Home
last modified time | relevance | path

Searched refs:identity_len (Results 1 – 25 of 127) sorted by relevance

123456

/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Deap_user_db.c120 if (len <= user->identity_len && in get_wildcard_cb()
136 size_t identity_len, int phase2) in eap_user_sqlite_get() argument
144 if (identity_len >= sizeof(id_str)) { in eap_user_sqlite_get()
146 __func__, (int) identity_len, in eap_user_sqlite_get()
150 os_memcpy(id_str, identity, identity_len); in eap_user_sqlite_get()
151 id_str[identity_len] = '\0'; in eap_user_sqlite_get()
152 for (i = 0; i < identity_len; i++) { in eap_user_sqlite_get()
169 hapd->tmp_eap_user.identity_len); in eap_user_sqlite_get()
174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); in eap_user_sqlite_get()
177 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); in eap_user_sqlite_get()
[all …]
Dpmksa_cache_auth.c150 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data()
152 entry->identity_len = eapol->identity_len; in pmksa_cache_from_eapol_data()
154 eapol->identity_len); in pmksa_cache_from_eapol_data()
189 eapol->identity = os_malloc(entry->identity_len); in pmksa_cache_to_eapol_data()
191 eapol->identity_len = entry->identity_len; in pmksa_cache_to_eapol_data()
193 entry->identity_len); in pmksa_cache_to_eapol_data()
196 eapol->identity, eapol->identity_len); in pmksa_cache_to_eapol_data()
411 entry->identity = os_malloc(old_entry->identity_len); in pmksa_cache_add_okc()
413 entry->identity_len = old_entry->identity_len; in pmksa_cache_add_okc()
415 old_entry->identity_len); in pmksa_cache_add_okc()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Deap_user_db.c120 if (len <= user->identity_len && in get_wildcard_cb()
136 size_t identity_len, int phase2) in eap_user_sqlite_get() argument
144 if (identity_len >= sizeof(id_str)) { in eap_user_sqlite_get()
146 __func__, (int) identity_len, in eap_user_sqlite_get()
150 os_memcpy(id_str, identity, identity_len); in eap_user_sqlite_get()
151 id_str[identity_len] = '\0'; in eap_user_sqlite_get()
152 for (i = 0; i < identity_len; i++) { in eap_user_sqlite_get()
169 hapd->tmp_eap_user.identity_len); in eap_user_sqlite_get()
174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); in eap_user_sqlite_get()
177 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); in eap_user_sqlite_get()
[all …]
Dpmksa_cache_auth.c150 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data()
152 entry->identity_len = eapol->identity_len; in pmksa_cache_from_eapol_data()
154 eapol->identity_len); in pmksa_cache_from_eapol_data()
189 eapol->identity = os_malloc(entry->identity_len); in pmksa_cache_to_eapol_data()
191 eapol->identity_len = entry->identity_len; in pmksa_cache_to_eapol_data()
193 entry->identity_len); in pmksa_cache_to_eapol_data()
196 eapol->identity, eapol->identity_len); in pmksa_cache_to_eapol_data()
411 entry->identity = os_malloc(old_entry->identity_len); in pmksa_cache_add_okc()
413 entry->identity_len = old_entry->identity_len; in pmksa_cache_add_okc()
415 old_entry->identity_len); in pmksa_cache_add_okc()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_gtc.c132 (pos2 - pos != (int) sm->identity_len || in eap_gtc_process()
133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process()
138 sm->identity, sm->identity_len); in eap_gtc_process()
143 sm->identity_len = pos2 - pos; in eap_gtc_process()
144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process()
151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process()
155 sm->identity, sm->identity_len); in eap_gtc_process()
Deap_server_sim.c130 } else if (sm->identity && sm->identity_len > 0 && in eap_sim_build_start()
271 sm->identity_len, data->nonce_s, data->mk, in eap_sim_build_reauth()
435 size_t identity_len; in eap_sim_process_start() local
454 if (!attr->identity || attr->identity_len == 0) { in eap_sim_process_start()
460 new_identity = os_malloc(attr->identity_len); in eap_sim_process_start()
465 os_memcpy(sm->identity, attr->identity, attr->identity_len); in eap_sim_process_start()
466 sm->identity_len = attr->identity_len; in eap_sim_process_start()
469 sm->identity, sm->identity_len); in eap_sim_process_start()
470 username = sim_get_username(sm->identity, sm->identity_len); in eap_sim_process_start()
558 identity_len = sm->identity_len; in eap_sim_process_start()
[all …]
Deap_server_aka.c139 username = sim_get_username(sm->identity, sm->identity_len); in eap_aka_check_identity()
371 } else if (sm->identity && sm->identity_len > 0 && in eap_aka_build_identity()
564 sm->identity_len, in eap_aka_build_reauth()
571 sm->identity_len, data->nonce_s, in eap_aka_build_reauth()
737 sm->identity, sm->identity_len); in eap_aka_determine_identity()
739 username = sim_get_username(sm->identity, sm->identity_len); in eap_aka_determine_identity()
803 size_t identity_len; in eap_aka_fullauth() local
847 identity_len = sm->identity_len; in eap_aka_fullauth()
848 while (identity_len > 0 && sm->identity[identity_len - 1] == '\0') { in eap_aka_fullauth()
851 identity_len--; in eap_aka_fullauth()
[all …]
Deap_server_fast.c62 size_t identity_len; member
132 size_t identity_len = 0; in eap_fast_session_ticket_cb() local
219 identity_len = elen; in eap_fast_session_ticket_cb()
236 "PAC-Opaque", identity, identity_len); in eap_fast_session_ticket_cb()
238 data->identity = os_malloc(identity_len); in eap_fast_session_ticket_cb()
240 os_memcpy(data->identity, identity, identity_len); in eap_fast_session_ticket_cb()
241 data->identity_len = identity_len; in eap_fast_session_ticket_cb()
704 (2 + sm->identity_len) + 8; in eap_fast_build_pac()
724 *pos++ = sm->identity_len; in eap_fast_build_pac()
725 os_memcpy(pos, sm->identity, sm->identity_len); in eap_fast_build_pac()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_gtc.c132 (pos2 - pos != (int) sm->identity_len || in eap_gtc_process()
133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process()
138 sm->identity, sm->identity_len); in eap_gtc_process()
143 sm->identity_len = pos2 - pos; in eap_gtc_process()
144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process()
151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process()
155 sm->identity, sm->identity_len); in eap_gtc_process()
Deap_server_sim.c130 } else if (sm->identity && sm->identity_len > 0 && in eap_sim_build_start()
271 sm->identity_len, data->nonce_s, data->mk, in eap_sim_build_reauth()
435 size_t identity_len; in eap_sim_process_start() local
454 if (!attr->identity || attr->identity_len == 0) { in eap_sim_process_start()
460 new_identity = os_malloc(attr->identity_len); in eap_sim_process_start()
465 os_memcpy(sm->identity, attr->identity, attr->identity_len); in eap_sim_process_start()
466 sm->identity_len = attr->identity_len; in eap_sim_process_start()
469 sm->identity, sm->identity_len); in eap_sim_process_start()
470 username = sim_get_username(sm->identity, sm->identity_len); in eap_sim_process_start()
558 identity_len = sm->identity_len; in eap_sim_process_start()
[all …]
Deap_server_aka.c139 username = sim_get_username(sm->identity, sm->identity_len); in eap_aka_check_identity()
371 } else if (sm->identity && sm->identity_len > 0 && in eap_aka_build_identity()
564 sm->identity_len, in eap_aka_build_reauth()
571 sm->identity_len, data->nonce_s, in eap_aka_build_reauth()
737 sm->identity, sm->identity_len); in eap_aka_determine_identity()
739 username = sim_get_username(sm->identity, sm->identity_len); in eap_aka_determine_identity()
803 size_t identity_len; in eap_aka_fullauth() local
847 identity_len = sm->identity_len; in eap_aka_fullauth()
848 while (identity_len > 0 && sm->identity[identity_len - 1] == '\0') { in eap_aka_fullauth()
851 identity_len--; in eap_aka_fullauth()
[all …]
Deap_server_fast.c62 size_t identity_len; member
132 size_t identity_len = 0; in eap_fast_session_ticket_cb() local
219 identity_len = elen; in eap_fast_session_ticket_cb()
236 "PAC-Opaque", identity, identity_len); in eap_fast_session_ticket_cb()
238 data->identity = os_malloc(identity_len); in eap_fast_session_ticket_cb()
240 os_memcpy(data->identity, identity, identity_len); in eap_fast_session_ticket_cb()
241 data->identity_len = identity_len; in eap_fast_session_ticket_cb()
702 (2 + sm->identity_len) + 8; in eap_fast_build_pac()
722 *pos++ = sm->identity_len; in eap_fast_build_pac()
723 os_memcpy(pos, sm->identity, sm->identity_len); in eap_fast_build_pac()
[all …]
Deap_server_teap.c65 size_t identity_len; member
142 size_t identity_len = 0; in eap_teap_session_ticket_cb() local
227 identity_len = elen; in eap_teap_session_ticket_cb()
245 identity, identity_len); in eap_teap_session_ticket_cb()
247 data->identity = os_malloc(identity_len); in eap_teap_session_ticket_cb()
249 os_memcpy(data->identity, identity, identity_len); in eap_teap_session_ticket_cb()
250 data->identity_len = identity_len; in eap_teap_session_ticket_cb()
671 (2 + sm->identity_len) + 8; in eap_teap_build_pac()
693 sm->identity, sm->identity_len); in eap_teap_build_pac()
695 *pos++ = sm->identity_len; in eap_teap_build_pac()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
109 size_t identity_len, in eap_aka_prime_derive_keys() argument
118 size_t identity_len, in eap_aka_prime_derive_keys_reauth() argument
191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member
Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, in eap_sim_derive_mk() argument
38 len[0] = identity_len; in eap_sim_derive_mk()
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, in eap_aka_derive_mk() argument
63 len[0] = identity_len; in eap_aka_derive_mk()
108 const u8 *identity, size_t identity_len, in eap_sim_derive_keys_reauth() argument
118 while (identity_len > 0 && identity[identity_len - 1] == 0) { in eap_sim_derive_keys_reauth()
121 identity_len--; in eap_sim_derive_keys_reauth()
124 len[0] = identity_len; in eap_sim_derive_keys_reauth()
136 identity, identity_len); in eap_sim_derive_keys_reauth()
275 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, in eap_aka_prime_derive_keys() argument
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
109 size_t identity_len, in eap_aka_prime_derive_keys() argument
118 size_t identity_len, in eap_aka_prime_derive_keys_reauth() argument
191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member
Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, in eap_sim_derive_mk() argument
38 len[0] = identity_len; in eap_sim_derive_mk()
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, in eap_aka_derive_mk() argument
63 len[0] = identity_len; in eap_aka_derive_mk()
108 const u8 *identity, size_t identity_len, in eap_sim_derive_keys_reauth() argument
118 while (identity_len > 0 && identity[identity_len - 1] == 0) { in eap_sim_derive_keys_reauth()
121 identity_len--; in eap_sim_derive_keys_reauth()
124 len[0] = identity_len; in eap_sim_derive_keys_reauth()
136 identity, identity_len); in eap_sim_derive_keys_reauth()
275 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, in eap_aka_prime_derive_keys() argument
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_leap.c67 size_t identity_len, password_len, len; in eap_leap_process_request() local
72 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_request()
110 3 + LEAP_RESPONSE_LEN + identity_len, in eap_leap_process_request()
129 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_request()
145 size_t identity_len; in eap_leap_process_success() local
149 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_success()
161 3 + LEAP_CHALLENGE_LEN + identity_len, in eap_leap_process_success()
179 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_success()
Deap_gtc.c51 size_t password_len, identity_len, len, plen; in eap_gtc_process() local
99 identity = eap_get_config_identity(sm, &identity_len); in eap_gtc_process()
103 plen += 9 + identity_len + 1; in eap_gtc_process()
110 wpabuf_put_data(resp, identity, identity_len); in eap_gtc_process()
Dmschapv2.c36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, in mschapv2_derive_response() argument
49 identity, identity_len); in mschapv2_derive_response()
50 username_len = identity_len; in mschapv2_derive_response()
Deap_sim.c407 size_t identity_len = 0; in eap_sim_learn_ids() local
417 identity = eap_get_config_identity(sm, &identity_len); in eap_sim_learn_ids()
419 for (realm = identity, realm_len = identity_len; in eap_sim_learn_ids()
489 size_t identity_len = 0; in eap_sim_response_start() local
496 identity_len = data->reauth_id_len; in eap_sim_response_start()
503 identity_len = data->pseudonym_len; in eap_sim_response_start()
506 identity = eap_get_config_identity(sm, &identity_len); in eap_sim_response_start()
525 identity, identity_len); in eap_sim_response_start()
526 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len, in eap_sim_response_start()
527 identity, identity_len); in eap_sim_response_start()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_gtc.c51 size_t password_len, identity_len, len, plen; in eap_gtc_process() local
99 identity = eap_get_config_identity(sm, &identity_len); in eap_gtc_process()
103 plen += 9 + identity_len + 1; in eap_gtc_process()
110 wpabuf_put_data(resp, identity, identity_len); in eap_gtc_process()
Deap_leap.c67 size_t identity_len, password_len, len; in eap_leap_process_request() local
72 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_request()
110 3 + LEAP_RESPONSE_LEN + identity_len, in eap_leap_process_request()
129 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_request()
145 size_t identity_len; in eap_leap_process_success() local
149 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_success()
161 3 + LEAP_CHALLENGE_LEN + identity_len, in eap_leap_process_success()
179 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_success()
Dmschapv2.c36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, in mschapv2_derive_response() argument
49 identity, identity_len); in mschapv2_derive_response()
50 username_len = identity_len; in mschapv2_derive_response()
Deap_sim.c405 size_t identity_len = 0; in eap_sim_learn_ids() local
415 identity = eap_get_config_identity(sm, &identity_len); in eap_sim_learn_ids()
417 for (realm = identity, realm_len = identity_len; in eap_sim_learn_ids()
487 size_t identity_len = 0; in eap_sim_response_start() local
493 identity_len = data->reauth_id_len; in eap_sim_response_start()
500 identity_len = data->pseudonym_len; in eap_sim_response_start()
503 identity = eap_get_config_identity(sm, &identity_len); in eap_sim_response_start()
533 identity, identity_len); in eap_sim_response_start()
534 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len, in eap_sim_response_start()
535 identity, identity_len); in eap_sim_response_start()
[all …]

123456