/external/wpa_supplicant_8/src/ap/ |
D | eap_user_db.c | 118 if (len <= user->identity_len && in get_wildcard_cb() 134 size_t identity_len, int phase2) in eap_user_sqlite_get() argument 141 if (identity_len >= sizeof(id_str)) { in eap_user_sqlite_get() 143 __func__, (int) identity_len, in eap_user_sqlite_get() 147 os_memcpy(id_str, identity, identity_len); in eap_user_sqlite_get() 148 id_str[identity_len] = '\0'; in eap_user_sqlite_get() 149 for (i = 0; i < identity_len; i++) { in eap_user_sqlite_get() 166 hapd->tmp_eap_user.identity_len); in eap_user_sqlite_get() 171 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); in eap_user_sqlite_get() 174 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); in eap_user_sqlite_get() [all …]
|
D | pmksa_cache_auth.c | 133 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data() 135 entry->identity_len = eapol->identity_len; in pmksa_cache_from_eapol_data() 137 eapol->identity_len); in pmksa_cache_from_eapol_data() 164 eapol->identity = os_malloc(entry->identity_len); in pmksa_cache_to_eapol_data() 166 eapol->identity_len = entry->identity_len; in pmksa_cache_to_eapol_data() 168 entry->identity_len); in pmksa_cache_to_eapol_data() 171 eapol->identity, eapol->identity_len); in pmksa_cache_to_eapol_data() 327 entry->identity = os_malloc(old_entry->identity_len); in pmksa_cache_add_okc() 329 entry->identity_len = old_entry->identity_len; in pmksa_cache_add_okc() 331 old_entry->identity_len); in pmksa_cache_add_okc() [all …]
|
D | ieee802_1x.c | 298 size_t identity_len; in ieee802_1x_learn_identity() local 310 identity = eap_get_identity(sm->eap, &identity_len); in ieee802_1x_learn_identity() 316 sm->identity = (u8 *) dup_binstr(identity, identity_len); in ieee802_1x_learn_identity() 318 sm->identity_len = 0; in ieee802_1x_learn_identity() 322 sm->identity_len = identity_len; in ieee802_1x_learn_identity() 584 sm->identity, sm->identity_len)) { in ieee802_1x_encapsulate_radius() 1368 sm->identity_len = len; in ieee802_1x_update_sta_identity() 1881 size_t identity_len; in ieee802_1x_eapol_send() local 1884 identity = eap_get_identity(sm->eap, &identity_len); in ieee802_1x_eapol_send() 1886 ((identity_len == WSC_ID_ENROLLEE_LEN && in ieee802_1x_eapol_send() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_gtc.c | 132 (pos2 - pos != (int) sm->identity_len || in eap_gtc_process() 133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process() 138 sm->identity, sm->identity_len); in eap_gtc_process() 143 sm->identity_len = pos2 - pos; in eap_gtc_process() 144 sm->identity = os_malloc(sm->identity_len); in eap_gtc_process() 149 os_memcpy(sm->identity, pos, sm->identity_len); in eap_gtc_process() 152 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process() 156 sm->identity, sm->identity_len); in eap_gtc_process()
|
D | eap_server_sim.c | 129 } else if (sm->identity && sm->identity_len > 0 && in eap_sim_build_start() 263 sm->identity_len, data->nonce_s, data->mk, in eap_sim_build_reauth() 418 size_t identity_len; in eap_sim_process_start() local 437 if (!attr->identity || attr->identity_len == 0) { in eap_sim_process_start() 443 new_identity = os_malloc(attr->identity_len); in eap_sim_process_start() 448 os_memcpy(sm->identity, attr->identity, attr->identity_len); in eap_sim_process_start() 449 sm->identity_len = attr->identity_len; in eap_sim_process_start() 452 sm->identity, sm->identity_len); in eap_sim_process_start() 453 username = sim_get_username(sm->identity, sm->identity_len); in eap_sim_process_start() 538 identity_len = sm->identity_len; in eap_sim_process_start() [all …]
|
D | eap_server_aka.c | 138 username = sim_get_username(sm->identity, sm->identity_len); in eap_aka_check_identity() 370 } else if (sm->identity && sm->identity_len > 0 && in eap_aka_build_identity() 556 sm->identity_len, in eap_aka_build_reauth() 563 sm->identity_len, data->nonce_s, in eap_aka_build_reauth() 720 sm->identity, sm->identity_len); in eap_aka_determine_identity() 722 username = sim_get_username(sm->identity, sm->identity_len); in eap_aka_determine_identity() 786 size_t identity_len; in eap_aka_fullauth() local 826 identity_len = sm->identity_len; in eap_aka_fullauth() 827 while (identity_len > 0 && sm->identity[identity_len - 1] == '\0') { in eap_aka_fullauth() 830 identity_len--; in eap_aka_fullauth() [all …]
|
D | eap_server_fast.c | 62 size_t identity_len; member 132 size_t identity_len = 0; in eap_fast_session_ticket_cb() local 214 identity_len = pos[1]; in eap_fast_session_ticket_cb() 231 "PAC-Opaque", identity, identity_len); in eap_fast_session_ticket_cb() 233 data->identity = os_malloc(identity_len); in eap_fast_session_ticket_cb() 235 os_memcpy(data->identity, identity, identity_len); in eap_fast_session_ticket_cb() 236 data->identity_len = identity_len; in eap_fast_session_ticket_cb() 697 (2 + sm->identity_len) + 8; in eap_fast_build_pac() 717 *pos++ = sm->identity_len; in eap_fast_build_pac() 718 os_memcpy(pos, sm->identity, sm->identity_len); in eap_fast_build_pac() [all …]
|
D | eap_i.h | 161 size_t identity_len; member 219 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 109 size_t identity_len, in eap_aka_prime_derive_keys() argument 118 size_t identity_len, in eap_aka_prime_derive_keys_reauth() argument 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member
|
D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, in eap_sim_derive_mk() argument 38 len[0] = identity_len; in eap_sim_derive_mk() 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, in eap_aka_derive_mk() argument 63 len[0] = identity_len; in eap_aka_derive_mk() 108 const u8 *identity, size_t identity_len, in eap_sim_derive_keys_reauth() argument 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { in eap_sim_derive_keys_reauth() 121 identity_len--; in eap_sim_derive_keys_reauth() 124 len[0] = identity_len; in eap_sim_derive_keys_reauth() 136 identity, identity_len); in eap_sim_derive_keys_reauth() 276 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, in eap_aka_prime_derive_keys() argument [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; in eap_gtc_process() local 99 identity = eap_get_config_identity(sm, &identity_len); in eap_gtc_process() 103 plen += 9 + identity_len + 1; in eap_gtc_process() 110 wpabuf_put_data(resp, identity, identity_len); in eap_gtc_process()
|
D | eap_leap.c | 67 size_t identity_len, password_len, len; in eap_leap_process_request() local 72 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_request() 110 3 + LEAP_RESPONSE_LEN + identity_len, in eap_leap_process_request() 125 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_request() 141 size_t identity_len; in eap_leap_process_success() local 145 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_success() 157 3 + LEAP_CHALLENGE_LEN + identity_len, in eap_leap_process_success() 175 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_success()
|
D | mschapv2.c | 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, in mschapv2_derive_response() argument 49 identity, identity_len); in mschapv2_derive_response() 50 username_len = identity_len; in mschapv2_derive_response()
|
D | eap_sim.c | 395 size_t identity_len = 0; in eap_sim_learn_ids() local 405 identity = eap_get_config_identity(sm, &identity_len); in eap_sim_learn_ids() 407 for (realm = identity, realm_len = identity_len; in eap_sim_learn_ids() 476 size_t identity_len = 0; in eap_sim_response_start() local 482 identity_len = data->reauth_id_len; in eap_sim_response_start() 487 identity_len = data->pseudonym_len; in eap_sim_response_start() 490 identity = eap_get_config_identity(sm, &identity_len); in eap_sim_response_start() 515 identity, identity_len); in eap_sim_response_start() 516 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len, in eap_sim_response_start() 517 identity, identity_len); in eap_sim_response_start() [all …]
|
D | eap_ttls.c | 435 size_t identity_len, password_len; in eap_ttls_phase2_request_mschapv2() local 440 identity = eap_get_config_identity(sm, &identity_len); in eap_ttls_phase2_request_mschapv2() 445 msg = wpabuf_alloc(identity_len + 1000); in eap_ttls_phase2_request_mschapv2() 455 identity, identity_len); in eap_ttls_phase2_request_mschapv2() 489 if (mschapv2_derive_response(identity, identity_len, password, in eap_ttls_phase2_request_mschapv2() 524 size_t identity_len, password_len; in eap_ttls_phase2_request_mschap() local 529 identity = eap_get_config_identity(sm, &identity_len); in eap_ttls_phase2_request_mschap() 534 msg = wpabuf_alloc(identity_len + 1000); in eap_ttls_phase2_request_mschap() 544 identity, identity_len); in eap_ttls_phase2_request_mschap() 607 size_t identity_len, password_len; in eap_ttls_phase2_request_pap() local [all …]
|
D | eap_aka.c | 375 size_t identity_len = 0; in eap_aka_learn_ids() local 385 identity = eap_get_config_identity(sm, &identity_len); in eap_aka_learn_ids() 387 for (realm = identity, realm_len = identity_len; in eap_aka_learn_ids() 597 size_t identity_len = 0; in eap_aka_response_identity() local 603 identity_len = data->reauth_id_len; in eap_aka_response_identity() 608 identity_len = data->pseudonym_len; in eap_aka_response_identity() 611 identity = eap_get_config_identity(sm, &identity_len); in eap_aka_response_identity() 626 identity, identity_len); in eap_aka_response_identity() 627 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len, in eap_aka_response_identity() 628 identity, identity_len); in eap_aka_response_identity() [all …]
|
D | eap.c | 371 for (i = 0; i < config->identity_len; i++) { in eap_home_realm() 375 if (i < config->identity_len) { in eap_home_realm() 376 realm_len = config->identity_len - i - 1; in eap_home_realm() 1371 conf->identity_len = 1 + imsi_len; in eap_sm_imsi_identity() 1431 size_t identity_len; in eap_sm_buildIdentity() local 1441 &identity_len)) != NULL) { in eap_sm_buildIdentity() 1443 "identity", identity, identity_len); in eap_sm_buildIdentity() 1446 identity_len = config->anonymous_identity_len; in eap_sm_buildIdentity() 1448 identity, identity_len); in eap_sm_buildIdentity() 1451 identity_len = config->identity_len; in eap_sm_buildIdentity() [all …]
|
D | eap_ikev2.c | 62 size_t identity_len, password_len; in eap_ikev2_init() local 65 identity = eap_get_config_identity(sm, &identity_len); in eap_ikev2_init() 86 data->ikev2.IDr = os_malloc(identity_len); in eap_ikev2_init() 89 os_memcpy(data->ikev2.IDr, identity, identity_len); in eap_ikev2_init() 90 data->ikev2.IDr_len = identity_len; in eap_ikev2_init()
|
D | eap_psk.c | 37 size_t identity_len, password_len; in eap_psk_init() local 57 identity = eap_get_config_identity(sm, &identity_len); in eap_psk_init() 59 data->id_p = os_malloc(identity_len); in eap_psk_init() 61 os_memcpy(data->id_p, identity, identity_len); in eap_psk_init() 62 data->id_p_len = identity_len; in eap_psk_init()
|
D | eap_sake.c | 72 size_t identity_len, password_len; in eap_sake_init() local 86 identity = eap_get_config_identity(sm, &identity_len); in eap_sake_init() 88 data->peerid = os_malloc(identity_len); in eap_sake_init() 93 os_memcpy(data->peerid, identity, identity_len); in eap_sake_init() 94 data->peerid_len = identity_len; in eap_sake_init()
|
D | eap_wsc.c | 146 size_t identity_len; in eap_wsc_init() local 163 identity = eap_get_config_identity(sm, &identity_len); in eap_wsc_init() 165 if (identity && identity_len == WSC_ID_REGISTRAR_LEN && in eap_wsc_init() 168 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN && in eap_wsc_init() 173 identity, identity_len); in eap_wsc_init()
|
D | eap_pax.c | 52 size_t identity_len, password_len; in eap_pax_init() local 54 identity = eap_get_config_identity(sm, &identity_len); in eap_pax_init() 72 data->cid = os_malloc(identity_len); in eap_pax_init() 77 os_memcpy(data->cid, identity, identity_len); in eap_pax_init() 78 data->cid_len = identity_len; in eap_pax_init()
|
D | eap_gpsk.c | 83 size_t identity_len, password_len; in eap_gpsk_init() local 97 identity = eap_get_config_identity(sm, &identity_len); in eap_gpsk_init() 99 data->id_peer = os_malloc(identity_len); in eap_gpsk_init() 104 os_memcpy(data->id_peer, identity, identity_len); in eap_gpsk_init() 105 data->id_peer_len = identity_len; in eap_gpsk_init()
|
D | eap_mschapv2.c | 156 size_t identity_len, password_len; in eap_mschapv2_challenge_reply() local 162 identity = eap_get_config_identity(sm, &identity_len); in eap_mschapv2_challenge_reply() 167 ms_len = sizeof(*ms) + 1 + sizeof(*r) + identity_len; in eap_mschapv2_challenge_reply() 207 if (mschapv2_derive_response(identity, identity_len, password, in eap_mschapv2_challenge_reply() 221 wpabuf_put_data(resp, identity, identity_len); in eap_mschapv2_challenge_reply()
|
/external/wpa_supplicant_8/src/radius/ |
D | radius_server.h | 201 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|