/freebsd-11-stable/contrib/wpa/wpa_supplicant/examples/ |
H A D | ieee8021x.conf | 10 identity="user name"
|
H A D | openCryptoki.conf | 26 identity="User"
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 1085 # identity: Identity string for EAP 1088 # anonymous_identity: Anonymous identity string for EAP (to be used as the 1089 # unencrypted identity with EAP types that support different tunnelled 1090 # identity, e.g., EAP-TTLS). This field can also be used with 1091 # EAP-SIM/AKA/AKA' to store the pseudonym identity. 1562 identity="user@example.com" 1576 identity="user@example.com" 1584 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the 1585 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel. 1590 identity [all...] |
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | eap_user_db.c | 110 if (os_strcmp(col[i], "identity") == 0 && argv[i]) 121 os_memcmp(argv[id], user->identity, len) == 0 && 135 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, argument 145 wpa_printf(MSG_DEBUG, "%s: identity len too big: %d >= %d", 150 os_memcpy(id_str, identity, identity_len); 164 wpa_printf(MSG_INFO, "DB: Unsupported character in identity"); 168 bin_clear_free(hapd->tmp_eap_user.identity, 174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); 175 if (hapd->tmp_eap_user.identity == NULL) 177 os_memcpy(hapd->tmp_eap_user.identity, identit 232 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument [all...] |
H A D | ieee802_11_auth.h | 26 char **identity, char **radius_cui,
|
H A D | pmksa_cache_auth.c | 42 os_free(entry->identity); 149 if (eapol->identity) { 150 entry->identity = os_malloc(eapol->identity_len); 151 if (entry->identity) { 153 os_memcpy(entry->identity, eapol->identity, 187 if (entry->identity) { 188 os_free(eapol->identity); 189 eapol->identity = os_malloc(entry->identity_len); 190 if (eapol->identity) { [all...] |
H A D | ieee802_11_auth.c | 39 char *identity; member in struct:hostapd_cached_radius_acl 57 os_free(e->identity); 94 char **identity, char **radius_cui) 117 if (identity) { 118 if (entry->identity) 119 *identity = os_strdup(entry->identity); 121 *identity = NULL; 245 * @identity: Buffer for returning identity (fro 89 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, struct vlan_description *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument 253 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, struct vlan_description *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui, int is_probe_req) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | mschapv2.c | 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument 49 identity, identity_len); 51 username = mschapv2_remove_domain(identity, &username_len);
|
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; local 99 identity = eap_get_config_identity(sm, &identity_len); 100 if (identity == NULL) 110 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 72 identity = eap_get_config_identity(sm, &identity_len); 74 if (identity == NULL || password == NULL) 129 wpabuf_put_data(resp, identity, identity_len); 144 const u8 *identity; local 149 identity = eap_get_config_identity(sm, &identity_len); 150 if (identity == NULL) 179 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_config.h | 17 * identity - EAP Identity 19 * This field is used to set the real user identity or NAI (for 22 u8 *identity; member in struct:eap_peer_config 33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 34 * real identity (identity field) only to the authentication server. 36 * If not set, the identity field will be used for both unencrypted and 40 * pseudonym identity. 640 * pending_req_identity - Whether there is a pending identity request
|
H A D | eap_sim.c | 404 const u8 *identity = NULL; local 414 /* Look for the realm of the permanent identity */ 415 identity = eap_get_config_identity(sm, &identity_len); 416 if (identity) { 417 for (realm = identity, realm_len = identity_len; 486 const u8 *identity = NULL; local 492 identity = data->reauth_id; 499 identity = data->pseudonym; 503 identity = eap_get_config_identity(sm, &identity_len); 504 if (identity) { 718 const u8 *identity; local [all...] |
/freebsd-11-stable/lib/libgssapi/ |
H A D | gss_krb5.c | 38 gsskrb5_register_acceptor_identity(const char *identity) argument 45 m->gm_krb5_register_acceptor_identity(identity);
|
/freebsd-11-stable/crypto/openssh/regress/ |
H A D | conch-ciphers.sh | 19 ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \
|
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_gtc.c | 131 if (sm->identity && sm->require_identity_match && 133 os_memcmp(pos, sm->identity, sm->identity_len))) { 137 "identity", 138 sm->identity, sm->identity_len); 142 os_free(sm->identity); 144 sm->identity = os_memdup(pos, sm->identity_len); 145 if (sm->identity == NULL) { 151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { 155 sm->identity, sm->identity_len);
|
H A D | eap_server_identity.c | 122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len); 129 if (sm->identity) 131 os_free(sm->identity); 132 sm->identity = os_malloc(len ? len : 1); 133 if (sm->identity == NULL) { 136 os_memcpy(sm->identity, pos, len);
|
H A D | eap_server_fast.c | 61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data 131 u8 *identity = NULL; local 218 identity = pos; 234 if (identity) { 236 "PAC-Opaque", identity, identity_len); 237 os_free(data->identity); 238 data->identity = os_malloc(identity_len); 239 if (data->identity) { 240 os_memcpy(data->identity, identity, identity_le [all...] |
H A D | eap_server_teap.c | 64 u8 *identity; /* from PAC-Opaque */ member in struct:eap_teap_data 141 u8 *identity = NULL; local 226 identity = pos; 242 if (identity) { 245 identity, identity_len); 246 os_free(data->identity); 247 data->identity = os_malloc(identity_len); 248 if (data->identity) { 249 os_memcpy(data->identity, identity, identity_le [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 108 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument 117 const u8 *identity, 186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/freebsd-11-stable/contrib/wpa/src/radius/ |
H A D | radius_server.h | 80 * eap_fast_a_id - EAP-FAST authority identity (A-ID) 162 * server_id - Server identity 199 * @identity: User identity 200 * @identity_len: identity buffer length in octets 201 * @phase2: Whether this is for Phase 2 identity 210 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
/freebsd-11-stable/contrib/wpa/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 74 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len, 96 const char *identity, const char *radius_cui);
|
/freebsd-11-stable/contrib/unbound/dnstap/ |
H A D | dnstap.c | 106 if (env->identity != NULL) { 107 dm->d.identity.data = (uint8_t *) env->identity; 108 dm->d.identity.len = (size_t) env->len_identity; 171 free(env->identity); 175 env->identity = strdup(buf); 180 env->identity = strdup(cfg->dnstap_identity); 182 if (env->identity == NULL) 184 env->len_identity = (unsigned int)strlen(env->identity); 185 verbose(VERB_OPS, "dnstap identity fiel [all...] |
H A D | dnstap.h | 54 /** dnstap "identity" field, NULL if disabled */ 55 char *identity; member in struct:dt_env 60 /** length of "identity" field */
|
/freebsd-11-stable/contrib/llvm-project/llvm/include/llvm/ADT/ |
H A D | IndexedMap.h | 28 template <typename T, typename ToIndexT = identity<unsigned>>
|
/freebsd-11-stable/contrib/unbound/util/ |
H A D | log.h | 110 * Set identity to print, default is 'unbound'. 116 * Set default identity to print, default is 'unbound'. 122 * Revert identity to print, back to the recorded default value. 127 * Set identity to print if there is an identity, otherwise 129 * @param identity: the identity to set. 131 void log_ident_set_or_default(const char* identity);
|