Searched refs:identity (Results 26 - 50 of 106) sorted by relevance

12345

/freebsd-11-stable/contrib/wpa/src/ap/
H A Dwpa_auth_glue.c982 const u8 *identity, size_t identity_len)
991 os_free(sta->identity);
992 sta->identity = NULL;
995 os_free(sta->eapol_sm->identity);
996 sta->eapol_sm->identity = NULL;
1003 /* sta->identity is NULL terminated */
1004 sta->identity = os_zalloc(identity_len + 1);
1005 if (!sta->identity)
1007 os_memcpy(sta->identity, identity, identity_le
981 hostapd_wpa_auth_set_identity(void *ctx, const u8 *sta_addr, const u8 *identity, size_t identity_len) argument
1027 char *identity; local
[all...]
H A Dieee802_1x.c335 const u8 *identity; local
349 identity = eap_get_identity(sm->eap, &identity_len);
350 if (identity == NULL)
353 /* Save station identity for future RADIUS packets */
354 os_free(sm->identity);
355 sm->identity = (u8 *) dup_binstr(identity, identity_len);
356 if (sm->identity == NULL) {
363 HOSTAPD_LEVEL_DEBUG, "STA identity '%s'", sm->identity);
1596 u8 *buf, *identity; local
2199 const u8 *identity; local
2246 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
[all...]
H A Dpmksa_cache_auth.h26 u8 *identity; member in struct:rsn_pmksa_cache_entry
H A Dwpa_auth_ft.c700 const u8 *identity, size_t identity_len)
704 return wpa_auth->cb->set_identity(wpa_auth->cb_ctx, sta_addr, identity,
1176 u8 *identity; member in struct:wpa_ft_pmk_r0_sa
1193 u8 *identity; member in struct:wpa_ft_pmk_r1_sa
1221 os_free(r0->identity);
1275 os_free(r1->identity);
1326 const u8 *identity, size_t identity_len,
1355 if (identity) {
1356 r0->identity = os_malloc(identity_len);
1357 if (r0->identity) {
699 wpa_ft_set_identity(struct wpa_authenticator *wpa_auth, const u8 *sta_addr, const u8 *identity, size_t identity_len) argument
1320 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, size_t pmk_r0_len, const u8 *pmk_r0_name, int pairwise, const struct vlan_description *vlan, int expires_in, int session_timeout, const u8 *identity, size_t identity_len, const u8 *radius_cui, size_t radius_cui_len) argument
1407 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, size_t pmk_r1_len, const u8 *pmk_r1_name, int pairwise, const struct vlan_description *vlan, int expires_in, int session_timeout, const u8 *identity, size_t identity_len, const u8 *radius_cui, size_t radius_cui_len) argument
1474 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, struct vlan_description *vlan, const u8 **identity, size_t *identity_len, const u8 **radius_cui, size_t *radius_cui_len, int *session_timeout) argument
2054 const u8 *identity, *radius_cui; local
2095 const u8 *identity, *radius_cui; local
2786 wpa_ft_local_derive_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, const u8 *r0kh_id, size_t r0kh_id_len, const u8 *req_pmk_r0_name, const u8 *req_pmk_r1_name, u8 *out_pmk_r1, int *out_pairwise, struct vlan_description *vlan, const u8 **identity, size_t *identity_len, const u8 **radius_cui, size_t *radius_cui_len, int *out_session_timeout) argument
2875 const u8 *identity, *radius_cui; local
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_server_aka.c106 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
107 "request full auth identity");
137 /* Check if we already know the identity from EAP-Response/Identity */
139 username = sim_get_username(sm->identity, sm->identity_len);
164 "identity - request permanent identity");
361 * RFC 4187, Chap. 4.1.4 recommends that identity from EAP is
363 * identity.
371 } else if (sm->identity && sm->identity_len > 0 &&
372 (sm->identity[
[all...]
H A Deap_server_sim.c114 * RFC 4186, Chap. 4.2.4 recommends that identity from EAP is
115 * ignored and the SIM/Start is used to request the identity.
127 * already know the identity of the peer, there is no need to
128 * request any identity in this case.
130 } else if (sm->identity && sm->identity_len > 0 &&
131 sm->identity[0] == EAP_SIM_REAUTH_ID_PREFIX) {
270 eap_sim_derive_keys_reauth(data->counter, sm->identity,
444 * Special case for AT_COUNTER_TOO_SMALL recovery - no identity
451 * We always request identity in SIM/Start, so the peer is required to
454 if (!attr->identity || att
[all...]
H A Deap_i.h160 u8 *identity; member in struct:eap_sm
164 /* Whether Phase 2 method should validate identity match */
226 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
H A Deap_sim_db.h93 char * sim_get_username(const u8 *identity, size_t identity_len);
H A Deap_server_ttls.c91 if (sm->identity) {
99 wpabuf_put_data(buf, sm->identity, id_len);
654 sm->identity, sm->identity_len,
721 if (sm->identity == NULL) {
722 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: No user identity "
731 username = sm->identity;
923 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) {
927 sm->identity, sm->identity_len);
1055 os_free(sm->identity);
1056 sm->identity
[all...]
H A Deap_server_wsc.c85 if (sm->identity && sm->identity_len == WSC_ID_REGISTRAR_LEN &&
86 os_memcmp(sm->identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) ==
89 else if (sm->identity && sm->identity_len == WSC_ID_ENROLLEE_LEN &&
90 os_memcmp(sm->identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN)
94 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity",
95 sm->identity, sm->identity_len);
H A Deap_server.c149 * @identity: Identity (User-Name) of the user
150 * @identity_len: Length of identity in bytes
155 * selected based on the specified identity. sm->user and
159 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, argument
175 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity,
225 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) {
858 * EAP Identity exchange. Use keyName-NAI as the user identity
863 "EAP: Use keyName-NAI as user identity for backend authentication");
865 sm->identity = (u8 *) dup_binstr(parse.keyname,
867 if (!sm->identity)
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument
37 addr[0] = identity;
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument
62 addr[0] = identity;
108 const u8 *identity, size_t identity_len,
118 while (identity_len > 0 && identity[identity_len - 1] == 0) {
120 "character from the end of identity");
123 addr[0] = identity;
136 identity, identity_len);
275 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
324 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]
H A Deap_pwd_common.h52 u8 identity[0]; /* length inferred from payload */ member in struct:eap_pwd_id
/freebsd-11-stable/contrib/unbound/util/
H A Dlog.c75 /** the identity of this executable/process */
195 void log_ident_set_or_default(const char* identity) argument
197 if(identity == NULL || identity[0] == 0)
200 log_ident_set(identity);
/freebsd-11-stable/crypto/openssl/apps/
H A Dengine.c95 static void identity(char *ptr) function
278 sk_OPENSSL_STRING_pop_free(cmds, identity);
501 sk_OPENSSL_STRING_pop_free(engines, identity);
502 sk_OPENSSL_STRING_pop_free(pre_cmds, identity);
503 sk_OPENSSL_STRING_pop_free(post_cmds, identity);
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Deap_aka.c384 const u8 *identity = NULL; local
394 /* Look for the realm of the permanent identity */
395 identity = eap_get_config_identity(sm, &identity_len);
396 if (identity) {
397 for (realm = identity, realm_len = identity_len;
616 const u8 *identity = NULL; local
622 identity = data->reauth_id;
629 identity = data->pseudonym;
633 identity = eap_get_config_identity(sm, &identity_len);
634 if (identity) {
923 const u8 *identity; local
[all...]
H A Deap_wsc.c141 const u8 *identity; local
159 identity = eap_get_config_identity(sm, &identity_len);
161 if (identity && identity_len == WSC_ID_REGISTRAR_LEN &&
162 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0)
164 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN &&
165 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0)
168 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity",
169 identity, identity_len);
H A Deap.c443 if (config->identity) {
445 if (config->identity[i] == '@')
453 os_memcpy(realm, &config->identity[i + 1], realm_len);
477 /* When identity is not provided in the config, build the realm from
480 if (!config->identity && !config->anonymous_identity &&
1533 wpa_printf(MSG_WARNING, "Too short IMSI for SIM identity");
1549 wpa_printf(MSG_WARNING, "Could not add realm to SIM identity");
1569 os_free(conf->identity);
1570 conf->identity = os_malloc(1 + imsi_len);
1571 if (conf->identity
1641 const u8 *identity; local
[all...]
H A Deap_ttls.c488 const u8 *identity, *password;
494 identity = eap_get_config_identity(sm, &identity_len);
496 if (identity == NULL || password == NULL)
509 identity, identity_len);
543 if (mschapv2_derive_response(identity, identity_len, password,
582 const u8 *identity, *password;
588 identity = eap_get_config_identity(sm, &identity_len);
590 if (identity == NULL || password == NULL)
603 identity, identity_len);
682 const u8 *identity, *passwor local
[all...]
H A Deap_ikev2.c61 const u8 *identity, *password; local
65 identity = eap_get_config_identity(sm, &identity_len);
66 if (identity == NULL) {
67 wpa_printf(MSG_INFO, "EAP-IKEV2: No identity available");
86 data->ikev2.IDr = os_memdup(identity, identity_len);
H A Deap_mschapv2.c155 const u8 *identity, *password; local
160 identity = eap_get_config_identity(sm, &identity_len);
162 if (identity == NULL || password == NULL)
205 if (mschapv2_derive_response(identity, identity_len, password,
219 wpabuf_put_data(resp, identity, identity_len);
/freebsd-11-stable/contrib/libstdc++/include/backward/
H A Dfunction.h111 using __gnu_cxx::identity;
/freebsd-11-stable/contrib/wpa/src/eapol_auth/
H A Deapol_auth_sm_i.h154 u8 *identity; member in struct:eapol_state_machine
/freebsd-11-stable/contrib/llvm-project/llvm/include/llvm/CodeGen/
H A DLivePhysRegs.h50 using RegisterSet = SparseSet<MCPhysReg, identity<MCPhysReg>>;
/freebsd-11-stable/crypto/openssh/contrib/cygwin/
H A Dssh-user-config43 # optionally create identity of type argument in ~/.ssh
52 if csih_request "Shall I create a ${name} identity file for you?"
61 if csih_request "Do you want to use this identity to login to this machine?"
90 'but it is not a valid directory. Cannot create user identity files.'
130 csih_error "${pwdhome}/.ssh is existant but not a directory. Cannot create user identity files."
251 create_identity identity rsa1 "(deprecated) SSH1 RSA"

Completed in 720 milliseconds

12345