/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | eap_user_db.c | 118 if (len <= user->identity_len && 134 size_t identity_len, int phase2) 141 if (identity_len >= sizeof(id_str)) { 143 __func__, (int) identity_len, 147 os_memcpy(id_str, identity, identity_len); 148 id_str[identity_len] = '\0'; 149 for (i = 0; i < identity_len; i++) { 166 hapd->tmp_eap_user.identity_len); 171 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); 174 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); 133 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument 224 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument [all...] |
H A D | pmksa_cache_auth.c | 150 entry->identity = os_malloc(eapol->identity_len); 152 entry->identity_len = eapol->identity_len; 154 eapol->identity_len); 189 eapol->identity = os_malloc(entry->identity_len); 191 eapol->identity_len = entry->identity_len; 193 entry->identity_len); 196 eapol->identity, eapol->identity_len); 356 entry->identity = os_malloc(old_entry->identity_len); [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | eap_user_db.c | 118 if (len <= user->identity_len && 134 size_t identity_len, int phase2) 141 if (identity_len >= sizeof(id_str)) { 143 __func__, (int) identity_len, 147 os_memcpy(id_str, identity, identity_len); 148 id_str[identity_len] = '\0'; 149 for (i = 0; i < identity_len; i++) { 166 hapd->tmp_eap_user.identity_len); 171 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); 174 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); 133 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument 224 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument [all...] |
H A D | pmksa_cache_auth.c | 150 entry->identity = os_malloc(eapol->identity_len); 152 entry->identity_len = eapol->identity_len; 154 eapol->identity_len); 189 eapol->identity = os_malloc(entry->identity_len); 191 eapol->identity_len = entry->identity_len; 193 entry->identity_len); 196 eapol->identity, eapol->identity_len); 356 entry->identity = os_malloc(old_entry->identity_len); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | eap_user_db.c | 118 if (len <= user->identity_len && 134 size_t identity_len, int phase2) 141 if (identity_len >= sizeof(id_str)) { 143 __func__, (int) identity_len, 147 os_memcpy(id_str, identity, identity_len); 148 id_str[identity_len] = '\0'; 149 for (i = 0; i < identity_len; i++) { 166 hapd->tmp_eap_user.identity_len); 171 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); 174 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); 133 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument 224 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument [all...] |
H A D | pmksa_cache_auth.c | 150 entry->identity = os_malloc(eapol->identity_len); 152 entry->identity_len = eapol->identity_len; 154 eapol->identity_len); 189 eapol->identity = os_malloc(entry->identity_len); 191 eapol->identity_len = entry->identity_len; 193 entry->identity_len); 196 eapol->identity, eapol->identity_len); 356 entry->identity = os_malloc(old_entry->identity_len); [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | mschapv2.c | 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument 49 identity, identity_len); 50 username_len = identity_len;
|
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 99 identity = eap_get_config_identity(sm, &identity_len); 103 plen += 9 + identity_len + 1; 110 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_leap.c | 67 size_t identity_len, password_len, len; local 72 identity = eap_get_config_identity(sm, &identity_len); 110 3 + LEAP_RESPONSE_LEN + identity_len, 125 wpabuf_put_data(resp, identity, identity_len); 141 size_t identity_len; local 145 identity = eap_get_config_identity(sm, &identity_len); 157 3 + LEAP_CHALLENGE_LEN + identity_len, 175 wpabuf_put_data(resp, identity, identity_len);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | mschapv2.c | 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument 49 identity, identity_len); 50 username_len = identity_len;
|
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 99 identity = eap_get_config_identity(sm, &identity_len); 103 plen += 9 + identity_len + 1; 110 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_leap.c | 67 size_t identity_len, password_len, len; local 72 identity = eap_get_config_identity(sm, &identity_len); 110 3 + LEAP_RESPONSE_LEN + identity_len, 125 wpabuf_put_data(resp, identity, identity_len); 141 size_t identity_len; local 145 identity = eap_get_config_identity(sm, &identity_len); 157 3 + LEAP_CHALLENGE_LEN + identity_len, 175 wpabuf_put_data(resp, identity, identity_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | mschapv2.c | 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument 49 identity, identity_len); 50 username_len = identity_len;
|
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 99 identity = eap_get_config_identity(sm, &identity_len); 103 plen += 9 + identity_len + 1; 110 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_leap.c | 67 size_t identity_len, password_len, len; local 72 identity = eap_get_config_identity(sm, &identity_len); 110 3 + LEAP_RESPONSE_LEN + identity_len, 125 wpabuf_put_data(resp, identity, identity_len); 141 size_t identity_len; local 145 identity = eap_get_config_identity(sm, &identity_len); 157 3 + LEAP_CHALLENGE_LEN + identity_len, 175 wpabuf_put_data(resp, identity, identity_len);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 109 size_t identity_len, 118 size_t identity_len, 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_gtc.c | 132 (pos2 - pos != (int) sm->identity_len || 133 os_memcmp(pos, sm->identity, sm->identity_len))) { 138 sm->identity, sm->identity_len); 143 sm->identity_len = pos2 - pos; 144 sm->identity = os_malloc(sm->identity_len); 149 os_memcpy(sm->identity, pos, sm->identity_len); 152 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { 156 sm->identity, sm->identity_len);
|
H A D | eap_server_sim.c | 129 } else if (sm->identity && sm->identity_len > 0 && 263 sm->identity_len, data->nonce_s, data->mk, 418 size_t identity_len; local 437 if (!attr->identity || attr->identity_len == 0) { 443 new_identity = os_malloc(attr->identity_len); 448 os_memcpy(sm->identity, attr->identity, attr->identity_len); 449 sm->identity_len = attr->identity_len; 452 sm->identity, sm->identity_len); 453 username = sim_get_username(sm->identity, sm->identity_len); [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 109 size_t identity_len, 118 size_t identity_len, 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_gtc.c | 132 (pos2 - pos != (int) sm->identity_len || 133 os_memcmp(pos, sm->identity, sm->identity_len))) { 138 sm->identity, sm->identity_len); 143 sm->identity_len = pos2 - pos; 144 sm->identity = os_malloc(sm->identity_len); 149 os_memcpy(sm->identity, pos, sm->identity_len); 152 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { 156 sm->identity, sm->identity_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 109 size_t identity_len, 118 size_t identity_len, 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_gtc.c | 132 (pos2 - pos != (int) sm->identity_len || 133 os_memcmp(pos, sm->identity, sm->identity_len))) { 138 sm->identity, sm->identity_len); 143 sm->identity_len = pos2 - pos; 144 sm->identity = os_malloc(sm->identity_len); 149 os_memcpy(sm->identity, pos, sm->identity_len); 152 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { 156 sm->identity, sm->identity_len);
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_server.h | 193 * @identity_len: identity buffer length in octets 203 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_server.h | 193 * @identity_len: identity buffer length in octets 203 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_server.h | 193 * @identity_len: identity buffer length in octets 203 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|