/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_sim_db.c | 35 size_t identity_len; member 548 size_t identity_len, int max_chal, in eap_sim_db_get_gsm_triplets() argument 558 if (identity_len < 2 || identity[0] != EAP_SIM_PERMANENT_PREFIX) { in eap_sim_db_get_gsm_triplets() 560 identity, identity_len); in eap_sim_db_get_gsm_triplets() 564 identity_len--; in eap_sim_db_get_gsm_triplets() 565 for (i = 0; i < identity_len; i++) { in eap_sim_db_get_gsm_triplets() 567 identity_len = i; in eap_sim_db_get_gsm_triplets() 571 if (identity_len + 1 > sizeof(entry->imsi)) { in eap_sim_db_get_gsm_triplets() 573 identity, identity_len); in eap_sim_db_get_gsm_triplets() 577 identity, identity_len); in eap_sim_db_get_gsm_triplets() [all …]
|
D | eap_sim.c | 114 sm->identity_len)) { in eap_sim_build_start() 243 sm->identity_len, data->nonce_s, data->mk, in eap_sim_build_reauth() 395 size_t identity_len; in eap_sim_process_start() local 402 sm->identity = os_malloc(attr->identity_len); in eap_sim_process_start() 405 attr->identity_len); in eap_sim_process_start() 406 sm->identity_len = attr->identity_len; in eap_sim_process_start() 411 identity_len = 0; in eap_sim_process_start() 413 if (sm->identity && sm->identity_len > 0 && in eap_sim_process_start() 416 identity_len = sm->identity_len; in eap_sim_process_start() 420 sm->identity_len, in eap_sim_process_start() [all …]
|
D | eap_sim_db.h | 37 size_t identity_len, int max_chal, 45 size_t identity_len); 52 size_t identity_len, char *pseudonym); 55 size_t identity_len, char *reauth_id, u16 counter, 58 size_t identity_len, char *reauth_id, 63 size_t identity_len, size_t *len); 68 size_t identity_len; member 80 size_t identity_len); 85 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, 90 size_t identity_len, const u8 *auts,
|
D | eap_aka.c | 275 sm->identity_len)) { in eap_aka_build_identity() 452 sm->identity_len, in eap_aka_build_reauth() 459 sm->identity_len, data->nonce_s, in eap_aka_build_reauth() 615 size_t identity_len; in eap_aka_determine_identity() local 619 identity_len = 0; in eap_aka_determine_identity() 623 identity_len = data->reauth->identity_len; in eap_aka_determine_identity() 624 } else if (sm->identity && sm->identity_len > 0 && in eap_aka_determine_identity() 627 identity_len = sm->identity_len; in eap_aka_determine_identity() 631 sm->identity_len, in eap_aka_determine_identity() 632 &identity_len); in eap_aka_determine_identity() [all …]
|
D | eap_gtc.c | 138 (pos2 - pos != (int) sm->identity_len || in eap_gtc_process() 139 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process() 144 sm->identity, sm->identity_len); in eap_gtc_process() 149 sm->identity_len = pos2 - pos; in eap_gtc_process() 150 sm->identity = os_malloc(sm->identity_len); in eap_gtc_process() 155 os_memcpy(sm->identity, pos, sm->identity_len); in eap_gtc_process() 158 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process() 162 sm->identity, sm->identity_len); in eap_gtc_process()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_sim_db.c | 36 size_t identity_len; member 549 size_t identity_len, int max_chal, in eap_sim_db_get_gsm_triplets() argument 559 if (identity_len < 2 || identity[0] != EAP_SIM_PERMANENT_PREFIX) { in eap_sim_db_get_gsm_triplets() 561 identity, identity_len); in eap_sim_db_get_gsm_triplets() 565 identity_len--; in eap_sim_db_get_gsm_triplets() 566 for (i = 0; i < identity_len; i++) { in eap_sim_db_get_gsm_triplets() 568 identity_len = i; in eap_sim_db_get_gsm_triplets() 572 if (identity_len + 1 > sizeof(entry->imsi)) { in eap_sim_db_get_gsm_triplets() 574 identity, identity_len); in eap_sim_db_get_gsm_triplets() 578 identity, identity_len); in eap_sim_db_get_gsm_triplets() [all …]
|
D | eap_sim_db.h | 35 size_t identity_len, int max_chal, 43 size_t identity_len); 50 size_t identity_len, char *pseudonym); 53 size_t identity_len, char *reauth_id, u16 counter, 56 size_t identity_len, char *reauth_id, 61 size_t identity_len, size_t *len); 66 size_t identity_len; member 78 size_t identity_len); 83 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, 88 size_t identity_len, const u8 *auts,
|
D | eap_server_sim.c | 115 sm->identity_len)) { in eap_sim_build_start() 244 sm->identity_len, data->nonce_s, data->mk, in eap_sim_build_reauth() 396 size_t identity_len; in eap_sim_process_start() local 403 sm->identity = os_malloc(attr->identity_len); in eap_sim_process_start() 406 attr->identity_len); in eap_sim_process_start() 407 sm->identity_len = attr->identity_len; in eap_sim_process_start() 412 identity_len = 0; in eap_sim_process_start() 414 if (sm->identity && sm->identity_len > 0 && in eap_sim_process_start() 417 identity_len = sm->identity_len; in eap_sim_process_start() 421 sm->identity_len, in eap_sim_process_start() [all …]
|
D | eap_server_aka.c | 275 sm->identity_len)) { in eap_aka_build_identity() 452 sm->identity_len, in eap_aka_build_reauth() 459 sm->identity_len, data->nonce_s, in eap_aka_build_reauth() 615 size_t identity_len; in eap_aka_determine_identity() local 619 identity_len = 0; in eap_aka_determine_identity() 623 identity_len = data->reauth->identity_len; in eap_aka_determine_identity() 624 } else if (sm->identity && sm->identity_len > 0 && in eap_aka_determine_identity() 627 identity_len = sm->identity_len; in eap_aka_determine_identity() 631 sm->identity_len, in eap_aka_determine_identity() 632 &identity_len); in eap_aka_determine_identity() [all …]
|
D | eap_server_gtc.c | 138 (pos2 - pos != (int) sm->identity_len || in eap_gtc_process() 139 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process() 144 sm->identity, sm->identity_len); in eap_gtc_process() 149 sm->identity_len = pos2 - pos; in eap_gtc_process() 150 sm->identity = os_malloc(sm->identity_len); in eap_gtc_process() 155 os_memcpy(sm->identity, pos, sm->identity_len); in eap_gtc_process() 158 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process() 162 sm->identity, sm->identity_len); in eap_gtc_process()
|
D | eap_server_fast.c | 68 size_t identity_len; member 138 size_t identity_len = 0; in eap_fast_session_ticket_cb() local 221 identity_len = pos[1]; in eap_fast_session_ticket_cb() 237 "PAC-Opaque", identity, identity_len); in eap_fast_session_ticket_cb() 239 data->identity = os_malloc(identity_len); in eap_fast_session_ticket_cb() 241 os_memcpy(data->identity, identity, identity_len); in eap_fast_session_ticket_cb() 242 data->identity_len = identity_len; in eap_fast_session_ticket_cb() 703 (2 + sm->identity_len) + 8; in eap_fast_build_pac() 723 *pos++ = sm->identity_len; in eap_fast_build_pac() 724 os_memcpy(pos, sm->identity, sm->identity_len); in eap_fast_build_pac() [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | pmksa_cache_auth.c | 137 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data() 139 entry->identity_len = eapol->identity_len; in pmksa_cache_from_eapol_data() 141 eapol->identity_len); in pmksa_cache_from_eapol_data() 162 eapol->identity = os_malloc(entry->identity_len); in pmksa_cache_to_eapol_data() 164 eapol->identity_len = entry->identity_len; in pmksa_cache_to_eapol_data() 166 entry->identity_len); in pmksa_cache_to_eapol_data() 169 eapol->identity, eapol->identity_len); in pmksa_cache_to_eapol_data() 301 entry->identity = os_malloc(old_entry->identity_len); in pmksa_cache_add_okc() 303 entry->identity_len = old_entry->identity_len; in pmksa_cache_add_okc() 305 old_entry->identity_len); in pmksa_cache_add_okc()
|
D | ap_config.c | 578 size_t identity_len, int phase2) in hostapd_get_eap_user() argument 583 if (conf->wps_state && identity_len == WSC_ID_ENROLLEE_LEN && in hostapd_get_eap_user() 592 if (conf->wps_state && identity_len == WSC_ID_REGISTRAR_LEN && in hostapd_get_eap_user() 612 identity_len >= user->identity_len && in hostapd_get_eap_user() 613 os_memcmp(user->identity, identity, user->identity_len) == in hostapd_get_eap_user() 620 user->identity_len == identity_len && in hostapd_get_eap_user() 621 os_memcmp(user->identity, identity, identity_len) == 0) in hostapd_get_eap_user()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.h | 80 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 84 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 89 const u8 *identity, size_t identity_len, 98 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 102 const u8 *identity, size_t identity_len, 115 size_t identity_len, in eap_aka_prime_derive_keys() argument 124 size_t identity_len, in eap_aka_prime_derive_keys_reauth() argument 197 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | eap_sim_common.h | 80 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 84 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 89 const u8 *identity, size_t identity_len, 98 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 102 const u8 *identity, size_t identity_len, 115 size_t identity_len, in eap_aka_prime_derive_keys() argument 124 size_t identity_len, in eap_aka_prime_derive_keys_reauth() argument 197 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member
|
/external/wpa_supplicant/ |
D | eap_gtc.c | 59 size_t password_len, identity_len, len, plen; in eap_gtc_process() local 108 identity = eap_get_config_identity(sm, &identity_len); in eap_gtc_process() 112 plen += 9 + identity_len + 1; in eap_gtc_process() 120 os_memcpy(rpos, identity, identity_len); in eap_gtc_process() 121 rpos += identity_len; in eap_gtc_process()
|
D | eap_leap.c | 74 size_t identity_len, password_len; in eap_leap_process_request() local 78 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_request() 119 3 + LEAP_RESPONSE_LEN + identity_len, in eap_leap_process_request() 131 os_memcpy(rpos, identity, identity_len); in eap_leap_process_request() 148 size_t identity_len; in eap_leap_process_success() local 152 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_success() 166 3 + LEAP_CHALLENGE_LEN + identity_len, in eap_leap_process_success() 184 os_memcpy(pos, identity, identity_len); in eap_leap_process_success()
|
D | eap_sim_common.h | 73 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 77 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 82 const u8 *identity, size_t identity_len, 135 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member
|
D | eap_sim_common.c | 31 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, in eap_sim_derive_mk() argument 41 len[0] = identity_len; in eap_sim_derive_mk() 59 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, in eap_aka_derive_mk() argument 66 len[0] = identity_len; in eap_aka_derive_mk() 111 const u8 *identity, size_t identity_len, in eap_sim_derive_keys_reauth() argument 121 while (identity_len > 0 && identity[identity_len - 1] == 0) { in eap_sim_derive_keys_reauth() 124 identity_len--; in eap_sim_derive_keys_reauth() 127 len[0] = identity_len; in eap_sim_derive_keys_reauth() 139 identity, identity_len); in eap_sim_derive_keys_reauth() 358 attr->identity_len = alen - 2; in eap_sim_parse_attr()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_leap.c | 72 size_t identity_len, password_len, len; in eap_leap_process_request() local 77 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_request() 115 3 + LEAP_RESPONSE_LEN + identity_len, in eap_leap_process_request() 130 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_request() 146 size_t identity_len; in eap_leap_process_success() local 150 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_success() 162 3 + LEAP_CHALLENGE_LEN + identity_len, in eap_leap_process_success() 180 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_success()
|
D | eap_gtc.c | 57 size_t password_len, identity_len, len, plen; in eap_gtc_process() local 105 identity = eap_get_config_identity(sm, &identity_len); in eap_gtc_process() 109 plen += 9 + identity_len + 1; in eap_gtc_process() 116 wpabuf_put_data(resp, identity, identity_len); in eap_gtc_process()
|
D | mschapv2.c | 42 void mschapv2_derive_response(const u8 *identity, size_t identity_len, in mschapv2_derive_response() argument 55 identity, identity_len); in mschapv2_derive_response() 56 username_len = identity_len; in mschapv2_derive_response()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_gtc.c | 57 size_t password_len, identity_len, len, plen; in eap_gtc_process() local 105 identity = eap_get_config_identity(sm, &identity_len); in eap_gtc_process() 109 plen += 9 + identity_len + 1; in eap_gtc_process() 116 wpabuf_put_data(resp, identity, identity_len); in eap_gtc_process()
|
D | eap_leap.c | 73 size_t identity_len, password_len, len; in eap_leap_process_request() local 78 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_request() 116 3 + LEAP_RESPONSE_LEN + identity_len, in eap_leap_process_request() 131 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_request() 147 size_t identity_len; in eap_leap_process_success() local 151 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_success() 163 3 + LEAP_CHALLENGE_LEN + identity_len, in eap_leap_process_success() 181 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_success()
|
D | mschapv2.c | 42 int mschapv2_derive_response(const u8 *identity, size_t identity_len, in mschapv2_derive_response() argument 55 identity, identity_len); in mschapv2_derive_response() 56 username_len = identity_len; in mschapv2_derive_response()
|