Home
last modified time | relevance | path

Searched refs:identity_len (Results 1 – 25 of 448) sorted by relevance

12345678910>>...18

/dports/net/hostapd/hostapd-2.9/src/ap/
H A Deap_user_db.c120 if (len <= user->identity_len && in get_wildcard_cb()
136 size_t identity_len, int phase2) in eap_user_sqlite_get() argument
144 if (identity_len >= sizeof(id_str)) { in eap_user_sqlite_get()
146 __func__, (int) identity_len, in eap_user_sqlite_get()
151 id_str[identity_len] = '\0'; in eap_user_sqlite_get()
152 for (i = 0; i < identity_len; i++) { in eap_user_sqlite_get()
169 hapd->tmp_eap_user.identity_len); in eap_user_sqlite_get()
178 hapd->tmp_eap_user.identity_len = identity_len; in eap_user_sqlite_get()
233 size_t identity_len, int phase2) in hostapd_get_eap_user() argument
268 identity_len >= user->identity_len && in hostapd_get_eap_user()
[all …]
H A Dpmksa_cache_auth.c150 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data()
152 entry->identity_len = eapol->identity_len; in pmksa_cache_from_eapol_data()
154 eapol->identity_len); in pmksa_cache_from_eapol_data()
189 eapol->identity = os_malloc(entry->identity_len); in pmksa_cache_to_eapol_data()
191 eapol->identity_len = entry->identity_len; in pmksa_cache_to_eapol_data()
193 entry->identity_len); in pmksa_cache_to_eapol_data()
196 eapol->identity, eapol->identity_len); in pmksa_cache_to_eapol_data()
411 entry->identity = os_malloc(old_entry->identity_len); in pmksa_cache_add_okc()
413 entry->identity_len = old_entry->identity_len; in pmksa_cache_add_okc()
415 old_entry->identity_len); in pmksa_cache_add_okc()
[all …]
/dports/net/hostapd-devel/hostap-14ab4a816/src/ap/
H A Deap_user_db.c120 if (len <= user->identity_len && in get_wildcard_cb()
136 size_t identity_len, int phase2) in eap_user_sqlite_get() argument
144 if (identity_len >= sizeof(id_str)) { in eap_user_sqlite_get()
146 __func__, (int) identity_len, in eap_user_sqlite_get()
151 id_str[identity_len] = '\0'; in eap_user_sqlite_get()
152 for (i = 0; i < identity_len; i++) { in eap_user_sqlite_get()
169 hapd->tmp_eap_user.identity_len); in eap_user_sqlite_get()
178 hapd->tmp_eap_user.identity_len = identity_len; in eap_user_sqlite_get()
233 size_t identity_len, int phase2) in hostapd_get_eap_user() argument
268 identity_len >= user->identity_len && in hostapd_get_eap_user()
[all …]
H A Dpmksa_cache_auth.c150 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data()
152 entry->identity_len = eapol->identity_len; in pmksa_cache_from_eapol_data()
154 eapol->identity_len); in pmksa_cache_from_eapol_data()
189 eapol->identity = os_malloc(entry->identity_len); in pmksa_cache_to_eapol_data()
191 eapol->identity_len = entry->identity_len; in pmksa_cache_to_eapol_data()
193 entry->identity_len); in pmksa_cache_to_eapol_data()
196 eapol->identity, eapol->identity_len); in pmksa_cache_to_eapol_data()
411 entry->identity = os_malloc(old_entry->identity_len); in pmksa_cache_add_okc()
413 entry->identity_len = old_entry->identity_len; in pmksa_cache_add_okc()
415 old_entry->identity_len); in pmksa_cache_add_okc()
[all …]
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/ap/
H A Deap_user_db.c120 if (len <= user->identity_len && in get_wildcard_cb()
136 size_t identity_len, int phase2) in eap_user_sqlite_get() argument
144 if (identity_len >= sizeof(id_str)) { in eap_user_sqlite_get()
146 __func__, (int) identity_len, in eap_user_sqlite_get()
151 id_str[identity_len] = '\0'; in eap_user_sqlite_get()
152 for (i = 0; i < identity_len; i++) { in eap_user_sqlite_get()
169 hapd->tmp_eap_user.identity_len); in eap_user_sqlite_get()
178 hapd->tmp_eap_user.identity_len = identity_len; in eap_user_sqlite_get()
233 size_t identity_len, int phase2) in hostapd_get_eap_user() argument
268 identity_len >= user->identity_len && in hostapd_get_eap_user()
[all …]
H A Dpmksa_cache_auth.c150 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data()
152 entry->identity_len = eapol->identity_len; in pmksa_cache_from_eapol_data()
154 eapol->identity_len); in pmksa_cache_from_eapol_data()
189 eapol->identity = os_malloc(entry->identity_len); in pmksa_cache_to_eapol_data()
191 eapol->identity_len = entry->identity_len; in pmksa_cache_to_eapol_data()
193 entry->identity_len); in pmksa_cache_to_eapol_data()
196 eapol->identity, eapol->identity_len); in pmksa_cache_to_eapol_data()
411 entry->identity = os_malloc(old_entry->identity_len); in pmksa_cache_add_okc()
413 entry->identity_len = old_entry->identity_len; in pmksa_cache_add_okc()
415 old_entry->identity_len); in pmksa_cache_add_okc()
[all …]
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Deap_user_db.c120 if (len <= user->identity_len && in get_wildcard_cb()
136 size_t identity_len, int phase2) in eap_user_sqlite_get() argument
144 if (identity_len >= sizeof(id_str)) { in eap_user_sqlite_get()
146 __func__, (int) identity_len, in eap_user_sqlite_get()
151 id_str[identity_len] = '\0'; in eap_user_sqlite_get()
152 for (i = 0; i < identity_len; i++) { in eap_user_sqlite_get()
169 hapd->tmp_eap_user.identity_len); in eap_user_sqlite_get()
178 hapd->tmp_eap_user.identity_len = identity_len; in eap_user_sqlite_get()
233 size_t identity_len, int phase2) in hostapd_get_eap_user() argument
268 identity_len >= user->identity_len && in hostapd_get_eap_user()
[all …]
H A Dpmksa_cache_auth.c150 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data()
152 entry->identity_len = eapol->identity_len; in pmksa_cache_from_eapol_data()
154 eapol->identity_len); in pmksa_cache_from_eapol_data()
189 eapol->identity = os_malloc(entry->identity_len); in pmksa_cache_to_eapol_data()
191 eapol->identity_len = entry->identity_len; in pmksa_cache_to_eapol_data()
193 entry->identity_len); in pmksa_cache_to_eapol_data()
196 eapol->identity, eapol->identity_len); in pmksa_cache_to_eapol_data()
411 entry->identity = os_malloc(old_entry->identity_len); in pmksa_cache_add_okc()
413 entry->identity_len = old_entry->identity_len; in pmksa_cache_add_okc()
415 old_entry->identity_len); in pmksa_cache_add_okc()
[all …]
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/ap/
H A Deap_user_db.c120 if (len <= user->identity_len && in get_wildcard_cb()
136 size_t identity_len, int phase2) in eap_user_sqlite_get() argument
144 if (identity_len >= sizeof(id_str)) { in eap_user_sqlite_get()
146 __func__, (int) identity_len, in eap_user_sqlite_get()
151 id_str[identity_len] = '\0'; in eap_user_sqlite_get()
152 for (i = 0; i < identity_len; i++) { in eap_user_sqlite_get()
169 hapd->tmp_eap_user.identity_len); in eap_user_sqlite_get()
178 hapd->tmp_eap_user.identity_len = identity_len; in eap_user_sqlite_get()
233 size_t identity_len, int phase2) in hostapd_get_eap_user() argument
268 identity_len >= user->identity_len && in hostapd_get_eap_user()
[all …]
H A Dpmksa_cache_auth.c150 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data()
152 entry->identity_len = eapol->identity_len; in pmksa_cache_from_eapol_data()
154 eapol->identity_len); in pmksa_cache_from_eapol_data()
189 eapol->identity = os_malloc(entry->identity_len); in pmksa_cache_to_eapol_data()
191 eapol->identity_len = entry->identity_len; in pmksa_cache_to_eapol_data()
193 entry->identity_len); in pmksa_cache_to_eapol_data()
196 eapol->identity, eapol->identity_len); in pmksa_cache_to_eapol_data()
411 entry->identity = os_malloc(old_entry->identity_len); in pmksa_cache_add_okc()
413 entry->identity_len = old_entry->identity_len; in pmksa_cache_add_okc()
415 old_entry->identity_len); in pmksa_cache_add_okc()
[all …]
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_server/
H A Deap_server_gtc.c132 (pos2 - pos != (int) sm->identity_len || in eap_gtc_process()
133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process()
138 sm->identity, sm->identity_len); in eap_gtc_process()
143 sm->identity_len = pos2 - pos; in eap_gtc_process()
144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process()
151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process()
155 sm->identity, sm->identity_len); in eap_gtc_process()
H A Deap_server_sim.c130 } else if (sm->identity && sm->identity_len > 0 && in eap_sim_build_start()
271 sm->identity_len, data->nonce_s, data->mk, in eap_sim_build_reauth()
435 size_t identity_len; in eap_sim_process_start() local
454 if (!attr->identity || attr->identity_len == 0) { in eap_sim_process_start()
460 new_identity = os_malloc(attr->identity_len); in eap_sim_process_start()
466 sm->identity_len = attr->identity_len; in eap_sim_process_start()
469 sm->identity, sm->identity_len); in eap_sim_process_start()
558 identity_len = sm->identity_len; in eap_sim_process_start()
559 while (identity_len > 0 && sm->identity[identity_len - 1] == '\0') { in eap_sim_process_start()
562 identity_len--; in eap_sim_process_start()
[all …]
/dports/net/hostapd/hostapd-2.9/src/eap_server/
H A Deap_server_gtc.c132 (pos2 - pos != (int) sm->identity_len || in eap_gtc_process()
133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process()
138 sm->identity, sm->identity_len); in eap_gtc_process()
143 sm->identity_len = pos2 - pos; in eap_gtc_process()
144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process()
151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process()
155 sm->identity, sm->identity_len); in eap_gtc_process()
H A Deap_server_sim.c130 } else if (sm->identity && sm->identity_len > 0 && in eap_sim_build_start()
271 sm->identity_len, data->nonce_s, data->mk, in eap_sim_build_reauth()
435 size_t identity_len; in eap_sim_process_start() local
454 if (!attr->identity || attr->identity_len == 0) { in eap_sim_process_start()
460 new_identity = os_malloc(attr->identity_len); in eap_sim_process_start()
466 sm->identity_len = attr->identity_len; in eap_sim_process_start()
469 sm->identity, sm->identity_len); in eap_sim_process_start()
558 identity_len = sm->identity_len; in eap_sim_process_start()
559 while (identity_len > 0 && sm->identity[identity_len - 1] == '\0') { in eap_sim_process_start()
562 identity_len--; in eap_sim_process_start()
[all …]
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_gtc.c132 (pos2 - pos != (int) sm->identity_len || in eap_gtc_process()
133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process()
138 sm->identity, sm->identity_len); in eap_gtc_process()
143 sm->identity_len = pos2 - pos; in eap_gtc_process()
144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process()
151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process()
155 sm->identity, sm->identity_len); in eap_gtc_process()
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_server/
H A Deap_server_gtc.c132 (pos2 - pos != (int) sm->identity_len || in eap_gtc_process()
133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process()
138 sm->identity, sm->identity_len); in eap_gtc_process()
143 sm->identity_len = pos2 - pos; in eap_gtc_process()
144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process()
151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process()
155 sm->identity, sm->identity_len); in eap_gtc_process()
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_gtc.c132 (pos2 - pos != (int) sm->identity_len || in eap_gtc_process()
133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process()
138 sm->identity, sm->identity_len); in eap_gtc_process()
143 sm->identity_len = pos2 - pos; in eap_gtc_process()
144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process()
151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process()
155 sm->identity, sm->identity_len); in eap_gtc_process()
H A Deap_server_sim.c130 } else if (sm->identity && sm->identity_len > 0 && in eap_sim_build_start()
271 sm->identity_len, data->nonce_s, data->mk, in eap_sim_build_reauth()
435 size_t identity_len; in eap_sim_process_start() local
454 if (!attr->identity || attr->identity_len == 0) { in eap_sim_process_start()
460 new_identity = os_malloc(attr->identity_len); in eap_sim_process_start()
466 sm->identity_len = attr->identity_len; in eap_sim_process_start()
469 sm->identity, sm->identity_len); in eap_sim_process_start()
558 identity_len = sm->identity_len; in eap_sim_process_start()
559 while (identity_len > 0 && sm->identity[identity_len - 1] == '\0') { in eap_sim_process_start()
562 identity_len--; in eap_sim_process_start()
[all …]
/dports/net/hostapd/hostapd-2.9/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
109 size_t identity_len, in eap_aka_prime_derive_keys() argument
118 size_t identity_len, in eap_aka_prime_derive_keys_reauth() argument
191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
109 size_t identity_len, in eap_aka_prime_derive_keys() argument
118 size_t identity_len, in eap_aka_prime_derive_keys_reauth() argument
191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
109 size_t identity_len, in eap_aka_prime_derive_keys() argument
118 size_t identity_len, in eap_aka_prime_derive_keys_reauth() argument
191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
109 size_t identity_len, in eap_aka_prime_derive_keys() argument
118 size_t identity_len, in eap_aka_prime_derive_keys_reauth() argument
191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
109 size_t identity_len, in eap_aka_prime_derive_keys() argument
118 size_t identity_len, in eap_aka_prime_derive_keys_reauth() argument
191 size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len; member
/dports/net-mgmt/nsca-ng-client/nsca-ng-1.6/src/client/
H A Dauth.c51 size_t identity_len = MIN(strlen(configured_id), max_identity_len - 1); in set_psk() local
54 (void)memcpy(identity, configured_id, identity_len); in set_psk()
57 identity[identity_len] = '\0'; in set_psk()
/dports/net-mgmt/nsca-ng/nsca-ng-1.6/src/client/
H A Dauth.c51 size_t identity_len = MIN(strlen(configured_id), max_identity_len - 1); in set_psk() local
54 (void)memcpy(identity, configured_id, identity_len); in set_psk()
57 identity[identity_len] = '\0'; in set_psk()

12345678910>>...18