Home
last modified time | relevance | path

Searched full:identity (Results 1 – 25 of 976) sorted by relevance

12345678910>>...40

/freebsd/contrib/llvm-project/libcxx/include/
H A Dalgorithm48 template<forward_iterator I, sentinel_for<I> S, class Proj = identity,
52 template<forward_range R, class Proj = identity,
56 template<forward_iterator I, sentinel_for<I> S, class Proj = identity,
60 template<forward_range R, class Proj = identity,
68 class Pred = ranges::equal_to, class Proj1 = identity, class Proj2 = identity>
74 class Pred = ranges::equal_to, class Proj1 = identity, class Proj2 = identity>
82 template<input_range R, class T, class Proj = identity>
87 template<input_iterator I, sentinel_for<I> S, class Proj = identity,
91 template<input_range R, class Proj = identity,
96 template<input_iterator I, sentinel_for<I> S, class Proj = identity,
[all …]
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server_aka.c37 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE enumerator
65 case IDENTITY: in eap_aka_state_txt()
66 return "IDENTITY"; in eap_aka_state_txt()
107 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - " in eap_aka_check_identity_reauth()
108 "request full auth identity"); in eap_aka_check_identity_reauth()
109 /* Remain in IDENTITY state for another round */ in eap_aka_check_identity_reauth()
118 "EAP-AKA: Permanent identity recognized - skip AKA-Identity exchange"); in eap_aka_check_identity_reauth()
159 const u8 *identity = sm->identity; in eap_aka_check_identity() local
163 identity = (const u8 *) sm->sim_aka_permanent; in eap_aka_check_identity()
167 /* Check if we already know the identity from EAP-Response/Identity */ in eap_aka_check_identity()
[all …]
H A Deap_server_sim.c119 username = sim_get_username(sm->identity, sm->identity_len); in eap_sim_build_start()
129 wpa_printf(MSG_DEBUG, " No identity request"); in eap_sim_build_start()
132 * RFC 4186, Chap. 4.2.4 recommends that identity from EAP is in eap_sim_build_start()
133 * ignored and the SIM/Start is used to request the identity. in eap_sim_build_start()
145 * already know the identity of the peer, there is no need to in eap_sim_build_start()
146 * request any identity in this case. in eap_sim_build_start()
148 } else if (sm->identity && sm->identity_len > 0 && in eap_sim_build_start()
149 sm->identity[0] == EAP_SIM_REAUTH_ID_PREFIX) { in eap_sim_build_start()
288 eap_sim_derive_keys_reauth(data->counter, sm->identity, in eap_sim_build_reauth()
453 const u8 *identity; in eap_sim_process_start() local
[all …]
H A Deap_server_identity.c2 * hostapd / EAP-Identity
70 wpa_printf(MSG_ERROR, "EAP-Identity: Failed to allocate " in eap_identity_buildReq()
91 wpa_printf(MSG_INFO, "EAP-Identity: Invalid frame"); in eap_identity_check()
109 wpa_printf(MSG_DEBUG, "EAP-Identity: failed to pick " in eap_identity_process()
122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len); in eap_identity_process()
126 eap_log_msg(sm, "EAP-Response/Identity '%s'", buf); in eap_identity_process()
129 if (sm->identity) in eap_identity_process()
131 os_free(sm->identity); in eap_identity_process()
132 sm->identity = os_malloc(len ? len : 1); in eap_identity_process()
133 if (sm->identity == NULL) { in eap_identity_process()
[all …]
H A Deap_server_gtc.c131 if (sm->identity && sm->require_identity_match && in eap_gtc_process()
133 os_memcmp(pos, sm->identity, sm->identity_len))) { in eap_gtc_process()
134 wpa_printf(MSG_DEBUG, "EAP-GTC: Phase 2 Identity did " in eap_gtc_process()
135 "not match with required Identity"); in eap_gtc_process()
137 "identity", in eap_gtc_process()
138 sm->identity, sm->identity_len); in eap_gtc_process()
142 os_free(sm->identity); in eap_gtc_process()
144 sm->identity = os_memdup(pos, sm->identity_len); in eap_gtc_process()
145 if (sm->identity == NULL) { in eap_gtc_process()
151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { in eap_gtc_process()
[all …]
H A Deap_server.c148 * @identity: Identity (User-Name) of the user
149 * @identity_len: Length of identity in bytes
154 * selected based on the specified identity. sm->user and
158 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, in eap_user_get() argument
174 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity, in eap_user_get()
225 if (sm->eap_if.eapRestart && !sm->cfg->eap_server && sm->identity) { in SM_STATE()
227 * Need to allow internal Identity method to be used instead in SM_STATE()
867 * EAP Identity exchange. Use keyName-NAI as the user identity in SM_STATE()
872 "EAP: Use keyName-NAI as user identity for backend authentication"); in SM_STATE()
874 sm->identity = (u8 *) dup_binstr(parse.keyname, in SM_STATE()
[all …]
/freebsd/contrib/wpa/src/ap/
H A Deap_user_db.c110 if (os_strcmp(col[i], "identity") == 0 && argv[i]) in get_wildcard_cb()
121 os_memcmp(argv[id], user->identity, len) == 0 && in get_wildcard_cb()
135 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, in eap_user_sqlite_get() argument
145 wpa_printf(MSG_DEBUG, "%s: identity len too big: %d >= %d", in eap_user_sqlite_get()
150 os_memcpy(id_str, identity, identity_len); in eap_user_sqlite_get()
164 wpa_printf(MSG_INFO, "DB: Unsupported character in identity"); in eap_user_sqlite_get()
168 bin_clear_free(hapd->tmp_eap_user.identity, in eap_user_sqlite_get()
174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); in eap_user_sqlite_get()
175 if (hapd->tmp_eap_user.identity == NULL) in eap_user_sqlite_get()
177 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len); in eap_user_sqlite_get()
[all …]
H A Dpmksa_cache_auth.c42 os_free(entry->identity); in _pmksa_cache_free_entry()
152 if (eapol->identity) { in pmksa_cache_from_eapol_data()
153 entry->identity = os_malloc(eapol->identity_len); in pmksa_cache_from_eapol_data()
154 if (entry->identity) { in pmksa_cache_from_eapol_data()
156 os_memcpy(entry->identity, eapol->identity, in pmksa_cache_from_eapol_data()
190 if (entry->identity) { in pmksa_cache_to_eapol_data()
191 os_free(eapol->identity); in pmksa_cache_to_eapol_data()
192 eapol->identity = os_malloc(entry->identity_len); in pmksa_cache_to_eapol_data()
193 if (eapol->identity) { in pmksa_cache_to_eapol_data()
195 os_memcpy(eapol->identity, entry->identity, in pmksa_cache_to_eapol_data()
[all …]
/freebsd/crypto/krb5/src/plugins/preauth/pkinit/
H A Dpkinit_identity.c114 opts->identity = NULL; in pkinit_init_identity_opts()
148 if (src_opts->identity != NULL) { in pkinit_dup_identity_opts()
149 newopts->identity = strdup(src_opts->identity); in pkinit_dup_identity_opts()
150 if (newopts->identity == NULL) in pkinit_dup_identity_opts()
220 if (idopts->identity != NULL) in pkinit_fini_identity_opts()
221 free(idopts->identity); in pkinit_fini_identity_opts()
505 * Load any identity information which doesn't require us to ask a controlling
530 * If identity was specified, use that. (For the kdc, this in pkinit_identity_initialize()
533 * If a user did not specify identity on the command line, in pkinit_identity_initialize()
537 if (idopts->identity != NULL) { in pkinit_identity_initialize()
[all …]
H A Dpkinit.h110 * both the plugin level and request level. the identity context (that
113 * (the kdc's identity is at the plugin level, the client's identity
115 * the identity context is meant to have the entity's cert,
136 * identity context should keep information about credentials
171 * information about identity from config file or command line
175 char *identity; member
310 char *identity; member
317 (pkinit_deferred_id **identities, const char *identity,
320 (pkinit_deferred_id *identities, const char *identity);
322 (pkinit_deferred_id *identities, const char *identity);
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_use_psk_identity_hint.pod13 - set PSK identity hint to use
20 const unsigned char *identity,
30 const char *identity,
47 an identity in B<identity> of length B<identity_len>. The callback function
58 Identity hints are not relevant for TLSv1.3. A server application wishing to use
60 to set the given B<NUL>-terminated PSK identity hint B<hint> for SSL context
62 identity hint B<hint> for the SSL connection object B<ssl>. If B<hint> is
65 In the case where PSK identity hint is B<NULL>, the server does not send the
71 is to validate the received PSK identity and to fetch the pre-shared key used
75 identity sent by the client in parameter B<identity>, and a buffer B<psk> of
[all …]
H A DSSL_get_psk_identity.pod5 SSL_get_psk_identity, SSL_get_psk_identity_hint - get PSK client identity and hint
16 SSL_get_psk_identity_hint() is used to retrieve the PSK identity hint
19 identity used during the connection setup.
24 If non-B<NULL>, SSL_get_psk_identity_hint() returns the PSK identity
25 hint and SSL_get_psk_identity() returns the PSK identity. Both are
27 no PSK identity hint was used during the connection setup.
/freebsd/contrib/wpa/hostapd/
H A Dhostapd.eap_user_sqlite2 identity TEXT PRIMARY KEY,
11 identity TEXT PRIMARY KEY,
15 INSERT INTO users(identity,methods,password,phase2) VALUES ('user','TTLS-MSCHAPV2','password',1);
16 INSERT INTO users(identity,methods,password,phase2) VALUES ('DOMAIN\mschapv2 user','TTLS-MSCHAPV2',…
18 INSERT INTO wildcards(identity,methods) VALUES ('','TTLS,TLS');
19 INSERT INTO wildcards(identity,methods) VALUES ('0','AKA');
31 identity TEXT
36 identity TEXT,
H A Dhostapd.eap_user3 # Each line must contain an identity, EAP method(s), and an optional password
4 # separated with whitespace (space or tab). The identity and password must be
14 # identity can be used in the unencrypted phase 1 and the real user identity
25 # * can be used as a wildcard to match any user identity. The main purposes for
26 # this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to
41 # version based on the Phase 1 identity. Without this flag, the EAP
71 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes
94 # Default to EAP-SIM and EAP-AKA based on fixed identity prefixes in phase 2
/freebsd/share/snmp/mibs/
H A DFREEBSD-MIB.txt11 MODULE-IDENTITY,
12 OBJECT-IDENTITY,
16 freeBSD MODULE-IDENTITY
34 freeBSDsrc OBJECT-IDENTITY
40 freeBSDsrcCertOtherName OBJECT-IDENTITY
49 freeBSDsrcCertNFSuser OBJECT-IDENTITY
55 freeBSDports OBJECT-IDENTITY
61 freeBSDpeople OBJECT-IDENTITY
72 freeBSDpeoplePhk OBJECT-IDENTITY
77 freeBSDVersion OBJECT-IDENTITY
/freebsd/crypto/krb5/src/tests/
H A Dt_pkinit.py159 # Run the basic test - PKINIT with FILE: identity, with no password on the key.
160 mark('FILE identity, no password')
183 mark('FILE identity, no password, RSA')
222 # Run the basic test - PKINIT with FILE: identity, with a password on the key,
225 mark('FILE identity, password on key (prompter)')
237 # Run the basic test - PKINIT with FILE: identity, with a password on the key,
240 mark('FILE identity, password on key (responder)')
254 # PKINIT with DIR: identity, with no password on the key.
255 mark('DIR identity, no password')
267 # PKINIT with DIR: identity, with a password on the key, supplied by the
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DSSL_CTX_use_psk_identity_hint.3148 \&\- set PSK identity hint to use
155 \& const unsigned char *identity,
165 \& const char *identity,
182 an identity in \fBidentity\fR of length \fBidentity_len\fR. The callback function
193 Identity hints are not relevant for TLSv1.3. A server application wishing to use
195 to set the given \fB\s-1NUL\s0\fR\-terminated \s-1PSK\s0 identity hint \fBhint\fR for \s-1SSL\s0 co…
197 identity hint \fBhint\fR for the \s-1SSL\s0 connection object \fBssl\fR. If \fBhint\fR is
200 In the case where \s-1PSK\s0 identity hint is \fB\s-1NULL\s0\fR, the server does not send the
206 is to validate the received \s-1PSK\s0 identity and to fetch the pre-shared key used
210 identity sent by the client in parameter \fBidentity\fR, and a buffer \fBpsk\fR of
[all …]
/freebsd/contrib/wpa/src/eap_peer/
H A Deap_sim.c161 if (sm->identity) { in eap_sim_init()
162 /* Use the EAP-Response/Identity in MK derivation if AT_IDENTITY in eap_sim_init()
164 data->mk_identity = os_memdup(sm->identity, sm->identity_len); in eap_sim_init()
434 const u8 *identity = NULL; in eap_sim_learn_ids() local
444 /* Look for the realm of the permanent identity */ in eap_sim_learn_ids()
445 identity = eap_get_config_identity(sm, &identity_len); in eap_sim_learn_ids()
446 if (identity) { in eap_sim_learn_ids()
447 for (realm = identity, realm_len = identity_len; in eap_sim_learn_ids()
515 const u8 *identity, size_t identity_len, in eap_sim_encrypt_identity() argument
522 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Encrypt permanent identity", in eap_sim_encrypt_identity()
[all …]
H A Deap_aka.c143 if (sm->identity) { in eap_aka_init()
144 /* Use the EAP-Response/Identity in MK derivation if AT_IDENTITY in eap_aka_init()
146 data->mk_identity = os_memdup(sm->identity, sm->identity_len); in eap_aka_init()
408 const u8 *identity = NULL; in eap_aka_learn_ids() local
418 /* Look for the realm of the permanent identity */ in eap_aka_learn_ids()
419 identity = eap_get_config_identity(sm, &identity_len); in eap_aka_learn_ids()
420 if (identity) { in eap_aka_learn_ids()
421 for (realm = identity, realm_len = identity_len; in eap_aka_learn_ids()
507 * No EAP-AKA/Identity packets were exchanged - send empty in eap_aka_add_checkcode()
514 /* Checkcode is SHA1/SHA256 hash over all EAP-AKA/Identity packets. */ in eap_aka_add_checkcode()
[all …]
H A Deap_sake.c17 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; enumerator
40 case IDENTITY: in eap_sake_state_txt()
41 return "IDENTITY"; in eap_sake_state_txt()
71 const u8 *identity, *password; in eap_sake_init() local
84 data->state = IDENTITY; in eap_sake_init()
86 identity = eap_get_config_identity(sm, &identity_len); in eap_sake_init()
87 if (identity) { in eap_sake_init()
88 data->peerid = os_memdup(identity, identity_len); in eap_sake_init()
150 if (data->state != IDENTITY) { in eap_sake_process_identity()
155 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); in eap_sake_process_identity()
[all …]
/freebsd/contrib/ntp/include/
H A Dntp_crypto.h39 #define CRYPTO_FLAG_PRIV 0x0010 /* PC identity scheme */
40 #define CRYPTO_FLAG_IFF 0x0020 /* IFF identity scheme */
41 #define CRYPTO_FLAG_GQ 0x0040 /* GQ identity scheme */
42 #define CRYPTO_FLAG_MV 0x0080 /* MV identity scheme */
43 #define CRYPTO_FLAG_MASK 0x00f0 /* identity scheme mask */
50 #define CRYPTO_FLAG_VRFY 0x0200 /* identity verified */
80 #define CRYPTO_IFF CRYPTO_CMD(7) /* IFF identity scheme */
81 #define CRYPTO_GQ CRYPTO_CMD(8) /* GQ identity scheme */
82 #define CRYPTO_MV CRYPTO_CMD(9) /* MV identity scheme */
96 #define XEVNT_KEY XEVNT_CMD(6) /* unsupported identity type */
/freebsd/contrib/wpa/src/radius/
H A Dradius_server.h64 * @identity: User identity
65 * @identity_len: identity buffer length in octets
66 * @phase2: Whether this is for Phase 2 identity
75 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
79 * eap_req_id_text - Optional data for EAP-Request/Identity
82 * will be sent in EAP-Request/Identity. This string can contain an
/freebsd/contrib/bc/vs/
H A Dbc.vcxproj213 …include /DBC_ENABLE_LIBRARY=0 /Fo:$(OutDir)strgen.obj /Fe:$(OutDir)strgen.exe %(Identity)</Command>
215 …include /DBC_ENABLE_LIBRARY=0 /Fo:$(OutDir)strgen.obj /Fe:$(OutDir)strgen.exe %(Identity)</Command>
217 …include /DBC_ENABLE_LIBRARY=0 /Fo:$(OutDir)strgen.obj /Fe:$(OutDir)strgen.exe %(Identity)</Command>
219 …include /DBC_ENABLE_LIBRARY=0 /Fo:$(OutDir)strgen.obj /Fe:$(OutDir)strgen.exe %(Identity)</Command>
252 …n="'$(Configuration)|$(Platform)'=='Debug|Win32'">$(OutDir)strgen.exe %(Identity) src2\lib.c 0 bc_…
254 …"'$(Configuration)|$(Platform)'=='Release|Win32'">$(OutDir)strgen.exe %(Identity) src2\lib.c 0 bc_…
256 …ion="'$(Configuration)|$(Platform)'=='Debug|x64'">$(OutDir)strgen.exe %(Identity) src2\lib.c 0 bc_…
258 …n="'$(Configuration)|$(Platform)'=='Release|x64'">$(OutDir)strgen.exe %(Identity) src2\lib.c 0 bc_…
265 …n="'$(Configuration)|$(Platform)'=='Debug|Win32'">$(OutDir)strgen.exe %(Identity) src2\lib2.c 0 bc…
267 …"'$(Configuration)|$(Platform)'=='Release|Win32'">$(OutDir)strgen.exe %(Identity) src2\lib2.c 0 bc…
[all …]
/freebsd/contrib/ntp/html/
H A Dautokey.html29 <li class="inline"><a href="#scfg">Configuration - Identity Schemes</a></li>
30 <li class="inline"><a href="#ident">Identity Schemes and Cryptotypes</a></li>
38identity schemes described on the <a href="http://www.eecis.udel.edu/~mills/ident.html">Autokey Id…
61 …e trails one or another identity schemes described on the <a href="http://www.eecis.udel.edu/~mill…
62 …hierarchies. The identity scheme insures that the server is authentic and not victim of masquerade…
63identity exchange with the TAs of parent subnets All group hosts construct an unbroken certific…
67 <p>The identity exchange is run between a TA acting as a server and a TH acting as a client. As sho…
68 …up key is not divulged to the clients, so they cannot conspire to prove identity to other hosts.</…
69 …/ident.html">Autokey Identity Schemes</a> page, there are five identity schemes, three of which - …
80 …nd between X and S. Therefore, both parent subnet TAs C and S run an identity exchange with chi…
[all …]
/freebsd/contrib/llvm-project/llvm/include/llvm/ADT/
H A Didentity.h1 //===- llvm/ADT/Identity.h - Provide std::identity from C++20 ---*- C++ -*-===//
9 // This file provides an implementation of std::identity from C++20.
21 // Similar to `std::identity` from C++20.
22 template <class Ty> struct identity { struct

12345678910>>...40