Searched defs:permanent (Results 1 - 19 of 19) sorted by relevance

/external/chromium_org/crypto/third_party/nss/
H A Dpk11akey.cc54 PRBool permanent,
84 public_value, permanent, sensitive, CKK_EC,
48 ImportEncryptedECPrivateKeyInfoAndReturnKey( PK11SlotInfo* slot, SECKEYEncryptedPrivateKeyInfo* epki, SECItem* password, SECItem* nickname, SECItem* public_value, PRBool permanent, PRBool sensitive, SECKEYPrivateKey** private_key, void* wincx) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_sim_db.h55 const char *permanent, char *pseudonym);
57 int eap_sim_db_add_reauth(struct eap_sim_db_data *data, const char *permanent,
60 const char *permanent,
69 char *permanent; /* Permanent username */ member in struct:eap_sim_reauth
H A Deap_server_sim.c40 char permanent[20]; /* Permanent username */ member in struct:eap_sim_data
470 os_strlcpy(data->permanent, data->reauth->permanent,
471 sizeof(data->permanent));
479 const char *permanent; local
482 permanent = eap_sim_db_get_permanent(
485 if (permanent == NULL) {
487 "identity - request permanent identity");
491 os_strlcpy(data->permanent, permanent,
[all...]
H A Deap_server_aka.c53 char permanent[20]; /* Permanent username */ member in struct:eap_aka_data
112 os_strlcpy(data->permanent, data->reauth->permanent,
113 sizeof(data->permanent));
155 const char *permanent; local
158 permanent = eap_sim_db_get_permanent(
160 if (permanent == NULL) {
163 "identity - request permanent identity");
167 os_strlcpy(data->permanent, permanent,
749 const char *permanent; local
[all...]
H A Deap_sim_db.c32 char *permanent; /* permanent username */ member in struct:eap_sim_pseudonym
95 " permanent CHAR(21) PRIMARY KEY,"
116 " permanent CHAR(21) PRIMARY KEY,"
178 const char *permanent, char *pseudonym)
183 if (!valid_db_string(permanent) || !valid_db_string(pseudonym)) {
189 "(permanent, pseudonym) VALUES ('%s', '%s');",
190 permanent, pseudonym);
209 if (os_strcmp(col[i], "permanent") == 0 && argv[i]) {
228 "SELECT permanent FRO
177 db_add_pseudonym(struct eap_sim_db_data *data, const char *permanent, char *pseudonym) argument
239 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
1043 eap_sim_db_add_pseudonym(struct eap_sim_db_data *data, const char *permanent, char *pseudonym) argument
1089 eap_sim_db_add_reauth_data(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter) argument
1146 eap_sim_db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk) argument
1187 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_sim_db.h55 const char *permanent, char *pseudonym);
57 int eap_sim_db_add_reauth(struct eap_sim_db_data *data, const char *permanent,
60 const char *permanent,
69 char *permanent; /* Permanent username */ member in struct:eap_sim_reauth
H A Deap_server_sim.c40 char permanent[20]; /* Permanent username */ member in struct:eap_sim_data
470 os_strlcpy(data->permanent, data->reauth->permanent,
471 sizeof(data->permanent));
479 const char *permanent; local
482 permanent = eap_sim_db_get_permanent(
485 if (permanent == NULL) {
487 "identity - request permanent identity");
491 os_strlcpy(data->permanent, permanent,
[all...]
H A Deap_server_aka.c53 char permanent[20]; /* Permanent username */ member in struct:eap_aka_data
112 os_strlcpy(data->permanent, data->reauth->permanent,
113 sizeof(data->permanent));
155 const char *permanent; local
158 permanent = eap_sim_db_get_permanent(
160 if (permanent == NULL) {
163 "identity - request permanent identity");
167 os_strlcpy(data->permanent, permanent,
749 const char *permanent; local
[all...]
H A Deap_sim_db.c32 char *permanent; /* permanent username */ member in struct:eap_sim_pseudonym
95 " permanent CHAR(21) PRIMARY KEY,"
116 " permanent CHAR(21) PRIMARY KEY,"
178 const char *permanent, char *pseudonym)
183 if (!valid_db_string(permanent) || !valid_db_string(pseudonym)) {
189 "(permanent, pseudonym) VALUES ('%s', '%s');",
190 permanent, pseudonym);
209 if (os_strcmp(col[i], "permanent") == 0 && argv[i]) {
228 "SELECT permanent FRO
177 db_add_pseudonym(struct eap_sim_db_data *data, const char *permanent, char *pseudonym) argument
239 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
1043 eap_sim_db_add_pseudonym(struct eap_sim_db_data *data, const char *permanent, char *pseudonym) argument
1089 eap_sim_db_add_reauth_data(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter) argument
1146 eap_sim_db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk) argument
1187 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_sim_db.h55 const char *permanent, char *pseudonym);
57 int eap_sim_db_add_reauth(struct eap_sim_db_data *data, const char *permanent,
60 const char *permanent,
69 char *permanent; /* Permanent username */ member in struct:eap_sim_reauth
H A Deap_server_sim.c40 char permanent[20]; /* Permanent username */ member in struct:eap_sim_data
470 os_strlcpy(data->permanent, data->reauth->permanent,
471 sizeof(data->permanent));
479 const char *permanent; local
482 permanent = eap_sim_db_get_permanent(
485 if (permanent == NULL) {
487 "identity - request permanent identity");
491 os_strlcpy(data->permanent, permanent,
[all...]
H A Deap_server_aka.c53 char permanent[20]; /* Permanent username */ member in struct:eap_aka_data
112 os_strlcpy(data->permanent, data->reauth->permanent,
113 sizeof(data->permanent));
155 const char *permanent; local
158 permanent = eap_sim_db_get_permanent(
160 if (permanent == NULL) {
163 "identity - request permanent identity");
167 os_strlcpy(data->permanent, permanent,
749 const char *permanent; local
[all...]
H A Deap_sim_db.c32 char *permanent; /* permanent username */ member in struct:eap_sim_pseudonym
95 " permanent CHAR(21) PRIMARY KEY,"
116 " permanent CHAR(21) PRIMARY KEY,"
178 const char *permanent, char *pseudonym)
183 if (!valid_db_string(permanent) || !valid_db_string(pseudonym)) {
189 "(permanent, pseudonym) VALUES ('%s', '%s');",
190 permanent, pseudonym);
209 if (os_strcmp(col[i], "permanent") == 0 && argv[i]) {
228 "SELECT permanent FRO
177 db_add_pseudonym(struct eap_sim_db_data *data, const char *permanent, char *pseudonym) argument
239 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
1043 eap_sim_db_add_pseudonym(struct eap_sim_db_data *data, const char *permanent, char *pseudonym) argument
1089 eap_sim_db_add_reauth_data(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter) argument
1146 eap_sim_db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk) argument
1187 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
[all...]
/external/chromium/crypto/
H A Drsa_private_key_nss.cc54 PR_FALSE /* not permanent */,
61 PR_TRUE /* permanent */,
69 PR_FALSE /* not permanent */,
77 PR_TRUE /* permanent */,
188 bool permanent,
202 &result->public_key_, permanent, sensitive, NULL);
212 const std::vector<uint8>& input, bool permanent, bool sensitive) {
232 slot, &der_private_key_info, NULL, NULL, permanent, sensitive,
187 CreateWithParams(uint16 num_bits, bool permanent, bool sensitive) argument
211 CreateFromPrivateKeyInfoWithParams( const std::vector<uint8>& input, bool permanent, bool sensitive) argument
/external/chromium_org/crypto/
H A Drsa_private_key_nss.cc55 false /* not permanent */,
63 false /* not permanent */,
71 true /* permanent */,
79 true /* permanent */,
204 bool permanent,
207 if (permanent) {
217 ScopedPK11Slot slot(permanent ? GetPrivateNSSKeySlot() :
229 permanent,
240 const std::vector<uint8>& input, bool permanent, bool sensitive) {
242 if (permanent) {
203 CreateWithParams(uint16 num_bits, bool permanent, bool sensitive) argument
239 CreateFromPrivateKeyInfoWithParams( const std::vector<uint8>& input, bool permanent, bool sensitive) argument
[all...]
H A Dec_private_key_nss.cc91 return CreateWithParams(PR_FALSE /* not permanent */,
98 return CreateWithParams(PR_TRUE /* permanent */,
102 // create permanent keys.
117 PR_FALSE /* not permanent */,
131 PR_TRUE /* permanent */,
135 // create permanent keys.
147 bool permanent,
196 permanent,
278 ECPrivateKey* ECPrivateKey::CreateWithParams(bool permanent, argument
313 permanent,
142 ImportFromEncryptedPrivateKeyInfo( const std::string& password, const uint8* encrypted_private_key_info, size_t encrypted_private_key_info_len, CERTSubjectPublicKeyInfo* decoded_spki, bool permanent, bool sensitive, SECKEYPrivateKey** key, SECKEYPublicKey** public_key) argument
325 CreateFromEncryptedPrivateKeyInfoWithParams( const std::string& password, const std::vector<uint8>& encrypted_private_key_info, const std::vector<uint8>& subject_public_key_info, bool permanent, bool sensitive) argument
[all...]
/external/valgrind/main/VEX/priv/
H A Dmain_util.c65 static HChar permanent[N_PERMANENT_BYTES] __attribute__((aligned(8))); variable
66 static HChar* permanent_first = &permanent[0];
67 static HChar* permanent_curr = &permanent[0];
68 static HChar* permanent_last = &permanent[N_PERMANENT_BYTES-1];
76 vassert(permanent_first == &permanent[0]);
77 vassert(permanent_last == &permanent[N_PERMANENT_BYTES-1]);
163 if (private_LibVEX_alloc_first == &permanent[0]) pool = "PERM";
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Djavax.servlet_2.5.0.v200910301333.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
H A Dorg.mortbay.jetty.server_6.1.23.v201004211559.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...

Completed in 1083 milliseconds