Searched refs:identity (Results 1 - 25 of 521) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/hostapd/
H A Dconfig_file.c278 wpa_printf(MSG_ERROR, "Invalid EAP identity (no \" in "
298 wpa_printf(MSG_ERROR, "Invalid EAP identity "
304 user->identity = os_malloc(pos - start);
305 if (user->identity == NULL) {
307 "memory for EAP identity");
310 os_memcpy(user->identity, start, pos - start);
/external/wpa_supplicant_8/hostapd/src/ap/
H A Daccounting.c81 /* Use 802.1X identity if available */
84 /* Use RADIUS ACL identity if 802.1X provides no identity */
85 if (!val && sta->identity) {
86 val = (u8 *) sta->identity;
87 len = os_strlen(sta->identity);
91 * identity */
H A Dap_config.c381 os_free(user->identity);
H A Dap_config.h116 u8 *identity; member in struct:hostapd_eap_user
H A Dauthsrv.c52 static int hostapd_radius_get_eap_user(void *ctx, const u8 *identity, argument
59 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2);
H A Deap_user_db.c108 if (os_strcmp(col[i], "identity") == 0 && argv[i])
119 os_memcmp(argv[id], user->identity, len) == 0 &&
133 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, argument
143 os_memcpy(id_str, identity, identity_len);
157 wpa_printf(MSG_INFO, "DB: Unsupported character in identity");
161 bin_clear_free(hapd->tmp_eap_user.identity,
167 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1);
168 if (hapd->tmp_eap_user.identity == NULL)
170 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_le
216 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument
[all...]
H A Dhostapd.c314 bin_clear_free(hapd->tmp_eap_user.identity,
635 u8 *identity; local
637 identity = ieee802_1x_get_identity(sta->eapol_sm,
639 if (identity &&
641 os_memcmp(identity, attr->user_name, identity_len)
H A Dhostapd.h428 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity,
H A Dieee802_11.c557 char *identity = NULL; local
634 &psk, &identity, &radius_cui);
680 sta->identity = identity;
681 identity = NULL;
746 os_free(identity);
H A Dieee802_11_auth.c40 char *identity; member in struct:hostapd_cached_radius_acl
58 os_free(e->identity);
104 char **identity, char **radius_cui)
127 if (identity) {
128 if (entry->identity)
129 *identity = os_strdup(entry->identity);
131 *identity = NULL;
225 * @identity: Buffer for returning identity (fro
100 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument
232 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument
[all...]
H A Dieee802_11_auth.h23 char **identity, char **radius_cui);
H A Dieee802_1x.c283 const u8 *identity; local
290 identity = eap_get_identity(sm->eap, &identity_len);
291 if (identity == NULL)
294 /* Save station identity for future RADIUS packets */
295 os_free(sm->identity);
296 sm->identity = (u8 *) dup_binstr(identity, identity_len);
297 if (sm->identity == NULL) {
304 HOSTAPD_LEVEL_DEBUG, "STA identity '%s'", sm->identity);
1287 u8 *buf, *identity; local
1813 const u8 *identity; local
1860 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
[all...]
H A Dpmksa_cache_auth.c40 os_free(entry->identity);
131 if (eapol->identity) {
132 entry->identity = os_malloc(eapol->identity_len);
133 if (entry->identity) {
135 os_memcpy(entry->identity, eapol->identity,
158 if (entry->identity) {
159 os_free(eapol->identity);
160 eapol->identity = os_malloc(entry->identity_len);
161 if (eapol->identity) {
[all...]
H A Dpmksa_cache_auth.h26 u8 *identity; member in struct:rsn_pmksa_cache_entry
H A Dsta_info.c273 os_free(sta->identity);
H A Dsta_info.h102 char *identity; /* User-Name from RADIUS */ member in struct:sta_info
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_pwd_common.h55 u8 identity[0]; /* length inferred from payload */ member in struct:eap_pwd_id
H A Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument
37 addr[0] = identity;
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument
62 addr[0] = identity;
108 const u8 *identity, size_t identity_len,
118 while (identity_len > 0 && identity[identity_len - 1] == 0) {
120 "character from the end of identity");
123 addr[0] = identity;
136 identity, identity_len);
276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
108 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument
117 const u8 *identity,
186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap.c1035 wpa_printf(MSG_WARNING, "Too short IMSI for SIM identity");
1040 wpa_printf(MSG_WARNING, "Could not add realm to SIM identity");
1060 os_free(conf->identity);
1061 conf->identity = os_malloc(1 + imsi_len);
1062 if (conf->identity == NULL) {
1064 "IMSI-based identity");
1070 conf->identity[0] = '1';
1073 conf->identity[0] = '0';
1076 conf->identity[0] = '6';
1079 os_memcpy(conf->identity
1139 const u8 *identity; local
[all...]
H A Deap_aka.c374 const u8 *identity = NULL; local
384 /* Look for the realm of the permanent identity */
385 identity = eap_get_config_identity(sm, &identity_len);
386 if (identity) {
387 for (realm = identity, realm_len = identity_len;
596 const u8 *identity = NULL; local
602 identity = data->reauth_id;
607 identity = data->pseudonym;
611 identity = eap_get_config_identity(sm, &identity_len);
612 if (identity) {
886 const u8 *identity; local
[all...]
H A Deap_config.h17 * identity - EAP Identity
19 * This field is used to set the real user identity or NAI (for
22 u8 *identity; member in struct:eap_peer_config
33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
34 * real identity (identity field) only to the authentication server.
36 * If not set, the identity field will be used for both unencrypted and
40 * pseudonym identity.
547 * pending_req_identity - Whether there is a pending identity request
H A Deap_eke.c71 const u8 *identity, *password; local
86 identity = eap_get_config_identity(sm, &identity_len);
87 if (identity) {
93 os_memcpy(data->peerid, identity, identity_len);
H A Deap_gpsk.c82 const u8 *identity, *password; local
97 identity = eap_get_config_identity(sm, &identity_len);
98 if (identity) {
104 os_memcpy(data->id_peer, identity, identity_len);
H A Deap_gtc.c50 const u8 *pos, *password, *identity; local
99 identity = eap_get_config_identity(sm, &identity_len);
100 if (identity == NULL)
110 wpabuf_put_data(resp, identity, identity_len);

Completed in 1374 milliseconds

1234567891011>>