/hostap-latest/src/ap/ |
D | eap_user_db.c | 23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) in set_user_methods() argument 32 os_memset(&user->methods, 0, sizeof(user->methods)); in set_user_methods() 39 user->methods[num_methods].method = in set_user_methods() 41 &user->methods[num_methods].vendor); in set_user_methods() 42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && in set_user_methods() 43 user->methods[num_methods].method == EAP_TYPE_NONE) { in set_user_methods() 45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; in set_user_methods() 49 user->ttls_auth |= EAP_TTLS_AUTH_CHAP; in set_user_methods() 53 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAP; in set_user_methods() 57 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAPV2; in set_user_methods() [all …]
|
D | authsrv.c | 55 struct eap_user *user) in hostapd_radius_get_eap_user() argument 65 if (user == NULL) in hostapd_radius_get_eap_user() 68 os_memset(user, 0, sizeof(*user)); in hostapd_radius_get_eap_user() 70 user->methods[i].vendor = eap_user->methods[i].vendor; in hostapd_radius_get_eap_user() 71 user->methods[i].method = eap_user->methods[i].method; in hostapd_radius_get_eap_user() 75 user->password = os_memdup(eap_user->password, in hostapd_radius_get_eap_user() 77 if (user->password == NULL) in hostapd_radius_get_eap_user() 79 user->password_len = eap_user->password_len; in hostapd_radius_get_eap_user() 80 user->password_hash = eap_user->password_hash; in hostapd_radius_get_eap_user() 82 user->salt = os_memdup(eap_user->salt, in hostapd_radius_get_eap_user() [all …]
|
/hostap-latest/hs20/server/ |
D | spp_server.c | 49 static char * db_get_session_val(struct hs20_svc *ctx, const char *user, 54 static xml_node_t * build_policy(struct hs20_svc *ctx, const char *user, 58 const char *user, 64 const char *user, const char *realm, in db_add_session() argument 83 sessionid, user ? user : "", realm ? realm : "", in db_add_session() 100 static void db_update_session_password(struct hs20_svc *ctx, const char *user, in db_update_session_password() argument 108 pw, sessionid, user, realm); in db_update_session_password() 121 const char *user, in db_update_session_machine_managed() argument 129 pw_mm ? "1" : "0", sessionid, user, realm); in db_update_session_machine_managed() 142 static void db_add_session_pps(struct hs20_svc *ctx, const char *user, in db_add_session_pps() argument [all …]
|
D | hs20-osu-server.txt | 41 assumes /home/user/hs20-server to be used, but this can be changed by 44 sudo mkdir -p /home/user/hs20-server 45 sudo chown $USER /home/user/hs20-server 46 mkdir -p /home/user/hs20-server/spp 47 mkdir -p /home/user/hs20-server/AS 75 cp hostapd hlr_auc_gw /home/user/hs20-server/AS 81 cp hs20_spp_server /home/user/hs20-server/spp 82 # prepare database (web server user/group needs to have write access) 83 mkdir -p /home/user/hs20-server/AS/DB 84 sudo chgrp www-data /home/user/hs20-server/AS/DB [all …]
|
D | hs20_spp_server.c | 69 char *user, *realm, *post, *str; in process() local 79 user = getenv("HS20USER"); in process() 80 if (user && strlen(user) == 0) in process() 81 user = NULL; in process() 119 resp = hs20_spp_server_process(ctx, spp, user, realm, dmacc); in process() 121 if (resp == NULL && user == NULL) { in process()
|
/hostap-latest/tests/hwsim/auth_serv/ |
D | ica-generate.sh | 28 mkdir -p iCA-user/certs iCA-user/crl iCA-user/newcerts iCA-user/private 29 touch iCA-user/index.txt 30 …l.cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout iCA-user/private/cakey.pem -out iCA-user/car… 31 …ial -out iCA-user/cacert.pem -days 3652 -batch -keyfile ca-key.pem -cert ca.pem -extensions v3_ca … 32 cat iCA-user/cacert.pem ca.pem > iCA-user/ca-and-root.pem 73 …ssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout iCA-user/user.key -out iCA-user/user.req -… 74 …tmp -batch -keyfile iCA-user/private/cakey.pem -cert iCA-user/cacert.pem -create_serial -in iCA-us… 75 cat iCA-user/user.pem iCA-user/cacert.pem > iCA-user/user_and_ica.pem 83 $OPENSSL verify -CAfile ca.pem iCA-user/cacert.pem 86 $OPENSSL verify -CAfile ca.pem iCA-user/cacert.pem [all …]
|
D | ec2-generate.sh | 43 $OPENSSL ecparam -out ec2-user.key -name $CURVE -genkey 44 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-user.key -out ec2-user.req -… 45 …atch -keyfile ec2-ca.key -cert ec2-ca.pem -create_serial -in ec2-user.req -out ec2-user.pem -exten… 56 $OPENSSL ecparam -out ec2-user-p256.key -name prime256v1 -genkey 57 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-user-p256.key -out ec2-user-… 58 …ch -keyfile ec2-ca.key -cert ec2-ca.pem -create_serial -in ec2-user-p256.req -out ec2-user-p256.pe… 66 $OPENSSL verify -CAfile ec2-ca.pem ec2-user.pem 67 $OPENSSL verify -CAfile ec2-ca.pem ec2-user-p256.pem
|
D | rsa3072-generate.sh | 56 if [ ! -r rsa3072-user.req ]; then 57 …sl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout rsa3072-user.key -out rsa3072-user.req -out… 59 …rsa3072-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-user.req -out rsa3072-user.pem -ext… 71 if [ ! -r rsa3072-user-rsa2048.req ]; then 72 …nf.tmp -batch -new -newkey rsa:2048 -nodes -keyout rsa3072-user-rsa2048.key -out rsa3072-user-rsa2… 74 …072-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-user-rsa2048.req -out rsa3072-user-rsa2… 82 $OPENSSL verify -CAfile rsa3072-ca.pem rsa3072-user.pem 83 $OPENSSL verify -CAfile rsa3072-ca.pem rsa3072-user-rsa2048.pem
|
D | update.sh | 62 …t server-extra.pkcs12 -in server.pem -inkey server.key -descert -certfile user.pem -passout pass:w… 129 if [ ! -r user.csr ]; then 130 …config openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout user.key -out user.csr -outform… 131 $OPENSSL rsa -in user.key -out user.rsa-key 132 …$OPENSSL pkcs8 -topk8 -in user.key -out user.key.pkcs8 -inform PEM -v2 des-ede3-cbc -v2prf hmacWit… 133 …$OPENSSL pkcs8 -topk8 -in user.key -out user.key.pkcs8.pkcs5v15 -inform PEM -v1 pbeWithMD5AndDES-C… 136 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -in user.csr -out user.pem -extensions ext_client 139 $OPENSSL pkcs12 -export -out user.pkcs12 -in user.pem -inkey user.key -descert -passout pass:whatev… 140 $OPENSSL pkcs12 -export -out user2.pkcs12 -in user.pem -inkey user.key -descert -name Test -certfil… 141 $OPENSSL pkcs12 -export -out user3.pkcs12 -in user.pem -inkey user.key -descert -name "my certifica…
|
D | sha512-generate.sh | 52 …nssl.cnf.tmp -batch -new -newkey rsa:3400 -nodes -keyout sha512-user.key -out sha512-user.req -out… 53 …ile sha512-ca.key -cert sha512-ca.pem -create_serial -in sha512-user.req -out sha512-user.pem -ext… 64 …nssl.cnf.tmp -batch -new -newkey rsa:2900 -nodes -keyout sha384-user.key -out sha384-user.req -out… 65 …ile sha512-ca.key -cert sha512-ca.pem -create_serial -in sha384-user.req -out sha384-user.pem -ext… 74 $OPENSSL verify -CAfile sha512-ca.pem sha512-user.pem 75 $OPENSSL verify -CAfile sha512-ca.pem sha384-user.pem
|
D | ec-generate.sh | 43 $OPENSSL ecparam -out ec-user.key -name $CURVE -genkey 44 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec-user.key -out ec-user.req -ou… 45 …p -batch -keyfile ec-ca.key -cert ec-ca.pem -create_serial -in ec-user.req -out ec-user.pem -exten… 53 $OPENSSL verify -CAfile ec-ca.pem ec-user.pem
|
/hostap-latest/hs20/server/www/ |
D | est.php | 10 unset($user); 34 $user = $data['username']; variable 35 if (strlen($user) < 1) { 41 "WHERE user='$user' AND realm='$realm'"; 44 error_log("EST: Session not found for user=$user realm=$realm"); 49 error_log("EST: Session fetch failed for user=$user realm=$realm"); 56 error_log("EST: Unexpected operation $oper for user=$user realm=$realm"); 61 error_log("EST: Empty password for user=$user realm=$realm"); 65 $A1 = md5($user . ':' . $realm . ':' . $pw); 70 error_log("EST: Incorrect authentication response for user=$user realm=$realm"); [all …]
|
D | spp.php | 28 unset($user); 46 $user = $data['username']; variable 47 if (strlen($user) < 1) { 59 "WHERE identity='$user' AND realm='$realm'")->fetch(); 62 "WHERE osu_user='$user' AND realm='$realm'")->fetch(); 67 error_log("spp.php - Authentication failed - user '$user' not found"); 75 $A1 = md5($user . ':' . $realm . ':' . $pw); 86 $user = "cert-" . $_SERVER["SSL_CLIENT_M_SERIAL"]; variable 132 if (isset($user) && strlen($user) > 0) 133 putenv("HS20USER=$user");
|
D | add-mo.php | 15 $user = $_POST["user"]; variable 17 if (strlen($id) < 32 || !isset($user) || !isset($pw)) { 21 if (strlen($user) < 1 || strncasecmp($user, "cert-", 5) == 0) { 34 $userrow = $db->query("SELECT identity FROM users WHERE identity='$user' AND realm='$realm'")->fetc… 45 if (!$db->exec("UPDATE sessions SET user='$user', password='$pw', realm='$realm', type='password' W… 50 "VALUES ('$user', '$realm', '$id', " .
|
D | remediation.php | 30 $user = $db->query("SELECT machine_managed,methods FROM users WHERE identity='$username'")->fetch(); variable 31 if ($user == false) { 37 $cert = $user['methods'] == "TLS" || strncmp($username, "cert-", 5) == 0; 41 } else if ($user['machine_managed'] == "1") {
|
D | add-free.php | 31 $user = $row['value']; variable 33 $row = $db->query("SELECT password FROM users WHERE identity='$user' AND realm='$realm'")->fetch(); 39 if (!$db->exec("UPDATE sessions SET user='$user', password='$pw', realm='$realm', machine_managed='… 44 "VALUES ('$user', '$realm', '$id', " .
|
/hostap-latest/hostapd/ |
D | hostapd.eap_user | 1 # hostapd user database for integrated EAP server 5 # double quoted ("user"). Password can alternatively be stored as 8 # that the plaintext password does not need to be included in the user file. 14 # identity can be used in the unencrypted phase 1 and the real user identity 16 # access is needed, two user entries is needed, one for phase 1 and another 25 # * can be used as a wildcard to match any user identity. The main purposes for 29 # user entry. 54 # hostapd.conf. For EAP server, this is configured separately for each user 56 # the main user entry line. 59 "user" MD5 "password" [all …]
|
/hostap-latest/src/eap_server/ |
D | eap_server_ttls.c | 534 if (!sm->user || !sm->user->password || sm->user->password_hash || in eap_ttls_process_phase2_pap() 535 !(sm->user->ttls_auth & EAP_TTLS_AUTH_PAP)) { in eap_ttls_process_phase2_pap() 542 if (sm->user->password_len != user_password_len || in eap_ttls_process_phase2_pap() 543 os_memcmp_const(sm->user->password, user_password, in eap_ttls_process_phase2_pap() 576 if (!sm->user || !sm->user->password || sm->user->password_hash || in eap_ttls_process_phase2_chap() 577 !(sm->user->ttls_auth & EAP_TTLS_AUTH_CHAP)) { in eap_ttls_process_phase2_chap() 604 chap_md5(password[0], sm->user->password, sm->user->password_len, in eap_ttls_process_phase2_chap() 637 if (!sm->user || !sm->user->password || in eap_ttls_process_phase2_mschap() 638 !(sm->user->ttls_auth & EAP_TTLS_AUTH_MSCHAP)) { in eap_ttls_process_phase2_mschap() 670 if ((sm->user->password_hash && in eap_ttls_process_phase2_mschap() [all …]
|
D | eap_server.c | 161 struct eap_user *user; in eap_user_get() local 167 eap_user_free(sm->user); in eap_user_get() 168 sm->user = NULL; in eap_user_get() 170 user = os_zalloc(sizeof(*user)); in eap_user_get() 171 if (user == NULL) in eap_user_get() 175 identity_len, phase2, user) != 0) { in eap_user_get() 176 eap_user_free(user); in eap_user_get() 180 sm->user = user; in eap_user_get() 1624 if (sm->user == NULL) in eap_sm_process_nak() 1631 (u8 *) sm->user->methods, in eap_sm_process_nak() [all …]
|
D | eap_server_mschapv2.c | 295 const u8 *username, *user; in eap_mschapv2_process_response() local 358 user = name; in eap_mschapv2_process_response() 361 if (user[i] == '\\') { in eap_mschapv2_process_response() 363 user += i + 1; in eap_mschapv2_process_response() 382 os_memcmp(username, user, username_len) != 0) { in eap_mschapv2_process_response() 387 "name", user, user_len); in eap_mschapv2_process_response() 395 if (sm->user->password_hash) { in eap_mschapv2_process_response() 399 sm->user->password, in eap_mschapv2_process_response() 405 sm->user->password, in eap_mschapv2_process_response() 406 sm->user->password_len, in eap_mschapv2_process_response() [all …]
|
D | eap_server_psk.c | 258 (sm->user->methods[i].vendor != EAP_VENDOR_IETF || in eap_psk_process_2() 259 sm->user->methods[i].method != EAP_TYPE_NONE); in eap_psk_process_2() 261 if (sm->user->methods[i].vendor == EAP_VENDOR_IETF && in eap_psk_process_2() 262 sm->user->methods[i].method == EAP_TYPE_PSK) in eap_psk_process_2() 267 sm->user->methods[i].vendor != EAP_VENDOR_IETF || in eap_psk_process_2() 268 sm->user->methods[i].method != EAP_TYPE_PSK) { in eap_psk_process_2() 276 if (sm->user->password == NULL || in eap_psk_process_2() 277 sm->user->password_len != EAP_PSK_PSK_LEN) { in eap_psk_process_2() 284 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { in eap_psk_process_2() 414 if (sm->user == NULL || sm->user->password == NULL) { in eap_psk_process()
|
D | eap_server_md5.c | 106 if (sm->user == NULL || sm->user->password == NULL || in eap_md5_process() 107 sm->user->password_hash) { in eap_md5_process() 122 if (chap_md5(id, sm->user->password, sm->user->password_len, in eap_md5_process()
|
/hostap-latest/eap_example/ |
D | eap_example_server.c | 31 struct eap_user *user) in server_get_eap_user() argument 33 os_memset(user, 0, sizeof(*user)); in server_get_eap_user() 37 user->methods[0].vendor = EAP_VENDOR_IETF; in server_get_eap_user() 38 user->methods[0].method = EAP_TYPE_PEAP; in server_get_eap_user() 49 user->methods[0].vendor = EAP_VENDOR_IETF; in server_get_eap_user() 50 user->methods[0].method = EAP_TYPE_MSCHAPV2; in server_get_eap_user() 51 user->password = (u8 *) os_strdup("password"); in server_get_eap_user() 52 user->password_len = 8; in server_get_eap_user()
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.conf.sgml | 71 identity="user@example.com" 73 client_cert="/etc/cert/user.pem" 74 private_key="/etc/cert/user.prv" 92 identity="user@example.com" 114 identity="user@example.com" 136 identity="user@example.com" 138 client_cert="/etc/cert/user.pem" 139 private_key="/etc/cert/user.prv" 164 identity="user@example.com" 167 client_cert="/etc/cert/user.pem" [all …]
|
/hostap-latest/tests/hwsim/vm/ |
D | dbus.conf | 5 <user>messagebus</user> 13 <allow user="*"/> 28 <policy user="root">
|