Home
last modified time | relevance | path

Searched refs:identity (Results 1 – 25 of 119) sorted by relevance

12345

/hostap-latest/tests/hwsim/
Dtest_erp.py27 eap="PAX", identity="pax.user@example.com",
41 eap="PAX", identity="pax.user@example.com",
57 eap="PSK", identity="psk.user@example.com",
83 eap="PSK", identity="psk.user@example.com",
143 eap="PSK", identity="psk.user@example.com",
174 eap="PSK", identity="user@example.com",
213 eap="PSK", identity="psk@erp.example.com",
280 erp_test(dev[0], hapd, eap="AKA", identity="0232010000000000@example.com",
283 eap="AKA", identity="0232010000000000@example.com",
285 erp_test(dev[0], hapd, eap="AKA'", identity="6555444333222111@example.com",
[all …]
Dtest_tnc.py21 eap="PEAP", identity="user", password="password",
29 eap="PEAP", identity="user", password="password",
37 eap="PEAP", identity="user", password="password",
55 eap="PEAP", identity="user", password="password",
66 eap="PEAP", identity="user", password="password",
86 eap="TTLS", identity="DOMAIN\mschapv2 user",
105 eap="TTLS", identity="DOMAIN\mschapv2 user",
154 for count, func, identity, phase2 in tests:
159 identity=identity, password="password",
187 eap="FAST", identity="user",
Dtest_authsrv.py35 eap="TTLS", identity="user",
48 eap="TTLS", identity="user",
58 eap="TTLS", identity="user",
69 eap="TTLS", identity="user",
79 eap="TTLS", identity="user",
92 eap="TTLS", identity="user",
107 eap="TTLS", identity="user",
119 eap="TTLS", identity="user",
132 eap="TTLS", identity="user",
217 eap="TTLS", identity="user",
[all …]
Dtest_ieee8021x.py33 identity="psk.user@example.com",
50 identity="psk.user@example.com",
68 identity="psk.user@example.com",
80 eap="PSK", identity="psk.user@example.com",
114 identity="psk.user@example.com",
130 eap="PSK", identity="psk.user@example.com",
134 eap="PSK", identity="psk.user@example.com",
181 eap="PSK", identity="psk.user@example.com",
215 eap="PSK", identity="psk.user@example.com",
257 eap="PSK", identity="psk.user@example.com",
[all …]
Dtest_suite_b.py69 eap="TLS", identity="tls user",
149 eap="TLS", identity="tls user",
190 eap="TLS", identity="tls user",
264 eap="TLS", identity="tls user",
297 eap="TLS", identity="tls user",
323 eap="TLS", identity="tls user",
340 eap="TLS", identity="tls user",
357 eap="TLS", identity="tls user",
376 eap="TLS", identity="tls user",
441 eap="TLS", identity="tls user",
[all …]
Dtest_ap_eap.py156 def eap_connect(dev, hapd, method, identity, raw_identity=None, argument
161 eap=method, identity=identity, raw_identity=raw_identity,
346 eap_connect(dev[0], hapd, "SIM", identity=None,
470 identity="1232010000000000",
480 identity="1232010000000000",
551 identity="1232010000000000",
694 identity="1232010000000000",
760 identity="1232010000000000",
901 identity="1232010000000000",
929 identity="1232010000000000",
[all …]
Dtest_pmksa_cache.py27 eap="GPSK", identity="gpsk user",
91 eap="GPSK", identity="gpsk user",
142 eap="GPSK", identity="gpsk user",
188 eap="GPSK", identity="gpsk user",
237 eap="GPSK", identity="gpsk user",
289 eap="GPSK", identity="gpsk user",
339 eap="GPSK", identity="gpsk user",
367 eap="GPSK", identity="gpsk user",
399 eap="GPSK", identity="gpsk-cui",
475 def generic_pmksa_cache_preauth(dev, apdev, extraparams, identity, databridge, argument
[all …]
Dtest_ap_vlan.py151 identity="vlan1",
155 identity="vlan2",
159 identity="pax.user@example.com",
176 identity="vlan1b",
195 identity="pax.user@example.com",
199 identity="pax.user@example.com",
203 identity="pax.user@example.com",
257 identity = "vlan1tagged" if tagged else "vlan1"
260 identity=identity,
356 identity="vlan1",
[all …]
Dtest_eap_proto.py312 eap="MD5", identity="user", password="password",
323 eap="MD5", identity="user", password="password",
334 eap="MD5", identity="user", password="password",
350 eap="MD5", identity="user", password="password",
366 eap="MD5", identity="user", password="password",
387 eap="MD5", identity="user", password="password",
458 eap="MD5", identity="user", password="password",
466 eap="MD5", identity="user", password="password",
769 eap="SAKE", identity="sake user",
781 eap="SAKE", identity="sake user",
[all …]
/hostap-latest/src/ap/
Deap_user_db.c121 os_memcmp(argv[id], user->identity, len) == 0 && in get_wildcard_cb()
135 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, in eap_user_sqlite_get() argument
150 os_memcpy(id_str, identity, identity_len); in eap_user_sqlite_get()
168 bin_clear_free(hapd->tmp_eap_user.identity, in eap_user_sqlite_get()
174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); in eap_user_sqlite_get()
175 if (hapd->tmp_eap_user.identity == NULL) in eap_user_sqlite_get()
177 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); in eap_user_sqlite_get()
214 os_free(user->identity); in eap_user_sqlite_get()
215 user->identity = user->password; in eap_user_sqlite_get()
232 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, in hostapd_get_eap_user() argument
[all …]
Dpmksa_cache_auth.c42 os_free(entry->identity); in _pmksa_cache_free_entry()
152 if (eapol->identity) { in pmksa_cache_from_eapol_data()
153 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data()
154 if (entry->identity) { in pmksa_cache_from_eapol_data()
156 os_memcpy(entry->identity, eapol->identity, in pmksa_cache_from_eapol_data()
190 if (entry->identity) { in pmksa_cache_to_eapol_data()
191 os_free(eapol->identity); in pmksa_cache_to_eapol_data()
192 eapol->identity = os_malloc(entry->identity_len); in pmksa_cache_to_eapol_data()
193 if (eapol->identity) { in pmksa_cache_to_eapol_data()
195 os_memcpy(eapol->identity, entry->identity, in pmksa_cache_to_eapol_data()
[all …]
/hostap-latest/wpa_supplicant/
Dwpa_supplicant.conf1825 identity="user@example.com"
1839 identity="user@example.com"
1853 identity="user@example.com"
1866 identity="user@example.com"
1928 identity="eap_psk_user@example.com"
1939 identity="user@example.com"
1953 identity="user"
1962 identity="user"
1972 identity="username"
1983 identity="username"
[all …]
/hostap-latest/hostapd/
Dhostapd.eap_user_sqlite2 identity TEXT PRIMARY KEY,
11 identity TEXT PRIMARY KEY,
15 INSERT INTO users(identity,methods,password,phase2) VALUES ('user','TTLS-MSCHAPV2','password',1);
16 INSERT INTO users(identity,methods,password,phase2) VALUES ('DOMAIN\mschapv2 user','TTLS-MSCHAPV2',…
18 INSERT INTO wildcards(identity,methods) VALUES ('','TTLS,TLS');
19 INSERT INTO wildcards(identity,methods) VALUES ('0','AKA');
31 identity TEXT
36 identity TEXT,
Dhostapd.eap_user3 # Each line must contain an identity, EAP method(s), and an optional password
4 # separated with whitespace (space or tab). The identity and password must be
14 # identity can be used in the unencrypted phase 1 and the real user identity
25 # * can be used as a wildcard to match any user identity. The main purposes for
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
41 # version based on the Phase 1 identity. Without this flag, the EAP
71 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes
94 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes in phase 2
/hostap-latest/src/eap_server/
Deap_server_gtc.c131 if (sm->identity && sm->require_identity_match && in eap_gtc_process()
133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process()
138 sm->identity, sm->identity_len); in eap_gtc_process()
142 os_free(sm->identity); in eap_gtc_process()
144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process()
145 if (sm->identity == NULL) { in eap_gtc_process()
151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process()
155 sm->identity, sm->identity_len); in eap_gtc_process()
Deap_server_sim.c119 username = sim_get_username(sm->identity, sm->identity_len); in eap_sim_build_start()
148 } else if (sm->identity && sm->identity_len > 0 && in eap_sim_build_start()
149 sm->identity[0] == EAP_SIM_REAUTH_ID_PREFIX) { in eap_sim_build_start()
288 eap_sim_derive_keys_reauth(data->counter, sm->identity, in eap_sim_build_reauth()
453 const u8 *identity; in eap_sim_process_start() local
470 (!attr->identity || attr->identity_len == 0)) in eap_sim_process_start()
477 if (!attr->identity || attr->identity_len == 0) { in eap_sim_process_start()
486 os_free(sm->identity); in eap_sim_process_start()
487 sm->identity = new_identity; in eap_sim_process_start()
488 os_memcpy(sm->identity, attr->identity, attr->identity_len); in eap_sim_process_start()
[all …]
Deap_server_aka.c159 const u8 *identity = sm->identity; in eap_aka_check_identity() local
163 identity = (const u8 *) sm->sim_aka_permanent; in eap_aka_check_identity()
169 username = sim_get_username(identity, identity_len); in eap_aka_check_identity()
411 } else if (sm->identity && sm->identity_len > 0 && in eap_aka_build_identity()
412 (sm->identity[0] == EAP_AKA_REAUTH_ID_PREFIX || in eap_aka_build_identity()
413 sm->identity[0] == EAP_AKA_PRIME_REAUTH_ID_PREFIX)) { in eap_aka_build_identity()
603 sm->identity, in eap_aka_build_reauth()
610 eap_sim_derive_keys_reauth(data->counter, sm->identity, in eap_aka_build_reauth()
777 sm->identity, sm->identity_len); in eap_aka_determine_identity()
779 username = sim_get_username(sm->identity, sm->identity_len); in eap_aka_determine_identity()
[all …]
Deap_server_fast.c61 u8 *identity; /* from PAC-Opaque */ member
131 u8 *identity = NULL; in eap_fast_session_ticket_cb() local
218 identity = pos; in eap_fast_session_ticket_cb()
234 if (identity) { in eap_fast_session_ticket_cb()
236 "PAC-Opaque", identity, identity_len); in eap_fast_session_ticket_cb()
237 os_free(data->identity); in eap_fast_session_ticket_cb()
238 data->identity = os_malloc(identity_len); in eap_fast_session_ticket_cb()
239 if (data->identity) { in eap_fast_session_ticket_cb()
240 os_memcpy(data->identity, identity, identity_len); in eap_fast_session_ticket_cb()
509 os_free(data->identity); in eap_fast_reset()
[all …]
Deap_server_identity.c129 if (sm->identity) in eap_identity_process()
131 os_free(sm->identity); in eap_identity_process()
132 sm->identity = os_malloc(len ? len : 1); in eap_identity_process()
133 if (sm->identity == NULL) { in eap_identity_process()
136 os_memcpy(sm->identity, pos, len); in eap_identity_process()
Deap_server_teap.c67 u8 *identity; /* from PAC-Opaque or client certificate */ member
151 u8 *identity = NULL; in eap_teap_session_ticket_cb() local
236 identity = pos; in eap_teap_session_ticket_cb()
252 if (identity) { in eap_teap_session_ticket_cb()
255 identity, identity_len); in eap_teap_session_ticket_cb()
256 os_free(data->identity); in eap_teap_session_ticket_cb()
257 data->identity = os_malloc(identity_len); in eap_teap_session_ticket_cb()
258 if (data->identity) { in eap_teap_session_ticket_cb()
259 os_memcpy(data->identity, identity, identity_len); in eap_teap_session_ticket_cb()
455 os_free(data->identity); in eap_teap_reset()
[all …]
/hostap-latest/src/eap_common/
Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
108 static inline void eap_aka_prime_derive_keys(const u8 *identity, in eap_aka_prime_derive_keys() argument
117 const u8 *identity, in eap_aka_prime_derive_keys_reauth() argument
186 const u8 *nonce_mt, *identity, *res, *auts; member
/hostap-latest/src/eap_peer/
Deap_sim.c161 if (sm->identity) { in eap_sim_init()
164 data->mk_identity = os_memdup(sm->identity, sm->identity_len); in eap_sim_init()
434 const u8 *identity = NULL; in eap_sim_learn_ids() local
445 identity = eap_get_config_identity(sm, &identity_len); in eap_sim_learn_ids()
446 if (identity) { in eap_sim_learn_ids()
447 for (realm = identity, realm_len = identity_len; in eap_sim_learn_ids()
515 const u8 *identity, size_t identity_len, in eap_sim_encrypt_identity() argument
523 identity, identity_len); in eap_sim_encrypt_identity()
525 imsi_buf = wpabuf_alloc_copy(identity, identity_len); in eap_sim_encrypt_identity()
565 const u8 *identity = NULL; in eap_sim_response_start() local
[all …]
Deap_aka.c143 if (sm->identity) { in eap_aka_init()
146 data->mk_identity = os_memdup(sm->identity, sm->identity_len); in eap_aka_init()
408 const u8 *identity = NULL; in eap_aka_learn_ids() local
419 identity = eap_get_config_identity(sm, &identity_len); in eap_aka_learn_ids()
420 if (identity) { in eap_aka_learn_ids()
421 for (realm = identity, realm_len = identity_len; in eap_aka_learn_ids()
647 const u8 *identity, size_t identity_len, in eap_aka_encrypt_identity() argument
655 identity, identity_len); in eap_aka_encrypt_identity()
657 imsi_buf = wpabuf_alloc_copy(identity, identity_len); in eap_aka_encrypt_identity()
698 const u8 *identity = NULL; in eap_aka_response_identity() local
[all …]
Deap.c452 if (config->identity) { in eap_get_realm()
454 if (config->identity[i] == '@') in eap_get_realm()
462 os_memcpy(realm, &config->identity[i + 1], realm_len); in eap_get_realm()
489 if (!config->identity && !config->anonymous_identity && in eap_get_realm()
1603 os_free(conf->identity); in eap_sm_imsi_identity()
1604 conf->identity = os_malloc(1 + imsi_len); in eap_sm_imsi_identity()
1605 if (conf->identity == NULL) { in eap_sm_imsi_identity()
1613 conf->identity[0] = '1'; in eap_sm_imsi_identity()
1616 conf->identity[0] = '0'; in eap_sm_imsi_identity()
1619 conf->identity[0] = '6'; in eap_sm_imsi_identity()
[all …]
Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; in eap_leap_process_request() local
72 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_request()
74 if (identity == NULL || password == NULL) in eap_leap_process_request()
129 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_request()
144 const u8 *identity; in eap_leap_process_success() local
149 identity = eap_get_config_identity(sm, &identity_len); in eap_leap_process_success()
150 if (identity == NULL) in eap_leap_process_success()
179 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_success()

12345