Home
last modified time | relevance | path

Searched refs:username (Results 1 – 25 of 42) sorted by relevance

12

/hostap-latest/src/eap_peer/
Dmschapv2.c15 const u8 * mschapv2_remove_domain(const u8 *username, size_t *len) in mschapv2_remove_domain() argument
26 if (username[i] == '\\') { in mschapv2_remove_domain()
28 return username + i + 1; in mschapv2_remove_domain()
32 return username; in mschapv2_remove_domain()
44 const u8 *username; in mschapv2_derive_response() local
51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response()
53 username, username_len); in mschapv2_derive_response()
60 username, username_len); in mschapv2_derive_response()
67 username, username_len, in mschapv2_derive_response()
71 username, username_len, nt_response, in mschapv2_derive_response()
[all …]
Dmschapv2.h17 const u8 * mschapv2_remove_domain(const u8 *username, size_t *len);
18 int mschapv2_derive_response(const u8 *username, size_t username_len,
Deap_mschapv2.c525 const u8 *username, *password, *new_password; in eap_mschapv2_change_password()
532 username = eap_get_config_identity(sm, &username_len); in eap_mschapv2_change_password()
535 if (username == NULL || password == NULL || new_password == NULL) in eap_mschapv2_change_password()
538 username = mschapv2_remove_domain(username, &username_len); in eap_mschapv2_change_password()
599 username, username_len); in eap_mschapv2_change_password()
603 username, username_len, in eap_mschapv2_change_password()
614 username, username_len, in eap_mschapv2_change_password()
Deap.h374 const u8 **username, size_t *username_len,
/hostap-latest/src/eap_server/
Deap_server_aka.c94 const char *username) in eap_aka_check_identity_reauth() argument
97 username[0] != EAP_AKA_PRIME_REAUTH_ID_PREFIX) in eap_aka_check_identity_reauth()
100 username[0] != EAP_AKA_REAUTH_ID_PREFIX) in eap_aka_check_identity_reauth()
103 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username); in eap_aka_check_identity_reauth()
105 username); in eap_aka_check_identity_reauth()
158 char *username; in eap_aka_check_identity() local
169 username = sim_get_username(identity, identity_len); in eap_aka_check_identity()
170 if (username == NULL) in eap_aka_check_identity()
173 if (eap_aka_check_identity_reauth(sm, data, username) > 0) { in eap_aka_check_identity()
174 os_free(username); in eap_aka_check_identity()
[all …]
Deap_server_sim.c117 char *username; in eap_sim_build_start() local
119 username = sim_get_username(sm->identity, sm->identity_len); in eap_sim_build_start()
120 if (username && username[0] == EAP_SIM_REAUTH_ID_PREFIX && in eap_sim_build_start()
122 username)) in eap_sim_build_start()
125 os_free(username); in eap_sim_build_start()
457 char *username; in eap_sim_process_start() local
501 username = sim_get_username(identity, identity_len); in eap_sim_process_start()
502 if (username == NULL) in eap_sim_process_start()
505 if (username[0] == EAP_SIM_REAUTH_ID_PREFIX) { in eap_sim_process_start()
507 username); in eap_sim_process_start()
[all …]
Deap_server_mschapv2.c295 const u8 *username, *user; in eap_mschapv2_process_response() local
348 username = sm->identity; in eap_mschapv2_process_response()
351 if (username[i] == '\\') { in eap_mschapv2_process_response()
353 username += i + 1; in eap_mschapv2_process_response()
373 username, username_len, challenge) == 0) { in eap_mschapv2_process_response()
375 username, username_len, in eap_mschapv2_process_response()
382 os_memcmp(username, user, username_len) != 0) { in eap_mschapv2_process_response()
385 "name", username, username_len); in eap_mschapv2_process_response()
393 username, username_len); in eap_mschapv2_process_response()
398 username, username_len, in eap_mschapv2_process_response()
[all …]
Deap_sim_db.c926 const char *username, int max_chal, in eap_sim_db_get_gsm_triplets() argument
936 if (username == NULL || username[0] != EAP_SIM_PERMANENT_PREFIX || in eap_sim_db_get_gsm_triplets()
937 username[1] == '\0' || os_strlen(username) > sizeof(entry->imsi)) { in eap_sim_db_get_gsm_triplets()
939 username); in eap_sim_db_get_gsm_triplets()
942 imsi = username + 1; in eap_sim_db_get_gsm_triplets()
1393 int eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, in eap_sim_db_get_aka_auth() argument
1403 if (username == NULL || in eap_sim_db_get_aka_auth()
1404 (username[0] != EAP_AKA_PERMANENT_PREFIX && in eap_sim_db_get_aka_auth()
1405 username[0] != EAP_AKA_PRIME_PERMANENT_PREFIX) || in eap_sim_db_get_aka_auth()
1406 username[1] == '\0' || os_strlen(username) > sizeof(entry->imsi)) { in eap_sim_db_get_aka_auth()
[all …]
Deap_sim_db.h41 const char *username, int max_chal,
85 int eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username,
90 const char *username, const u8 *auts,
Deap_server_ttls.c700 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, in eap_ttls_process_phase2_mschapv2() local
733 username = sm->identity; in eap_ttls_process_phase2_mschapv2()
736 if (username[i] == '\\') { in eap_ttls_process_phase2_mschapv2()
738 username += i + 1; in eap_ttls_process_phase2_mschapv2()
766 username, username_len); in eap_ttls_process_phase2_mschapv2()
774 username, username_len, in eap_ttls_process_phase2_mschapv2()
779 username, username_len, in eap_ttls_process_phase2_mschapv2()
791 username, username_len, challenge2) == 0) { in eap_ttls_process_phase2_mschapv2()
793 username, username_len, in eap_ttls_process_phase2_mschapv2()
807 username, username_len, nt_response, in eap_ttls_process_phase2_mschapv2()
[all …]
Deap.h301 const u8 *username, size_t username_len,
/hostap-latest/src/crypto/
Dms_funcs.c82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument
92 addr[2] = username; in challenge_hash()
172 const u8 *username, size_t username_len, in generate_nt_response() argument
179 if (challenge_hash(peer_challenge, auth_challenge, username, in generate_nt_response()
200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument
207 username, username_len, in generate_nt_response_pwhash()
230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument
263 challenge_hash(peer_challenge, auth_challenge, username, in generate_authenticator_response_pwhash()
286 const u8 *username, size_t username_len, in generate_authenticator_response() argument
294 username, username_len, nt_response, response); in generate_authenticator_response()
Dms_funcs.h13 const u8 *username, size_t username_len,
18 const u8 *username, size_t username_len,
24 const u8 *username, size_t username_len,
29 const u8 *username, size_t username_len,
37 const u8 *username, size_t username_len, u8 *challenge);
Dcrypto_module_tests.c2477 char *username = "User"; in test_ms_funcs() local
2523 (u8 *) username, os_strlen(username), in test_ms_funcs()
2540 (u8 *) username, in test_ms_funcs()
2541 os_strlen(username), in test_ms_funcs()
/hostap-latest/hs20/server/www/
Dremediation.php27 $username = $row['user']; variable
28 echo "User: " . $username . "@" . $row['realm'] . "<br>\n";
30 $user = $db->query("SELECT machine_managed,methods FROM users WHERE identity='$username'")->fetch();
37 $cert = $user['methods'] == "TLS" || strncmp($username, "cert-", 5) == 0;
/hostap-latest/wpadebug/src/w1/fi/wpadebug/
DWpaCredActivity.java34 String username; field in Credential
47 username = fields[2]; in Credential()
49 username = ""; in Credential()
64 username = _username; in Credential()
74 String res = id + " - " + username + "@" + realm; in toString()
133 String username = data.getStringExtra("username"); in onActivityResult()
171 if (!set_cred_quoted(id, "username", username) || in onActivityResult()
183 mListAdapter.add(new Credential(id, username, realm, domain, imsi)); in onActivityResult()
/hostap-latest/src/utils/
Dhttp-utils.h40 const char *ca_fname, const char *username,
55 const char *username, const char *password,
Dhttp_curl.c1328 const char *ca_fname, const char *username, in setup_curl_post() argument
1340 "username=%s%s", address, ca_fname, username, extra); in setup_curl_post()
1380 if (username) { in setup_curl_post()
1382 curl_easy_setopt(curl, CURLOPT_USERNAME, username); in setup_curl_post()
1391 const char *ca_fname, const char *username, in post_init_client() argument
1400 clone_str(&ctx->svc_username, username); in post_init_client()
1416 ctx->curl = setup_curl_post(ctx, ctx->svc_address, ca_fname, username, in post_init_client()
1426 const char *ca_fname, const char *username, in soap_init_client() argument
1430 if (post_init_client(ctx, address, ca_fname, username, password, in soap_init_client()
1448 char *username = NULL; in soap_reinit_client() local
[all …]
/hostap-latest/src/radius/
Dradius_server.c76 char *username; /* from User-Name attribute */ member
315 sess->username, buf); in srv_log()
395 os_free(sess->username); in radius_server_session_free()
529 pos = os_strstr(sess->username, "@test-"); in radius_server_testing_options()
586 char *username; in radius_server_get_new_session() local
588 username = os_zalloc(user_len + 1); in radius_server_get_new_session()
589 if (username) { in radius_server_get_new_session()
590 os_memcpy(username, user, user_len); in radius_server_get_new_session()
591 if (radius_server_erp_find_key(data, username)) in radius_server_get_new_session()
593 os_free(username); in radius_server_get_new_session()
[all …]
/hostap-latest/wpa_supplicant/
Dinterworking.c705 if (cred->username == NULL || in nai_realm_find_eap()
706 cred->username[0] == '\0' || in nai_realm_find_eap()
714 cred->username ? cred->username : "NULL", in nai_realm_find_eap()
1494 if (ttls && cred->username && cred->username[0]) { in interworking_set_eap_params()
1498 pos = os_strchr(cred->username, '@'); in interworking_set_eap_params()
1524 if (!ttls && cred->username && cred->username[0] && cred->realm && in interworking_set_eap_params()
1525 !os_strchr(cred->username, '@')) { in interworking_set_eap_params()
1530 buflen = os_strlen(cred->username) + 1 + in interworking_set_eap_params()
1536 os_snprintf(id, buflen, "%s@%s", cred->username, cred->realm); in interworking_set_eap_params()
1541 } else if (cred->username && cred->username[0] && in interworking_set_eap_params()
[all …]
DREADME-HS20126 # username: Username for Interworking network selection
330 # username="user@example.com"
344 # username="user"
373 Add a username/password credential:
379 > set_cred 0 username "username"
676 anonymous_identity: Credential/UsernamePassword/Username with username part
/hostap-latest/src/eapol_supp/
Deapol_supp_sm.h372 const u8 **username, size_t *username_len,
503 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info() argument
/hostap-latest/hostapd/
Dhostapd.eap_user_sqlite25 username TEXT,
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_cli.sgml45 authentication information, like username and password, if these
60 messages (event messages, username/password requests).</para>
71 username and password, which are not present in the configuration
/hostap-latest/hs20/server/
Dsql.txt76 username TEXT,

12