/external/wpa_supplicant_8/hostapd/ |
H A D | config_file.c | 278 wpa_printf(MSG_ERROR, "Invalid EAP identity (no \" in " 298 wpa_printf(MSG_ERROR, "Invalid EAP identity " 304 user->identity = os_malloc(pos - start); 305 if (user->identity == NULL) { 307 "memory for EAP identity"); 310 os_memcpy(user->identity, start, pos - start);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | accounting.c | 81 /* Use 802.1X identity if available */ 84 /* Use RADIUS ACL identity if 802.1X provides no identity */ 85 if (!val && sta->identity) { 86 val = (u8 *) sta->identity; 87 len = os_strlen(sta->identity); 91 * identity */
|
H A D | ap_config.c | 381 os_free(user->identity);
|
H A D | ap_config.h | 116 u8 *identity; member in struct:hostapd_eap_user
|
H A D | authsrv.c | 52 static int hostapd_radius_get_eap_user(void *ctx, const u8 *identity, argument 59 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2);
|
H A D | eap_user_db.c | 108 if (os_strcmp(col[i], "identity") == 0 && argv[i]) 119 os_memcmp(argv[id], user->identity, len) == 0 && 133 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, argument 143 os_memcpy(id_str, identity, identity_len); 157 wpa_printf(MSG_INFO, "DB: Unsupported character in identity"); 161 bin_clear_free(hapd->tmp_eap_user.identity, 167 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); 168 if (hapd->tmp_eap_user.identity == NULL) 170 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_le 216 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument [all...] |
H A D | hostapd.c | 314 bin_clear_free(hapd->tmp_eap_user.identity, 635 u8 *identity; local 637 identity = ieee802_1x_get_identity(sta->eapol_sm, 639 if (identity && 641 os_memcmp(identity, attr->user_name, identity_len)
|
H A D | hostapd.h | 428 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity,
|
H A D | ieee802_11.c | 557 char *identity = NULL; local 634 &psk, &identity, &radius_cui); 680 sta->identity = identity; 681 identity = NULL; 746 os_free(identity);
|
H A D | ieee802_11_auth.c | 40 char *identity; member in struct:hostapd_cached_radius_acl 58 os_free(e->identity); 104 char **identity, char **radius_cui) 127 if (identity) { 128 if (entry->identity) 129 *identity = os_strdup(entry->identity); 131 *identity = NULL; 225 * @identity: Buffer for returning identity (fro 100 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument 232 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument [all...] |
H A D | ieee802_11_auth.h | 23 char **identity, char **radius_cui);
|
H A D | ieee802_1x.c | 283 const u8 *identity; local 290 identity = eap_get_identity(sm->eap, &identity_len); 291 if (identity == NULL) 294 /* Save station identity for future RADIUS packets */ 295 os_free(sm->identity); 296 sm->identity = (u8 *) dup_binstr(identity, identity_len); 297 if (sm->identity == NULL) { 304 HOSTAPD_LEVEL_DEBUG, "STA identity '%s'", sm->identity); 1287 u8 *buf, *identity; local 1813 const u8 *identity; local 1860 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument [all...] |
H A D | pmksa_cache_auth.c | 40 os_free(entry->identity); 131 if (eapol->identity) { 132 entry->identity = os_malloc(eapol->identity_len); 133 if (entry->identity) { 135 os_memcpy(entry->identity, eapol->identity, 158 if (entry->identity) { 159 os_free(eapol->identity); 160 eapol->identity = os_malloc(entry->identity_len); 161 if (eapol->identity) { [all...] |
H A D | pmksa_cache_auth.h | 26 u8 *identity; member in struct:rsn_pmksa_cache_entry
|
H A D | sta_info.c | 273 os_free(sta->identity);
|
H A D | sta_info.h | 102 char *identity; /* User-Name from RADIUS */ member in struct:sta_info
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pwd_common.h | 55 u8 identity[0]; /* length inferred from payload */ member in struct:eap_pwd_id
|
H A D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument 37 addr[0] = identity; 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument 62 addr[0] = identity; 108 const u8 *identity, size_t identity_len, 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { 120 "character from the end of identity"); 123 addr[0] = identity; 136 identity, identity_len); 276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 108 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument 117 const u8 *identity, 186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 1035 wpa_printf(MSG_WARNING, "Too short IMSI for SIM identity"); 1040 wpa_printf(MSG_WARNING, "Could not add realm to SIM identity"); 1060 os_free(conf->identity); 1061 conf->identity = os_malloc(1 + imsi_len); 1062 if (conf->identity == NULL) { 1064 "IMSI-based identity"); 1070 conf->identity[0] = '1'; 1073 conf->identity[0] = '0'; 1076 conf->identity[0] = '6'; 1079 os_memcpy(conf->identity 1139 const u8 *identity; local [all...] |
H A D | eap_aka.c | 374 const u8 *identity = NULL; local 384 /* Look for the realm of the permanent identity */ 385 identity = eap_get_config_identity(sm, &identity_len); 386 if (identity) { 387 for (realm = identity, realm_len = identity_len; 596 const u8 *identity = NULL; local 602 identity = data->reauth_id; 607 identity = data->pseudonym; 611 identity = eap_get_config_identity(sm, &identity_len); 612 if (identity) { 886 const u8 *identity; local [all...] |
H A D | eap_config.h | 17 * identity - EAP Identity 19 * This field is used to set the real user identity or NAI (for 22 u8 *identity; member in struct:eap_peer_config 33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 34 * real identity (identity field) only to the authentication server. 36 * If not set, the identity field will be used for both unencrypted and 40 * pseudonym identity. 547 * pending_req_identity - Whether there is a pending identity request
|
H A D | eap_eke.c | 71 const u8 *identity, *password; local 86 identity = eap_get_config_identity(sm, &identity_len); 87 if (identity) { 93 os_memcpy(data->peerid, identity, identity_len);
|
H A D | eap_gpsk.c | 82 const u8 *identity, *password; local 97 identity = eap_get_config_identity(sm, &identity_len); 98 if (identity) { 104 os_memcpy(data->id_peer, identity, identity_len);
|
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; local 99 identity = eap_get_config_identity(sm, &identity_len); 100 if (identity == NULL) 110 wpabuf_put_data(resp, identity, identity_len);
|