Searched refs:identity (Results 1 - 25 of 106) sorted by relevance

12345

/freebsd-11-stable/contrib/wpa/wpa_supplicant/examples/
H A Dieee8021x.conf10 identity="user name"
H A DopenCryptoki.conf26 identity="User"
/freebsd-11-stable/contrib/wpa/wpa_supplicant/
H A Dwpa_supplicant.conf1085 # identity: Identity string for EAP
1088 # anonymous_identity: Anonymous identity string for EAP (to be used as the
1089 # unencrypted identity with EAP types that support different tunnelled
1090 # identity, e.g., EAP-TTLS). This field can also be used with
1091 # EAP-SIM/AKA/AKA' to store the pseudonym identity.
1562 identity="user@example.com"
1576 identity="user@example.com"
1584 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
1585 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
1590 identity
[all...]
/freebsd-11-stable/contrib/wpa/src/ap/
H A Deap_user_db.c110 if (os_strcmp(col[i], "identity") == 0 && argv[i])
121 os_memcmp(argv[id], user->identity, len) == 0 &&
135 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, argument
145 wpa_printf(MSG_DEBUG, "%s: identity len too big: %d >= %d",
150 os_memcpy(id_str, identity, identity_len);
164 wpa_printf(MSG_INFO, "DB: Unsupported character in identity");
168 bin_clear_free(hapd->tmp_eap_user.identity,
174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1);
175 if (hapd->tmp_eap_user.identity == NULL)
177 os_memcpy(hapd->tmp_eap_user.identity, identit
232 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument
[all...]
H A Dieee802_11_auth.h26 char **identity, char **radius_cui,
H A Dpmksa_cache_auth.c42 os_free(entry->identity);
149 if (eapol->identity) {
150 entry->identity = os_malloc(eapol->identity_len);
151 if (entry->identity) {
153 os_memcpy(entry->identity, eapol->identity,
187 if (entry->identity) {
188 os_free(eapol->identity);
189 eapol->identity = os_malloc(entry->identity_len);
190 if (eapol->identity) {
[all...]
H A Dieee802_11_auth.c39 char *identity; member in struct:hostapd_cached_radius_acl
57 os_free(e->identity);
94 char **identity, char **radius_cui)
117 if (identity) {
118 if (entry->identity)
119 *identity = os_strdup(entry->identity);
121 *identity = NULL;
245 * @identity: Buffer for returning identity (fro
89 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, struct vlan_description *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument
253 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, struct vlan_description *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui, int is_probe_req) argument
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_peer/
H A Dmschapv2.c36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument
49 identity, identity_len);
51 username = mschapv2_remove_domain(identity, &username_len);
H A Deap_gtc.c50 const u8 *pos, *password, *identity; local
99 identity = eap_get_config_identity(sm, &identity_len);
100 if (identity == NULL)
110 wpabuf_put_data(resp, identity, identity_len);
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; local
72 identity = eap_get_config_identity(sm, &identity_len);
74 if (identity == NULL || password == NULL)
129 wpabuf_put_data(resp, identity, identity_len);
144 const u8 *identity; local
149 identity = eap_get_config_identity(sm, &identity_len);
150 if (identity == NULL)
179 wpabuf_put_data(resp, identity, identity_len);
H A Deap_config.h17 * identity - EAP Identity
19 * This field is used to set the real user identity or NAI (for
22 u8 *identity; member in struct:eap_peer_config
33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
34 * real identity (identity field) only to the authentication server.
36 * If not set, the identity field will be used for both unencrypted and
40 * pseudonym identity.
640 * pending_req_identity - Whether there is a pending identity request
H A Deap_sim.c404 const u8 *identity = NULL; local
414 /* Look for the realm of the permanent identity */
415 identity = eap_get_config_identity(sm, &identity_len);
416 if (identity) {
417 for (realm = identity, realm_len = identity_len;
486 const u8 *identity = NULL; local
492 identity = data->reauth_id;
499 identity = data->pseudonym;
503 identity = eap_get_config_identity(sm, &identity_len);
504 if (identity) {
718 const u8 *identity; local
[all...]
/freebsd-11-stable/lib/libgssapi/
H A Dgss_krb5.c38 gsskrb5_register_acceptor_identity(const char *identity) argument
45 m->gm_krb5_register_acceptor_identity(identity);
/freebsd-11-stable/crypto/openssh/regress/
H A Dconch-ciphers.sh19 ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \
/freebsd-11-stable/contrib/wpa/src/eap_server/
H A Deap_server_gtc.c131 if (sm->identity && sm->require_identity_match &&
133 os_memcmp(pos, sm->identity, sm->identity_len))) {
137 "identity",
138 sm->identity, sm->identity_len);
142 os_free(sm->identity);
144 sm->identity = os_memdup(pos, sm->identity_len);
145 if (sm->identity == NULL) {
151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) {
155 sm->identity, sm->identity_len);
H A Deap_server_identity.c122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
129 if (sm->identity)
131 os_free(sm->identity);
132 sm->identity = os_malloc(len ? len : 1);
133 if (sm->identity == NULL) {
136 os_memcpy(sm->identity, pos, len);
H A Deap_server_fast.c61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data
131 u8 *identity = NULL; local
218 identity = pos;
234 if (identity) {
236 "PAC-Opaque", identity, identity_len);
237 os_free(data->identity);
238 data->identity = os_malloc(identity_len);
239 if (data->identity) {
240 os_memcpy(data->identity, identity, identity_le
[all...]
H A Deap_server_teap.c64 u8 *identity; /* from PAC-Opaque */ member in struct:eap_teap_data
141 u8 *identity = NULL; local
226 identity = pos;
242 if (identity) {
245 identity, identity_len);
246 os_free(data->identity);
247 data->identity = os_malloc(identity_len);
248 if (data->identity) {
249 os_memcpy(data->identity, identity, identity_le
[all...]
/freebsd-11-stable/contrib/wpa/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
108 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument
117 const u8 *identity,
186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/freebsd-11-stable/contrib/wpa/src/radius/
H A Dradius_server.h80 * eap_fast_a_id - EAP-FAST authority identity (A-ID)
162 * server_id - Server identity
199 * @identity: User identity
200 * @identity_len: identity buffer length in octets
201 * @phase2: Whether this is for Phase 2 identity
210 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
/freebsd-11-stable/contrib/wpa/src/eapol_auth/
H A Deapol_auth_sm.h74 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
96 const char *identity, const char *radius_cui);
/freebsd-11-stable/contrib/unbound/dnstap/
H A Ddnstap.c106 if (env->identity != NULL) {
107 dm->d.identity.data = (uint8_t *) env->identity;
108 dm->d.identity.len = (size_t) env->len_identity;
171 free(env->identity);
175 env->identity = strdup(buf);
180 env->identity = strdup(cfg->dnstap_identity);
182 if (env->identity == NULL)
184 env->len_identity = (unsigned int)strlen(env->identity);
185 verbose(VERB_OPS, "dnstap identity fiel
[all...]
H A Ddnstap.h54 /** dnstap "identity" field, NULL if disabled */
55 char *identity; member in struct:dt_env
60 /** length of "identity" field */
/freebsd-11-stable/contrib/llvm-project/llvm/include/llvm/ADT/
H A DIndexedMap.h28 template <typename T, typename ToIndexT = identity<unsigned>>
/freebsd-11-stable/contrib/unbound/util/
H A Dlog.h110 * Set identity to print, default is 'unbound'.
116 * Set default identity to print, default is 'unbound'.
122 * Revert identity to print, back to the recorded default value.
127 * Set identity to print if there is an identity, otherwise
129 * @param identity: the identity to set.
131 void log_ident_set_or_default(const char* identity);

Completed in 154 milliseconds

12345