/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_pwd_common.h | 55 u8 identity[0]; /* length inferred from payload */ member in struct:eap_pwd_id
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_config.h | 17 * identity - EAP Identity 19 * This field is used to set the real user identity or NAI (for 22 u8 *identity; member in struct:eap_peer_config 33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 34 * real identity (identity field) only to the authentication server. 36 * If not set, the identity field will be used for both unencrypted and 40 * pseudonym identity. 547 * pending_req_identity - Whether there is a pending identity request
|
H A D | eap_aka.c | 374 const u8 *identity = NULL; local 384 /* Look for the realm of the permanent identity */ 385 identity = eap_get_config_identity(sm, &identity_len); 386 if (identity) { 387 for (realm = identity, realm_len = identity_len; 596 const u8 *identity = NULL; local 602 identity = data->reauth_id; 607 identity = data->pseudonym; 611 identity = eap_get_config_identity(sm, &identity_len); 612 if (identity) { 886 const u8 *identity; local [all...] |
H A D | eap_sim.c | 394 const u8 *identity = NULL; local 404 /* Look for the realm of the permanent identity */ 405 identity = eap_get_config_identity(sm, &identity_len); 406 if (identity) { 407 for (realm = identity, realm_len = identity_len; 475 const u8 *identity = NULL; local 481 identity = data->reauth_id; 486 identity = data->pseudonym; 490 identity = eap_get_config_identity(sm, &identity_len); 491 if (identity) { 701 const u8 *identity; local [all...] |
H A D | eap_ttls.c | 430 const u8 *identity, *password; local 436 identity = eap_get_config_identity(sm, &identity_len); 438 if (identity == NULL || password == NULL) 451 identity, identity_len); 485 if (mschapv2_derive_response(identity, identity_len, password, 519 const u8 *identity, *password; local 525 identity = eap_get_config_identity(sm, &identity_len); 527 if (identity == NULL || password == NULL) 540 identity, identity_len); 602 const u8 *identity, *passwor local 655 const u8 *identity, *password; local [all...] |
/external/chromium-trace/trace-viewer/third_party/gl-matrix/spec/gl-matrix/ |
H A D | mat4-spec.js | 24 var out, matA, matB, identity, result; 43 identity = [1, 0, 0, 0, 51 it("should return a 16 element array initialized to a 4x4 identity matrix", function() { expect(result).toBeEqualish(identity); }); 65 describe("identity", function() { 66 beforeEach(function() { result = mat4.identity(out); }); 67 it("should place values into out", function() { expect(result).toBeEqualish(identity); });
|
/external/chromium_org/chrome/common/extensions/docs/examples/apps/hello-php/lib/lightopenid/ |
H A D | openid.php | 12 * $openid->identity = 'ID supplied by user'; 52 private $identity, $claimed_id; 82 case 'identity': 104 case 'identity': 105 # We return claimed_id instead of identity, 107 # i.e. what he set as identity, not the op-local identifier (which is what we verify) 181 if (!$url) throw new ErrorException('No identity supplied.'); 229 if (isset($delegate[2])) $this->identity = trim($delegate[2]); 251 if (isset($delegate[1])) $this->identity = $delegate[1]; 294 $this->identity variable [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_aka.c | 374 const u8 *identity = NULL; local 384 /* Look for the realm of the permanent identity */ 385 identity = eap_get_config_identity(sm, &identity_len); 386 if (identity) { 387 for (realm = identity, realm_len = identity_len; 596 const u8 *identity = NULL; local 602 identity = data->reauth_id; 607 identity = data->pseudonym; 611 identity = eap_get_config_identity(sm, &identity_len); 612 if (identity) { 886 const u8 *identity; local [all...] |
H A D | eap_sim.c | 394 const u8 *identity = NULL; local 404 /* Look for the realm of the permanent identity */ 405 identity = eap_get_config_identity(sm, &identity_len); 406 if (identity) { 407 for (realm = identity, realm_len = identity_len; 475 const u8 *identity = NULL; local 481 identity = data->reauth_id; 486 identity = data->pseudonym; 490 identity = eap_get_config_identity(sm, &identity_len); 491 if (identity) { 701 const u8 *identity; local [all...] |
H A D | eap_ttls.c | 430 const u8 *identity, *password; local 436 identity = eap_get_config_identity(sm, &identity_len); 438 if (identity == NULL || password == NULL) 451 identity, identity_len); 485 if (mschapv2_derive_response(identity, identity_len, password, 519 const u8 *identity, *password; local 525 identity = eap_get_config_identity(sm, &identity_len); 527 if (identity == NULL || password == NULL) 540 identity, identity_len); 602 const u8 *identity, *passwor local 655 const u8 *identity, *password; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_aka.c | 374 const u8 *identity = NULL; local 384 /* Look for the realm of the permanent identity */ 385 identity = eap_get_config_identity(sm, &identity_len); 386 if (identity) { 387 for (realm = identity, realm_len = identity_len; 596 const u8 *identity = NULL; local 602 identity = data->reauth_id; 607 identity = data->pseudonym; 611 identity = eap_get_config_identity(sm, &identity_len); 612 if (identity) { 886 const u8 *identity; local [all...] |
H A D | eap_sim.c | 394 const u8 *identity = NULL; local 404 /* Look for the realm of the permanent identity */ 405 identity = eap_get_config_identity(sm, &identity_len); 406 if (identity) { 407 for (realm = identity, realm_len = identity_len; 475 const u8 *identity = NULL; local 481 identity = data->reauth_id; 486 identity = data->pseudonym; 490 identity = eap_get_config_identity(sm, &identity_len); 491 if (identity) { 701 const u8 *identity; local [all...] |
H A D | eap_ttls.c | 430 const u8 *identity, *password; local 436 identity = eap_get_config_identity(sm, &identity_len); 438 if (identity == NULL || password == NULL) 451 identity, identity_len); 485 if (mschapv2_derive_response(identity, identity_len, password, 519 const u8 *identity, *password; local 525 identity = eap_get_config_identity(sm, &identity_len); 527 if (identity == NULL || password == NULL) 540 identity, identity_len); 602 const u8 *identity, *passwor local 655 const u8 *identity, *password; local [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | SSLParametersImpl.java | 666 String identity = pskCallbacks.chooseClientPSKIdentity(pskKeyManager, identityHint); 667 // Store identity in NULL-terminated modified UTF-8 representation into ientityBytesOut 669 if (identity == null) { 670 identity = ""; 672 } else if (identity.isEmpty()) { 676 identityBytes = identity.getBytes("UTF-8"); 690 SecretKey secretKey = pskCallbacks.getPSKKey(pskKeyManager, identityHint, identity); 706 String identityHint, String identity, byte[] key, PSKCallbacks pskCallbacks) { 711 SecretKey secretKey = pskCallbacks.getPSKKey(pskKeyManager, identityHint, identity); 782 SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity); argument 705 serverPSKKeyRequested( String identityHint, String identity, byte[] key, PSKCallbacks pskCallbacks) argument [all...] |
/external/guava/guava-tests/test/com/google/common/base/ |
H A D | FunctionsTest.java | 42 Function<String, String> identity = Functions.identity(); 43 assertNull(identity.apply(null)); 44 assertSame("foo", identity.apply("foo")); 48 Function<Long, Long> identity = Functions.identity(); 49 assertNotSame(new Long(135135L), identity.apply(new Long(135135L))); 54 checkCanReserializeSingleton(Functions.identity()); 346 .addEqualityGroup(Functions.identity())
|
/external/qemu/distrib/sdl-1.2.15/src/video/ |
H A D | SDL_pixels.c | 556 map->identity = 0; 567 map->identity = 1; 570 dstfmt->palette, &map->identity); 572 if ( ! map->identity ) { 578 map->identity = 0; 594 map->table = MapNto1(srcfmt, dstfmt, &map->identity); 595 if ( ! map->identity ) { 600 map->identity = 0; /* Don't optimize to copy */ 605 map->identity = 1;
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | dtlstransportchannel.cc | 158 rtc::SSLIdentity* identity) { 160 if (identity == local_identity_) { 162 LOG_J(LS_INFO, this) << "Ignoring identical DTLS identity"; 165 LOG_J(LS_ERROR, this) << "Can't change DTLS local identity in this state"; 170 if (identity) { 171 local_identity_ = identity; 174 LOG_J(LS_INFO, this) << "NULL DTLS identity supplied. Not doing DTLS"; 181 rtc::SSLIdentity** identity) const { 185 *identity = local_identity_->GetReference(); 157 SetLocalIdentity( rtc::SSLIdentity* identity) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_aka.c | 105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - " 106 "request full auth identity"); 136 /* Check if we already know the identity from EAP-Response/Identity */ 138 username = sim_get_username(sm->identity, sm->identity_len); 163 "identity - request permanent identity"); 360 * RFC 4187, Chap. 4.1.4 recommends that identity from EAP is 362 * identity. 370 } else if (sm->identity && sm->identity_len > 0 && 371 (sm->identity[ [all...] |
H A D | eap_server_sim.c | 113 * RFC 4186, Chap. 4.2.4 recommends that identity from EAP is 114 * ignored and the SIM/Start is used to request the identity. 126 * already know the identity of the peer, there is no need to 127 * request any identity in this case. 129 } else if (sm->identity && sm->identity_len > 0 && 130 sm->identity[0] == EAP_SIM_REAUTH_ID_PREFIX) { 262 eap_sim_derive_keys_reauth(data->counter, sm->identity, 427 * Special case for AT_COUNTER_TOO_SMALL recovery - no identity 434 * We always request identity in SIM/Start, so the peer is required to 437 if (!attr->identity || att [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_aka.c | 105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - " 106 "request full auth identity"); 136 /* Check if we already know the identity from EAP-Response/Identity */ 138 username = sim_get_username(sm->identity, sm->identity_len); 163 "identity - request permanent identity"); 360 * RFC 4187, Chap. 4.1.4 recommends that identity from EAP is 362 * identity. 370 } else if (sm->identity && sm->identity_len > 0 && 371 (sm->identity[ [all...] |
H A D | eap_server_sim.c | 113 * RFC 4186, Chap. 4.2.4 recommends that identity from EAP is 114 * ignored and the SIM/Start is used to request the identity. 126 * already know the identity of the peer, there is no need to 127 * request any identity in this case. 129 } else if (sm->identity && sm->identity_len > 0 && 130 sm->identity[0] == EAP_SIM_REAUTH_ID_PREFIX) { 262 eap_sim_derive_keys_reauth(data->counter, sm->identity, 427 * Special case for AT_COUNTER_TOO_SMALL recovery - no identity 434 * We always request identity in SIM/Start, so the peer is required to 437 if (!attr->identity || att [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_aka.c | 105 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - " 106 "request full auth identity"); 136 /* Check if we already know the identity from EAP-Response/Identity */ 138 username = sim_get_username(sm->identity, sm->identity_len); 163 "identity - request permanent identity"); 360 * RFC 4187, Chap. 4.1.4 recommends that identity from EAP is 362 * identity. 370 } else if (sm->identity && sm->identity_len > 0 && 371 (sm->identity[ [all...] |
/external/chromium_org/chrome/browser/extensions/api/identity/ |
H A D | identity_api.cc | 5 #include "chrome/browser/extensions/api/identity/identity_api.h" 26 #include "chrome/common/extensions/api/identity.h" 27 #include "chrome/common/extensions/api/identity/oauth2_manifest_handler.h" 82 namespace identity = api::identity; 229 api::identity::AccountInfo account_info; 233 api::identity::OnSignInChanged::Create(account_info, is_signed_in); 234 scoped_ptr<Event> event(new Event(api::identity::OnSignInChanged::kEventName, 280 api::identity::AccountInfo account_info; 295 TRACE_EVENT_ASYNC_END0("identity", "IdentityGetAuthTokenFunctio [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument 37 addr[0] = identity; 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument 62 addr[0] = identity; 108 const u8 *identity, size_t identity_len, 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { 120 "character from the end of identity"); 123 addr[0] = identity; 136 identity, identity_len); 276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument 37 addr[0] = identity; 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument 62 addr[0] = identity; 108 const u8 *identity, size_t identity_len, 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { 120 "character from the end of identity"); 123 addr[0] = identity; 136 identity, identity_len); 276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |