/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | eap_user_db.c | 120 if (len <= user->identity_len && 136 size_t identity_len, int phase2) 144 if (identity_len >= sizeof(id_str)) { 146 __func__, (int) identity_len, 150 os_memcpy(id_str, identity, identity_len); 151 id_str[identity_len] = '\0'; 152 for (i = 0; i < identity_len; i++) { 169 hapd->tmp_eap_user.identity_len); 174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); 177 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); 135 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument 232 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument [all...] |
H A D | pmksa_cache_auth.c | 150 entry->identity = os_malloc(eapol->identity_len); 152 entry->identity_len = eapol->identity_len; 154 eapol->identity_len); 189 eapol->identity = os_malloc(entry->identity_len); 191 eapol->identity_len = entry->identity_len; 193 entry->identity_len); 196 eapol->identity, eapol->identity_len); 411 entry->identity = os_malloc(old_entry->identity_len); [all...] |
H A D | pmksa_cache_auth.h | 27 size_t identity_len; member in struct:rsn_pmksa_cache_entry
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | mschapv2.c | 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument 49 identity, identity_len); 50 username_len = identity_len;
|
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; local 99 identity = eap_get_config_identity(sm, &identity_len); 103 plen += 9 + identity_len + 1; 110 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_leap.c | 67 size_t identity_len, password_len, len; local 72 identity = eap_get_config_identity(sm, &identity_len); 110 3 + LEAP_RESPONSE_LEN + identity_len, 129 wpabuf_put_data(resp, identity, identity_len); 145 size_t identity_len; local 149 identity = eap_get_config_identity(sm, &identity_len); 161 3 + LEAP_CHALLENGE_LEN + identity_len, 179 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_config.h | 25 * identity_len - EAP Identity length 27 size_t identity_len; member in struct:eap_peer_config
|
H A D | eap_sim.c | 405 size_t identity_len = 0; local 415 identity = eap_get_config_identity(sm, &identity_len); 417 for (realm = identity, realm_len = identity_len; 487 size_t identity_len = 0; local 493 identity_len = data->reauth_id_len; 500 identity_len = data->pseudonym_len; 503 identity = eap_get_config_identity(sm, &identity_len); 533 identity, identity_len); 534 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len, 535 identity, identity_len); 719 size_t identity_len; local [all...] |
H A D | eap_ttls.c | 489 size_t identity_len, password_len; 494 identity = eap_get_config_identity(sm, &identity_len); 499 msg = wpabuf_alloc(identity_len + 1000); 509 identity, identity_len); 543 if (mschapv2_derive_response(identity, identity_len, password, 583 size_t identity_len, password_len; 588 identity = eap_get_config_identity(sm, &identity_len); 593 msg = wpabuf_alloc(identity_len + 1000); 603 identity, identity_len); 683 size_t identity_len, password_le local [all...] |
H A D | eap_aka.c | 385 size_t identity_len = 0; local 395 identity = eap_get_config_identity(sm, &identity_len); 397 for (realm = identity, realm_len = identity_len; 617 size_t identity_len = 0; local 623 identity_len = data->reauth_id_len; 630 identity_len = data->pseudonym_len; 633 identity = eap_get_config_identity(sm, &identity_len); 653 identity, identity_len); 654 eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len, 655 identity, identity_len); 924 size_t identity_len; local [all...] |
H A D | eap_ikev2.c | 62 size_t identity_len, password_len; local 65 identity = eap_get_config_identity(sm, &identity_len); 86 data->ikev2.IDr = os_memdup(identity, identity_len); 89 data->ikev2.IDr_len = identity_len;
|
H A D | eap_psk.c | 37 size_t identity_len, password_len; local 57 identity = eap_get_config_identity(sm, &identity_len); 59 data->id_p = os_malloc(identity_len); 61 os_memcpy(data->id_p, identity, identity_len); 62 data->id_p_len = identity_len;
|
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 109 size_t identity_len, 118 size_t identity_len, 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member in struct:eap_sim_attrs 108 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument 38 len[0] = identity_len; 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument 63 len[0] = identity_len; 108 const u8 *identity, size_t identity_len, 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { 121 identity_len--; 124 len[0] = identity_len; 136 identity, identity_len); 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 275 eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, const u8 *ik, const u8 *ck, u8 *k_encr, u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk) argument 324 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_gtc.c | 132 (pos2 - pos != (int) sm->identity_len || 133 os_memcmp(pos, sm->identity, sm->identity_len))) { 138 sm->identity, sm->identity_len); 143 sm->identity_len = pos2 - pos; 144 sm->identity = os_memdup(pos, sm->identity_len); 151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { 155 sm->identity, sm->identity_len);
|
H A D | eap_server_sim.c | 130 } else if (sm->identity && sm->identity_len > 0 && 271 sm->identity_len, data->nonce_s, data->mk, 435 size_t identity_len; local 454 if (!attr->identity || attr->identity_len == 0) { 460 new_identity = os_malloc(attr->identity_len); 465 os_memcpy(sm->identity, attr->identity, attr->identity_len); 466 sm->identity_len = attr->identity_len; 469 sm->identity, sm->identity_len); 470 username = sim_get_username(sm->identity, sm->identity_len); [all...] |
H A D | eap_server_fast.c | 62 size_t identity_len; member in struct:eap_fast_data 132 size_t identity_len = 0; local 219 identity_len = elen; 236 "PAC-Opaque", identity, identity_len); 238 data->identity = os_malloc(identity_len); 240 os_memcpy(data->identity, identity, identity_len); 241 data->identity_len = identity_len; 702 (2 + sm->identity_len) + 8; 722 *pos++ = sm->identity_len; [all...] |
H A D | eap_server_aka.c | 139 username = sim_get_username(sm->identity, sm->identity_len); 371 } else if (sm->identity && sm->identity_len > 0 && 564 sm->identity_len, 571 sm->identity_len, data->nonce_s, 737 sm->identity, sm->identity_len); 739 username = sim_get_username(sm->identity, sm->identity_len); 803 size_t identity_len; local 847 identity_len = sm->identity_len; 848 while (identity_len > [all...] |
H A D | eap_i.h | 161 size_t identity_len; member in struct:eap_sm 226 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
H A D | eap_server_teap.c | 65 size_t identity_len; member in struct:eap_teap_data 142 size_t identity_len = 0; local 227 identity_len = elen; 245 identity, identity_len); 247 data->identity = os_malloc(identity_len); 249 os_memcpy(data->identity, identity, identity_len); 250 data->identity_len = identity_len; 671 (2 + sm->identity_len) + 8; 693 sm->identity, sm->identity_len); [all...] |
H A D | eap_sim_db.h | 93 char * sim_get_username(const u8 *identity, size_t identity_len);
|
H A D | eap_server_ttls.c | 87 buf = wpabuf_alloc(1 + 1 + sm->identity_len); 94 if (sm->identity_len <= 255) 95 id_len = sm->identity_len; 654 sm->identity, sm->identity_len, 732 username_len = sm->identity_len; 923 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { 927 sm->identity, sm->identity_len); 1061 sm->identity_len = parse.user_name_len; 1233 sm->identity_len = 0; 1239 sm->identity_len [all...] |
/freebsd-11-stable/contrib/wpa/src/radius/ |
H A D | radius_server.h | 200 * @identity_len: identity buffer length in octets 210 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
/freebsd-11-stable/contrib/wpa/src/eapol_auth/ |
H A D | eapol_auth_sm_i.h | 155 size_t identity_len; member in struct:eapol_state_machine
|
H A D | eapol_auth_sm.h | 74 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|