/freebsd-10.0-release/contrib/wpa/wpa_supplicant/examples/ |
H A D | ieee8021x.conf | 10 identity="user name"
|
H A D | openCryptoki.conf | 26 identity="User"
|
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 612 # identity: Identity string for EAP 615 # anonymous_identity: Anonymous identity string for EAP (to be used as the 616 # unencrypted identity with EAP types that support different tunnelled 617 # identity, e.g., EAP-TTLS). This field can also be used with 618 # EAP-SIM/AKA/AKA' to store the pseudonym identity. 895 identity="user@example.com" 909 identity="user@example.com" 917 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the 918 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel. 923 identity [all...] |
/freebsd-10.0-release/contrib/wpa/src/ap/ |
H A D | eap_user_db.c | 106 if (os_strcmp(col[i], "identity") == 0 && argv[i]) 117 os_memcmp(argv[id], user->identity, len) == 0 && 131 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, argument 141 os_memcpy(id_str, identity, identity_len); 155 wpa_printf(MSG_INFO, "DB: Unsupported character in identity"); 159 os_free(hapd->tmp_eap_user.identity); 163 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); 164 if (hapd->tmp_eap_user.identity == NULL) 166 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_le 212 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument [all...] |
H A D | ieee802_11_auth.h | 23 char **identity, char **radius_cui);
|
H A D | pmksa_cache_auth.c | 42 os_free(entry->identity); 129 if (eapol->identity) { 130 entry->identity = os_malloc(eapol->identity_len); 131 if (entry->identity) { 133 os_memcpy(entry->identity, eapol->identity, 156 if (entry->identity) { 157 os_free(eapol->identity); 158 eapol->identity = os_malloc(entry->identity_len); 159 if (eapol->identity) { [all...] |
H A D | ieee802_11_auth.c | 40 char *identity; member in struct:hostapd_cached_radius_acl 58 os_free(e->identity); 104 char **identity, char **radius_cui) 126 if (identity) { 127 if (entry->identity) 128 *identity = os_strdup(entry->identity); 130 *identity = NULL; 224 * @identity: Buffer for returning identity (fro 100 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument 231 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument [all...] |
H A D | ieee802_1x.c | 389 const u8 *identity; local 396 identity = eap_get_identity(sm->eap, &identity_len); 397 if (identity == NULL) 400 /* Save station identity for future RADIUS packets */ 401 os_free(sm->identity); 402 sm->identity = os_malloc(identity_len + 1); 403 if (sm->identity == NULL) { 408 os_memcpy(sm->identity, identity, identity_len); 410 sm->identity[identity_le 1264 u8 *buf, *identity; local 1647 const u8 *identity; local 1694 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument [all...] |
H A D | pmksa_cache_auth.h | 26 u8 *identity; member in struct:rsn_pmksa_cache_entry
|
/freebsd-10.0-release/contrib/wpa/src/eap_peer/ |
H A D | mschapv2.c | 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument 49 identity, identity_len); 51 username = mschapv2_remove_domain(identity, &username_len);
|
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; local 99 identity = eap_get_config_identity(sm, &identity_len); 100 if (identity == NULL) 110 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 72 identity = eap_get_config_identity(sm, &identity_len); 74 if (identity == NULL || password == NULL) 125 wpabuf_put_data(resp, identity, identity_len); 140 const u8 *identity; local 145 identity = eap_get_config_identity(sm, &identity_len); 146 if (identity == NULL) 175 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_sim.c | 299 const u8 *identity = NULL; local 309 /* Look for the realm of the permanent identity */ 310 identity = eap_get_config_identity(sm, &identity_len); 311 if (identity) { 312 for (realm = identity, realm_len = identity_len; 380 const u8 *identity = NULL; local 386 identity = data->reauth_id; 391 identity = data->pseudonym; 395 identity = eap_get_config_identity(sm, &identity_len); 396 if (identity) { 605 const u8 *identity; local [all...] |
/freebsd-10.0-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_gtc.c | 131 if (sm->identity && sm->require_identity_match && 133 os_memcmp(pos, sm->identity, sm->identity_len))) { 137 "identity", 138 sm->identity, sm->identity_len); 142 os_free(sm->identity); 144 sm->identity = os_malloc(sm->identity_len); 145 if (sm->identity == NULL) { 149 os_memcpy(sm->identity, pos, sm->identity_len); 152 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { 156 sm->identity, s [all...] |
H A D | eap_server_identity.c | 121 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len); 122 if (sm->identity) 124 os_free(sm->identity); 125 sm->identity = os_malloc(len ? len : 1); 126 if (sm->identity == NULL) { 129 os_memcpy(sm->identity, pos, len);
|
H A D | eap_server_fast.c | 61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data 131 u8 *identity = NULL; local 214 identity = pos + 2; 229 if (identity) { 231 "PAC-Opaque", identity, identity_len); 232 os_free(data->identity); 233 data->identity = os_malloc(identity_len); 234 if (data->identity) { 235 os_memcpy(data->identity, identity, identity_le [all...] |
H A D | eap_i.h | 145 u8 *identity; member in struct:eap_sm 147 /* Whether Phase 2 method should validate identity match */ 193 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
/freebsd-10.0-release/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 108 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument 117 const u8 *identity, 186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
H A D | eap_pwd_common.h | 55 u8 identity[0]; /* length inferred from payload */ member in struct:eap_pwd_id
|
/freebsd-10.0-release/crypto/openssh/regress/ |
H A D | conch-ciphers.sh | 19 ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \
|
/freebsd-10.0-release/lib/libgssapi/ |
H A D | gss_krb5.c | 38 gsskrb5_register_acceptor_identity(const char *identity) argument 45 m->gm_krb5_register_acceptor_identity(identity);
|
/freebsd-10.0-release/contrib/wpa/src/radius/ |
H A D | radius_server.h | 70 * eap_fast_a_id - EAP-FAST authority identity (A-ID) 163 * @identity: User identity 164 * @identity_len: identity buffer length in octets 165 * @phase2: Whether this is for Phase 2 identity 174 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/tests/ |
H A D | link_test.c | 73 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, argument
|
/freebsd-10.0-release/contrib/wpa/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 62 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len, 81 const char *identity, const char *radius_cui);
|
/freebsd-10.0-release/contrib/llvm/include/llvm/ADT/ |
H A D | IndexedMap.h | 30 template <typename T, typename ToIndexT = llvm::identity<unsigned> >
|