/external/wpa_supplicant_8/src/ap/ |
D | authsrv.c | 74 user->password = os_memdup(eap_user->password, in hostapd_radius_get_eap_user() 81 user->salt = os_memdup(eap_user->salt, in hostapd_radius_get_eap_user() 194 os_memdup(hapd->conf->pac_opaque_encr_key, 16); in authsrv_eap_config() 196 cfg->eap_fast_a_id = os_memdup(hapd->conf->eap_fast_a_id, in authsrv_eap_config()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_gpsk.c | 99 data->id_peer = os_memdup(identity, identity_len); in eap_gpsk_init() 119 data->psk = os_memdup(password, password_len); in eap_gpsk_init() 159 data->id_server = os_memdup(pos, alen); in eap_gpsk_process_id_server() 722 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_gpsk_getKey() 739 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_gpsk_get_emsk() 756 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id()
|
D | eap_sake.c | 88 data->peerid = os_memdup(identity, identity_len); in eap_sake_init() 232 data->serverid = os_memdup(attr.serverid, attr.serverid_len); in eap_sake_process_challenge() 455 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_sake_getKey() 494 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_sake_get_emsk()
|
D | eap_psk.c | 119 data->id_s = os_memdup(hdr1 + 1, data->id_s_len); in eap_psk_process_1() 275 decrypted = os_memdup(msg, left); in eap_psk_process_3() 426 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_psk_getKey() 466 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_psk_get_emsk()
|
D | eap_fast_pac.c | 117 *dst = os_memdup(src, src_len); in eap_fast_copy_buf() 722 pac->a_id = os_memdup(pos, len); in eap_fast_pac_get_a_id() 730 pac->a_id_info = os_memdup(pos, len); in eap_fast_pac_get_a_id() 820 pac->pac_opaque = os_memdup(pos, pac->pac_opaque_len); in eap_fast_load_pac_bin() 831 pac->pac_info = os_memdup(pos, pac->pac_info_len); in eap_fast_load_pac_bin()
|
D | eap_teap_pac.c | 117 *dst = os_memdup(src, src_len); in eap_teap_copy_buf() 726 pac->a_id = os_memdup(pos, len); in eap_teap_pac_get_a_id() 734 pac->a_id_info = os_memdup(pos, len); in eap_teap_pac_get_a_id() 824 pac->pac_opaque = os_memdup(pos, pac->pac_opaque_len); in eap_teap_load_pac_bin() 835 pac->pac_info = os_memdup(pos, pac->pac_info_len); in eap_teap_load_pac_bin()
|
D | eap_tls.c | 378 key = os_memdup(data->key_data, EAP_TLS_KEY_LEN); in eap_tls_getKey() 396 key = os_memdup(data->key_data + EAP_TLS_KEY_LEN, EAP_EMSK_LEN); in eap_tls_get_emsk() 414 id = os_memdup(data->session_id, data->id_len); in eap_tls_get_session_id()
|
D | eap_eke.c | 88 data->peerid = os_memdup(identity, identity_len); in eap_eke_init() 312 data->serverid = os_memdup(pos, end - pos); in eap_eke_process_id() 718 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_eke_getKey() 735 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_eke_get_emsk()
|
D | eap_ikev2.c | 86 data->ikev2.IDr = os_memdup(identity, identity_len); in eap_ikev2_init() 93 data->ikev2.shared_secret = os_memdup(password, password_len); in eap_ikev2_init()
|
D | eap_sim.c | 447 data->reauth_id = os_memdup(attr->next_reauth_id, in eap_sim_learn_ids() 659 data->ver_list = os_memdup(attr->version_list, attr->version_list_len); in eap_sim_process_start() 1248 key = os_memdup(data->msk, EAP_SIM_KEYING_DATA_LEN); in eap_sim_getKey() 1298 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_sim_get_emsk()
|
D | eap_mschapv2.c | 112 data->peer_challenge = os_memdup(sm->peer_challenge, in eap_mschapv2_init() 121 data->auth_challenge = os_memdup(sm->auth_challenge, in eap_mschapv2_init()
|
D | eap_aka.c | 425 data->reauth_id = os_memdup(attr->next_reauth_id, in eap_aka_learn_ids() 967 data->network_name = os_memdup(attr->kdf_input, in eap_aka_process_challenge() 1529 key = os_memdup(data->msk, EAP_SIM_KEYING_DATA_LEN); in eap_aka_getKey() 1579 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_aka_get_emsk()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_psk.c | 239 data->id_p = os_memdup(cpos, left); in eap_psk_process_2() 373 decrypted = os_memdup(pos, left); in eap_psk_process_4() 451 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_psk_getKey() 468 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_psk_get_emsk()
|
D | eap_server_gpsk.c | 272 data->id_peer = os_memdup(pos, alen); in eap_gpsk_process_gpsk_2() 578 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_gpsk_getKey() 595 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_gpsk_get_emsk() 619 sid = os_memdup(data->session_id, data->id_len); in eap_gpsk_get_session_id()
|
D | eap_server_sake.c | 329 data->peerid = os_memdup(attr.peerid, attr.peerid_len); in eap_sake_process_challenge() 474 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_sake_getKey() 491 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_sake_get_emsk()
|
D | eap_server_pwd.c | 123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init() 978 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_pwd_getkey() 996 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_pwd_get_emsk() 1028 id = os_memdup(data->session_id, 1 + SHA256_MAC_LEN); in eap_pwd_get_session_id()
|
D | eap_server_gtc.c | 144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process()
|
D | eap_server_eke.c | 470 data->peerid = os_memdup(pos, end - pos); in eap_eke_process_identity() 734 key = os_memdup(data->msk, EAP_MSK_LEN); in eap_eke_getKey() 751 key = os_memdup(data->emsk, EAP_EMSK_LEN); in eap_eke_get_emsk()
|
/external/wpa_supplicant_8/src/wps/ |
D | wps.c | 54 data->dev_password = os_memdup(cfg->pin, cfg->pin_len); in wps_init() 77 os_memdup(wpabuf_head(cfg->wps->ap_nfc_dev_pw), in wps_init() 124 os_memdup(cfg->new_ap_settings, in wps_init()
|
/external/wpa_supplicant_8/src/utils/ |
D | os_none.c | 117 void * os_memdup(const void *src, size_t n) in os_memdup() function
|
D | os_win32.c | 288 void * os_memdup(const void *src, size_t len) in os_memdup() function
|
/external/wpa_supplicant_8/src/crypto/ |
D | aes-siv.c | 98 buf = os_memdup(addr[i], len[i]); in aes_s2v()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.c | 178 tmp = os_memdup(wpabuf_head(req), wpabuf_len(req)); in eap_sim_verify_mac() 372 tmp = os_memdup(wpabuf_head(req), wpabuf_len(req)); in eap_sim_verify_mac_sha256() 944 decrypted = os_memdup(encr_data, encr_data_len); in eap_sim_parse_encr()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | ctrl_iface_named_pipe.c | 322 dst->rsp_buf = os_memdup(send_buf, send_len); in wpa_supplicant_ctrl_iface_rx() 744 dst->rsp_buf = os_memdup(send_buf, send_len); in wpa_supplicant_global_iface_rx()
|
/external/wpa_supplicant_8/src/radius/ |
D | radius.c | 968 data = os_memdup(pos + sizeof(*vhdr), len); in radius_msg_get_vendor_attr() 1047 res = os_memdup(plain + 1, plain[0]); in decrypt_ms_key() 1600 buf = os_memdup(fdata, fdlen); in radius_msg_get_tunnel_password() 1689 dst->attr[i].data = os_memdup(src->attr[i].data, in radius_copy_class()
|