Searched refs:identity_len (Results 1 - 25 of 146) sorted by relevance

123456

/external/wpa_supplicant_8/hostapd/src/ap/
H A Deap_user_db.c118 if (len <= user->identity_len &&
134 size_t identity_len, int phase2)
141 if (identity_len >= sizeof(id_str)) {
143 __func__, (int) identity_len,
147 os_memcpy(id_str, identity, identity_len);
148 id_str[identity_len] = '\0';
149 for (i = 0; i < identity_len; i++) {
166 hapd->tmp_eap_user.identity_len);
171 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1);
174 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len);
133 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument
224 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument
[all...]
H A Dpmksa_cache_auth.c150 entry->identity = os_malloc(eapol->identity_len);
152 entry->identity_len = eapol->identity_len;
154 eapol->identity_len);
189 eapol->identity = os_malloc(entry->identity_len);
191 eapol->identity_len = entry->identity_len;
193 entry->identity_len);
196 eapol->identity, eapol->identity_len);
356 entry->identity = os_malloc(old_entry->identity_len);
[all...]
/external/wpa_supplicant_8/src/ap/
H A Deap_user_db.c118 if (len <= user->identity_len &&
134 size_t identity_len, int phase2)
141 if (identity_len >= sizeof(id_str)) {
143 __func__, (int) identity_len,
147 os_memcpy(id_str, identity, identity_len);
148 id_str[identity_len] = '\0';
149 for (i = 0; i < identity_len; i++) {
166 hapd->tmp_eap_user.identity_len);
171 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1);
174 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len);
133 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument
224 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument
[all...]
H A Dpmksa_cache_auth.c150 entry->identity = os_malloc(eapol->identity_len);
152 entry->identity_len = eapol->identity_len;
154 eapol->identity_len);
189 eapol->identity = os_malloc(entry->identity_len);
191 eapol->identity_len = entry->identity_len;
193 entry->identity_len);
196 eapol->identity, eapol->identity_len);
356 entry->identity = os_malloc(old_entry->identity_len);
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Deap_user_db.c118 if (len <= user->identity_len &&
134 size_t identity_len, int phase2)
141 if (identity_len >= sizeof(id_str)) {
143 __func__, (int) identity_len,
147 os_memcpy(id_str, identity, identity_len);
148 id_str[identity_len] = '\0';
149 for (i = 0; i < identity_len; i++) {
166 hapd->tmp_eap_user.identity_len);
171 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1);
174 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len);
133 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument
224 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument
[all...]
H A Dpmksa_cache_auth.c150 entry->identity = os_malloc(eapol->identity_len);
152 entry->identity_len = eapol->identity_len;
154 eapol->identity_len);
189 eapol->identity = os_malloc(entry->identity_len);
191 eapol->identity_len = entry->identity_len;
193 entry->identity_len);
196 eapol->identity, eapol->identity_len);
356 entry->identity = os_malloc(old_entry->identity_len);
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Dmschapv2.c36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument
49 identity, identity_len);
50 username_len = identity_len;
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
99 identity = eap_get_config_identity(sm, &identity_len);
103 plen += 9 + identity_len + 1;
110 wpabuf_put_data(resp, identity, identity_len);
H A Deap_leap.c67 size_t identity_len, password_len, len; local
72 identity = eap_get_config_identity(sm, &identity_len);
110 3 + LEAP_RESPONSE_LEN + identity_len,
125 wpabuf_put_data(resp, identity, identity_len);
141 size_t identity_len; local
145 identity = eap_get_config_identity(sm, &identity_len);
157 3 + LEAP_CHALLENGE_LEN + identity_len,
175 wpabuf_put_data(resp, identity, identity_len);
/external/wpa_supplicant_8/src/eap_peer/
H A Dmschapv2.c36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument
49 identity, identity_len);
50 username_len = identity_len;
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
99 identity = eap_get_config_identity(sm, &identity_len);
103 plen += 9 + identity_len + 1;
110 wpabuf_put_data(resp, identity, identity_len);
H A Deap_leap.c67 size_t identity_len, password_len, len; local
72 identity = eap_get_config_identity(sm, &identity_len);
110 3 + LEAP_RESPONSE_LEN + identity_len,
125 wpabuf_put_data(resp, identity, identity_len);
141 size_t identity_len; local
145 identity = eap_get_config_identity(sm, &identity_len);
157 3 + LEAP_CHALLENGE_LEN + identity_len,
175 wpabuf_put_data(resp, identity, identity_len);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dmschapv2.c36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument
49 identity, identity_len);
50 username_len = identity_len;
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
99 identity = eap_get_config_identity(sm, &identity_len);
103 plen += 9 + identity_len + 1;
110 wpabuf_put_data(resp, identity, identity_len);
H A Deap_leap.c67 size_t identity_len, password_len, len; local
72 identity = eap_get_config_identity(sm, &identity_len);
110 3 + LEAP_RESPONSE_LEN + identity_len,
125 wpabuf_put_data(resp, identity, identity_len);
141 size_t identity_len; local
145 identity = eap_get_config_identity(sm, &identity_len);
157 3 + LEAP_CHALLENGE_LEN + identity_len,
175 wpabuf_put_data(resp, identity, identity_len);
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
109 size_t identity_len,
118 size_t identity_len,
191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_gtc.c132 (pos2 - pos != (int) sm->identity_len ||
133 os_memcmp(pos, sm->identity, sm->identity_len))) {
138 sm->identity, sm->identity_len);
143 sm->identity_len = pos2 - pos;
144 sm->identity = os_malloc(sm->identity_len);
149 os_memcpy(sm->identity, pos, sm->identity_len);
152 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) {
156 sm->identity, sm->identity_len);
H A Deap_server_sim.c129 } else if (sm->identity && sm->identity_len > 0 &&
263 sm->identity_len, data->nonce_s, data->mk,
418 size_t identity_len; local
437 if (!attr->identity || attr->identity_len == 0) {
443 new_identity = os_malloc(attr->identity_len);
448 os_memcpy(sm->identity, attr->identity, attr->identity_len);
449 sm->identity_len = attr->identity_len;
452 sm->identity, sm->identity_len);
453 username = sim_get_username(sm->identity, sm->identity_len);
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
109 size_t identity_len,
118 size_t identity_len,
191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_gtc.c132 (pos2 - pos != (int) sm->identity_len ||
133 os_memcmp(pos, sm->identity, sm->identity_len))) {
138 sm->identity, sm->identity_len);
143 sm->identity_len = pos2 - pos;
144 sm->identity = os_malloc(sm->identity_len);
149 os_memcpy(sm->identity, pos, sm->identity_len);
152 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) {
156 sm->identity, sm->identity_len);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
109 size_t identity_len,
118 size_t identity_len,
191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_gtc.c132 (pos2 - pos != (int) sm->identity_len ||
133 os_memcmp(pos, sm->identity, sm->identity_len))) {
138 sm->identity, sm->identity_len);
143 sm->identity_len = pos2 - pos;
144 sm->identity = os_malloc(sm->identity_len);
149 os_memcpy(sm->identity, pos, sm->identity_len);
152 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) {
156 sm->identity, sm->identity_len);
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius_server.h193 * @identity_len: identity buffer length in octets
203 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
/external/wpa_supplicant_8/src/radius/
H A Dradius_server.h193 * @identity_len: identity buffer length in octets
203 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius_server.h193 * @identity_len: identity buffer length in octets
203 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,

Completed in 1963 milliseconds

123456