/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | eap_user_db.c | 120 if (len <= user->identity_len && in get_wildcard_cb() 136 size_t identity_len, int phase2) in eap_user_sqlite_get() argument 144 if (identity_len >= sizeof(id_str)) { in eap_user_sqlite_get() 146 __func__, (int) identity_len, in eap_user_sqlite_get() 151 id_str[identity_len] = '\0'; in eap_user_sqlite_get() 152 for (i = 0; i < identity_len; i++) { in eap_user_sqlite_get() 169 hapd->tmp_eap_user.identity_len); in eap_user_sqlite_get() 178 hapd->tmp_eap_user.identity_len = identity_len; in eap_user_sqlite_get() 233 size_t identity_len, int phase2) in hostapd_get_eap_user() argument 268 identity_len >= user->identity_len && in hostapd_get_eap_user() [all …]
|
H A D | pmksa_cache_auth.c | 150 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data() 152 entry->identity_len = eapol->identity_len; in pmksa_cache_from_eapol_data() 154 eapol->identity_len); in pmksa_cache_from_eapol_data() 189 eapol->identity = os_malloc(entry->identity_len); in pmksa_cache_to_eapol_data() 191 eapol->identity_len = entry->identity_len; in pmksa_cache_to_eapol_data() 193 entry->identity_len); in pmksa_cache_to_eapol_data() 196 eapol->identity, eapol->identity_len); in pmksa_cache_to_eapol_data() 411 entry->identity = os_malloc(old_entry->identity_len); in pmksa_cache_add_okc() 413 entry->identity_len = old_entry->identity_len; in pmksa_cache_add_okc() 415 old_entry->identity_len); in pmksa_cache_add_okc() [all …]
|
H A D | wpa_auth_ft.c | 705 identity_len); in wpa_ft_set_identity() 1177 size_t identity_len; member 1194 size_t identity_len; member 1359 r0->identity_len = identity_len; in wpa_ft_store_pmk_r0() 1448 r1->identity_len = identity_len; in wpa_ft_store_pmk_r1() 1500 if (identity && identity_len) { in wpa_ft_fetch_pmk_r1() 1502 *identity_len = r1->identity_len; in wpa_ft_fetch_pmk_r1() 2055 size_t identity_len, radius_cui_len; in wpa_ft_store_pmk_fils() local 2845 if (identity && identity_len) { in wpa_ft_local_derive_pmk_r1() 2847 *identity_len = r0->identity_len; in wpa_ft_local_derive_pmk_r1() [all …]
|
H A D | wpa_auth_glue.c | 982 const u8 *identity, size_t identity_len) in hostapd_wpa_auth_set_identity() argument 997 sta->eapol_sm->identity_len = 0; in hostapd_wpa_auth_set_identity() 1000 if (!identity_len) in hostapd_wpa_auth_set_identity() 1004 sta->identity = os_zalloc(identity_len + 1); in hostapd_wpa_auth_set_identity() 1007 os_memcpy(sta->identity, identity, identity_len); in hostapd_wpa_auth_set_identity() 1010 sta->eapol_sm->identity = os_zalloc(identity_len); in hostapd_wpa_auth_set_identity() 1013 os_memcpy(sta->eapol_sm->identity, identity, identity_len); in hostapd_wpa_auth_set_identity() 1014 sta->eapol_sm->identity_len = identity_len; in hostapd_wpa_auth_set_identity()
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server_gtc.c | 132 (pos2 - pos != (int) sm->identity_len || in eap_gtc_process() 133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process() 138 sm->identity, sm->identity_len); in eap_gtc_process() 143 sm->identity_len = pos2 - pos; in eap_gtc_process() 144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process() 151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process() 155 sm->identity, sm->identity_len); in eap_gtc_process()
|
H A D | eap_server_sim.c | 130 } else if (sm->identity && sm->identity_len > 0 && in eap_sim_build_start() 271 sm->identity_len, data->nonce_s, data->mk, in eap_sim_build_reauth() 435 size_t identity_len; in eap_sim_process_start() local 454 if (!attr->identity || attr->identity_len == 0) { in eap_sim_process_start() 460 new_identity = os_malloc(attr->identity_len); in eap_sim_process_start() 466 sm->identity_len = attr->identity_len; in eap_sim_process_start() 469 sm->identity, sm->identity_len); in eap_sim_process_start() 558 identity_len = sm->identity_len; in eap_sim_process_start() 559 while (identity_len > 0 && sm->identity[identity_len - 1] == '\0') { in eap_sim_process_start() 562 identity_len--; in eap_sim_process_start() [all …]
|
H A D | eap_server_aka.c | 371 } else if (sm->identity && sm->identity_len > 0 && in eap_aka_build_identity() 564 sm->identity_len, in eap_aka_build_reauth() 571 sm->identity_len, data->nonce_s, in eap_aka_build_reauth() 737 sm->identity, sm->identity_len); in eap_aka_determine_identity() 803 size_t identity_len; in eap_aka_fullauth() local 847 identity_len = sm->identity_len; in eap_aka_fullauth() 848 while (identity_len > 0 && sm->identity[identity_len - 1] == '\0') { in eap_aka_fullauth() 851 identity_len--; in eap_aka_fullauth() 854 sm->identity, identity_len); in eap_aka_fullauth() 900 new_identity = os_malloc(attr->identity_len); in eap_aka_process_identity() [all …]
|
H A D | eap_server_fast.c | 62 size_t identity_len; member 132 size_t identity_len = 0; in eap_fast_session_ticket_cb() local 219 identity_len = elen; in eap_fast_session_ticket_cb() 241 data->identity_len = identity_len; in eap_fast_session_ticket_cb() 702 (2 + sm->identity_len) + 8; in eap_fast_build_pac() 722 *pos++ = sm->identity_len; in eap_fast_build_pac() 724 pos += sm->identity_len; in eap_fast_build_pac() 796 sm->identity_len); in eap_fast_build_pac() 1049 sm->identity, sm->identity_len); in eap_fast_process_phase2_response() 1483 sm->identity_len = data->identity_len; in eap_fast_process_phase2_start() [all …]
|
H A D | eap_server_teap.c | 65 size_t identity_len; member 142 size_t identity_len = 0; in eap_teap_session_ticket_cb() local 227 identity_len = elen; in eap_teap_session_ticket_cb() 245 identity, identity_len); in eap_teap_session_ticket_cb() 250 data->identity_len = identity_len; in eap_teap_session_ticket_cb() 671 (2 + sm->identity_len) + 8; in eap_teap_build_pac() 695 *pos++ = sm->identity_len; in eap_teap_build_pac() 697 pos += sm->identity_len; in eap_teap_build_pac() 767 sm->identity_len); in eap_teap_build_pac() 1632 sm->identity_len = data->identity_len; in eap_teap_process_phase2_start() [all …]
|
H A D | eap_server_ttls.c | 87 buf = wpabuf_alloc(1 + 1 + sm->identity_len); in eap_ttls_valid_session() 94 if (sm->identity_len <= 255) in eap_ttls_valid_session() 95 id_len = sm->identity_len; in eap_ttls_valid_session() 654 sm->identity, sm->identity_len, in eap_ttls_process_phase2_mschap() 732 username_len = sm->identity_len; in eap_ttls_process_phase2_mschapv2() 927 sm->identity, sm->identity_len); in eap_ttls_process_phase2_eap_response() 1061 sm->identity_len = parse.user_name_len; in eap_ttls_process_phase2() 1233 sm->identity_len = 0; in eap_ttls_process() 1239 sm->identity_len = id_len; in eap_ttls_process() 1241 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_ttls_process() [all …]
|
H A D | eap_server_peap.c | 112 buf = wpabuf_alloc(1 + 1 + sm->identity_len); in eap_peap_valid_session() 119 if (sm->identity_len <= 255) in eap_peap_valid_session() 120 id_len = sm->identity_len; in eap_peap_valid_session() 1011 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_peap_process_phase2_response() 1015 sm->identity, sm->identity_len); in eap_peap_process_phase2_response() 1268 sm->identity_len = 0; in eap_peap_process() 1274 sm->identity_len = id_len; in eap_peap_process() 1276 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_peap_process() 1278 sm->identity, sm->identity_len); in eap_peap_process()
|
H A D | eap_i.h | 161 size_t identity_len; member 226 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
/dragonfly/contrib/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 109 size_t identity_len, in eap_aka_prime_derive_keys() argument 118 size_t identity_len, in eap_aka_prime_derive_keys_reauth() argument 191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member
|
H A D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, in eap_sim_derive_mk() argument 38 len[0] = identity_len; in eap_sim_derive_mk() 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, in eap_aka_derive_mk() argument 63 len[0] = identity_len; in eap_aka_derive_mk() 108 const u8 *identity, size_t identity_len, in eap_sim_derive_keys_reauth() argument 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { in eap_sim_derive_keys_reauth() 121 identity_len--; in eap_sim_derive_keys_reauth() 124 len[0] = identity_len; in eap_sim_derive_keys_reauth() 136 identity, identity_len); in eap_sim_derive_keys_reauth() 325 const u8 *identity, size_t identity_len, in eap_aka_prime_derive_keys_reauth() argument [all …]
|
/dragonfly/contrib/wpa_supplicant/src/eap_peer/ |
H A D | eap_leap.c | 67 size_t identity_len, password_len, len; in eap_leap_process_request() local 72 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_request() 110 3 + LEAP_RESPONSE_LEN + identity_len, in eap_leap_process_request() 129 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_request() 145 size_t identity_len; in eap_leap_process_success() local 149 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_success() 161 3 + LEAP_CHALLENGE_LEN + identity_len, in eap_leap_process_success() 179 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_success()
|
H A D | eap_gtc.c | 51 size_t password_len, identity_len, len, plen; in eap_gtc_process() local 99 identity = eap_get_config_identity(sm, &identity_len); in eap_gtc_process() 103 plen += 9 + identity_len + 1; in eap_gtc_process() 110 wpabuf_put_data(resp, identity, identity_len); in eap_gtc_process()
|
H A D | eap_sim.c | 405 size_t identity_len = 0; in eap_sim_learn_ids() local 487 size_t identity_len = 0; in eap_sim_response_start() local 493 identity_len = data->reauth_id_len; in eap_sim_response_start() 500 identity_len = data->pseudonym_len; in eap_sim_response_start() 533 identity, identity_len); in eap_sim_response_start() 535 identity, identity_len); in eap_sim_response_start() 719 size_t identity_len; in eap_sim_process_challenge() local 778 identity_len = data->last_eap_identity_len; in eap_sim_process_challenge() 783 identity_len = data->pseudonym_len; in eap_sim_process_challenge() 790 identity_len = config->imsi_identity_len; in eap_sim_process_challenge() [all …]
|
H A D | mschapv2.c | 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, in mschapv2_derive_response() argument 49 identity, identity_len); in mschapv2_derive_response() 50 username_len = identity_len; in mschapv2_derive_response()
|
H A D | eap_aka.c | 385 size_t identity_len = 0; in eap_aka_learn_ids() local 617 size_t identity_len = 0; in eap_aka_response_identity() local 623 identity_len = data->reauth_id_len; in eap_aka_response_identity() 630 identity_len = data->pseudonym_len; in eap_aka_response_identity() 653 identity, identity_len); in eap_aka_response_identity() 655 identity, identity_len); in eap_aka_response_identity() 924 size_t identity_len; in eap_aka_process_challenge() local 1041 identity_len = data->last_eap_identity_len; in eap_aka_process_challenge() 1046 identity_len = data->pseudonym_len; in eap_aka_process_challenge() 1053 identity_len = config->imsi_identity_len; in eap_aka_process_challenge() [all …]
|
H A D | eap_ttls.c | 489 size_t identity_len, password_len; in eap_ttls_phase2_request_mschapv2() 499 msg = wpabuf_alloc(identity_len + 1000); in eap_ttls_phase2_request_mschapv2() 509 identity, identity_len); in eap_ttls_phase2_request_mschapv2() 583 size_t identity_len, password_len; in eap_ttls_phase2_request_mschap() 593 msg = wpabuf_alloc(identity_len + 1000); in eap_ttls_phase2_request_mschap() 603 identity, identity_len); in eap_ttls_phase2_request_mschap() 683 size_t identity_len, password_len; in eap_ttls_phase2_request_pap() local 702 identity, identity_len); in eap_ttls_phase2_request_pap() 740 size_t identity_len, password_len; in eap_ttls_phase2_request_chap() 759 identity, identity_len); in eap_ttls_phase2_request_chap() [all …]
|
H A D | eap.c | 448 if (i < config->identity_len) { in eap_get_realm() 1589 conf->identity_len = 1 + imsi_len; in eap_sm_imsi_identity() 1642 size_t identity_len; in eap_sm_buildIdentity() local 1652 &identity_len)) != NULL) { in eap_sm_buildIdentity() 1654 "identity", identity, identity_len); in eap_sm_buildIdentity() 1659 identity, identity_len); in eap_sm_buildIdentity() 1662 identity_len = config->identity_len; in eap_sm_buildIdentity() 1664 identity, identity_len); in eap_sm_buildIdentity() 1673 identity_len = config->identity_len; in eap_sm_buildIdentity() 1676 identity, identity_len); in eap_sm_buildIdentity() [all …]
|
H A D | eap_psk.c | 37 size_t identity_len, password_len; in eap_psk_init() local 57 identity = eap_get_config_identity(sm, &identity_len); in eap_psk_init() 59 data->id_p = os_malloc(identity_len); in eap_psk_init() 61 os_memcpy(data->id_p, identity, identity_len); in eap_psk_init() 62 data->id_p_len = identity_len; in eap_psk_init()
|
H A D | eap_wsc.c | 142 size_t identity_len; in eap_wsc_init() local 159 identity = eap_get_config_identity(sm, &identity_len); in eap_wsc_init() 161 if (identity && identity_len == WSC_ID_REGISTRAR_LEN && in eap_wsc_init() 164 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN && in eap_wsc_init() 169 identity, identity_len); in eap_wsc_init()
|
H A D | eap_ikev2.c | 62 size_t identity_len, password_len; in eap_ikev2_init() local 65 identity = eap_get_config_identity(sm, &identity_len); in eap_ikev2_init() 86 data->ikev2.IDr = os_memdup(identity, identity_len); in eap_ikev2_init() 89 data->ikev2.IDr_len = identity_len; in eap_ikev2_init()
|
H A D | eap_mschapv2.c | 154 size_t identity_len, password_len; in eap_mschapv2_challenge_reply() local 160 identity = eap_get_config_identity(sm, &identity_len); in eap_mschapv2_challenge_reply() 165 ms_len = sizeof(*ms) + 1 + sizeof(*r) + identity_len; in eap_mschapv2_challenge_reply() 205 if (mschapv2_derive_response(identity, identity_len, password, in eap_mschapv2_challenge_reply() 219 wpabuf_put_data(resp, identity, identity_len); in eap_mschapv2_challenge_reply()
|