/hostap-latest/src/eap_peer/ |
D | mschapv2.c | 15 const u8 * mschapv2_remove_domain(const u8 *username, size_t *len) in mschapv2_remove_domain() argument 26 if (username[i] == '\\') { in mschapv2_remove_domain() 28 return username + i + 1; in mschapv2_remove_domain() 32 return username; in mschapv2_remove_domain() 44 const u8 *username; in mschapv2_derive_response() local 51 username = mschapv2_remove_domain(identity, &username_len); in mschapv2_derive_response() 53 username, username_len); in mschapv2_derive_response() 60 username, username_len); in mschapv2_derive_response() 67 username, username_len, in mschapv2_derive_response() 71 username, username_len, nt_response, in mschapv2_derive_response() [all …]
|
D | mschapv2.h | 17 const u8 * mschapv2_remove_domain(const u8 *username, size_t *len); 18 int mschapv2_derive_response(const u8 *username, size_t username_len,
|
D | eap_mschapv2.c | 525 const u8 *username, *password, *new_password; in eap_mschapv2_change_password() 532 username = eap_get_config_identity(sm, &username_len); in eap_mschapv2_change_password() 535 if (username == NULL || password == NULL || new_password == NULL) in eap_mschapv2_change_password() 538 username = mschapv2_remove_domain(username, &username_len); in eap_mschapv2_change_password() 599 username, username_len); in eap_mschapv2_change_password() 603 username, username_len, in eap_mschapv2_change_password() 614 username, username_len, in eap_mschapv2_change_password()
|
D | eap.h | 374 const u8 **username, size_t *username_len,
|
/hostap-latest/src/eap_server/ |
D | eap_server_aka.c | 94 const char *username) in eap_aka_check_identity_reauth() argument 97 username[0] != EAP_AKA_PRIME_REAUTH_ID_PREFIX) in eap_aka_check_identity_reauth() 100 username[0] != EAP_AKA_REAUTH_ID_PREFIX) in eap_aka_check_identity_reauth() 103 wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username); in eap_aka_check_identity_reauth() 105 username); in eap_aka_check_identity_reauth() 158 char *username; in eap_aka_check_identity() local 169 username = sim_get_username(identity, identity_len); in eap_aka_check_identity() 170 if (username == NULL) in eap_aka_check_identity() 173 if (eap_aka_check_identity_reauth(sm, data, username) > 0) { in eap_aka_check_identity() 174 os_free(username); in eap_aka_check_identity() [all …]
|
D | eap_server_sim.c | 117 char *username; in eap_sim_build_start() local 119 username = sim_get_username(sm->identity, sm->identity_len); in eap_sim_build_start() 120 if (username && username[0] == EAP_SIM_REAUTH_ID_PREFIX && in eap_sim_build_start() 122 username)) in eap_sim_build_start() 125 os_free(username); in eap_sim_build_start() 457 char *username; in eap_sim_process_start() local 501 username = sim_get_username(identity, identity_len); in eap_sim_process_start() 502 if (username == NULL) in eap_sim_process_start() 505 if (username[0] == EAP_SIM_REAUTH_ID_PREFIX) { in eap_sim_process_start() 507 username); in eap_sim_process_start() [all …]
|
D | eap_server_mschapv2.c | 295 const u8 *username, *user; in eap_mschapv2_process_response() local 348 username = sm->identity; in eap_mschapv2_process_response() 351 if (username[i] == '\\') { in eap_mschapv2_process_response() 353 username += i + 1; in eap_mschapv2_process_response() 373 username, username_len, challenge) == 0) { in eap_mschapv2_process_response() 375 username, username_len, in eap_mschapv2_process_response() 382 os_memcmp(username, user, username_len) != 0) { in eap_mschapv2_process_response() 385 "name", username, username_len); in eap_mschapv2_process_response() 393 username, username_len); in eap_mschapv2_process_response() 398 username, username_len, in eap_mschapv2_process_response() [all …]
|
D | eap_sim_db.c | 926 const char *username, int max_chal, in eap_sim_db_get_gsm_triplets() argument 936 if (username == NULL || username[0] != EAP_SIM_PERMANENT_PREFIX || in eap_sim_db_get_gsm_triplets() 937 username[1] == '\0' || os_strlen(username) > sizeof(entry->imsi)) { in eap_sim_db_get_gsm_triplets() 939 username); in eap_sim_db_get_gsm_triplets() 942 imsi = username + 1; in eap_sim_db_get_gsm_triplets() 1393 int eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, in eap_sim_db_get_aka_auth() argument 1403 if (username == NULL || in eap_sim_db_get_aka_auth() 1404 (username[0] != EAP_AKA_PERMANENT_PREFIX && in eap_sim_db_get_aka_auth() 1405 username[0] != EAP_AKA_PRIME_PERMANENT_PREFIX) || in eap_sim_db_get_aka_auth() 1406 username[1] == '\0' || os_strlen(username) > sizeof(entry->imsi)) { in eap_sim_db_get_aka_auth() [all …]
|
D | eap_sim_db.h | 41 const char *username, int max_chal, 85 int eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, 90 const char *username, const u8 *auts,
|
D | eap_server_ttls.c | 700 u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge, in eap_ttls_process_phase2_mschapv2() local 733 username = sm->identity; in eap_ttls_process_phase2_mschapv2() 736 if (username[i] == '\\') { in eap_ttls_process_phase2_mschapv2() 738 username += i + 1; in eap_ttls_process_phase2_mschapv2() 766 username, username_len); in eap_ttls_process_phase2_mschapv2() 774 username, username_len, in eap_ttls_process_phase2_mschapv2() 779 username, username_len, in eap_ttls_process_phase2_mschapv2() 791 username, username_len, challenge2) == 0) { in eap_ttls_process_phase2_mschapv2() 793 username, username_len, in eap_ttls_process_phase2_mschapv2() 807 username, username_len, nt_response, in eap_ttls_process_phase2_mschapv2() [all …]
|
D | eap.h | 301 const u8 *username, size_t username_len,
|
/hostap-latest/src/crypto/ |
D | ms_funcs.c | 82 const u8 *username, size_t username_len, u8 *challenge) in challenge_hash() argument 92 addr[2] = username; in challenge_hash() 172 const u8 *username, size_t username_len, in generate_nt_response() argument 179 if (challenge_hash(peer_challenge, auth_challenge, username, in generate_nt_response() 200 const u8 *username, size_t username_len, in generate_nt_response_pwhash() argument 207 username, username_len, in generate_nt_response_pwhash() 230 const u8 *username, size_t username_len, in generate_authenticator_response_pwhash() argument 263 challenge_hash(peer_challenge, auth_challenge, username, in generate_authenticator_response_pwhash() 286 const u8 *username, size_t username_len, in generate_authenticator_response() argument 294 username, username_len, nt_response, response); in generate_authenticator_response()
|
D | ms_funcs.h | 13 const u8 *username, size_t username_len, 18 const u8 *username, size_t username_len, 24 const u8 *username, size_t username_len, 29 const u8 *username, size_t username_len, 37 const u8 *username, size_t username_len, u8 *challenge);
|
D | crypto_module_tests.c | 2477 char *username = "User"; in test_ms_funcs() local 2523 (u8 *) username, os_strlen(username), in test_ms_funcs() 2540 (u8 *) username, in test_ms_funcs() 2541 os_strlen(username), in test_ms_funcs()
|
/hostap-latest/hs20/server/www/ |
D | remediation.php | 27 $username = $row['user']; variable 28 echo "User: " . $username . "@" . $row['realm'] . "<br>\n"; 30 $user = $db->query("SELECT machine_managed,methods FROM users WHERE identity='$username'")->fetch(); 37 $cert = $user['methods'] == "TLS" || strncmp($username, "cert-", 5) == 0;
|
/hostap-latest/wpadebug/src/w1/fi/wpadebug/ |
D | WpaCredActivity.java | 34 String username; field in Credential 47 username = fields[2]; in Credential() 49 username = ""; in Credential() 64 username = _username; in Credential() 74 String res = id + " - " + username + "@" + realm; in toString() 133 String username = data.getStringExtra("username"); in onActivityResult() 171 if (!set_cred_quoted(id, "username", username) || in onActivityResult() 183 mListAdapter.add(new Credential(id, username, realm, domain, imsi)); in onActivityResult()
|
/hostap-latest/src/utils/ |
D | http-utils.h | 40 const char *ca_fname, const char *username, 55 const char *username, const char *password,
|
D | http_curl.c | 1328 const char *ca_fname, const char *username, in setup_curl_post() argument 1340 "username=%s%s", address, ca_fname, username, extra); in setup_curl_post() 1380 if (username) { in setup_curl_post() 1382 curl_easy_setopt(curl, CURLOPT_USERNAME, username); in setup_curl_post() 1391 const char *ca_fname, const char *username, in post_init_client() argument 1400 clone_str(&ctx->svc_username, username); in post_init_client() 1416 ctx->curl = setup_curl_post(ctx, ctx->svc_address, ca_fname, username, in post_init_client() 1426 const char *ca_fname, const char *username, in soap_init_client() argument 1430 if (post_init_client(ctx, address, ca_fname, username, password, in soap_init_client() 1448 char *username = NULL; in soap_reinit_client() local [all …]
|
/hostap-latest/src/radius/ |
D | radius_server.c | 76 char *username; /* from User-Name attribute */ member 315 sess->username, buf); in srv_log() 395 os_free(sess->username); in radius_server_session_free() 529 pos = os_strstr(sess->username, "@test-"); in radius_server_testing_options() 586 char *username; in radius_server_get_new_session() local 588 username = os_zalloc(user_len + 1); in radius_server_get_new_session() 589 if (username) { in radius_server_get_new_session() 590 os_memcpy(username, user, user_len); in radius_server_get_new_session() 591 if (radius_server_erp_find_key(data, username)) in radius_server_get_new_session() 593 os_free(username); in radius_server_get_new_session() [all …]
|
/hostap-latest/wpa_supplicant/ |
D | interworking.c | 705 if (cred->username == NULL || in nai_realm_find_eap() 706 cred->username[0] == '\0' || in nai_realm_find_eap() 714 cred->username ? cred->username : "NULL", in nai_realm_find_eap() 1494 if (ttls && cred->username && cred->username[0]) { in interworking_set_eap_params() 1498 pos = os_strchr(cred->username, '@'); in interworking_set_eap_params() 1524 if (!ttls && cred->username && cred->username[0] && cred->realm && in interworking_set_eap_params() 1525 !os_strchr(cred->username, '@')) { in interworking_set_eap_params() 1530 buflen = os_strlen(cred->username) + 1 + in interworking_set_eap_params() 1536 os_snprintf(id, buflen, "%s@%s", cred->username, cred->realm); in interworking_set_eap_params() 1541 } else if (cred->username && cred->username[0] && in interworking_set_eap_params() [all …]
|
D | README-HS20 | 126 # username: Username for Interworking network selection 330 # username="user@example.com" 344 # username="user" 373 Add a username/password credential: 379 > set_cred 0 username "username" 676 anonymous_identity: Credential/UsernamePassword/Username with username part
|
/hostap-latest/src/eapol_supp/ |
D | eapol_supp_sm.h | 372 const u8 **username, size_t *username_len, 503 const u8 **username, size_t *username_len, in eapol_sm_get_erp_info() argument
|
/hostap-latest/hostapd/ |
D | hostapd.eap_user_sqlite | 25 username TEXT,
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_cli.sgml | 45 authentication information, like username and password, if these 60 messages (event messages, username/password requests).</para> 71 username and password, which are not present in the configuration
|
/hostap-latest/hs20/server/ |
D | sql.txt | 76 username TEXT,
|