Searched refs:identity (Results 1 - 25 of 95) sorted by relevance

1234

/freebsd-10.0-release/contrib/wpa/wpa_supplicant/examples/
H A Dieee8021x.conf10 identity="user name"
H A DopenCryptoki.conf26 identity="User"
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf612 # identity: Identity string for EAP
615 # anonymous_identity: Anonymous identity string for EAP (to be used as the
616 # unencrypted identity with EAP types that support different tunnelled
617 # identity, e.g., EAP-TTLS). This field can also be used with
618 # EAP-SIM/AKA/AKA' to store the pseudonym identity.
895 identity="user@example.com"
909 identity="user@example.com"
917 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
918 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
923 identity
[all...]
/freebsd-10.0-release/contrib/wpa/src/ap/
H A Deap_user_db.c106 if (os_strcmp(col[i], "identity") == 0 && argv[i])
117 os_memcmp(argv[id], user->identity, len) == 0 &&
131 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, argument
141 os_memcpy(id_str, identity, identity_len);
155 wpa_printf(MSG_INFO, "DB: Unsupported character in identity");
159 os_free(hapd->tmp_eap_user.identity);
163 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1);
164 if (hapd->tmp_eap_user.identity == NULL)
166 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_le
212 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument
[all...]
H A Dieee802_11_auth.h23 char **identity, char **radius_cui);
H A Dpmksa_cache_auth.c42 os_free(entry->identity);
129 if (eapol->identity) {
130 entry->identity = os_malloc(eapol->identity_len);
131 if (entry->identity) {
133 os_memcpy(entry->identity, eapol->identity,
156 if (entry->identity) {
157 os_free(eapol->identity);
158 eapol->identity = os_malloc(entry->identity_len);
159 if (eapol->identity) {
[all...]
H A Dieee802_11_auth.c40 char *identity; member in struct:hostapd_cached_radius_acl
58 os_free(e->identity);
104 char **identity, char **radius_cui)
126 if (identity) {
127 if (entry->identity)
128 *identity = os_strdup(entry->identity);
130 *identity = NULL;
224 * @identity: Buffer for returning identity (fro
100 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument
231 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument
[all...]
H A Dieee802_1x.c389 const u8 *identity; local
396 identity = eap_get_identity(sm->eap, &identity_len);
397 if (identity == NULL)
400 /* Save station identity for future RADIUS packets */
401 os_free(sm->identity);
402 sm->identity = os_malloc(identity_len + 1);
403 if (sm->identity == NULL) {
408 os_memcpy(sm->identity, identity, identity_len);
410 sm->identity[identity_le
1264 u8 *buf, *identity; local
1647 const u8 *identity; local
1694 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
[all...]
H A Dpmksa_cache_auth.h26 u8 *identity; member in struct:rsn_pmksa_cache_entry
/freebsd-10.0-release/contrib/wpa/src/eap_peer/
H A Dmschapv2.c36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument
49 identity, identity_len);
51 username = mschapv2_remove_domain(identity, &username_len);
H A Deap_gtc.c50 const u8 *pos, *password, *identity; local
99 identity = eap_get_config_identity(sm, &identity_len);
100 if (identity == NULL)
110 wpabuf_put_data(resp, identity, identity_len);
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; local
72 identity = eap_get_config_identity(sm, &identity_len);
74 if (identity == NULL || password == NULL)
125 wpabuf_put_data(resp, identity, identity_len);
140 const u8 *identity; local
145 identity = eap_get_config_identity(sm, &identity_len);
146 if (identity == NULL)
175 wpabuf_put_data(resp, identity, identity_len);
H A Deap_sim.c299 const u8 *identity = NULL; local
309 /* Look for the realm of the permanent identity */
310 identity = eap_get_config_identity(sm, &identity_len);
311 if (identity) {
312 for (realm = identity, realm_len = identity_len;
380 const u8 *identity = NULL; local
386 identity = data->reauth_id;
391 identity = data->pseudonym;
395 identity = eap_get_config_identity(sm, &identity_len);
396 if (identity) {
605 const u8 *identity; local
[all...]
/freebsd-10.0-release/contrib/wpa/src/eap_server/
H A Deap_server_gtc.c131 if (sm->identity && sm->require_identity_match &&
133 os_memcmp(pos, sm->identity, sm->identity_len))) {
137 "identity",
138 sm->identity, sm->identity_len);
142 os_free(sm->identity);
144 sm->identity = os_malloc(sm->identity_len);
145 if (sm->identity == NULL) {
149 os_memcpy(sm->identity, pos, sm->identity_len);
152 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) {
156 sm->identity, s
[all...]
H A Deap_server_identity.c121 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
122 if (sm->identity)
124 os_free(sm->identity);
125 sm->identity = os_malloc(len ? len : 1);
126 if (sm->identity == NULL) {
129 os_memcpy(sm->identity, pos, len);
H A Deap_server_fast.c61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data
131 u8 *identity = NULL; local
214 identity = pos + 2;
229 if (identity) {
231 "PAC-Opaque", identity, identity_len);
232 os_free(data->identity);
233 data->identity = os_malloc(identity_len);
234 if (data->identity) {
235 os_memcpy(data->identity, identity, identity_le
[all...]
H A Deap_i.h145 u8 *identity; member in struct:eap_sm
147 /* Whether Phase 2 method should validate identity match */
193 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
/freebsd-10.0-release/contrib/wpa/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
108 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument
117 const u8 *identity,
186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
H A Deap_pwd_common.h55 u8 identity[0]; /* length inferred from payload */ member in struct:eap_pwd_id
/freebsd-10.0-release/crypto/openssh/regress/
H A Dconch-ciphers.sh19 ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \
/freebsd-10.0-release/lib/libgssapi/
H A Dgss_krb5.c38 gsskrb5_register_acceptor_identity(const char *identity) argument
45 m->gm_krb5_register_acceptor_identity(identity);
/freebsd-10.0-release/contrib/wpa/src/radius/
H A Dradius_server.h70 * eap_fast_a_id - EAP-FAST authority identity (A-ID)
163 * @identity: User identity
164 * @identity_len: identity buffer length in octets
165 * @phase2: Whether this is for Phase 2 identity
174 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/tests/
H A Dlink_test.c73 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, argument
/freebsd-10.0-release/contrib/wpa/src/eapol_auth/
H A Deapol_auth_sm.h62 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
81 const char *identity, const char *radius_cui);
/freebsd-10.0-release/contrib/llvm/include/llvm/ADT/
H A DIndexedMap.h30 template <typename T, typename ToIndexT = llvm::identity<unsigned> >

Completed in 129 milliseconds

1234