Home
last modified time | relevance | path

Searched refs:identity (Results 1 – 25 of 99) sorted by relevance

1234

/dragonfly/contrib/wpa_supplicant/src/ap/
H A Deap_user_db.c121 os_memcmp(argv[id], user->identity, len) == 0 && in get_wildcard_cb()
150 os_memcpy(id_str, identity, identity_len); in eap_user_sqlite_get()
168 bin_clear_free(hapd->tmp_eap_user.identity, in eap_user_sqlite_get()
174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); in eap_user_sqlite_get()
175 if (hapd->tmp_eap_user.identity == NULL) in eap_user_sqlite_get()
177 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); in eap_user_sqlite_get()
214 os_free(user->identity); in eap_user_sqlite_get()
215 user->identity = user->password; in eap_user_sqlite_get()
262 if (!phase2 && user->identity == NULL) { in hostapd_get_eap_user()
269 os_memcmp(user->identity, identity, user->identity_len) == in hostapd_get_eap_user()
[all …]
H A Dpmksa_cache_auth.c42 os_free(entry->identity); in _pmksa_cache_free_entry()
149 if (eapol->identity) { in pmksa_cache_from_eapol_data()
151 if (entry->identity) { in pmksa_cache_from_eapol_data()
153 os_memcpy(entry->identity, eapol->identity, in pmksa_cache_from_eapol_data()
187 if (entry->identity) { in pmksa_cache_to_eapol_data()
188 os_free(eapol->identity); in pmksa_cache_to_eapol_data()
190 if (eapol->identity) { in pmksa_cache_to_eapol_data()
192 os_memcpy(eapol->identity, entry->identity, in pmksa_cache_to_eapol_data()
412 if (entry->identity) { in pmksa_cache_add_okc()
414 os_memcpy(entry->identity, old_entry->identity, in pmksa_cache_add_okc()
[all …]
H A Dieee802_11_auth.c39 char *identity; member
57 os_free(e->identity); in hostapd_acl_cache_free_entry()
117 if (identity) { in hostapd_acl_cache_get()
118 if (entry->identity) in hostapd_acl_cache_get()
119 *identity = os_strdup(entry->identity); in hostapd_acl_cache_get()
121 *identity = NULL; in hostapd_acl_cache_get()
271 if (identity) in hostapd_allowed_address()
272 *identity = NULL; in hostapd_allowed_address()
310 if (identity) { in hostapd_allowed_address()
312 *identity = NULL; in hostapd_allowed_address()
[all …]
H A Dwpa_auth_glue.c991 os_free(sta->identity); in hostapd_wpa_auth_set_identity()
992 sta->identity = NULL; in hostapd_wpa_auth_set_identity()
1005 if (!sta->identity) in hostapd_wpa_auth_set_identity()
1007 os_memcpy(sta->identity, identity, identity_len); in hostapd_wpa_auth_set_identity()
1011 if (!sta->eapol_sm->identity) in hostapd_wpa_auth_set_identity()
1013 os_memcpy(sta->eapol_sm->identity, identity, identity_len); in hostapd_wpa_auth_set_identity()
1027 char *identity; in hostapd_wpa_auth_get_identity() local
1037 if (!sta->identity) { in hostapd_wpa_auth_get_identity()
1042 identity = sta->identity; in hostapd_wpa_auth_get_identity()
1043 len = os_strlen(identity); in hostapd_wpa_auth_get_identity()
[all …]
H A Dieee802_1x.c335 const u8 *identity; in ieee802_1x_learn_identity() local
350 if (identity == NULL) in ieee802_1x_learn_identity()
354 os_free(sm->identity); in ieee802_1x_learn_identity()
355 sm->identity = (u8 *) dup_binstr(identity, identity_len); in ieee802_1x_learn_identity()
706 if (sm->identity && in ieee802_1x_encapsulate_radius()
1596 u8 *buf, *identity; in ieee802_1x_update_sta_identity() local
1614 sm->identity ? (char *) sm->identity : "N/A", in ieee802_1x_update_sta_identity()
1618 sm->identity = identity; in ieee802_1x_update_sta_identity()
2199 const u8 *identity; in ieee802_1x_eapol_send() local
2204 if (identity && in ieee802_1x_eapol_send()
[all …]
H A Dwpa_auth_ft.c1176 u8 *identity; member
1193 u8 *identity; member
1221 os_free(r0->identity); in wpa_ft_free_pmk_r0()
1355 if (identity) { in wpa_ft_store_pmk_r0()
1357 if (r0->identity) { in wpa_ft_store_pmk_r0()
1358 os_memcpy(r0->identity, identity, identity_len); in wpa_ft_store_pmk_r0()
1444 if (identity) { in wpa_ft_store_pmk_r1()
1446 if (r1->identity) { in wpa_ft_store_pmk_r1()
1447 os_memcpy(r1->identity, identity, identity_len); in wpa_ft_store_pmk_r1()
1501 *identity = r1->identity; in wpa_ft_fetch_pmk_r1()
[all …]
/dragonfly/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_gtc.c131 if (sm->identity && sm->require_identity_match && in eap_gtc_process()
133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process()
138 sm->identity, sm->identity_len); in eap_gtc_process()
142 os_free(sm->identity); in eap_gtc_process()
144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process()
145 if (sm->identity == NULL) { in eap_gtc_process()
151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process()
155 sm->identity, sm->identity_len); in eap_gtc_process()
H A Deap_server_fast.c131 u8 *identity = NULL; in eap_fast_session_ticket_cb() local
218 identity = pos; in eap_fast_session_ticket_cb()
234 if (identity) { in eap_fast_session_ticket_cb()
237 os_free(data->identity); in eap_fast_session_ticket_cb()
239 if (data->identity) { in eap_fast_session_ticket_cb()
240 os_memcpy(data->identity, identity, identity_len); in eap_fast_session_ticket_cb()
518 os_free(data->identity); in eap_fast_reset()
720 if (sm->identity) { in eap_fast_build_pac()
794 if (sm->identity) { in eap_fast_build_pac()
1479 if (data->identity) { in eap_fast_process_phase2_start()
[all …]
H A Deap_server_identity.c129 if (sm->identity) in eap_identity_process()
131 os_free(sm->identity); in eap_identity_process()
132 sm->identity = os_malloc(len ? len : 1); in eap_identity_process()
133 if (sm->identity == NULL) { in eap_identity_process()
136 os_memcpy(sm->identity, pos, len); in eap_identity_process()
H A Deap_server_teap.c141 u8 *identity = NULL; in eap_teap_session_ticket_cb() local
226 identity = pos; in eap_teap_session_ticket_cb()
242 if (identity) { in eap_teap_session_ticket_cb()
246 os_free(data->identity); in eap_teap_session_ticket_cb()
248 if (data->identity) { in eap_teap_session_ticket_cb()
249 os_memcpy(data->identity, identity, identity_len); in eap_teap_session_ticket_cb()
439 os_free(data->identity); in eap_teap_reset()
691 if (sm->identity) { in eap_teap_build_pac()
765 if (sm->identity) { in eap_teap_build_pac()
1627 if (data->identity) { in eap_teap_process_phase2_start()
[all …]
H A Deap_server_sim.c130 } else if (sm->identity && sm->identity_len > 0 && in eap_sim_build_start()
131 sm->identity[0] == EAP_SIM_REAUTH_ID_PREFIX) { in eap_sim_build_start()
270 eap_sim_derive_keys_reauth(data->counter, sm->identity, in eap_sim_build_reauth()
454 if (!attr->identity || attr->identity_len == 0) { in eap_sim_process_start()
463 os_free(sm->identity); in eap_sim_process_start()
464 sm->identity = new_identity; in eap_sim_process_start()
465 os_memcpy(sm->identity, attr->identity, attr->identity_len); in eap_sim_process_start()
469 sm->identity, sm->identity_len); in eap_sim_process_start()
470 username = sim_get_username(sm->identity, sm->identity_len); in eap_sim_process_start()
565 sm->identity, identity_len); in eap_sim_process_start()
[all …]
H A Deap_server_aka.c371 } else if (sm->identity && sm->identity_len > 0 && in eap_aka_build_identity()
372 (sm->identity[0] == EAP_AKA_REAUTH_ID_PREFIX || in eap_aka_build_identity()
563 sm->identity, in eap_aka_build_reauth()
570 eap_sim_derive_keys_reauth(data->counter, sm->identity, in eap_aka_build_reauth()
737 sm->identity, sm->identity_len); in eap_aka_determine_identity()
854 sm->identity, identity_len); in eap_aka_fullauth()
861 eap_aka_derive_mk(sm->identity, identity_len, data->ik, in eap_aka_fullauth()
892 if (!attr->identity || attr->identity_len == 0) { in eap_aka_process_identity()
906 os_free(sm->identity); in eap_aka_process_identity()
907 sm->identity = new_identity; in eap_aka_process_identity()
[all …]
H A Deap_server_ttls.c91 if (sm->identity) { in eap_ttls_valid_session()
99 wpabuf_put_data(buf, sm->identity, id_len); in eap_ttls_valid_session()
721 if (sm->identity == NULL) { in eap_ttls_process_phase2_mschapv2()
731 username = sm->identity; in eap_ttls_process_phase2_mschapv2()
927 sm->identity, sm->identity_len); in eap_ttls_process_phase2_eap_response()
1055 os_free(sm->identity); in eap_ttls_process_phase2()
1057 if (sm->identity == NULL) { in eap_ttls_process_phase2()
1230 os_free(sm->identity); in eap_ttls_process()
1232 if (!sm->identity) { in eap_ttls_process()
1238 os_memcpy(sm->identity, pos, id_len); in eap_ttls_process()
[all …]
H A Deap_server.c865 sm->identity = (u8 *) dup_binstr(parse.keyname, in SM_STATE()
867 if (!sm->identity) in SM_STATE()
1684 if (sm->identity == NULL || sm->currentId == -1) { in eap_sm_Policy_getNextMethod()
1774 if (sm->identity == NULL || sm->currentId == -1) { in eap_sm_Policy_getDecision()
1922 os_free(sm->identity); in eap_server_sm_deinit()
1991 return sm->identity; in eap_get_identity()
2058 os_free(sm->identity); in eap_erp_update_identity()
2059 sm->identity = os_malloc(parse.keyname_len); in eap_erp_update_identity()
2060 if (sm->identity) { in eap_erp_update_identity()
2091 os_free(sm->identity); in eap_server_clear_identity()
[all …]
H A Deap_server_wsc.c85 if (sm->identity && sm->identity_len == WSC_ID_REGISTRAR_LEN && in eap_wsc_init()
86 os_memcmp(sm->identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == in eap_wsc_init()
89 else if (sm->identity && sm->identity_len == WSC_ID_ENROLLEE_LEN && in eap_wsc_init()
90 os_memcmp(sm->identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) in eap_wsc_init()
95 sm->identity, sm->identity_len); in eap_wsc_init()
/dragonfly/contrib/wpa_supplicant/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
108 static inline void eap_aka_prime_derive_keys(const u8 *identity, in eap_aka_prime_derive_keys() argument
117 const u8 *identity, in eap_aka_prime_derive_keys_reauth() argument
186 const u8 *nonce_mt, *identity, *res, *auts; member
H A Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, in eap_sim_derive_mk() argument
37 addr[0] = identity; in eap_sim_derive_mk()
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, in eap_aka_derive_mk() argument
62 addr[0] = identity; in eap_aka_derive_mk()
108 const u8 *identity, size_t identity_len, in eap_sim_derive_keys_reauth() argument
118 while (identity_len > 0 && identity[identity_len - 1] == 0) { in eap_sim_derive_keys_reauth()
123 addr[0] = identity; in eap_sim_derive_keys_reauth()
136 identity, identity_len); in eap_sim_derive_keys_reauth()
296 prf_prime(key, "EAP-AKA'", identity, identity_len, NULL, 0, in eap_aka_prime_derive_keys()
325 const u8 *identity, size_t identity_len, in eap_aka_prime_derive_keys_reauth() argument
[all …]
/dragonfly/contrib/wpa_supplicant/src/eap_peer/
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
72 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_request()
74 if (identity == NULL || password == NULL) in eap_leap_process_request()
129 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_request()
144 const u8 *identity; in eap_leap_process_success() local
149 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_success()
150 if (identity == NULL) in eap_leap_process_success()
179 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_success()
H A Deap_sim.c404 const u8 *identity = NULL; in eap_sim_learn_ids() local
416 if (identity) { in eap_sim_learn_ids()
486 const u8 *identity = NULL; in eap_sim_response_start() local
492 identity = data->reauth_id; in eap_sim_response_start()
499 identity = data->pseudonym; in eap_sim_response_start()
504 if (identity) { in eap_sim_response_start()
531 if (identity) { in eap_sim_response_start()
533 identity, identity_len); in eap_sim_response_start()
535 identity, identity_len); in eap_sim_response_start()
718 const u8 *identity; in eap_sim_process_challenge() local
[all …]
H A Deap_gtc.c50 const u8 *pos, *password, *identity; in eap_gtc_process() local
99 identity = eap_get_config_identity(sm, &identity_len); in eap_gtc_process()
100 if (identity == NULL) in eap_gtc_process()
110 wpabuf_put_data(resp, identity, identity_len); in eap_gtc_process()
H A Deap_aka.c384 const u8 *identity = NULL; in eap_aka_learn_ids() local
396 if (identity) { in eap_aka_learn_ids()
616 const u8 *identity = NULL; in eap_aka_response_identity() local
622 identity = data->reauth_id; in eap_aka_response_identity()
629 identity = data->pseudonym; in eap_aka_response_identity()
634 if (identity) { in eap_aka_response_identity()
651 if (identity) { in eap_aka_response_identity()
653 identity, identity_len); in eap_aka_response_identity()
655 identity, identity_len); in eap_aka_response_identity()
923 const u8 *identity; in eap_aka_process_challenge() local
[all …]
H A Dmschapv2.c36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, in mschapv2_derive_response() argument
49 identity, identity_len); in mschapv2_derive_response()
51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response()
H A Deap.c443 if (config->identity) { in eap_get_realm()
1569 os_free(conf->identity); in eap_sm_imsi_identity()
1579 conf->identity[0] = '1'; in eap_sm_imsi_identity()
1582 conf->identity[0] = '0'; in eap_sm_imsi_identity()
1585 conf->identity[0] = '6'; in eap_sm_imsi_identity()
1641 const u8 *identity; in eap_sm_buildIdentity() local
1661 identity = config->identity; in eap_sm_buildIdentity()
1669 if (!identity) { in eap_sm_buildIdentity()
1672 identity = config->identity; in eap_sm_buildIdentity()
1683 } else if (!identity) { in eap_sm_buildIdentity()
[all …]
H A Deap_ttls.c488 const u8 *identity, *password; in eap_ttls_phase2_request_mschapv2()
496 if (identity == NULL || password == NULL) in eap_ttls_phase2_request_mschapv2()
509 identity, identity_len); in eap_ttls_phase2_request_mschapv2()
582 const u8 *identity, *password; in eap_ttls_phase2_request_mschap()
590 if (identity == NULL || password == NULL) in eap_ttls_phase2_request_mschap()
603 identity, identity_len); in eap_ttls_phase2_request_mschap()
682 const u8 *identity, *password; in eap_ttls_phase2_request_pap() local
702 identity, identity_len); in eap_ttls_phase2_request_pap()
739 const u8 *identity, *password; in eap_ttls_phase2_request_chap()
759 identity, identity_len); in eap_ttls_phase2_request_chap()
[all …]
H A Deap_wsc.c141 const u8 *identity; in eap_wsc_init() local
159 identity = eap_get_config_identity(sm, &identity_len); in eap_wsc_init()
161 if (identity && identity_len == WSC_ID_REGISTRAR_LEN && in eap_wsc_init()
162 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0) in eap_wsc_init()
164 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN && in eap_wsc_init()
165 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0) in eap_wsc_init()
169 identity, identity_len); in eap_wsc_init()

1234