Home
last modified time | relevance | path

Searched refs:os_memdup (Results 1 – 25 of 82) sorted by relevance

1234

/external/wpa_supplicant_8/src/ap/
Dauthsrv.c74 user->password = os_memdup(eap_user->password, in hostapd_radius_get_eap_user()
81 user->salt = os_memdup(eap_user->salt, in hostapd_radius_get_eap_user()
194 os_memdup(hapd->conf->pac_opaque_encr_key, 16); in authsrv_eap_config()
196 cfg->eap_fast_a_id = os_memdup(hapd->conf->eap_fast_a_id, in authsrv_eap_config()
/external/wpa_supplicant_8/src/eap_peer/
Deap_gpsk.c99 data->id_peer = os_memdup(identity, identity_len); in eap_gpsk_init()
119 data->psk = os_memdup(password, password_len); in eap_gpsk_init()
159 data->id_server = os_memdup(pos, alen); in eap_gpsk_process_id_server()
722 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_gpsk_getKey()
739 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_gpsk_get_emsk()
756 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id()
Deap_sake.c88 data->peerid = os_memdup(identity, identity_len); in eap_sake_init()
232 data->serverid = os_memdup(attr.serverid, attr.serverid_len); in eap_sake_process_challenge()
455 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_sake_getKey()
494 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_sake_get_emsk()
Deap_psk.c119 data->id_s = os_memdup(hdr1 + 1, data->id_s_len); in eap_psk_process_1()
275 decrypted = os_memdup(msg, left); in eap_psk_process_3()
426 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_psk_getKey()
466 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_psk_get_emsk()
Deap_fast_pac.c117 *dst = os_memdup(src, src_len); in eap_fast_copy_buf()
722 pac->a_id = os_memdup(pos, len); in eap_fast_pac_get_a_id()
730 pac->a_id_info = os_memdup(pos, len); in eap_fast_pac_get_a_id()
820 pac->pac_opaque = os_memdup(pos, pac->pac_opaque_len); in eap_fast_load_pac_bin()
831 pac->pac_info = os_memdup(pos, pac->pac_info_len); in eap_fast_load_pac_bin()
Deap_teap_pac.c117 *dst = os_memdup(src, src_len); in eap_teap_copy_buf()
726 pac->a_id = os_memdup(pos, len); in eap_teap_pac_get_a_id()
734 pac->a_id_info = os_memdup(pos, len); in eap_teap_pac_get_a_id()
824 pac->pac_opaque = os_memdup(pos, pac->pac_opaque_len); in eap_teap_load_pac_bin()
835 pac->pac_info = os_memdup(pos, pac->pac_info_len); in eap_teap_load_pac_bin()
Deap_tls.c378 key = os_memdup(data->key_data, EAP_TLS_KEY_LEN); in eap_tls_getKey()
396 key = os_memdup(data->key_data + EAP_TLS_KEY_LEN, EAP_EMSK_LEN); in eap_tls_get_emsk()
414 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id()
Deap_eke.c88 data->peerid = os_memdup(identity, identity_len); in eap_eke_init()
312 data->serverid = os_memdup(pos, end - pos); in eap_eke_process_id()
718 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_eke_getKey()
735 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_eke_get_emsk()
Deap_ikev2.c86 data->ikev2.IDr = os_memdup(identity, identity_len); in eap_ikev2_init()
93 data->ikev2.shared_secret = os_memdup(password, password_len); in eap_ikev2_init()
Deap_sim.c447 data->reauth_id = os_memdup(attr->next_reauth_id, in eap_sim_learn_ids()
659 data->ver_list = os_memdup(attr->version_list, attr->version_list_len); in eap_sim_process_start()
1248 key = os_memdup(data->msk, EAP_SIM_KEYING_DATA_LEN); in eap_sim_getKey()
1298 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_sim_get_emsk()
Deap_mschapv2.c112 data->peer_challenge = os_memdup(sm->peer_challenge, in eap_mschapv2_init()
121 data->auth_challenge = os_memdup(sm->auth_challenge, in eap_mschapv2_init()
Deap_aka.c425 data->reauth_id = os_memdup(attr->next_reauth_id, in eap_aka_learn_ids()
967 data->network_name = os_memdup(attr->kdf_input, in eap_aka_process_challenge()
1529 key = os_memdup(data->msk, EAP_SIM_KEYING_DATA_LEN); in eap_aka_getKey()
1579 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_aka_get_emsk()
/external/wpa_supplicant_8/src/eap_server/
Deap_server_psk.c239 data->id_p = os_memdup(cpos, left); in eap_psk_process_2()
373 decrypted = os_memdup(pos, left); in eap_psk_process_4()
451 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_psk_getKey()
468 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_psk_get_emsk()
Deap_server_gpsk.c272 data->id_peer = os_memdup(pos, alen); in eap_gpsk_process_gpsk_2()
578 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_gpsk_getKey()
595 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_gpsk_get_emsk()
619 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id()
Deap_server_sake.c329 data->peerid = os_memdup(attr.peerid, attr.peerid_len); in eap_sake_process_challenge()
474 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_sake_getKey()
491 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_sake_get_emsk()
Deap_server_pwd.c123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init()
978 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_pwd_getkey()
996 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_pwd_get_emsk()
1028 id = os_memdup(data->session_id, 1 + SHA256_MAC_LEN); in eap_pwd_get_session_id()
Deap_server_gtc.c144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process()
Deap_server_eke.c470 data->peerid = os_memdup(pos, end - pos); in eap_eke_process_identity()
734 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_eke_getKey()
751 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_eke_get_emsk()
/external/wpa_supplicant_8/src/wps/
Dwps.c54 data->dev_password = os_memdup(cfg->pin, cfg->pin_len); in wps_init()
77 os_memdup(wpabuf_head(cfg->wps->ap_nfc_dev_pw), in wps_init()
124 os_memdup(cfg->new_ap_settings, in wps_init()
/external/wpa_supplicant_8/src/utils/
Dos_none.c117 void * os_memdup(const void *src, size_t n) in os_memdup() function
Dos_win32.c288 void * os_memdup(const void *src, size_t len) in os_memdup() function
/external/wpa_supplicant_8/src/crypto/
Daes-siv.c98 buf = os_memdup(addr[i], len[i]); in aes_s2v()
/external/wpa_supplicant_8/src/eap_common/
Deap_sim_common.c178 tmp = os_memdup(wpabuf_head(req), wpabuf_len(req)); in eap_sim_verify_mac()
372 tmp = os_memdup(wpabuf_head(req), wpabuf_len(req)); in eap_sim_verify_mac_sha256()
944 decrypted = os_memdup(encr_data, encr_data_len); in eap_sim_parse_encr()
/external/wpa_supplicant_8/wpa_supplicant/
Dctrl_iface_named_pipe.c322 dst->rsp_buf = os_memdup(send_buf, send_len); in wpa_supplicant_ctrl_iface_rx()
744 dst->rsp_buf = os_memdup(send_buf, send_len); in wpa_supplicant_global_iface_rx()
/external/wpa_supplicant_8/src/radius/
Dradius.c968 data = os_memdup(pos + sizeof(*vhdr), len); in radius_msg_get_vendor_attr()
1047 res = os_memdup(plain + 1, plain[0]); in decrypt_ms_key()
1600 buf = os_memdup(fdata, fdlen); in radius_msg_get_tunnel_password()
1689 dst->attr[i].data = os_memdup(src->attr[i].data, in radius_copy_class()

1234