Searched refs:identity (Results 151 - 175 of 521) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_pwd_common.h55 u8 identity[0]; /* length inferred from payload */ member in struct:eap_pwd_id
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_config.h17 * identity - EAP Identity
19 * This field is used to set the real user identity or NAI (for
22 u8 *identity; member in struct:eap_peer_config
33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
34 * real identity (identity field) only to the authentication server.
36 * If not set, the identity field will be used for both unencrypted and
40 * pseudonym identity.
547 * pending_req_identity - Whether there is a pending identity request
H A Deap_aka.c374 const u8 *identity = NULL; local
384 /* Look for the realm of the permanent identity */
385 identity = eap_get_config_identity(sm, &identity_len);
386 if (identity) {
387 for (realm = identity, realm_len = identity_len;
596 const u8 *identity = NULL; local
602 identity = data->reauth_id;
607 identity = data->pseudonym;
611 identity = eap_get_config_identity(sm, &identity_len);
612 if (identity) {
886 const u8 *identity; local
[all...]
H A Deap_sim.c394 const u8 *identity = NULL; local
404 /* Look for the realm of the permanent identity */
405 identity = eap_get_config_identity(sm, &identity_len);
406 if (identity) {
407 for (realm = identity, realm_len = identity_len;
475 const u8 *identity = NULL; local
481 identity = data->reauth_id;
486 identity = data->pseudonym;
490 identity = eap_get_config_identity(sm, &identity_len);
491 if (identity) {
701 const u8 *identity; local
[all...]
H A Deap_ttls.c430 const u8 *identity, *password; local
436 identity = eap_get_config_identity(sm, &identity_len);
438 if (identity == NULL || password == NULL)
451 identity, identity_len);
485 if (mschapv2_derive_response(identity, identity_len, password,
519 const u8 *identity, *password; local
525 identity = eap_get_config_identity(sm, &identity_len);
527 if (identity == NULL || password == NULL)
540 identity, identity_len);
602 const u8 *identity, *passwor local
655 const u8 *identity, *password; local
[all...]
/external/chromium-trace/trace-viewer/third_party/gl-matrix/spec/gl-matrix/
H A Dmat4-spec.js24 var out, matA, matB, identity, result;
43 identity = [1, 0, 0, 0,
51 it("should return a 16 element array initialized to a 4x4 identity matrix", function() { expect(result).toBeEqualish(identity); });
65 describe("identity", function() {
66 beforeEach(function() { result = mat4.identity(out); });
67 it("should place values into out", function() { expect(result).toBeEqualish(identity); });
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-php/lib/lightopenid/
H A Dopenid.php12 * $openid->identity = 'ID supplied by user';
52 private $identity, $claimed_id;
82 case 'identity':
104 case 'identity':
105 # We return claimed_id instead of identity,
107 # i.e. what he set as identity, not the op-local identifier (which is what we verify)
181 if (!$url) throw new ErrorException('No identity supplied.');
229 if (isset($delegate[2])) $this->identity = trim($delegate[2]);
251 if (isset($delegate[1])) $this->identity = $delegate[1];
294 $this->identity variable
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_aka.c374 const u8 *identity = NULL; local
384 /* Look for the realm of the permanent identity */
385 identity = eap_get_config_identity(sm, &identity_len);
386 if (identity) {
387 for (realm = identity, realm_len = identity_len;
596 const u8 *identity = NULL; local
602 identity = data->reauth_id;
607 identity = data->pseudonym;
611 identity = eap_get_config_identity(sm, &identity_len);
612 if (identity) {
886 const u8 *identity; local
[all...]
H A Deap_sim.c394 const u8 *identity = NULL; local
404 /* Look for the realm of the permanent identity */
405 identity = eap_get_config_identity(sm, &identity_len);
406 if (identity) {
407 for (realm = identity, realm_len = identity_len;
475 const u8 *identity = NULL; local
481 identity = data->reauth_id;
486 identity = data->pseudonym;
490 identity = eap_get_config_identity(sm, &identity_len);
491 if (identity) {
701 const u8 *identity; local
[all...]
H A Deap_ttls.c430 const u8 *identity, *password; local
436 identity = eap_get_config_identity(sm, &identity_len);
438 if (identity == NULL || password == NULL)
451 identity, identity_len);
485 if (mschapv2_derive_response(identity, identity_len, password,
519 const u8 *identity, *password; local
525 identity = eap_get_config_identity(sm, &identity_len);
527 if (identity == NULL || password == NULL)
540 identity, identity_len);
602 const u8 *identity, *passwor local
655 const u8 *identity, *password; local
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_aka.c374 const u8 *identity = NULL; local
384 /* Look for the realm of the permanent identity */
385 identity = eap_get_config_identity(sm, &identity_len);
386 if (identity) {
387 for (realm = identity, realm_len = identity_len;
596 const u8 *identity = NULL; local
602 identity = data->reauth_id;
607 identity = data->pseudonym;
611 identity = eap_get_config_identity(sm, &identity_len);
612 if (identity) {
886 const u8 *identity; local
[all...]
H A Deap_sim.c394 const u8 *identity = NULL; local
404 /* Look for the realm of the permanent identity */
405 identity = eap_get_config_identity(sm, &identity_len);
406 if (identity) {
407 for (realm = identity, realm_len = identity_len;
475 const u8 *identity = NULL; local
481 identity = data->reauth_id;
486 identity = data->pseudonym;
490 identity = eap_get_config_identity(sm, &identity_len);
491 if (identity) {
701 const u8 *identity; local
[all...]
H A Deap_ttls.c430 const u8 *identity, *password; local
436 identity = eap_get_config_identity(sm, &identity_len);
438 if (identity == NULL || password == NULL)
451 identity, identity_len);
485 if (mschapv2_derive_response(identity, identity_len, password,
519 const u8 *identity, *password; local
525 identity = eap_get_config_identity(sm, &identity_len);
527 if (identity == NULL || password == NULL)
540 identity, identity_len);
602 const u8 *identity, *passwor local
655 const u8 *identity, *password; local
[all...]
/external/conscrypt/src/main/java/org/conscrypt/
H A DSSLParametersImpl.java666 String identity = pskCallbacks.chooseClientPSKIdentity(pskKeyManager, identityHint);
667 // Store identity in NULL-terminated modified UTF-8 representation into ientityBytesOut
669 if (identity == null) {
670 identity = "";
672 } else if (identity.isEmpty()) {
676 identityBytes = identity.getBytes("UTF-8");
690 SecretKey secretKey = pskCallbacks.getPSKKey(pskKeyManager, identityHint, identity);
706 String identityHint, String identity, byte[] key, PSKCallbacks pskCallbacks) {
711 SecretKey secretKey = pskCallbacks.getPSKKey(pskKeyManager, identityHint, identity);
782 SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity); argument
705 serverPSKKeyRequested( String identityHint, String identity, byte[] key, PSKCallbacks pskCallbacks) argument
[all...]
/external/guava/guava-tests/test/com/google/common/base/
H A DFunctionsTest.java42 Function<String, String> identity = Functions.identity();
43 assertNull(identity.apply(null));
44 assertSame("foo", identity.apply("foo"));
48 Function<Long, Long> identity = Functions.identity();
49 assertNotSame(new Long(135135L), identity.apply(new Long(135135L)));
54 checkCanReserializeSingleton(Functions.identity());
346 .addEqualityGroup(Functions.identity())
/external/qemu/distrib/sdl-1.2.15/src/video/
H A DSDL_pixels.c556 map->identity = 0;
567 map->identity = 1;
570 dstfmt->palette, &map->identity);
572 if ( ! map->identity ) {
578 map->identity = 0;
594 map->table = MapNto1(srcfmt, dstfmt, &map->identity);
595 if ( ! map->identity ) {
600 map->identity = 0; /* Don't optimize to copy */
605 map->identity = 1;
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Ddtlstransportchannel.cc158 rtc::SSLIdentity* identity) {
160 if (identity == local_identity_) {
162 LOG_J(LS_INFO, this) << "Ignoring identical DTLS identity";
165 LOG_J(LS_ERROR, this) << "Can't change DTLS local identity in this state";
170 if (identity) {
171 local_identity_ = identity;
174 LOG_J(LS_INFO, this) << "NULL DTLS identity supplied. Not doing DTLS";
181 rtc::SSLIdentity** identity) const {
185 *identity = local_identity_->GetReference();
157 SetLocalIdentity( rtc::SSLIdentity* identity) argument
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_aka.c105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
106 "request full auth identity");
136 /* Check if we already know the identity from EAP-Response/Identity */
138 username = sim_get_username(sm->identity, sm->identity_len);
163 "identity - request permanent identity");
360 * RFC 4187, Chap. 4.1.4 recommends that identity from EAP is
362 * identity.
370 } else if (sm->identity && sm->identity_len > 0 &&
371 (sm->identity[
[all...]
H A Deap_server_sim.c113 * RFC 4186, Chap. 4.2.4 recommends that identity from EAP is
114 * ignored and the SIM/Start is used to request the identity.
126 * already know the identity of the peer, there is no need to
127 * request any identity in this case.
129 } else if (sm->identity && sm->identity_len > 0 &&
130 sm->identity[0] == EAP_SIM_REAUTH_ID_PREFIX) {
262 eap_sim_derive_keys_reauth(data->counter, sm->identity,
427 * Special case for AT_COUNTER_TOO_SMALL recovery - no identity
434 * We always request identity in SIM/Start, so the peer is required to
437 if (!attr->identity || att
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_aka.c105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
106 "request full auth identity");
136 /* Check if we already know the identity from EAP-Response/Identity */
138 username = sim_get_username(sm->identity, sm->identity_len);
163 "identity - request permanent identity");
360 * RFC 4187, Chap. 4.1.4 recommends that identity from EAP is
362 * identity.
370 } else if (sm->identity && sm->identity_len > 0 &&
371 (sm->identity[
[all...]
H A Deap_server_sim.c113 * RFC 4186, Chap. 4.2.4 recommends that identity from EAP is
114 * ignored and the SIM/Start is used to request the identity.
126 * already know the identity of the peer, there is no need to
127 * request any identity in this case.
129 } else if (sm->identity && sm->identity_len > 0 &&
130 sm->identity[0] == EAP_SIM_REAUTH_ID_PREFIX) {
262 eap_sim_derive_keys_reauth(data->counter, sm->identity,
427 * Special case for AT_COUNTER_TOO_SMALL recovery - no identity
434 * We always request identity in SIM/Start, so the peer is required to
437 if (!attr->identity || att
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_aka.c105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
106 "request full auth identity");
136 /* Check if we already know the identity from EAP-Response/Identity */
138 username = sim_get_username(sm->identity, sm->identity_len);
163 "identity - request permanent identity");
360 * RFC 4187, Chap. 4.1.4 recommends that identity from EAP is
362 * identity.
370 } else if (sm->identity && sm->identity_len > 0 &&
371 (sm->identity[
[all...]
/external/chromium_org/chrome/browser/extensions/api/identity/
H A Didentity_api.cc5 #include "chrome/browser/extensions/api/identity/identity_api.h"
26 #include "chrome/common/extensions/api/identity.h"
27 #include "chrome/common/extensions/api/identity/oauth2_manifest_handler.h"
82 namespace identity = api::identity;
229 api::identity::AccountInfo account_info;
233 api::identity::OnSignInChanged::Create(account_info, is_signed_in);
234 scoped_ptr<Event> event(new Event(api::identity::OnSignInChanged::kEventName,
280 api::identity::AccountInfo account_info;
295 TRACE_EVENT_ASYNC_END0("identity", "IdentityGetAuthTokenFunctio
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument
37 addr[0] = identity;
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument
62 addr[0] = identity;
108 const u8 *identity, size_t identity_len,
118 while (identity_len > 0 && identity[identity_len - 1] == 0) {
120 "character from the end of identity");
123 addr[0] = identity;
136 identity, identity_len);
276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument
37 addr[0] = identity;
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument
62 addr[0] = identity;
108 const u8 *identity, size_t identity_len,
118 while (identity_len > 0 && identity[identity_len - 1] == 0) {
120 "character from the end of identity");
123 addr[0] = identity;
136 identity, identity_len);
276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]

Completed in 5007 milliseconds

1234567891011>>