Lines Matching defs:user
194 struct hostapd_eap_user *user, *tail = NULL;
207 wpa_printf(MSG_ERROR, "EAP user file '%s' not found.", fname);
211 /* Lines: "user" METHOD,METHOD2 "password" (password optional) */
228 user = NULL;
236 user = os_zalloc(sizeof(*user));
237 if (user == NULL) {
238 wpa_printf(MSG_ERROR, "EAP user allocation failed");
241 user->force_version = -1;
257 user->identity = os_malloc(pos - start);
258 if (user->identity == NULL) {
263 os_memcpy(user->identity, start, pos - start);
264 user->identity_len = pos - start;
267 user->wildcard_prefix = 1;
296 user->methods[num_methods].method =
299 &user->methods[num_methods].vendor);
300 if (user->methods[num_methods].vendor ==
302 user->methods[num_methods].method == EAP_TYPE_NONE)
305 user->ttls_auth |= EAP_TTLS_AUTH_PAP;
309 user->ttls_auth |= EAP_TTLS_AUTH_CHAP;
313 user->ttls_auth |=
318 user->ttls_auth |=
336 if (num_methods == 0 && user->ttls_auth == 0) {
351 user->force_version = 0;
356 user->force_version = 1;
361 user->phase2 = 1;
377 user->password = os_malloc(pos - start);
378 if (user->password == NULL) {
383 os_memcpy(user->password, start, pos - start);
384 user->password_len = pos - start;
398 user->password = os_malloc(16);
399 if (user->password == NULL) {
404 if (hexstr2bin(pos, user->password, 16) < 0) {
409 user->password_len = 16;
410 user->password_hash = 1;
422 user->password = os_malloc((pos2 - pos) / 2);
423 if (user->password == NULL) {
428 if (hexstr2bin(pos, user->password,
434 user->password_len = (pos2 - pos) / 2;
441 user->phase2 = 1;
446 tail = conf->eap_user = user;
448 tail->next = user;
449 tail = user;
454 if (user) {
455 os_free(user->password);
456 os_free(user->identity);
457 os_free(user);
1363 *ipos++ = 3 + count * 3; /* User Data Header Length (UDHL) */