *id; local 351 id = os_malloc(data->id_len); 352 if (id 149 eap_tls_failure(struct eap_sm *sm, struct eap_tls_data *data, struct eap_method_ret *ret, int res, struct wpabuf *resp, u8 id) argument [all...] |
H A D | eap_tls_common.c | 569 * @id: EAP identifier for the response 575 int peap_version, u8 id, int ret, 618 EAP_CODE_RESPONSE, id); 649 * @id: EAP identifier for the response 674 u8 id, const u8 *in_data, size_t in_len, 739 return eap_tls_process_output(data, eap_type, peap_version, id, ret, 746 * @id: EAP identifier for the response 751 struct wpabuf * eap_peer_tls_build_ack(u8 id, EapType eap_type, argument 756 resp = eap_tls_msg_alloc(eap_type, 1, EAP_CODE_RESPONSE, id); 759 wpa_printf(MSG_DEBUG, "SSL: Building ACK (type=%d id 574 eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, int ret, struct wpabuf **out_data) argument 672 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 990 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_tnc.c | 65 static struct wpabuf * eap_tnc_build_frag_ack(u8 id, u8 code) argument 69 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, code, id); 84 struct eap_method_ret *ret, u8 id) 109 EAP_CODE_RESPONSE, id); 164 u8 id, u8 flags, 192 return eap_tnc_build_frag_ack(id, EAP_CODE_RESPONSE); 209 u8 flags, id; local 221 id = eap_get_id(reqData); 268 return eap_tnc_build_msg(data, ret, id); 277 return eap_tnc_process_fragment(data, ret, id, flag 83 eap_tnc_build_msg(struct eap_tnc_data *data, struct eap_method_ret *ret, u8 id) argument 162 eap_tnc_process_fragment(struct eap_tnc_data *data, struct eap_method_ret *ret, u8 id, u8 flags, u32 message_length, const u8 *buf, size_t len) argument [all...] |