Home
last modified time | relevance | path

Searched refs:user (Results 1 – 25 of 112) sorted by relevance

12345

/hostap-latest/src/ap/
Deap_user_db.c23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) in set_user_methods() argument
32 os_memset(&user->methods, 0, sizeof(user->methods)); in set_user_methods()
39 user->methods[num_methods].method = in set_user_methods()
41 &user->methods[num_methods].vendor); in set_user_methods()
42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF && in set_user_methods()
43 user->methods[num_methods].method == EAP_TYPE_NONE) { in set_user_methods()
45 user->ttls_auth |= EAP_TTLS_AUTH_PAP; in set_user_methods()
49 user->ttls_auth |= EAP_TTLS_AUTH_CHAP; in set_user_methods()
53 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAP; in set_user_methods()
57 user->ttls_auth |= EAP_TTLS_AUTH_MSCHAPV2; in set_user_methods()
[all …]
Dauthsrv.c55 struct eap_user *user) in hostapd_radius_get_eap_user() argument
65 if (user == NULL) in hostapd_radius_get_eap_user()
68 os_memset(user, 0, sizeof(*user)); in hostapd_radius_get_eap_user()
70 user->methods[i].vendor = eap_user->methods[i].vendor; in hostapd_radius_get_eap_user()
71 user->methods[i].method = eap_user->methods[i].method; in hostapd_radius_get_eap_user()
75 user->password = os_memdup(eap_user->password, in hostapd_radius_get_eap_user()
77 if (user->password == NULL) in hostapd_radius_get_eap_user()
79 user->password_len = eap_user->password_len; in hostapd_radius_get_eap_user()
80 user->password_hash = eap_user->password_hash; in hostapd_radius_get_eap_user()
82 user->salt = os_memdup(eap_user->salt, in hostapd_radius_get_eap_user()
[all …]
/hostap-latest/hs20/server/
Dspp_server.c49 static char * db_get_session_val(struct hs20_svc *ctx, const char *user,
54 static xml_node_t * build_policy(struct hs20_svc *ctx, const char *user,
58 const char *user,
64 const char *user, const char *realm, in db_add_session() argument
83 sessionid, user ? user : "", realm ? realm : "", in db_add_session()
100 static void db_update_session_password(struct hs20_svc *ctx, const char *user, in db_update_session_password() argument
108 pw, sessionid, user, realm); in db_update_session_password()
121 const char *user, in db_update_session_machine_managed() argument
129 pw_mm ? "1" : "0", sessionid, user, realm); in db_update_session_machine_managed()
142 static void db_add_session_pps(struct hs20_svc *ctx, const char *user, in db_add_session_pps() argument
[all …]
Dhs20-osu-server.txt41 assumes /home/user/hs20-server to be used, but this can be changed by
44 sudo mkdir -p /home/user/hs20-server
45 sudo chown $USER /home/user/hs20-server
46 mkdir -p /home/user/hs20-server/spp
47 mkdir -p /home/user/hs20-server/AS
75 cp hostapd hlr_auc_gw /home/user/hs20-server/AS
81 cp hs20_spp_server /home/user/hs20-server/spp
82 # prepare database (web server user/group needs to have write access)
83 mkdir -p /home/user/hs20-server/AS/DB
84 sudo chgrp www-data /home/user/hs20-server/AS/DB
[all …]
Dhs20_spp_server.c69 char *user, *realm, *post, *str; in process() local
79 user = getenv("HS20USER"); in process()
80 if (user && strlen(user) == 0) in process()
81 user = NULL; in process()
119 resp = hs20_spp_server_process(ctx, spp, user, realm, dmacc); in process()
121 if (resp == NULL && user == NULL) { in process()
/hostap-latest/tests/hwsim/auth_serv/
Dica-generate.sh28 mkdir -p iCA-user/certs iCA-user/crl iCA-user/newcerts iCA-user/private
29 touch iCA-user/index.txt
30 …l.cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout iCA-user/private/cakey.pem -out iCA-user/car…
31 …ial -out iCA-user/cacert.pem -days 3652 -batch -keyfile ca-key.pem -cert ca.pem -extensions v3_ca …
32 cat iCA-user/cacert.pem ca.pem > iCA-user/ca-and-root.pem
73 …ssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout iCA-user/user.key -out iCA-user/user.req -…
74 …tmp -batch -keyfile iCA-user/private/cakey.pem -cert iCA-user/cacert.pem -create_serial -in iCA-us…
75 cat iCA-user/user.pem iCA-user/cacert.pem > iCA-user/user_and_ica.pem
83 $OPENSSL verify -CAfile ca.pem iCA-user/cacert.pem
86 $OPENSSL verify -CAfile ca.pem iCA-user/cacert.pem
[all …]
Dec2-generate.sh43 $OPENSSL ecparam -out ec2-user.key -name $CURVE -genkey
44 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-user.key -out ec2-user.req -…
45 …atch -keyfile ec2-ca.key -cert ec2-ca.pem -create_serial -in ec2-user.req -out ec2-user.pem -exten…
56 $OPENSSL ecparam -out ec2-user-p256.key -name prime256v1 -genkey
57 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-user-p256.key -out ec2-user-…
58 …ch -keyfile ec2-ca.key -cert ec2-ca.pem -create_serial -in ec2-user-p256.req -out ec2-user-p256.pe…
66 $OPENSSL verify -CAfile ec2-ca.pem ec2-user.pem
67 $OPENSSL verify -CAfile ec2-ca.pem ec2-user-p256.pem
Drsa3072-generate.sh56 if [ ! -r rsa3072-user.req ]; then
57 …sl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout rsa3072-user.key -out rsa3072-user.req -out…
59 …rsa3072-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-user.req -out rsa3072-user.pem -ext…
71 if [ ! -r rsa3072-user-rsa2048.req ]; then
72 …nf.tmp -batch -new -newkey rsa:2048 -nodes -keyout rsa3072-user-rsa2048.key -out rsa3072-user-rsa2…
74 …072-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-user-rsa2048.req -out rsa3072-user-rsa2…
82 $OPENSSL verify -CAfile rsa3072-ca.pem rsa3072-user.pem
83 $OPENSSL verify -CAfile rsa3072-ca.pem rsa3072-user-rsa2048.pem
Dupdate.sh62 …t server-extra.pkcs12 -in server.pem -inkey server.key -descert -certfile user.pem -passout pass:w…
129 if [ ! -r user.csr ]; then
130 …config openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout user.key -out user.csr -outform…
131 $OPENSSL rsa -in user.key -out user.rsa-key
132 …$OPENSSL pkcs8 -topk8 -in user.key -out user.key.pkcs8 -inform PEM -v2 des-ede3-cbc -v2prf hmacWit…
133 …$OPENSSL pkcs8 -topk8 -in user.key -out user.key.pkcs8.pkcs5v15 -inform PEM -v1 pbeWithMD5AndDES-C…
136 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -in user.csr -out user.pem -extensions ext_client
139 $OPENSSL pkcs12 -export -out user.pkcs12 -in user.pem -inkey user.key -descert -passout pass:whatev…
140 $OPENSSL pkcs12 -export -out user2.pkcs12 -in user.pem -inkey user.key -descert -name Test -certfil…
141 $OPENSSL pkcs12 -export -out user3.pkcs12 -in user.pem -inkey user.key -descert -name "my certifica…
Dsha512-generate.sh52 …nssl.cnf.tmp -batch -new -newkey rsa:3400 -nodes -keyout sha512-user.key -out sha512-user.req -out…
53 …ile sha512-ca.key -cert sha512-ca.pem -create_serial -in sha512-user.req -out sha512-user.pem -ext…
64 …nssl.cnf.tmp -batch -new -newkey rsa:2900 -nodes -keyout sha384-user.key -out sha384-user.req -out…
65 …ile sha512-ca.key -cert sha512-ca.pem -create_serial -in sha384-user.req -out sha384-user.pem -ext…
74 $OPENSSL verify -CAfile sha512-ca.pem sha512-user.pem
75 $OPENSSL verify -CAfile sha512-ca.pem sha384-user.pem
Dec-generate.sh43 $OPENSSL ecparam -out ec-user.key -name $CURVE -genkey
44 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec-user.key -out ec-user.req -ou…
45 …p -batch -keyfile ec-ca.key -cert ec-ca.pem -create_serial -in ec-user.req -out ec-user.pem -exten…
53 $OPENSSL verify -CAfile ec-ca.pem ec-user.pem
/hostap-latest/hs20/server/www/
Dest.php10 unset($user);
34 $user = $data['username']; variable
35 if (strlen($user) < 1) {
41 "WHERE user='$user' AND realm='$realm'";
44 error_log("EST: Session not found for user=$user realm=$realm");
49 error_log("EST: Session fetch failed for user=$user realm=$realm");
56 error_log("EST: Unexpected operation $oper for user=$user realm=$realm");
61 error_log("EST: Empty password for user=$user realm=$realm");
65 $A1 = md5($user . ':' . $realm . ':' . $pw);
70 error_log("EST: Incorrect authentication response for user=$user realm=$realm");
[all …]
Dspp.php28 unset($user);
46 $user = $data['username']; variable
47 if (strlen($user) < 1) {
59 "WHERE identity='$user' AND realm='$realm'")->fetch();
62 "WHERE osu_user='$user' AND realm='$realm'")->fetch();
67 error_log("spp.php - Authentication failed - user '$user' not found");
75 $A1 = md5($user . ':' . $realm . ':' . $pw);
86 $user = "cert-" . $_SERVER["SSL_CLIENT_M_SERIAL"]; variable
132 if (isset($user) && strlen($user) > 0)
133 putenv("HS20USER=$user");
Dadd-mo.php15 $user = $_POST["user"]; variable
17 if (strlen($id) < 32 || !isset($user) || !isset($pw)) {
21 if (strlen($user) < 1 || strncasecmp($user, "cert-", 5) == 0) {
34 $userrow = $db->query("SELECT identity FROM users WHERE identity='$user' AND realm='$realm'")->fetc…
45 if (!$db->exec("UPDATE sessions SET user='$user', password='$pw', realm='$realm', type='password' W…
50 "VALUES ('$user', '$realm', '$id', " .
Dremediation.php30 $user = $db->query("SELECT machine_managed,methods FROM users WHERE identity='$username'")->fetch(); variable
31 if ($user == false) {
37 $cert = $user['methods'] == "TLS" || strncmp($username, "cert-", 5) == 0;
41 } else if ($user['machine_managed'] == "1") {
Dadd-free.php31 $user = $row['value']; variable
33 $row = $db->query("SELECT password FROM users WHERE identity='$user' AND realm='$realm'")->fetch();
39 if (!$db->exec("UPDATE sessions SET user='$user', password='$pw', realm='$realm', machine_managed='…
44 "VALUES ('$user', '$realm', '$id', " .
/hostap-latest/hostapd/
Dhostapd.eap_user1 # hostapd user database for integrated EAP server
5 # double quoted ("user"). Password can alternatively be stored as
8 # that the plaintext password does not need to be included in the user file.
14 # identity can be used in the unencrypted phase 1 and the real user identity
16 # access is needed, two user entries is needed, one for phase 1 and another
25 # * can be used as a wildcard to match any user identity. The main purposes for
29 # user entry.
54 # hostapd.conf. For EAP server, this is configured separately for each user
56 # the main user entry line.
59 "user" MD5 "password"
[all …]
/hostap-latest/src/eap_server/
Deap_server_ttls.c534 if (!sm->user || !sm->user->password || sm->user->password_hash || in eap_ttls_process_phase2_pap()
535 !(sm->user->ttls_auth & EAP_TTLS_AUTH_PAP)) { in eap_ttls_process_phase2_pap()
542 if (sm->user->password_len != user_password_len || in eap_ttls_process_phase2_pap()
543 os_memcmp_const(sm->user->password, user_password, in eap_ttls_process_phase2_pap()
576 if (!sm->user || !sm->user->password || sm->user->password_hash || in eap_ttls_process_phase2_chap()
577 !(sm->user->ttls_auth & EAP_TTLS_AUTH_CHAP)) { in eap_ttls_process_phase2_chap()
604 chap_md5(password[0], sm->user->password, sm->user->password_len, in eap_ttls_process_phase2_chap()
637 if (!sm->user || !sm->user->password || in eap_ttls_process_phase2_mschap()
638 !(sm->user->ttls_auth & EAP_TTLS_AUTH_MSCHAP)) { in eap_ttls_process_phase2_mschap()
670 if ((sm->user->password_hash && in eap_ttls_process_phase2_mschap()
[all …]
Deap_server.c161 struct eap_user *user; in eap_user_get() local
167 eap_user_free(sm->user); in eap_user_get()
168 sm->user = NULL; in eap_user_get()
170 user = os_zalloc(sizeof(*user)); in eap_user_get()
171 if (user == NULL) in eap_user_get()
175 identity_len, phase2, user) != 0) { in eap_user_get()
176 eap_user_free(user); in eap_user_get()
180 sm->user = user; in eap_user_get()
1624 if (sm->user == NULL) in eap_sm_process_nak()
1631 (u8 *) sm->user->methods, in eap_sm_process_nak()
[all …]
Deap_server_mschapv2.c295 const u8 *username, *user; in eap_mschapv2_process_response() local
358 user = name; in eap_mschapv2_process_response()
361 if (user[i] == '\\') { in eap_mschapv2_process_response()
363 user += i + 1; in eap_mschapv2_process_response()
382 os_memcmp(username, user, username_len) != 0) { in eap_mschapv2_process_response()
387 "name", user, user_len); in eap_mschapv2_process_response()
395 if (sm->user->password_hash) { in eap_mschapv2_process_response()
399 sm->user->password, in eap_mschapv2_process_response()
405 sm->user->password, in eap_mschapv2_process_response()
406 sm->user->password_len, in eap_mschapv2_process_response()
[all …]
Deap_server_psk.c258 (sm->user->methods[i].vendor != EAP_VENDOR_IETF || in eap_psk_process_2()
259 sm->user->methods[i].method != EAP_TYPE_NONE); in eap_psk_process_2()
261 if (sm->user->methods[i].vendor == EAP_VENDOR_IETF && in eap_psk_process_2()
262 sm->user->methods[i].method == EAP_TYPE_PSK) in eap_psk_process_2()
267 sm->user->methods[i].vendor != EAP_VENDOR_IETF || in eap_psk_process_2()
268 sm->user->methods[i].method != EAP_TYPE_PSK) { in eap_psk_process_2()
276 if (sm->user->password == NULL || in eap_psk_process_2()
277 sm->user->password_len != EAP_PSK_PSK_LEN) { in eap_psk_process_2()
284 if (eap_psk_key_setup(sm->user->password, data->ak, data->kdk)) { in eap_psk_process_2()
414 if (sm->user == NULL || sm->user->password == NULL) { in eap_psk_process()
Deap_server_md5.c106 if (sm->user == NULL || sm->user->password == NULL || in eap_md5_process()
107 sm->user->password_hash) { in eap_md5_process()
122 if (chap_md5(id, sm->user->password, sm->user->password_len, in eap_md5_process()
/hostap-latest/eap_example/
Deap_example_server.c31 struct eap_user *user) in server_get_eap_user() argument
33 os_memset(user, 0, sizeof(*user)); in server_get_eap_user()
37 user->methods[0].vendor = EAP_VENDOR_IETF; in server_get_eap_user()
38 user->methods[0].method = EAP_TYPE_PEAP; in server_get_eap_user()
49 user->methods[0].vendor = EAP_VENDOR_IETF; in server_get_eap_user()
50 user->methods[0].method = EAP_TYPE_MSCHAPV2; in server_get_eap_user()
51 user->password = (u8 *) os_strdup("password"); in server_get_eap_user()
52 user->password_len = 8; in server_get_eap_user()
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_supplicant.conf.sgml71 identity="user@example.com"
73 client_cert="/etc/cert/user.pem"
74 private_key="/etc/cert/user.prv"
92 identity="user@example.com"
114 identity="user@example.com"
136 identity="user@example.com"
138 client_cert="/etc/cert/user.pem"
139 private_key="/etc/cert/user.prv"
164 identity="user@example.com"
167 client_cert="/etc/cert/user.pem"
[all …]
/hostap-latest/tests/hwsim/vm/
Ddbus.conf5 <user>messagebus</user>
13 <allow user="*"/>
28 <policy user="root">

12345