Searched refs:identity_len (Results 1 - 25 of 57) sorted by relevance

123

/freebsd-11-stable/contrib/wpa/src/ap/
H A Deap_user_db.c120 if (len <= user->identity_len &&
136 size_t identity_len, int phase2)
144 if (identity_len >= sizeof(id_str)) {
146 __func__, (int) identity_len,
150 os_memcpy(id_str, identity, identity_len);
151 id_str[identity_len] = '\0';
152 for (i = 0; i < identity_len; i++) {
169 hapd->tmp_eap_user.identity_len);
174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1);
177 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len);
135 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument
232 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument
[all...]
H A Dpmksa_cache_auth.c150 entry->identity = os_malloc(eapol->identity_len);
152 entry->identity_len = eapol->identity_len;
154 eapol->identity_len);
189 eapol->identity = os_malloc(entry->identity_len);
191 eapol->identity_len = entry->identity_len;
193 entry->identity_len);
196 eapol->identity, eapol->identity_len);
411 entry->identity = os_malloc(old_entry->identity_len);
[all...]
H A Dpmksa_cache_auth.h27 size_t identity_len; member in struct:rsn_pmksa_cache_entry
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Dmschapv2.c36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument
49 identity, identity_len);
50 username_len = identity_len;
H A Deap_gtc.c51 size_t password_len, identity_len, len, plen; local
99 identity = eap_get_config_identity(sm, &identity_len);
103 plen += 9 + identity_len + 1;
110 wpabuf_put_data(resp, identity, identity_len);
H A Deap_leap.c67 size_t identity_len, password_len, len; local
72 identity = eap_get_config_identity(sm, &identity_len);
110 3 + LEAP_RESPONSE_LEN + identity_len,
129 wpabuf_put_data(resp, identity, identity_len);
145 size_t identity_len; local
149 identity = eap_get_config_identity(sm, &identity_len);
161 3 + LEAP_CHALLENGE_LEN + identity_len,
179 wpabuf_put_data(resp, identity, identity_len);
H A Deap_config.h25 * identity_len - EAP Identity length
27 size_t identity_len; member in struct:eap_peer_config
H A Deap_sim.c405 size_t identity_len = 0; local
415 identity = eap_get_config_identity(sm, &identity_len);
417 for (realm = identity, realm_len = identity_len;
487 size_t identity_len = 0; local
493 identity_len = data->reauth_id_len;
500 identity_len = data->pseudonym_len;
503 identity = eap_get_config_identity(sm, &identity_len);
533 identity, identity_len);
534 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len,
535 identity, identity_len);
719 size_t identity_len; local
[all...]
H A Deap_ttls.c489 size_t identity_len, password_len;
494 identity = eap_get_config_identity(sm, &identity_len);
499 msg = wpabuf_alloc(identity_len + 1000);
509 identity, identity_len);
543 if (mschapv2_derive_response(identity, identity_len, password,
583 size_t identity_len, password_len;
588 identity = eap_get_config_identity(sm, &identity_len);
593 msg = wpabuf_alloc(identity_len + 1000);
603 identity, identity_len);
683 size_t identity_len, password_le local
[all...]
H A Deap_aka.c385 size_t identity_len = 0; local
395 identity = eap_get_config_identity(sm, &identity_len);
397 for (realm = identity, realm_len = identity_len;
617 size_t identity_len = 0; local
623 identity_len = data->reauth_id_len;
630 identity_len = data->pseudonym_len;
633 identity = eap_get_config_identity(sm, &identity_len);
653 identity, identity_len);
654 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len,
655 identity, identity_len);
924 size_t identity_len; local
[all...]
H A Deap_ikev2.c62 size_t identity_len, password_len; local
65 identity = eap_get_config_identity(sm, &identity_len);
86 data->ikev2.IDr = os_memdup(identity, identity_len);
89 data->ikev2.IDr_len = identity_len;
H A Deap_psk.c37 size_t identity_len, password_len; local
57 identity = eap_get_config_identity(sm, &identity_len);
59 data->id_p = os_malloc(identity_len);
61 os_memcpy(data->id_p, identity, identity_len);
62 data->id_p_len = identity_len;
/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
109 size_t identity_len,
118 size_t identity_len,
191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs
108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument
38 len[0] = identity_len;
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument
63 len[0] = identity_len;
108 const u8 *identity, size_t identity_len,
118 while (identity_len > 0 && identity[identity_len - 1] == 0) {
121 identity_len--;
124 len[0] = identity_len;
136 identity, identity_len);
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
275 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument
324 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_server_gtc.c132 (pos2 - pos != (int) sm->identity_len ||
133 os_memcmp(pos, sm->identity, sm->identity_len))) {
138 sm->identity, sm->identity_len);
143 sm->identity_len = pos2 - pos;
144 sm->identity = os_memdup(pos, sm->identity_len);
151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) {
155 sm->identity, sm->identity_len);
H A Deap_server_sim.c130 } else if (sm->identity && sm->identity_len > 0 &&
271 sm->identity_len, data->nonce_s, data->mk,
435 size_t identity_len; local
454 if (!attr->identity || attr->identity_len == 0) {
460 new_identity = os_malloc(attr->identity_len);
465 os_memcpy(sm->identity, attr->identity, attr->identity_len);
466 sm->identity_len = attr->identity_len;
469 sm->identity, sm->identity_len);
470 username = sim_get_username(sm->identity, sm->identity_len);
[all...]
H A Deap_server_fast.c62 size_t identity_len; member in struct:eap_fast_data
132 size_t identity_len = 0; local
219 identity_len = elen;
236 "PAC-Opaque", identity, identity_len);
238 data->identity = os_malloc(identity_len);
240 os_memcpy(data->identity, identity, identity_len);
241 data->identity_len = identity_len;
702 (2 + sm->identity_len) + 8;
722 *pos++ = sm->identity_len;
[all...]
H A Deap_server_aka.c139 username = sim_get_username(sm->identity, sm->identity_len);
371 } else if (sm->identity && sm->identity_len > 0 &&
564 sm->identity_len,
571 sm->identity_len, data->nonce_s,
737 sm->identity, sm->identity_len);
739 username = sim_get_username(sm->identity, sm->identity_len);
803 size_t identity_len; local
847 identity_len = sm->identity_len;
848 while (identity_len >
[all...]
H A Deap_i.h161 size_t identity_len; member in struct:eap_sm
226 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
H A Deap_server_teap.c65 size_t identity_len; member in struct:eap_teap_data
142 size_t identity_len = 0; local
227 identity_len = elen;
245 identity, identity_len);
247 data->identity = os_malloc(identity_len);
249 os_memcpy(data->identity, identity, identity_len);
250 data->identity_len = identity_len;
671 (2 + sm->identity_len) + 8;
693 sm->identity, sm->identity_len);
[all...]
H A Deap_sim_db.h93 char * sim_get_username(const u8 *identity, size_t identity_len);
H A Deap_server_ttls.c87 buf = wpabuf_alloc(1 + 1 + sm->identity_len);
94 if (sm->identity_len <= 255)
95 id_len = sm->identity_len;
654 sm->identity, sm->identity_len,
732 username_len = sm->identity_len;
923 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) {
927 sm->identity, sm->identity_len);
1061 sm->identity_len = parse.user_name_len;
1233 sm->identity_len = 0;
1239 sm->identity_len
[all...]
/freebsd-11-stable/contrib/wpa/src/radius/
H A Dradius_server.h200 * @identity_len: identity buffer length in octets
210 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
/freebsd-11-stable/contrib/wpa/src/eapol_auth/
H A Deapol_auth_sm_i.h155 size_t identity_len; member in struct:eapol_state_machine
H A Deapol_auth_sm.h74 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,

Completed in 160 milliseconds

123