Searched refs:eap_user_get (Results 1 – 11 of 11) sorted by relevance
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_i.h | 223 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
D | eap_server_gtc.c | 151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process()
|
D | eap_server_ttls.c | 923 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_ttls_process_phase2_eap_response() 1062 if (eap_user_get(sm, parse.user_name, parse.user_name_len, 1) in eap_ttls_process_phase2() 1241 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_ttls_process()
|
D | eap_server_tls.c | 214 if (eap_user_get(sm, (const u8 *) user, user_len, in eap_tls_buildReq()
|
D | eap_server_peap.c | 1011 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_peap_process_phase2_response() 1276 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_peap_process()
|
D | eap_server_ikev2.c | 43 if (eap_user_get(sm, IDr, IDr_len, 0) < 0 || sm->user == NULL || in eap_ikev2_get_shared_secret()
|
D | eap_server_psk.c | 249 if (eap_user_get(sm, data->id_p, data->id_p_len, 0) < 0) { in eap_psk_process_2()
|
D | eap_server_pax.c | 351 if (eap_user_get(sm, (u8 *) data->cid, data->cid_len, 0) < 0) { in eap_pax_process_std_2()
|
D | eap_server_fast.c | 1045 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_fast_process_phase2_response() 1486 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_fast_process_phase2_start()
|
D | eap_server_eke.c | 481 if (eap_user_get(sm, data->peerid, data->peerid_len, data->phase2)) { in eap_eke_process_identity()
|
D | eap_server.c | 159 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, in eap_user_get() function 1740 if (eap_user_get(sm, sm->identity, sm->identity_len, 0) != 0) { in eap_sm_Policy_getDecision()
|