/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | eap_user_db.c | 121 os_memcmp(argv[id], user->identity, len) == 0 && in get_wildcard_cb() 150 os_memcpy(id_str, identity, identity_len); in eap_user_sqlite_get() 168 bin_clear_free(hapd->tmp_eap_user.identity, in eap_user_sqlite_get() 174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); in eap_user_sqlite_get() 175 if (hapd->tmp_eap_user.identity == NULL) in eap_user_sqlite_get() 177 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); in eap_user_sqlite_get() 214 os_free(user->identity); in eap_user_sqlite_get() 215 user->identity = user->password; in eap_user_sqlite_get() 262 if (!phase2 && user->identity == NULL) { in hostapd_get_eap_user() 269 os_memcmp(user->identity, identity, user->identity_len) == in hostapd_get_eap_user() [all …]
|
H A D | pmksa_cache_auth.c | 42 os_free(entry->identity); in _pmksa_cache_free_entry() 149 if (eapol->identity) { in pmksa_cache_from_eapol_data() 151 if (entry->identity) { in pmksa_cache_from_eapol_data() 153 os_memcpy(entry->identity, eapol->identity, in pmksa_cache_from_eapol_data() 187 if (entry->identity) { in pmksa_cache_to_eapol_data() 188 os_free(eapol->identity); in pmksa_cache_to_eapol_data() 190 if (eapol->identity) { in pmksa_cache_to_eapol_data() 192 os_memcpy(eapol->identity, entry->identity, in pmksa_cache_to_eapol_data() 412 if (entry->identity) { in pmksa_cache_add_okc() 414 os_memcpy(entry->identity, old_entry->identity, in pmksa_cache_add_okc() [all …]
|
H A D | ieee802_11_auth.c | 39 char *identity; member 57 os_free(e->identity); in hostapd_acl_cache_free_entry() 117 if (identity) { in hostapd_acl_cache_get() 118 if (entry->identity) in hostapd_acl_cache_get() 119 *identity = os_strdup(entry->identity); in hostapd_acl_cache_get() 121 *identity = NULL; in hostapd_acl_cache_get() 271 if (identity) in hostapd_allowed_address() 272 *identity = NULL; in hostapd_allowed_address() 310 if (identity) { in hostapd_allowed_address() 312 *identity = NULL; in hostapd_allowed_address() [all …]
|
H A D | wpa_auth_glue.c | 991 os_free(sta->identity); in hostapd_wpa_auth_set_identity() 992 sta->identity = NULL; in hostapd_wpa_auth_set_identity() 1005 if (!sta->identity) in hostapd_wpa_auth_set_identity() 1007 os_memcpy(sta->identity, identity, identity_len); in hostapd_wpa_auth_set_identity() 1011 if (!sta->eapol_sm->identity) in hostapd_wpa_auth_set_identity() 1013 os_memcpy(sta->eapol_sm->identity, identity, identity_len); in hostapd_wpa_auth_set_identity() 1027 char *identity; in hostapd_wpa_auth_get_identity() local 1037 if (!sta->identity) { in hostapd_wpa_auth_get_identity() 1042 identity = sta->identity; in hostapd_wpa_auth_get_identity() 1043 len = os_strlen(identity); in hostapd_wpa_auth_get_identity() [all …]
|
H A D | ieee802_1x.c | 335 const u8 *identity; in ieee802_1x_learn_identity() local 350 if (identity == NULL) in ieee802_1x_learn_identity() 354 os_free(sm->identity); in ieee802_1x_learn_identity() 355 sm->identity = (u8 *) dup_binstr(identity, identity_len); in ieee802_1x_learn_identity() 706 if (sm->identity && in ieee802_1x_encapsulate_radius() 1596 u8 *buf, *identity; in ieee802_1x_update_sta_identity() local 1614 sm->identity ? (char *) sm->identity : "N/A", in ieee802_1x_update_sta_identity() 1618 sm->identity = identity; in ieee802_1x_update_sta_identity() 2199 const u8 *identity; in ieee802_1x_eapol_send() local 2204 if (identity && in ieee802_1x_eapol_send() [all …]
|
H A D | wpa_auth_ft.c | 1176 u8 *identity; member 1193 u8 *identity; member 1221 os_free(r0->identity); in wpa_ft_free_pmk_r0() 1355 if (identity) { in wpa_ft_store_pmk_r0() 1357 if (r0->identity) { in wpa_ft_store_pmk_r0() 1358 os_memcpy(r0->identity, identity, identity_len); in wpa_ft_store_pmk_r0() 1444 if (identity) { in wpa_ft_store_pmk_r1() 1446 if (r1->identity) { in wpa_ft_store_pmk_r1() 1447 os_memcpy(r1->identity, identity, identity_len); in wpa_ft_store_pmk_r1() 1501 *identity = r1->identity; in wpa_ft_fetch_pmk_r1() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server_gtc.c | 131 if (sm->identity && sm->require_identity_match && in eap_gtc_process() 133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process() 138 sm->identity, sm->identity_len); in eap_gtc_process() 142 os_free(sm->identity); in eap_gtc_process() 144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process() 145 if (sm->identity == NULL) { in eap_gtc_process() 151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process() 155 sm->identity, sm->identity_len); in eap_gtc_process()
|
H A D | eap_server_fast.c | 131 u8 *identity = NULL; in eap_fast_session_ticket_cb() local 218 identity = pos; in eap_fast_session_ticket_cb() 234 if (identity) { in eap_fast_session_ticket_cb() 237 os_free(data->identity); in eap_fast_session_ticket_cb() 239 if (data->identity) { in eap_fast_session_ticket_cb() 240 os_memcpy(data->identity, identity, identity_len); in eap_fast_session_ticket_cb() 518 os_free(data->identity); in eap_fast_reset() 720 if (sm->identity) { in eap_fast_build_pac() 794 if (sm->identity) { in eap_fast_build_pac() 1479 if (data->identity) { in eap_fast_process_phase2_start() [all …]
|
H A D | eap_server_identity.c | 129 if (sm->identity) in eap_identity_process() 131 os_free(sm->identity); in eap_identity_process() 132 sm->identity = os_malloc(len ? len : 1); in eap_identity_process() 133 if (sm->identity == NULL) { in eap_identity_process() 136 os_memcpy(sm->identity, pos, len); in eap_identity_process()
|
H A D | eap_server_teap.c | 141 u8 *identity = NULL; in eap_teap_session_ticket_cb() local 226 identity = pos; in eap_teap_session_ticket_cb() 242 if (identity) { in eap_teap_session_ticket_cb() 246 os_free(data->identity); in eap_teap_session_ticket_cb() 248 if (data->identity) { in eap_teap_session_ticket_cb() 249 os_memcpy(data->identity, identity, identity_len); in eap_teap_session_ticket_cb() 439 os_free(data->identity); in eap_teap_reset() 691 if (sm->identity) { in eap_teap_build_pac() 765 if (sm->identity) { in eap_teap_build_pac() 1627 if (data->identity) { in eap_teap_process_phase2_start() [all …]
|
H A D | eap_server_sim.c | 130 } else if (sm->identity && sm->identity_len > 0 && in eap_sim_build_start() 131 sm->identity[0] == EAP_SIM_REAUTH_ID_PREFIX) { in eap_sim_build_start() 270 eap_sim_derive_keys_reauth(data->counter, sm->identity, in eap_sim_build_reauth() 454 if (!attr->identity || attr->identity_len == 0) { in eap_sim_process_start() 463 os_free(sm->identity); in eap_sim_process_start() 464 sm->identity = new_identity; in eap_sim_process_start() 465 os_memcpy(sm->identity, attr->identity, attr->identity_len); in eap_sim_process_start() 469 sm->identity, sm->identity_len); in eap_sim_process_start() 470 username = sim_get_username(sm->identity, sm->identity_len); in eap_sim_process_start() 565 sm->identity, identity_len); in eap_sim_process_start() [all …]
|
H A D | eap_server_aka.c | 371 } else if (sm->identity && sm->identity_len > 0 && in eap_aka_build_identity() 372 (sm->identity[0] == EAP_AKA_REAUTH_ID_PREFIX || in eap_aka_build_identity() 563 sm->identity, in eap_aka_build_reauth() 570 eap_sim_derive_keys_reauth(data->counter, sm->identity, in eap_aka_build_reauth() 737 sm->identity, sm->identity_len); in eap_aka_determine_identity() 854 sm->identity, identity_len); in eap_aka_fullauth() 861 eap_aka_derive_mk(sm->identity, identity_len, data->ik, in eap_aka_fullauth() 892 if (!attr->identity || attr->identity_len == 0) { in eap_aka_process_identity() 906 os_free(sm->identity); in eap_aka_process_identity() 907 sm->identity = new_identity; in eap_aka_process_identity() [all …]
|
H A D | eap_server_ttls.c | 91 if (sm->identity) { in eap_ttls_valid_session() 99 wpabuf_put_data(buf, sm->identity, id_len); in eap_ttls_valid_session() 721 if (sm->identity == NULL) { in eap_ttls_process_phase2_mschapv2() 731 username = sm->identity; in eap_ttls_process_phase2_mschapv2() 927 sm->identity, sm->identity_len); in eap_ttls_process_phase2_eap_response() 1055 os_free(sm->identity); in eap_ttls_process_phase2() 1057 if (sm->identity == NULL) { in eap_ttls_process_phase2() 1230 os_free(sm->identity); in eap_ttls_process() 1232 if (!sm->identity) { in eap_ttls_process() 1238 os_memcpy(sm->identity, pos, id_len); in eap_ttls_process() [all …]
|
H A D | eap_server.c | 865 sm->identity = (u8 *) dup_binstr(parse.keyname, in SM_STATE() 867 if (!sm->identity) in SM_STATE() 1684 if (sm->identity == NULL || sm->currentId == -1) { in eap_sm_Policy_getNextMethod() 1774 if (sm->identity == NULL || sm->currentId == -1) { in eap_sm_Policy_getDecision() 1922 os_free(sm->identity); in eap_server_sm_deinit() 1991 return sm->identity; in eap_get_identity() 2058 os_free(sm->identity); in eap_erp_update_identity() 2059 sm->identity = os_malloc(parse.keyname_len); in eap_erp_update_identity() 2060 if (sm->identity) { in eap_erp_update_identity() 2091 os_free(sm->identity); in eap_server_clear_identity() [all …]
|
H A D | eap_server_wsc.c | 85 if (sm->identity && sm->identity_len == WSC_ID_REGISTRAR_LEN && in eap_wsc_init() 86 os_memcmp(sm->identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == in eap_wsc_init() 89 else if (sm->identity && sm->identity_len == WSC_ID_ENROLLEE_LEN && in eap_wsc_init() 90 os_memcmp(sm->identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) in eap_wsc_init() 95 sm->identity, sm->identity_len); in eap_wsc_init()
|
/dragonfly/contrib/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 108 static inline void eap_aka_prime_derive_keys(const u8 *identity, in eap_aka_prime_derive_keys() argument 117 const u8 *identity, in eap_aka_prime_derive_keys_reauth() argument 186 const u8 *nonce_mt, *identity, *res, *auts; member
|
H A D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, in eap_sim_derive_mk() argument 37 addr[0] = identity; in eap_sim_derive_mk() 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, in eap_aka_derive_mk() argument 62 addr[0] = identity; in eap_aka_derive_mk() 108 const u8 *identity, size_t identity_len, in eap_sim_derive_keys_reauth() argument 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { in eap_sim_derive_keys_reauth() 123 addr[0] = identity; in eap_sim_derive_keys_reauth() 136 identity, identity_len); in eap_sim_derive_keys_reauth() 296 prf_prime(key, "EAP-AKA'", identity, identity_len, NULL, 0, in eap_aka_prime_derive_keys() 325 const u8 *identity, size_t identity_len, in eap_aka_prime_derive_keys_reauth() argument [all …]
|
/dragonfly/contrib/wpa_supplicant/src/eap_peer/ |
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local 72 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_request() 74 if (identity == NULL || password == NULL) in eap_leap_process_request() 129 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_request() 144 const u8 *identity; in eap_leap_process_success() local 149 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_success() 150 if (identity == NULL) in eap_leap_process_success() 179 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_success()
|
H A D | eap_sim.c | 404 const u8 *identity = NULL; in eap_sim_learn_ids() local 416 if (identity) { in eap_sim_learn_ids() 486 const u8 *identity = NULL; in eap_sim_response_start() local 492 identity = data->reauth_id; in eap_sim_response_start() 499 identity = data->pseudonym; in eap_sim_response_start() 504 if (identity) { in eap_sim_response_start() 531 if (identity) { in eap_sim_response_start() 533 identity, identity_len); in eap_sim_response_start() 535 identity, identity_len); in eap_sim_response_start() 718 const u8 *identity; in eap_sim_process_challenge() local [all …]
|
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; in eap_gtc_process() local 99 identity = eap_get_config_identity(sm, &identity_len); in eap_gtc_process() 100 if (identity == NULL) in eap_gtc_process() 110 wpabuf_put_data(resp, identity, identity_len); in eap_gtc_process()
|
H A D | eap_aka.c | 384 const u8 *identity = NULL; in eap_aka_learn_ids() local 396 if (identity) { in eap_aka_learn_ids() 616 const u8 *identity = NULL; in eap_aka_response_identity() local 622 identity = data->reauth_id; in eap_aka_response_identity() 629 identity = data->pseudonym; in eap_aka_response_identity() 634 if (identity) { in eap_aka_response_identity() 651 if (identity) { in eap_aka_response_identity() 653 identity, identity_len); in eap_aka_response_identity() 655 identity, identity_len); in eap_aka_response_identity() 923 const u8 *identity; in eap_aka_process_challenge() local [all …]
|
H A D | mschapv2.c | 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, in mschapv2_derive_response() argument 49 identity, identity_len); in mschapv2_derive_response() 51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response()
|
H A D | eap.c | 443 if (config->identity) { in eap_get_realm() 1569 os_free(conf->identity); in eap_sm_imsi_identity() 1579 conf->identity[0] = '1'; in eap_sm_imsi_identity() 1582 conf->identity[0] = '0'; in eap_sm_imsi_identity() 1585 conf->identity[0] = '6'; in eap_sm_imsi_identity() 1641 const u8 *identity; in eap_sm_buildIdentity() local 1661 identity = config->identity; in eap_sm_buildIdentity() 1669 if (!identity) { in eap_sm_buildIdentity() 1672 identity = config->identity; in eap_sm_buildIdentity() 1683 } else if (!identity) { in eap_sm_buildIdentity() [all …]
|
H A D | eap_ttls.c | 488 const u8 *identity, *password; in eap_ttls_phase2_request_mschapv2() 496 if (identity == NULL || password == NULL) in eap_ttls_phase2_request_mschapv2() 509 identity, identity_len); in eap_ttls_phase2_request_mschapv2() 582 const u8 *identity, *password; in eap_ttls_phase2_request_mschap() 590 if (identity == NULL || password == NULL) in eap_ttls_phase2_request_mschap() 603 identity, identity_len); in eap_ttls_phase2_request_mschap() 682 const u8 *identity, *password; in eap_ttls_phase2_request_pap() local 702 identity, identity_len); in eap_ttls_phase2_request_pap() 739 const u8 *identity, *password; in eap_ttls_phase2_request_chap() 759 identity, identity_len); in eap_ttls_phase2_request_chap() [all …]
|
H A D | eap_wsc.c | 141 const u8 *identity; in eap_wsc_init() local 159 identity = eap_get_config_identity(sm, &identity_len); in eap_wsc_init() 161 if (identity && identity_len == WSC_ID_REGISTRAR_LEN && in eap_wsc_init() 162 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0) in eap_wsc_init() 164 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN && in eap_wsc_init() 165 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0) in eap_wsc_init() 169 identity, identity_len); in eap_wsc_init()
|