/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | wpa_auth_glue.c | 982 const u8 *identity, size_t identity_len) 991 os_free(sta->identity); 992 sta->identity = NULL; 995 os_free(sta->eapol_sm->identity); 996 sta->eapol_sm->identity = NULL; 1003 /* sta->identity is NULL terminated */ 1004 sta->identity = os_zalloc(identity_len + 1); 1005 if (!sta->identity) 1007 os_memcpy(sta->identity, identity, identity_le 981 hostapd_wpa_auth_set_identity(void *ctx, const u8 *sta_addr, const u8 *identity, size_t identity_len) argument 1027 char *identity; local [all...] |
H A D | ieee802_1x.c | 335 const u8 *identity; local 349 identity = eap_get_identity(sm->eap, &identity_len); 350 if (identity == NULL) 353 /* Save station identity for future RADIUS packets */ 354 os_free(sm->identity); 355 sm->identity = (u8 *) dup_binstr(identity, identity_len); 356 if (sm->identity == NULL) { 363 HOSTAPD_LEVEL_DEBUG, "STA identity '%s'", sm->identity); 1596 u8 *buf, *identity; local 2199 const u8 *identity; local 2246 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument [all...] |
H A D | pmksa_cache_auth.h | 26 u8 *identity; member in struct:rsn_pmksa_cache_entry
|
H A D | wpa_auth_ft.c | 700 const u8 *identity, size_t identity_len) 704 return wpa_auth->cb->set_identity(wpa_auth->cb_ctx, sta_addr, identity, 1176 u8 *identity; member in struct:wpa_ft_pmk_r0_sa 1193 u8 *identity; member in struct:wpa_ft_pmk_r1_sa 1221 os_free(r0->identity); 1275 os_free(r1->identity); 1326 const u8 *identity, size_t identity_len, 1355 if (identity) { 1356 r0->identity = os_malloc(identity_len); 1357 if (r0->identity) { 699 wpa_ft_set_identity(struct wpa_authenticator *wpa_auth, const u8 *sta_addr, const u8 *identity, size_t identity_len) argument 1320 wpa_ft_store_pmk_r0(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r0, size_t pmk_r0_len, const u8 *pmk_r0_name, int pairwise, const struct vlan_description *vlan, int expires_in, int session_timeout, const u8 *identity, size_t identity_len, const u8 *radius_cui, size_t radius_cui_len) argument 1407 wpa_ft_store_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1, size_t pmk_r1_len, const u8 *pmk_r1_name, int pairwise, const struct vlan_description *vlan, int expires_in, int session_timeout, const u8 *identity, size_t identity_len, const u8 *radius_cui, size_t radius_cui_len) argument 1474 wpa_ft_fetch_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *spa, const u8 *pmk_r1_name, u8 *pmk_r1, size_t *pmk_r1_len, int *pairwise, struct vlan_description *vlan, const u8 **identity, size_t *identity_len, const u8 **radius_cui, size_t *radius_cui_len, int *session_timeout) argument 2054 const u8 *identity, *radius_cui; local 2095 const u8 *identity, *radius_cui; local 2786 wpa_ft_local_derive_pmk_r1(struct wpa_authenticator *wpa_auth, struct wpa_state_machine *sm, const u8 *r0kh_id, size_t r0kh_id_len, const u8 *req_pmk_r0_name, const u8 *req_pmk_r1_name, u8 *out_pmk_r1, int *out_pairwise, struct vlan_description *vlan, const u8 **identity, size_t *identity_len, const u8 **radius_cui, size_t *radius_cui_len, int *out_session_timeout) argument 2875 const u8 *identity, *radius_cui; local [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_aka.c | 106 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - " 107 "request full auth identity"); 137 /* Check if we already know the identity from EAP-Response/Identity */ 139 username = sim_get_username(sm->identity, sm->identity_len); 164 "identity - request permanent identity"); 361 * RFC 4187, Chap. 4.1.4 recommends that identity from EAP is 363 * identity. 371 } else if (sm->identity && sm->identity_len > 0 && 372 (sm->identity[ [all...] |
H A D | eap_server_sim.c | 114 * RFC 4186, Chap. 4.2.4 recommends that identity from EAP is 115 * ignored and the SIM/Start is used to request the identity. 127 * already know the identity of the peer, there is no need to 128 * request any identity in this case. 130 } else if (sm->identity && sm->identity_len > 0 && 131 sm->identity[0] == EAP_SIM_REAUTH_ID_PREFIX) { 270 eap_sim_derive_keys_reauth(data->counter, sm->identity, 444 * Special case for AT_COUNTER_TOO_SMALL recovery - no identity 451 * We always request identity in SIM/Start, so the peer is required to 454 if (!attr->identity || att [all...] |
H A D | eap_i.h | 160 u8 *identity; member in struct:eap_sm 164 /* Whether Phase 2 method should validate identity match */ 226 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
H A D | eap_sim_db.h | 93 char * sim_get_username(const u8 *identity, size_t identity_len);
|
H A D | eap_server_ttls.c | 91 if (sm->identity) { 99 wpabuf_put_data(buf, sm->identity, id_len); 654 sm->identity, sm->identity_len, 721 if (sm->identity == NULL) { 722 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: No user identity " 731 username = sm->identity; 923 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { 927 sm->identity, sm->identity_len); 1055 os_free(sm->identity); 1056 sm->identity [all...] |
H A D | eap_server_wsc.c | 85 if (sm->identity && sm->identity_len == WSC_ID_REGISTRAR_LEN && 86 os_memcmp(sm->identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 89 else if (sm->identity && sm->identity_len == WSC_ID_ENROLLEE_LEN && 90 os_memcmp(sm->identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) 94 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity", 95 sm->identity, sm->identity_len);
|
H A D | eap_server.c | 149 * @identity: Identity (User-Name) of the user 150 * @identity_len: Length of identity in bytes 155 * selected based on the specified identity. sm->user and 159 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, argument 175 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity, 225 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) { 858 * EAP Identity exchange. Use keyName-NAI as the user identity 863 "EAP: Use keyName-NAI as user identity for backend authentication"); 865 sm->identity = (u8 *) dup_binstr(parse.keyname, 867 if (!sm->identity) [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument 37 addr[0] = identity; 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument 62 addr[0] = identity; 108 const u8 *identity, size_t identity_len, 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { 120 "character from the end of identity"); 123 addr[0] = identity; 136 identity, identity_len); 275 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 324 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
H A D | eap_pwd_common.h | 52 u8 identity[0]; /* length inferred from payload */ member in struct:eap_pwd_id
|
/freebsd-11-stable/contrib/unbound/util/ |
H A D | log.c | 75 /** the identity of this executable/process */ 195 void log_ident_set_or_default(const char* identity) argument 197 if(identity == NULL || identity[0] == 0) 200 log_ident_set(identity);
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | engine.c | 95 static void identity(char *ptr) function 278 sk_OPENSSL_STRING_pop_free(cmds, identity); 501 sk_OPENSSL_STRING_pop_free(engines, identity); 502 sk_OPENSSL_STRING_pop_free(pre_cmds, identity); 503 sk_OPENSSL_STRING_pop_free(post_cmds, identity);
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_aka.c | 384 const u8 *identity = NULL; local 394 /* Look for the realm of the permanent identity */ 395 identity = eap_get_config_identity(sm, &identity_len); 396 if (identity) { 397 for (realm = identity, realm_len = identity_len; 616 const u8 *identity = NULL; local 622 identity = data->reauth_id; 629 identity = data->pseudonym; 633 identity = eap_get_config_identity(sm, &identity_len); 634 if (identity) { 923 const u8 *identity; local [all...] |
H A D | eap_wsc.c | 141 const u8 *identity; local 159 identity = eap_get_config_identity(sm, &identity_len); 161 if (identity && identity_len == WSC_ID_REGISTRAR_LEN && 162 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0) 164 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN && 165 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0) 168 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity", 169 identity, identity_len);
|
H A D | eap.c | 443 if (config->identity) { 445 if (config->identity[i] == '@') 453 os_memcpy(realm, &config->identity[i + 1], realm_len); 477 /* When identity is not provided in the config, build the realm from 480 if (!config->identity && !config->anonymous_identity && 1533 wpa_printf(MSG_WARNING, "Too short IMSI for SIM identity"); 1549 wpa_printf(MSG_WARNING, "Could not add realm to SIM identity"); 1569 os_free(conf->identity); 1570 conf->identity = os_malloc(1 + imsi_len); 1571 if (conf->identity 1641 const u8 *identity; local [all...] |
H A D | eap_ttls.c | 488 const u8 *identity, *password; 494 identity = eap_get_config_identity(sm, &identity_len); 496 if (identity == NULL || password == NULL) 509 identity, identity_len); 543 if (mschapv2_derive_response(identity, identity_len, password, 582 const u8 *identity, *password; 588 identity = eap_get_config_identity(sm, &identity_len); 590 if (identity == NULL || password == NULL) 603 identity, identity_len); 682 const u8 *identity, *passwor local [all...] |
H A D | eap_ikev2.c | 61 const u8 *identity, *password; local 65 identity = eap_get_config_identity(sm, &identity_len); 66 if (identity == NULL) { 67 wpa_printf(MSG_INFO, "EAP-IKEV2: No identity available"); 86 data->ikev2.IDr = os_memdup(identity, identity_len);
|
H A D | eap_mschapv2.c | 155 const u8 *identity, *password; local 160 identity = eap_get_config_identity(sm, &identity_len); 162 if (identity == NULL || password == NULL) 205 if (mschapv2_derive_response(identity, identity_len, password, 219 wpabuf_put_data(resp, identity, identity_len);
|
/freebsd-11-stable/contrib/libstdc++/include/backward/ |
H A D | function.h | 111 using __gnu_cxx::identity;
|
/freebsd-11-stable/contrib/wpa/src/eapol_auth/ |
H A D | eapol_auth_sm_i.h | 154 u8 *identity; member in struct:eapol_state_machine
|
/freebsd-11-stable/contrib/llvm-project/llvm/include/llvm/CodeGen/ |
H A D | LivePhysRegs.h | 50 using RegisterSet = SparseSet<MCPhysReg, identity<MCPhysReg>>;
|
/freebsd-11-stable/crypto/openssh/contrib/cygwin/ |
H A D | ssh-user-config | 43 # optionally create identity of type argument in ~/.ssh 52 if csih_request "Shall I create a ${name} identity file for you?" 61 if csih_request "Do you want to use this identity to login to this machine?" 90 'but it is not a valid directory. Cannot create user identity files.' 130 csih_error "${pwdhome}/.ssh is existant but not a directory. Cannot create user identity files." 251 create_identity identity rsa1 "(deprecated) SSH1 RSA"
|