/hostap-latest/tests/hwsim/ |
D | test_erp.py | 27 eap="PAX", identity="pax.user@example.com", 41 eap="PAX", identity="pax.user@example.com", 57 eap="PSK", identity="psk.user@example.com", 83 eap="PSK", identity="psk.user@example.com", 143 eap="PSK", identity="psk.user@example.com", 174 eap="PSK", identity="user@example.com", 213 eap="PSK", identity="psk@erp.example.com", 280 erp_test(dev[0], hapd, eap="AKA", identity="0232010000000000@example.com", 283 eap="AKA", identity="0232010000000000@example.com", 285 erp_test(dev[0], hapd, eap="AKA'", identity="6555444333222111@example.com", [all …]
|
D | test_tnc.py | 21 eap="PEAP", identity="user", password="password", 29 eap="PEAP", identity="user", password="password", 37 eap="PEAP", identity="user", password="password", 55 eap="PEAP", identity="user", password="password", 66 eap="PEAP", identity="user", password="password", 86 eap="TTLS", identity="DOMAIN\mschapv2 user", 105 eap="TTLS", identity="DOMAIN\mschapv2 user", 154 for count, func, identity, phase2 in tests: 159 identity=identity, password="password", 187 eap="FAST", identity="user",
|
D | test_authsrv.py | 35 eap="TTLS", identity="user", 48 eap="TTLS", identity="user", 58 eap="TTLS", identity="user", 69 eap="TTLS", identity="user", 79 eap="TTLS", identity="user", 92 eap="TTLS", identity="user", 107 eap="TTLS", identity="user", 119 eap="TTLS", identity="user", 132 eap="TTLS", identity="user", 217 eap="TTLS", identity="user", [all …]
|
D | test_ieee8021x.py | 33 identity="psk.user@example.com", 50 identity="psk.user@example.com", 68 identity="psk.user@example.com", 80 eap="PSK", identity="psk.user@example.com", 114 identity="psk.user@example.com", 130 eap="PSK", identity="psk.user@example.com", 134 eap="PSK", identity="psk.user@example.com", 181 eap="PSK", identity="psk.user@example.com", 215 eap="PSK", identity="psk.user@example.com", 257 eap="PSK", identity="psk.user@example.com", [all …]
|
D | test_suite_b.py | 69 eap="TLS", identity="tls user", 149 eap="TLS", identity="tls user", 190 eap="TLS", identity="tls user", 264 eap="TLS", identity="tls user", 297 eap="TLS", identity="tls user", 323 eap="TLS", identity="tls user", 340 eap="TLS", identity="tls user", 357 eap="TLS", identity="tls user", 376 eap="TLS", identity="tls user", 441 eap="TLS", identity="tls user", [all …]
|
D | test_ap_eap.py | 156 def eap_connect(dev, hapd, method, identity, raw_identity=None, argument 161 eap=method, identity=identity, raw_identity=raw_identity, 346 eap_connect(dev[0], hapd, "SIM", identity=None, 470 identity="1232010000000000", 480 identity="1232010000000000", 551 identity="1232010000000000", 694 identity="1232010000000000", 760 identity="1232010000000000", 901 identity="1232010000000000", 929 identity="1232010000000000", [all …]
|
D | test_pmksa_cache.py | 27 eap="GPSK", identity="gpsk user", 91 eap="GPSK", identity="gpsk user", 142 eap="GPSK", identity="gpsk user", 188 eap="GPSK", identity="gpsk user", 237 eap="GPSK", identity="gpsk user", 289 eap="GPSK", identity="gpsk user", 339 eap="GPSK", identity="gpsk user", 367 eap="GPSK", identity="gpsk user", 399 eap="GPSK", identity="gpsk-cui", 475 def generic_pmksa_cache_preauth(dev, apdev, extraparams, identity, databridge, argument [all …]
|
D | test_ap_vlan.py | 151 identity="vlan1", 155 identity="vlan2", 159 identity="pax.user@example.com", 176 identity="vlan1b", 195 identity="pax.user@example.com", 199 identity="pax.user@example.com", 203 identity="pax.user@example.com", 257 identity = "vlan1tagged" if tagged else "vlan1" 260 identity=identity, 356 identity="vlan1", [all …]
|
D | test_eap_proto.py | 312 eap="MD5", identity="user", password="password", 323 eap="MD5", identity="user", password="password", 334 eap="MD5", identity="user", password="password", 350 eap="MD5", identity="user", password="password", 366 eap="MD5", identity="user", password="password", 387 eap="MD5", identity="user", password="password", 458 eap="MD5", identity="user", password="password", 466 eap="MD5", identity="user", password="password", 769 eap="SAKE", identity="sake user", 781 eap="SAKE", identity="sake user", [all …]
|
/hostap-latest/src/ap/ |
D | eap_user_db.c | 121 os_memcmp(argv[id], user->identity, len) == 0 && in get_wildcard_cb() 135 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, in eap_user_sqlite_get() argument 150 os_memcpy(id_str, identity, identity_len); in eap_user_sqlite_get() 168 bin_clear_free(hapd->tmp_eap_user.identity, in eap_user_sqlite_get() 174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); in eap_user_sqlite_get() 175 if (hapd->tmp_eap_user.identity == NULL) in eap_user_sqlite_get() 177 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); in eap_user_sqlite_get() 214 os_free(user->identity); in eap_user_sqlite_get() 215 user->identity = user->password; in eap_user_sqlite_get() 232 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, in hostapd_get_eap_user() argument [all …]
|
D | pmksa_cache_auth.c | 42 os_free(entry->identity); in _pmksa_cache_free_entry() 152 if (eapol->identity) { in pmksa_cache_from_eapol_data() 153 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data() 154 if (entry->identity) { in pmksa_cache_from_eapol_data() 156 os_memcpy(entry->identity, eapol->identity, in pmksa_cache_from_eapol_data() 190 if (entry->identity) { in pmksa_cache_to_eapol_data() 191 os_free(eapol->identity); in pmksa_cache_to_eapol_data() 192 eapol->identity = os_malloc(entry->identity_len); in pmksa_cache_to_eapol_data() 193 if (eapol->identity) { in pmksa_cache_to_eapol_data() 195 os_memcpy(eapol->identity, entry->identity, in pmksa_cache_to_eapol_data() [all …]
|
/hostap-latest/wpa_supplicant/ |
D | wpa_supplicant.conf | 1825 identity="user@example.com" 1839 identity="user@example.com" 1853 identity="user@example.com" 1866 identity="user@example.com" 1928 identity="eap_psk_user@example.com" 1939 identity="user@example.com" 1953 identity="user" 1962 identity="user" 1972 identity="username" 1983 identity="username" [all …]
|
/hostap-latest/hostapd/ |
D | hostapd.eap_user_sqlite | 2 identity TEXT PRIMARY KEY, 11 identity TEXT PRIMARY KEY, 15 INSERT INTO users(identity,methods,password,phase2) VALUES ('user','TTLS-MSCHAPV2','password',1); 16 INSERT INTO users(identity,methods,password,phase2) VALUES ('DOMAIN\mschapv2 user','TTLS-MSCHAPV2',… 18 INSERT INTO wildcards(identity,methods) VALUES ('','TTLS,TLS'); 19 INSERT INTO wildcards(identity,methods) VALUES ('0','AKA'); 31 identity TEXT 36 identity TEXT,
|
D | hostapd.eap_user | 3 # Each line must contain an identity, EAP method(s), and an optional password 4 # separated with whitespace (space or tab). The identity and password must be 14 # identity can be used in the unencrypted phase 1 and the real user identity 25 # * can be used as a wildcard to match any user identity. The main purposes for 26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to 41 # version based on the Phase 1 identity. Without this flag, the EAP 71 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes 94 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes in phase 2
|
/hostap-latest/src/eap_server/ |
D | eap_server_gtc.c | 131 if (sm->identity && sm->require_identity_match && in eap_gtc_process() 133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process() 138 sm->identity, sm->identity_len); in eap_gtc_process() 142 os_free(sm->identity); in eap_gtc_process() 144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process() 145 if (sm->identity == NULL) { in eap_gtc_process() 151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process() 155 sm->identity, sm->identity_len); in eap_gtc_process()
|
D | eap_server_sim.c | 119 username = sim_get_username(sm->identity, sm->identity_len); in eap_sim_build_start() 148 } else if (sm->identity && sm->identity_len > 0 && in eap_sim_build_start() 149 sm->identity[0] == EAP_SIM_REAUTH_ID_PREFIX) { in eap_sim_build_start() 288 eap_sim_derive_keys_reauth(data->counter, sm->identity, in eap_sim_build_reauth() 453 const u8 *identity; in eap_sim_process_start() local 470 (!attr->identity || attr->identity_len == 0)) in eap_sim_process_start() 477 if (!attr->identity || attr->identity_len == 0) { in eap_sim_process_start() 486 os_free(sm->identity); in eap_sim_process_start() 487 sm->identity = new_identity; in eap_sim_process_start() 488 os_memcpy(sm->identity, attr->identity, attr->identity_len); in eap_sim_process_start() [all …]
|
D | eap_server_aka.c | 159 const u8 *identity = sm->identity; in eap_aka_check_identity() local 163 identity = (const u8 *) sm->sim_aka_permanent; in eap_aka_check_identity() 169 username = sim_get_username(identity, identity_len); in eap_aka_check_identity() 411 } else if (sm->identity && sm->identity_len > 0 && in eap_aka_build_identity() 412 (sm->identity[0] == EAP_AKA_REAUTH_ID_PREFIX || in eap_aka_build_identity() 413 sm->identity[0] == EAP_AKA_PRIME_REAUTH_ID_PREFIX)) { in eap_aka_build_identity() 603 sm->identity, in eap_aka_build_reauth() 610 eap_sim_derive_keys_reauth(data->counter, sm->identity, in eap_aka_build_reauth() 777 sm->identity, sm->identity_len); in eap_aka_determine_identity() 779 username = sim_get_username(sm->identity, sm->identity_len); in eap_aka_determine_identity() [all …]
|
D | eap_server_fast.c | 61 u8 *identity; /* from PAC-Opaque */ member 131 u8 *identity = NULL; in eap_fast_session_ticket_cb() local 218 identity = pos; in eap_fast_session_ticket_cb() 234 if (identity) { in eap_fast_session_ticket_cb() 236 "PAC-Opaque", identity, identity_len); in eap_fast_session_ticket_cb() 237 os_free(data->identity); in eap_fast_session_ticket_cb() 238 data->identity = os_malloc(identity_len); in eap_fast_session_ticket_cb() 239 if (data->identity) { in eap_fast_session_ticket_cb() 240 os_memcpy(data->identity, identity, identity_len); in eap_fast_session_ticket_cb() 509 os_free(data->identity); in eap_fast_reset() [all …]
|
D | eap_server_identity.c | 129 if (sm->identity) in eap_identity_process() 131 os_free(sm->identity); in eap_identity_process() 132 sm->identity = os_malloc(len ? len : 1); in eap_identity_process() 133 if (sm->identity == NULL) { in eap_identity_process() 136 os_memcpy(sm->identity, pos, len); in eap_identity_process()
|
D | eap_server_teap.c | 67 u8 *identity; /* from PAC-Opaque or client certificate */ member 151 u8 *identity = NULL; in eap_teap_session_ticket_cb() local 236 identity = pos; in eap_teap_session_ticket_cb() 252 if (identity) { in eap_teap_session_ticket_cb() 255 identity, identity_len); in eap_teap_session_ticket_cb() 256 os_free(data->identity); in eap_teap_session_ticket_cb() 257 data->identity = os_malloc(identity_len); in eap_teap_session_ticket_cb() 258 if (data->identity) { in eap_teap_session_ticket_cb() 259 os_memcpy(data->identity, identity, identity_len); in eap_teap_session_ticket_cb() 455 os_free(data->identity); in eap_teap_reset() [all …]
|
/hostap-latest/src/eap_common/ |
D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 108 static inline void eap_aka_prime_derive_keys(const u8 *identity, in eap_aka_prime_derive_keys() argument 117 const u8 *identity, in eap_aka_prime_derive_keys_reauth() argument 186 const u8 *nonce_mt, *identity, *res, *auts; member
|
/hostap-latest/src/eap_peer/ |
D | eap_sim.c | 161 if (sm->identity) { in eap_sim_init() 164 data->mk_identity = os_memdup(sm->identity, sm->identity_len); in eap_sim_init() 434 const u8 *identity = NULL; in eap_sim_learn_ids() local 445 identity = eap_get_config_identity(sm, &identity_len); in eap_sim_learn_ids() 446 if (identity) { in eap_sim_learn_ids() 447 for (realm = identity, realm_len = identity_len; in eap_sim_learn_ids() 515 const u8 *identity, size_t identity_len, in eap_sim_encrypt_identity() argument 523 identity, identity_len); in eap_sim_encrypt_identity() 525 imsi_buf = wpabuf_alloc_copy(identity, identity_len); in eap_sim_encrypt_identity() 565 const u8 *identity = NULL; in eap_sim_response_start() local [all …]
|
D | eap_aka.c | 143 if (sm->identity) { in eap_aka_init() 146 data->mk_identity = os_memdup(sm->identity, sm->identity_len); in eap_aka_init() 408 const u8 *identity = NULL; in eap_aka_learn_ids() local 419 identity = eap_get_config_identity(sm, &identity_len); in eap_aka_learn_ids() 420 if (identity) { in eap_aka_learn_ids() 421 for (realm = identity, realm_len = identity_len; in eap_aka_learn_ids() 647 const u8 *identity, size_t identity_len, in eap_aka_encrypt_identity() argument 655 identity, identity_len); in eap_aka_encrypt_identity() 657 imsi_buf = wpabuf_alloc_copy(identity, identity_len); in eap_aka_encrypt_identity() 698 const u8 *identity = NULL; in eap_aka_response_identity() local [all …]
|
D | eap.c | 452 if (config->identity) { in eap_get_realm() 454 if (config->identity[i] == '@') in eap_get_realm() 462 os_memcpy(realm, &config->identity[i + 1], realm_len); in eap_get_realm() 489 if (!config->identity && !config->anonymous_identity && in eap_get_realm() 1603 os_free(conf->identity); in eap_sm_imsi_identity() 1604 conf->identity = os_malloc(1 + imsi_len); in eap_sm_imsi_identity() 1605 if (conf->identity == NULL) { in eap_sm_imsi_identity() 1613 conf->identity[0] = '1'; in eap_sm_imsi_identity() 1616 conf->identity[0] = '0'; in eap_sm_imsi_identity() 1619 conf->identity[0] = '6'; in eap_sm_imsi_identity() [all …]
|
D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local 72 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_request() 74 if (identity == NULL || password == NULL) in eap_leap_process_request() 129 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_request() 144 const u8 *identity; in eap_leap_process_success() local 149 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_success() 150 if (identity == NULL) in eap_leap_process_success() 179 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_success()
|