Home
last modified time | relevance | path

Searched full:identity (Results 1 – 25 of 869) sorted by relevance

12345678910>>...35

/freebsd/contrib/llvm-project/libcxx/include/
H A Dalgorithm48 template<forward_iterator I, sentinel_for<I> S, class Proj = identity,
52 template<forward_range R, class Proj = identity,
56 template<forward_iterator I, sentinel_for<I> S, class Proj = identity,
60 template<forward_range R, class Proj = identity,
68 class Pred = ranges::equal_to, class Proj1 = identity, class Proj2 = identity>
74 class Pred = ranges::equal_to, class Proj1 = identity, class Proj2 = identity>
82 template<input_range R, class T, class Proj = identity>
87 template<input_iterator I, sentinel_for<I> S, class Proj = identity,
91 template<input_range R, class Proj = identity,
96 template<input_iterator I, sentinel_for<I> S, class Proj = identity,
[all …]
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server_aka.c37 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE enumerator
65 case IDENTITY: in eap_aka_state_txt()
66 return "IDENTITY"; in eap_aka_state_txt()
107 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - " in eap_aka_check_identity_reauth()
108 "request full auth identity"); in eap_aka_check_identity_reauth()
109 /* Remain in IDENTITY state for another round */ in eap_aka_check_identity_reauth()
118 "EAP-AKA: Permanent identity recognized - skip AKA-Identity exchange"); in eap_aka_check_identity_reauth()
159 const u8 *identity = sm->identity; in eap_aka_check_identity() local
163 identity = (const u8 *) sm->sim_aka_permanent; in eap_aka_check_identity()
167 /* Check if we already know the identity from EAP-Response/Identity */ in eap_aka_check_identity()
[all …]
H A Deap_server_identity.c2 * hostapd / EAP-Identity
70 wpa_printf(MSG_ERROR, "EAP-Identity: Failed to allocate " in eap_identity_buildReq()
91 wpa_printf(MSG_INFO, "EAP-Identity: Invalid frame"); in eap_identity_check()
109 wpa_printf(MSG_DEBUG, "EAP-Identity: failed to pick " in eap_identity_process()
122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len); in eap_identity_process()
126 eap_log_msg(sm, "EAP-Response/Identity '%s'", buf); in eap_identity_process()
129 if (sm->identity) in eap_identity_process()
131 os_free(sm->identity); in eap_identity_process()
132 sm->identity = os_malloc(len ? len : 1); in eap_identity_process()
133 if (sm->identity == NULL) { in eap_identity_process()
[all …]
H A Deap_server_sim.c119 username = sim_get_username(sm->identity, sm->identity_len); in eap_sim_build_start()
129 wpa_printf(MSG_DEBUG, " No identity request"); in eap_sim_build_start()
132 * RFC 4186, Chap. 4.2.4 recommends that identity from EAP is in eap_sim_build_start()
133 * ignored and the SIM/Start is used to request the identity. in eap_sim_build_start()
145 * already know the identity of the peer, there is no need to in eap_sim_build_start()
146 * request any identity in this case. in eap_sim_build_start()
148 } else if (sm->identity && sm->identity_len > 0 && in eap_sim_build_start()
149 sm->identity[0] == EAP_SIM_REAUTH_ID_PREFIX) { in eap_sim_build_start()
288 eap_sim_derive_keys_reauth(data->counter, sm->identity, in eap_sim_build_reauth()
453 const u8 *identity; in eap_sim_process_start() local
[all …]
H A Deap_server_gtc.c131 if (sm->identity && sm->require_identity_match && in eap_gtc_process()
133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process()
134 wpa_printf(MSG_DEBUG, "EAP-GTC: Phase 2 Identity did " in eap_gtc_process()
135 "not match with required Identity"); in eap_gtc_process()
137 "identity", in eap_gtc_process()
138 sm->identity, sm->identity_len); in eap_gtc_process()
142 os_free(sm->identity); in eap_gtc_process()
144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process()
145 if (sm->identity == NULL) { in eap_gtc_process()
151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process()
[all …]
H A Deap_server.c148 * @identity: Identity (User-Name) of the user
149 * @identity_len: Length of identity in bytes
154 * selected based on the specified identity. sm->user and
158 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, in eap_user_get() argument
174 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity, in eap_user_get()
225 if (sm->eap_if.eapRestart && !sm->cfg->eap_server && sm->identity) { in SM_STATE()
227 * Need to allow internal Identity method to be used instead in SM_STATE()
867 * EAP Identity exchange. Use keyName-NAI as the user identity in SM_STATE()
872 "EAP: Use keyName-NAI as user identity for backend authentication"); in SM_STATE()
874 sm->identity = (u8 *) dup_binstr(parse.keyname, in SM_STATE()
[all …]
/freebsd/contrib/wpa/src/ap/
H A Deap_user_db.c110 if (os_strcmp(col[i], "identity") == 0 && argv[i]) in get_wildcard_cb()
121 os_memcmp(argv[id], user->identity, len) == 0 && in get_wildcard_cb()
135 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, in eap_user_sqlite_get() argument
145 wpa_printf(MSG_DEBUG, "%s: identity len too big: %d >= %d", in eap_user_sqlite_get()
150 os_memcpy(id_str, identity, identity_len); in eap_user_sqlite_get()
164 wpa_printf(MSG_INFO, "DB: Unsupported character in identity"); in eap_user_sqlite_get()
168 bin_clear_free(hapd->tmp_eap_user.identity, in eap_user_sqlite_get()
174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); in eap_user_sqlite_get()
175 if (hapd->tmp_eap_user.identity == NULL) in eap_user_sqlite_get()
177 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); in eap_user_sqlite_get()
[all …]
H A Dpmksa_cache_auth.c42 os_free(entry->identity); in _pmksa_cache_free_entry()
152 if (eapol->identity) { in pmksa_cache_from_eapol_data()
153 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data()
154 if (entry->identity) { in pmksa_cache_from_eapol_data()
156 os_memcpy(entry->identity, eapol->identity, in pmksa_cache_from_eapol_data()
190 if (entry->identity) { in pmksa_cache_to_eapol_data()
191 os_free(eapol->identity); in pmksa_cache_to_eapol_data()
192 eapol->identity = os_malloc(entry->identity_len); in pmksa_cache_to_eapol_data()
193 if (eapol->identity) { in pmksa_cache_to_eapol_data()
195 os_memcpy(eapol->identity, entry->identity, in pmksa_cache_to_eapol_data()
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_use_psk_identity_hint.pod13 - set PSK identity hint to use
20 const unsigned char *identity,
30 const char *identity,
47 an identity in B<identity> of length B<identity_len>. The callback function
58 Identity hints are not relevant for TLSv1.3. A server application wishing to use
60 to set the given B<NUL>-terminated PSK identity hint B<hint> for SSL context
62 identity hint B<hint> for the SSL connection object B<ssl>. If B<hint> is
65 In the case where PSK identity hint is B<NULL>, the server does not send the
71 is to validate the received PSK identity and to fetch the pre-shared key used
75 identity sent by the client in parameter B<identity>, and a buffer B<psk> of
[all …]
H A DSSL_get_psk_identity.pod5 SSL_get_psk_identity, SSL_get_psk_identity_hint - get PSK client identity and hint
16 SSL_get_psk_identity_hint() is used to retrieve the PSK identity hint
19 identity used during the connection setup.
24 If non-B<NULL>, SSL_get_psk_identity_hint() returns the PSK identity
25 hint and SSL_get_psk_identity() returns the PSK identity. Both are
27 no PSK identity hint was used during the connection setup.
/freebsd/contrib/wpa/hostapd/
H A Dhostapd.eap_user_sqlite2 identity TEXT PRIMARY KEY,
11 identity TEXT PRIMARY KEY,
15 INSERT INTO users(identity,methods,password,phase2) VALUES ('user','TTLS-MSCHAPV2','password',1);
16 INSERT INTO users(identity,methods,password,phase2) VALUES ('DOMAIN\mschapv2 user','TTLS-MSCHAPV2',…
18 INSERT INTO wildcards(identity,methods) VALUES ('','TTLS,TLS');
19 INSERT INTO wildcards(identity,methods) VALUES ('0','AKA');
31 identity TEXT
36 identity TEXT,
H A Dhostapd.eap_user3 # Each line must contain an identity, EAP method(s), and an optional password
4 # separated with whitespace (space or tab). The identity and password must be
14 # identity can be used in the unencrypted phase 1 and the real user identity
25 # * can be used as a wildcard to match any user identity. The main purposes for
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
41 # version based on the Phase 1 identity. Without this flag, the EAP
71 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes
94 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes in phase 2
/freebsd/share/snmp/mibs/
H A DFREEBSD-MIB.txt11 MODULE-IDENTITY,
12 OBJECT-IDENTITY,
16 freeBSD MODULE-IDENTITY
34 freeBSDsrc OBJECT-IDENTITY
40 freeBSDsrcCertOtherName OBJECT-IDENTITY
49 freeBSDsrcCertNFSuser OBJECT-IDENTITY
55 freeBSDports OBJECT-IDENTITY
61 freeBSDpeople OBJECT-IDENTITY
72 freeBSDpeoplePhk OBJECT-IDENTITY
77 freeBSDVersion OBJECT-IDENTITY
/freebsd/secure/lib/libcrypto/man/man3/
H A DSSL_CTX_use_psk_identity_hint.3148 \&\- set PSK identity hint to use
155 \& const unsigned char *identity,
165 \& const char *identity,
182 an identity in \fBidentity\fR of length \fBidentity_len\fR. The callback function
193 Identity hints are not relevant for TLSv1.3. A server application wishing to use
195 to set the given \fB\s-1NUL\s0\fR\-terminated \s-1PSK\s0 identity hint \fBhint\fR for \s-1SSL\s0 co…
197 identity hint \fBhint\fR for the \s-1SSL\s0 connection object \fBssl\fR. If \fBhint\fR is
200 In the case where \s-1PSK\s0 identity hint is \fB\s-1NULL\s0\fR, the server does not send the
206 is to validate the received \s-1PSK\s0 identity and to fetch the pre-shared key used
210 identity sent by the client in parameter \fBidentity\fR, and a buffer \fBpsk\fR of
[all …]
/freebsd/contrib/wpa/src/eap_peer/
H A Deap_sim.c161 if (sm->identity) { in eap_sim_init()
162 /* Use the EAP-Response/Identity in MK derivation if AT_IDENTITY in eap_sim_init()
164 data->mk_identity = os_memdup(sm->identity, sm->identity_len); in eap_sim_init()
434 const u8 *identity = NULL; in eap_sim_learn_ids() local
444 /* Look for the realm of the permanent identity */ in eap_sim_learn_ids()
445 identity = eap_get_config_identity(sm, &identity_len); in eap_sim_learn_ids()
446 if (identity) { in eap_sim_learn_ids()
447 for (realm = identity, realm_len = identity_len; in eap_sim_learn_ids()
515 const u8 *identity, size_t identity_len, in eap_sim_encrypt_identity() argument
522 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Encrypt permanent identity", in eap_sim_encrypt_identity()
[all …]
H A Deap_aka.c143 if (sm->identity) { in eap_aka_init()
144 /* Use the EAP-Response/Identity in MK derivation if AT_IDENTITY in eap_aka_init()
146 data->mk_identity = os_memdup(sm->identity, sm->identity_len); in eap_aka_init()
408 const u8 *identity = NULL; in eap_aka_learn_ids() local
418 /* Look for the realm of the permanent identity */ in eap_aka_learn_ids()
419 identity = eap_get_config_identity(sm, &identity_len); in eap_aka_learn_ids()
420 if (identity) { in eap_aka_learn_ids()
421 for (realm = identity, realm_len = identity_len; in eap_aka_learn_ids()
507 * No EAP-AKA/Identity packets were exchanged - send empty in eap_aka_add_checkcode()
514 /* Checkcode is SHA1/SHA256 hash over all EAP-AKA/Identity packets. */ in eap_aka_add_checkcode()
[all …]
H A Deap_sake.c17 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; enumerator
40 case IDENTITY: in eap_sake_state_txt()
41 return "IDENTITY"; in eap_sake_state_txt()
71 const u8 *identity, *password; in eap_sake_init() local
84 data->state = IDENTITY; in eap_sake_init()
86 identity = eap_get_config_identity(sm, &identity_len); in eap_sake_init()
87 if (identity) { in eap_sake_init()
88 data->peerid = os_memdup(identity, identity_len); in eap_sake_init()
150 if (data->state != IDENTITY) { in eap_sake_process_identity()
155 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); in eap_sake_process_identity()
[all …]
/freebsd/contrib/wpa/src/radius/
H A Dradius_server.h64 * @identity: User identity
65 * @identity_len: identity buffer length in octets
66 * @phase2: Whether this is for Phase 2 identity
75 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
79 * eap_req_id_text - Optional data for EAP-Request/Identity
82 * will be sent in EAP-Request/Identity. This string can contain an
/freebsd/contrib/ntp/include/
H A Dntp_crypto.h39 #define CRYPTO_FLAG_PRIV 0x0010 /* PC identity scheme */
40 #define CRYPTO_FLAG_IFF 0x0020 /* IFF identity scheme */
41 #define CRYPTO_FLAG_GQ 0x0040 /* GQ identity scheme */
42 #define CRYPTO_FLAG_MV 0x0080 /* MV identity scheme */
43 #define CRYPTO_FLAG_MASK 0x00f0 /* identity scheme mask */
50 #define CRYPTO_FLAG_VRFY 0x0200 /* identity verified */
80 #define CRYPTO_IFF CRYPTO_CMD(7) /* IFF identity scheme */
81 #define CRYPTO_GQ CRYPTO_CMD(8) /* GQ identity scheme */
82 #define CRYPTO_MV CRYPTO_CMD(9) /* MV identity scheme */
96 #define XEVNT_KEY XEVNT_CMD(6) /* unsupported identity type */
/freebsd/contrib/bc/vs/
H A Dbc.vcxproj213 …include /DBC_ENABLE_LIBRARY=0 /Fo:$(OutDir)strgen.obj /Fe:$(OutDir)strgen.exe %(Identity)</Command>
215 …include /DBC_ENABLE_LIBRARY=0 /Fo:$(OutDir)strgen.obj /Fe:$(OutDir)strgen.exe %(Identity)</Command>
217 …include /DBC_ENABLE_LIBRARY=0 /Fo:$(OutDir)strgen.obj /Fe:$(OutDir)strgen.exe %(Identity)</Command>
219 …include /DBC_ENABLE_LIBRARY=0 /Fo:$(OutDir)strgen.obj /Fe:$(OutDir)strgen.exe %(Identity)</Command>
252 …n="'$(Configuration)|$(Platform)'=='Debug|Win32'">$(OutDir)strgen.exe %(Identity) src2\lib.c 0 bc_…
254 …"'$(Configuration)|$(Platform)'=='Release|Win32'">$(OutDir)strgen.exe %(Identity) src2\lib.c 0 bc_…
256 …ion="'$(Configuration)|$(Platform)'=='Debug|x64'">$(OutDir)strgen.exe %(Identity) src2\lib.c 0 bc_…
258 …n="'$(Configuration)|$(Platform)'=='Release|x64'">$(OutDir)strgen.exe %(Identity) src2\lib.c 0 bc_…
265 …n="'$(Configuration)|$(Platform)'=='Debug|Win32'">$(OutDir)strgen.exe %(Identity) src2\lib2.c 0 bc…
267 …"'$(Configuration)|$(Platform)'=='Release|Win32'">$(OutDir)strgen.exe %(Identity) src2\lib2.c 0 bc…
[all …]
/freebsd/contrib/llvm-project/llvm/include/llvm/ADT/
H A Didentity.h1 //===- llvm/ADT/Identity.h - Provide std::identity from C++20 ---*- C++ -*-===//
9 // This file provides an implementation of std::identity from C++20.
21 // Similar to `std::identity` from C++20.
22 template <class Ty> struct identity { struct
/freebsd/contrib/ntp/html/
H A Dautokey.html29 <li class="inline"><a href="#scfg">Configuration - Identity Schemes</a></li>
30 <li class="inline"><a href="#ident">Identity Schemes and Cryptotypes</a></li>
38identity schemes described on the <a href="http://www.eecis.udel.edu/~mills/ident.html">Autokey Id…
61 …e trails one or another identity schemes described on the <a href="http://www.eecis.udel.edu/~mill…
62 …hierarchies. The identity scheme insures that the server is authentic and not victim of masquerade…
63identity exchange with the TAs of parent subnets All group hosts construct an unbroken certific…
67 <p>The identity exchange is run between a TA acting as a server and a TH acting as a client. As sho…
68 …up key is not divulged to the clients, so they cannot conspire to prove identity to other hosts.</…
69 …/ident.html">Autokey Identity Schemes</a> page, there are five identity schemes, three of which - …
80 …nd between X and S. Therefore, both parent subnet TAs C and S run an identity exchange with chi…
[all …]
/freebsd/sys/contrib/openzfs/cmd/zed/
H A Dzed_log.c31 const char *identity; member
40 zed_log_init(const char *identity) in zed_log_init() argument
42 if (identity) { in zed_log_init()
43 const char *p = strrchr(identity, '/'); in zed_log_init()
44 _ctx.identity = (p != NULL) ? p + 1 : identity; in zed_log_init()
46 _ctx.identity = NULL; in zed_log_init()
186 openlog(_ctx.identity, LOG_NDELAY | LOG_PID, facility); in zed_log_syslog_open()
/freebsd/share/man/man9/
H A Dvm_page_busy.941 .Nd protect page identity changes and page content references
74 Page identity is usually protected by higher level locks like vm_object
77 necessary to complete the identity change.
79 to own the identity for a certain amount of time.
81 In other situations, threads do not need to change the identity of the
82 page but they want to prevent other threads from changing the identity
/freebsd/contrib/wpa/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
108 static inline void eap_aka_prime_derive_keys(const u8 *identity, in eap_aka_prime_derive_keys() argument
117 const u8 *identity, in eap_aka_prime_derive_keys_reauth() argument
186 const u8 *nonce_mt, *identity, *res, *auts; member

12345678910>>...35