/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_server.h | 164 * @identity_len: identity buffer length in octets 174 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_server.h | 164 * @identity_len: identity buffer length in octets 174 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_server.h | 164 * @identity_len: identity buffer length in octets 174 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
H A D | link_test.c | 74 size_t identity_len, int phase2) 73 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, size_t identity_len, int phase2) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_leap.c | 72 size_t identity_len, password_len, len; local 77 identity = eap_get_config_identity(sm, &identity_len); 115 3 + LEAP_RESPONSE_LEN + identity_len, 130 wpabuf_put_data(resp, identity, identity_len); 146 size_t identity_len; local 150 identity = eap_get_config_identity(sm, &identity_len); 162 3 + LEAP_CHALLENGE_LEN + identity_len, 180 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_config.h | 31 * identity_len - EAP Identity length 33 size_t identity_len; member in struct:eap_peer_config
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_i.h | 152 size_t identity_len; member in struct:eap_sm 190 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_leap.c | 67 size_t identity_len, password_len, len; local 72 identity = eap_get_config_identity(sm, &identity_len); 110 3 + LEAP_RESPONSE_LEN + identity_len, 125 wpabuf_put_data(resp, identity, identity_len); 141 size_t identity_len; local 145 identity = eap_get_config_identity(sm, &identity_len); 157 3 + LEAP_CHALLENGE_LEN + identity_len, 175 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_config.h | 25 * identity_len - EAP Identity length 27 size_t identity_len; member in struct:eap_peer_config
|
H A D | eap_sim.c | 300 size_t identity_len = 0; local 310 identity = eap_get_config_identity(sm, &identity_len); 312 for (realm = identity, realm_len = identity_len; 381 size_t identity_len = 0; local 387 identity_len = data->reauth_id_len; 392 identity_len = data->pseudonym_len; 395 identity = eap_get_config_identity(sm, &identity_len); 420 identity, identity_len); 421 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len, 422 identity, identity_len); 606 size_t identity_len; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_i.h | 146 size_t identity_len; member in struct:eap_sm 193 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
H A D | eap_server_sim.c | 128 } else if (sm->identity && sm->identity_len > 0 && 262 sm->identity_len, data->nonce_s, data->mk, 417 size_t identity_len; local 436 if (!attr->identity || attr->identity_len == 0) { 442 new_identity = os_malloc(attr->identity_len); 447 os_memcpy(sm->identity, attr->identity, attr->identity_len); 448 sm->identity_len = attr->identity_len; 451 sm->identity, sm->identity_len); 452 username = sim_get_username(sm->identity, sm->identity_len); [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_leap.c | 67 size_t identity_len, password_len, len; local 72 identity = eap_get_config_identity(sm, &identity_len); 110 3 + LEAP_RESPONSE_LEN + identity_len, 125 wpabuf_put_data(resp, identity, identity_len); 141 size_t identity_len; local 145 identity = eap_get_config_identity(sm, &identity_len); 157 3 + LEAP_CHALLENGE_LEN + identity_len, 175 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_config.h | 25 * identity_len - EAP Identity length 27 size_t identity_len; member in struct:eap_peer_config
|
H A D | eap_sim.c | 300 size_t identity_len = 0; local 310 identity = eap_get_config_identity(sm, &identity_len); 312 for (realm = identity, realm_len = identity_len; 381 size_t identity_len = 0; local 387 identity_len = data->reauth_id_len; 392 identity_len = data->pseudonym_len; 395 identity = eap_get_config_identity(sm, &identity_len); 420 identity, identity_len); 421 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len, 422 identity, identity_len); 606 size_t identity_len; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_i.h | 146 size_t identity_len; member in struct:eap_sm 193 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
H A D | eap_server_sim.c | 128 } else if (sm->identity && sm->identity_len > 0 && 262 sm->identity_len, data->nonce_s, data->mk, 417 size_t identity_len; local 436 if (!attr->identity || attr->identity_len == 0) { 442 new_identity = os_malloc(attr->identity_len); 447 os_memcpy(sm->identity, attr->identity, attr->identity_len); 448 sm->identity_len = attr->identity_len; 451 sm->identity, sm->identity_len); 452 username = sim_get_username(sm->identity, sm->identity_len); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_leap.c | 67 size_t identity_len, password_len, len; local 72 identity = eap_get_config_identity(sm, &identity_len); 110 3 + LEAP_RESPONSE_LEN + identity_len, 125 wpabuf_put_data(resp, identity, identity_len); 141 size_t identity_len; local 145 identity = eap_get_config_identity(sm, &identity_len); 157 3 + LEAP_CHALLENGE_LEN + identity_len, 175 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_config.h | 25 * identity_len - EAP Identity length 27 size_t identity_len; member in struct:eap_peer_config
|
H A D | eap_sim.c | 300 size_t identity_len = 0; local 310 identity = eap_get_config_identity(sm, &identity_len); 312 for (realm = identity, realm_len = identity_len; 381 size_t identity_len = 0; local 387 identity_len = data->reauth_id_len; 392 identity_len = data->pseudonym_len; 395 identity = eap_get_config_identity(sm, &identity_len); 420 identity, identity_len); 421 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len, 422 identity, identity_len); 606 size_t identity_len; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_i.h | 146 size_t identity_len; member in struct:eap_sm 193 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
H A D | eap_server_sim.c | 128 } else if (sm->identity && sm->identity_len > 0 && 262 sm->identity_len, data->nonce_s, data->mk, 417 size_t identity_len; local 436 if (!attr->identity || attr->identity_len == 0) { 442 new_identity = os_malloc(attr->identity_len); 447 os_memcpy(sm->identity, attr->identity, attr->identity_len); 448 sm->identity_len = attr->identity_len; 451 sm->identity, sm->identity_len); 452 username = sim_get_username(sm->identity, sm->identity_len); [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | pmksa_cache_auth.h | 27 size_t identity_len; member in struct:rsn_pmksa_cache_entry
|
/external/wpa_supplicant_8/src/ap/ |
H A D | pmksa_cache_auth.h | 27 size_t identity_len; member in struct:rsn_pmksa_cache_entry
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | pmksa_cache_auth.h | 27 size_t identity_len; member in struct:rsn_pmksa_cache_entry
|