Searched defs:user (Results 1 - 25 of 439) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/hostapd/
H A Dconfig_file.c219 struct hostapd_eap_user *user = NULL, *tail = NULL; local
232 wpa_printf(MSG_ERROR, "EAP user file '%s' not found.", fname);
236 /* Lines: "user" METHOD,METHOD2 "password" (password optional) */
254 if (user && os_strncmp(buf, "radius_accept_attr=", 19) == 0) {
260 user = NULL; /* already in the BSS list */
263 if (user->accept_attr == NULL) {
264 user->accept_attr = attr;
266 a = user->accept_attr;
275 user = NULL;
283 user
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dap_config.c156 conf->fragm_threshold = -1; /* user driver default: 2346 */
378 void hostapd_config_free_eap_user(struct hostapd_eap_user *user) argument
380 hostapd_config_free_radius_attr(user->accept_attr);
381 os_free(user->identity);
382 bin_clear_free(user->password, user->password_len);
383 os_free(user);
400 struct hostapd_eap_user *user, *prev_user; local
419 user = conf->eap_user;
420 while (user) {
[all...]
H A Dauthsrv.c54 struct eap_user *user)
63 if (user == NULL)
66 os_memset(user, 0, sizeof(*user));
68 user->methods[i].vendor = eap_user->methods[i].vendor;
69 user->methods[i].method = eap_user->methods[i].method;
73 user->password = os_malloc(eap_user->password_len);
74 if (user->password == NULL)
76 os_memcpy(user->password, eap_user->password,
78 user
52 hostapd_radius_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
[all...]
H A Deap_user_db.c2 * hostapd / EAP user database
23 static void set_user_methods(struct hostapd_eap_user *user, const char *methods) argument
32 os_memset(&user->methods, 0, sizeof(user->methods));
39 user->methods[num_methods].method =
41 &user->methods[num_methods].vendor);
42 if (user->methods[num_methods].vendor == EAP_VENDOR_IETF &&
43 user->methods[num_methods].method == EAP_TYPE_NONE) {
45 user->ttls_auth |= EAP_TTLS_AUTH_PAP;
49 user
81 struct hostapd_eap_user *user = ctx; local
103 struct hostapd_eap_user *user = ctx; local
137 struct hostapd_eap_user *user = NULL; local
220 struct hostapd_eap_user *user = conf->eap_user; local
[all...]
H A Dieee802_1x.c1862 struct eap_user *user)
1872 os_memset(user, 0, sizeof(*user));
1873 user->phase2 = phase2;
1875 user->methods[i].vendor = eap_user->methods[i].vendor;
1876 user->methods[i].method = eap_user->methods[i].method;
1880 user->password = os_malloc(eap_user->password_len);
1881 if (user->password == NULL)
1883 os_memcpy(user->password, eap_user->password,
1885 user
1860 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_i.h150 struct eap_user *user; member in struct:eap_sm
H A Deap_server.c27 static void eap_user_free(struct eap_user *user);
81 * eap_user_get - Fetch user information from the database
83 * @identity: Identity (User-Name) of the user
85 * @phase2: 0 = EAP phase1 user, 1 = EAP phase2 (tunneled) user
88 * This function is used to fetch user information for EAP. The user will be
89 * selected based on the specified identity. sm->user and
90 * sm->user_eap_method_index are updated for the new user when a matching user
96 struct eap_user *user; local
1259 eap_user_free(struct eap_user *user) argument
[all...]
H A Deap_server_mschapv2.c290 const u8 *username, *user; local
353 user = name;
356 if (user[i] == '\\') {
358 user += i + 1;
364 os_memcmp(username, user, username_len) != 0) {
365 wpa_printf(MSG_DEBUG, "EAP-MSCHAPV2: Mismatch in user names");
366 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Expected user "
368 wpa_hexdump_ascii(MSG_DEBUG, "EAP-MSCHAPV2: Received user "
369 "name", user, user_len);
377 if (sm->user
[all...]
/external/wpa_supplicant_8/hostapd/src/eapol_auth/
H A Deapol_auth_sm.c1002 struct eap_user *user)
1008 identity_len, phase2, user);
1009 if (user->remediation)
1000 eapol_sm_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
/external/wpa_supplicant_8/hostapd/src/l2_packet/
H A Dl2_packet_pcap.c146 static void l2_packet_receive_cb(u_char *user, const struct pcap_pkthdr *hdr, argument
149 struct l2_packet_data *l2 = (struct l2_packet_data *) user;
H A Dl2_packet_winpcap.c102 static void l2_packet_receive_cb(u_char *user, const struct pcap_pkthdr *hdr, argument
105 struct l2_packet_data *l2 = (struct l2_packet_data *) user;
/external/wpa_supplicant_8/hostapd/src/pae/
H A Dieee802_1x_kay_i.h82 int user; /* FIXME: to indicate if it can be delete safely */ member in struct:data_key
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius_server.c191 * This A-ID-Info contains a user-friendly name for the A-ID. For
281 * get_eap_user - Callback for fetching EAP user information
286 * @user: Data structure for filling in the user information
289 * This is used to fetch information from user database. The callback
290 * will fill in information about allowed EAP methods and the user
295 int phase2, struct eap_user *user);
608 u8 *user; local
617 if (radius_msg_get_attr_ptr(msg, RADIUS_ATTR_USER_NAME, &user,
622 RADIUS_DUMP_ASCII("User-Name", user, user_le
1985 radius_server_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
[all...]
/external/wpa_supplicant_8/hs20/client/
H A Dest.c405 os_snprintf(name, sizeof(name), "cert-user-%u", val);
616 const char *user, const char *pw)
664 ctx->ca_fname, user, pw, client_cert, client_key,
615 est_simple_enroll(struct hs20_osu_client *ctx, const char *url, const char *user, const char *pw) argument
H A Dosu_client.c106 char *url, *user = NULL, *pw = NULL; local
143 user = xml_node_get_text(ctx->xml, node);
144 if (user == NULL) {
148 wpa_printf(MSG_INFO, "estUserID: %s", user);
149 write_summary(ctx, "estUserID: %s", user);
169 est_simple_enroll(ctx, url, user, pw) < 0)
175 xml_node_get_text_free(ctx->xml, user);
693 const char *alt_loc, char **user, char **pw)
700 *user = xml_node_get_text(ctx->xml, node);
712 xml_node_get_text_free(ctx->xml, *user);
692 get_user_pw(struct hs20_osu_client *ctx, xml_node_t *pps, const char *alt_loc, char **user, char **pw) argument
[all...]
/external/wpa_supplicant_8/hs20/server/
H A Dhs20_spp_server.c68 char *user, *realm, *post, *str; local
74 user = getenv("HS20USER");
75 if (user && strlen(user) == 0)
76 user = NULL;
102 resp = hs20_spp_server_process(ctx, spp, user, realm, dmacc);
104 if (resp == NULL && user == NULL) {
H A Dspp_server.c47 static char * db_get_session_val(struct hs20_svc *ctx, const char *user,
52 static xml_node_t * build_policy(struct hs20_svc *ctx, const char *user,
57 const char *user, const char *realm,
65 sql = sqlite3_mprintf("INSERT INTO sessions(timestamp,id,user,realm,"
70 sessionid, user ? user : "", realm ? realm : "",
86 static void db_update_session_password(struct hs20_svc *ctx, const char *user, argument
93 "user=%Q AND realm=%Q",
94 pw, sessionid, user, realm);
106 static void db_add_session_pps(struct hs20_svc *ctx, const char *user, argument
56 db_add_session(struct hs20_svc *ctx, const char *user, const char *realm, const char *sessionid, const char *pw, const char *redirect_uri, enum hs20_session_operation operation) argument
178 db_remove_session(struct hs20_svc *ctx, const char *user, const char *realm, const char *sessionid) argument
203 hs20_eventlog(struct hs20_svc *ctx, const char *user, const char *realm, const char *sessionid, const char *notes, const char *dump) argument
241 hs20_eventlog_node(struct hs20_svc *ctx, const char *user, const char *realm, const char *sessionid, const char *notes, xml_node_t *node) argument
257 db_update_mo_str(struct hs20_svc *ctx, const char *user, const char *realm, const char *name, const char *str) argument
278 db_update_mo(struct hs20_svc *ctx, const char *user, const char *realm, const char *name, xml_node_t *mo) argument
358 db_get_val(struct hs20_svc *ctx, const char *user, const char *realm, const char *field, int dmacc) argument
387 db_update_val(struct hs20_svc *ctx, const char *user, const char *realm, const char *field, const char *val, int dmacc) argument
418 db_get_session_val(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *field) argument
452 update_password(struct hs20_svc *ctx, const char *user, const char *realm, const char *pw, int dmacc) argument
490 build_username_password(struct hs20_svc *ctx, xml_node_t *parent, const char *user, const char *pw) argument
513 add_username_password(struct hs20_svc *ctx, xml_node_t *cred, const char *user, const char *pw) argument
545 build_credential_pw(struct hs20_svc *ctx, const char *user, const char *realm, const char *pw) argument
567 build_credential(struct hs20_svc *ctx, const char *user, const char *realm, char *new_pw, size_t new_pw_len) argument
578 build_credential_cert(struct hs20_svc *ctx, const char *user, const char *realm, const char *cert_fingerprint) argument
655 build_sub_rem_resp(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int machine_rem, int dmacc) argument
730 machine_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument
739 policy_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument
812 user_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *redirect_uri) argument
833 free_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, const char *redirect_uri) argument
855 no_sub_rem(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id) argument
870 hs20_subscription_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc, const char *redirect_uri) argument
929 build_policy(struct hs20_svc *ctx, const char *user, const char *realm, int use_dmacc) argument
984 hs20_policy_update(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id, int dmacc) argument
1155 hs20_user_input_remediation(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument
1191 build_pps(struct hs20_svc *ctx, const char *user, const char *realm, const char *pw, const char *cert, int machine_managed) argument
1255 spp_exec_get_certificate(struct hs20_svc *ctx, const char *session_id, const char *user, const char *realm) argument
1309 char *user, *realm, *pw, *type, *mm; local
1415 hs20_user_input_free_remediation(struct hs20_svc *ctx, const char *user, const char *realm, const char *session_id) argument
1467 hs20_user_input_complete(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument
1504 hs20_cert_enroll_completed(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument
1530 hs20_cert_enroll_failed(struct hs20_svc *ctx, const char *user, const char *realm, int dmacc, const char *session_id) argument
1570 hs20_spp_post_dev_data(struct hs20_svc *ctx, xml_node_t *node, const char *user, const char *realm, const char *session_id, int dmacc) argument
1868 char *user, *realm, *pw, *pw_mm, *pps, *str; local
1991 hs20_spp_update_response(struct hs20_svc *ctx, xml_node_t *node, const char *user, const char *realm, const char *session_id, int dmacc) argument
[all...]
/external/wpa_supplicant_8/hs20/server/www/
H A Dadd-free.php31 $user = $row['value']; variable
33 $row = $db->query("SELECT password FROM users WHERE identity='$user' AND realm='$realm'")->fetch();
39 if (!$db->exec("UPDATE sessions SET user='$user', password='$pw', realm='$realm', machine_managed='1' WHERE rowid=$rowid")) {
43 $db->exec("INSERT INTO eventlog(user,realm,sessionid,timestamp,notes) " .
44 "VALUES ('$user', '$realm', '$id', " .
46 "'completed user input response for a new PPS MO')");
H A Dadd-mo.php15 $user = $_POST["user"]; variable
17 if (strlen($id) < 32 || !isset($user) || !isset($pw)) {
21 if (strlen($user) < 1 || strncasecmp($user, "cert-", 5) == 0) {
34 $userrow = $db->query("SELECT identity FROM users WHERE identity='$user' AND realm='$realm'")->fetch();
45 if (!$db->exec("UPDATE sessions SET user='$user', password='$pw', realm='$realm', type='password' WHERE rowid=$rowid")) {
49 $db->exec("INSERT INTO eventlog(user,realm,sessionid,timestamp,notes) " .
50 "VALUES ('$user', '
[all...]
H A Dcert-enroll.php26 $user = sha1(mt_rand()); variable
28 if (!$db->exec("UPDATE sessions SET user='$user', type='cert' WHERE rowid=$rowid")) {
32 $db->exec("INSERT INTO eventlog(user,realm,sessionid,timestamp,notes) " .
35 "'completed user input response for client certificate enrollment')");
H A Dest.php10 unset($user);
28 $user = $data['username']; variable
29 if (strlen($user) < 1) {
41 "WHERE user='$user' AND realm='$realm'";
44 error_log("EST: Session not found for user=$user realm=$realm");
49 error_log("EST: Session fetch failed for user=$user realm=$realm");
56 error_log("EST: Unexpected operation $oper for user
157 $user = "cert-$sn"; variable
[all...]
H A Dredirect.php24 $user = $row['user']; variable
27 $db->exec("INSERT INTO eventlog(user,realm,sessionid,timestamp,notes) " .
28 "VALUES ('$user', '$realm', '$id', " .
30 "'redirected after user input')");
H A Dspp.php23 unset($user);
41 $user = $data['username']; variable
42 if (strlen($user) < 1) {
54 "WHERE identity='$user' AND realm='$realm'")->fetch();
57 "WHERE osu_user='$user' AND realm='$realm'")->fetch();
62 error_log("spp.php - Authentication failed - user '$user' not found");
70 $A1 = md5($user . ':' . $realm . ':' . $pw);
81 $user = "cert-" . $_SERVER["SSL_CLIENT_M_SERIAL"]; variable
93 if (isset($user)
[all...]
H A Dusers.php66 if ($cmd == 'subrem-add-user' && $id > 0) {
67 $db->exec("UPDATE users SET remediation='user' WHERE rowid=$id");
167 echo " [<a href=\"users.php?cmd=subrem-add-user&id=" .
168 $row['rowid'] . "\">add:user</a>]";
175 } else if ($rem == "user") {
239 $user = $row['identity']; variable
254 echo "<th>user<th>realm";
269 $res = $db->query("SELECT rowid,* FROM eventlog WHERE (user='$user' OR user
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dap_config.c156 conf->fragm_threshold = -1; /* user driver default: 2346 */
378 void hostapd_config_free_eap_user(struct hostapd_eap_user *user) argument
380 hostapd_config_free_radius_attr(user->accept_attr);
381 os_free(user->identity);
382 bin_clear_free(user->password, user->password_len);
383 os_free(user);
400 struct hostapd_eap_user *user, *prev_user; local
419 user = conf->eap_user;
420 while (user) {
[all...]

Completed in 343 milliseconds

1234567891011>>