/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_sim_db.h | 55 const char *permanent, char *pseudonym); 57 int eap_sim_db_add_reauth(struct eap_sim_db_data *data, const char *permanent, 60 const char *permanent, 69 char *permanent; /* Permanent username */ member in struct:eap_sim_reauth
|
H A D | eap_sim_db.c | 32 char *permanent; /* permanent username */ member in struct:eap_sim_pseudonym 94 " permanent CHAR(21) PRIMARY KEY," 115 " permanent CHAR(21) PRIMARY KEY," 177 const char *permanent, char *pseudonym) 182 if (!valid_db_string(permanent) || !valid_db_string(pseudonym)) { 188 "(permanent, pseudonym) VALUES ('%s', '%s');", 189 permanent, pseudonym); 208 if (os_strcmp(col[i], "permanent") == 0 && argv[i]) { 227 "SELECT permanent FRO 176 db_add_pseudonym(struct eap_sim_db_data *data, const char *permanent, char *pseudonym) argument 238 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument 1052 eap_sim_db_add_pseudonym(struct eap_sim_db_data *data, const char *permanent, char *pseudonym) argument 1098 eap_sim_db_add_reauth_data(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter) argument 1155 eap_sim_db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk) argument 1196 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument [all...] |
H A D | eap_server_aka.c | 53 char permanent[20]; /* Permanent username */ member in struct:eap_aka_data 112 os_strlcpy(data->permanent, data->reauth->permanent, 113 sizeof(data->permanent)); 155 const char *permanent; local 158 permanent = eap_sim_db_get_permanent( 160 if (permanent == NULL) { 163 "identity - request permanent identity"); 167 os_strlcpy(data->permanent, permanent, 749 const char *permanent; local [all...] |
H A D | eap_server_sim.c | 40 char permanent[20]; /* Permanent username */ member in struct:eap_sim_data 470 os_strlcpy(data->permanent, data->reauth->permanent, 471 sizeof(data->permanent)); 479 const char *permanent; local 482 permanent = eap_sim_db_get_permanent( 485 if (permanent == NULL) { 487 "identity - request permanent identity"); 491 os_strlcpy(data->permanent, permanent, [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_sim_db.h | 55 const char *permanent, char *pseudonym); 57 int eap_sim_db_add_reauth(struct eap_sim_db_data *data, const char *permanent, 60 const char *permanent, 69 char *permanent; /* Permanent username */ member in struct:eap_sim_reauth
|
H A D | eap_sim_db.c | 32 char *permanent; /* permanent username */ member in struct:eap_sim_pseudonym 94 " permanent CHAR(21) PRIMARY KEY," 115 " permanent CHAR(21) PRIMARY KEY," 177 const char *permanent, char *pseudonym) 182 if (!valid_db_string(permanent) || !valid_db_string(pseudonym)) { 188 "(permanent, pseudonym) VALUES ('%s', '%s');", 189 permanent, pseudonym); 208 if (os_strcmp(col[i], "permanent") == 0 && argv[i]) { 227 "SELECT permanent FRO 176 db_add_pseudonym(struct eap_sim_db_data *data, const char *permanent, char *pseudonym) argument 238 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument 1052 eap_sim_db_add_pseudonym(struct eap_sim_db_data *data, const char *permanent, char *pseudonym) argument 1098 eap_sim_db_add_reauth_data(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter) argument 1155 eap_sim_db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk) argument 1196 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument [all...] |
H A D | eap_server_aka.c | 53 char permanent[20]; /* Permanent username */ member in struct:eap_aka_data 112 os_strlcpy(data->permanent, data->reauth->permanent, 113 sizeof(data->permanent)); 155 const char *permanent; local 158 permanent = eap_sim_db_get_permanent( 160 if (permanent == NULL) { 163 "identity - request permanent identity"); 167 os_strlcpy(data->permanent, permanent, 749 const char *permanent; local [all...] |
H A D | eap_server_sim.c | 40 char permanent[20]; /* Permanent username */ member in struct:eap_sim_data 470 os_strlcpy(data->permanent, data->reauth->permanent, 471 sizeof(data->permanent)); 479 const char *permanent; local 482 permanent = eap_sim_db_get_permanent( 485 if (permanent == NULL) { 487 "identity - request permanent identity"); 491 os_strlcpy(data->permanent, permanent, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.h | 55 const char *permanent, char *pseudonym); 57 int eap_sim_db_add_reauth(struct eap_sim_db_data *data, const char *permanent, 60 const char *permanent, 69 char *permanent; /* Permanent username */ member in struct:eap_sim_reauth
|
H A D | eap_sim_db.c | 32 char *permanent; /* permanent username */ member in struct:eap_sim_pseudonym 94 " permanent CHAR(21) PRIMARY KEY," 115 " permanent CHAR(21) PRIMARY KEY," 177 const char *permanent, char *pseudonym) 182 if (!valid_db_string(permanent) || !valid_db_string(pseudonym)) { 188 "(permanent, pseudonym) VALUES ('%s', '%s');", 189 permanent, pseudonym); 208 if (os_strcmp(col[i], "permanent") == 0 && argv[i]) { 227 "SELECT permanent FRO 176 db_add_pseudonym(struct eap_sim_db_data *data, const char *permanent, char *pseudonym) argument 238 db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument 1052 eap_sim_db_add_pseudonym(struct eap_sim_db_data *data, const char *permanent, char *pseudonym) argument 1098 eap_sim_db_add_reauth_data(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter) argument 1155 eap_sim_db_add_reauth(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *mk) argument 1196 eap_sim_db_add_reauth_prime(struct eap_sim_db_data *data, const char *permanent, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument [all...] |
H A D | eap_server_aka.c | 53 char permanent[20]; /* Permanent username */ member in struct:eap_aka_data 112 os_strlcpy(data->permanent, data->reauth->permanent, 113 sizeof(data->permanent)); 155 const char *permanent; local 158 permanent = eap_sim_db_get_permanent( 160 if (permanent == NULL) { 163 "identity - request permanent identity"); 167 os_strlcpy(data->permanent, permanent, 749 const char *permanent; local [all...] |
H A D | eap_server_sim.c | 40 char permanent[20]; /* Permanent username */ member in struct:eap_sim_data 470 os_strlcpy(data->permanent, data->reauth->permanent, 471 sizeof(data->permanent)); 479 const char *permanent; local 482 permanent = eap_sim_db_get_permanent( 485 if (permanent == NULL) { 487 "identity - request permanent identity"); 491 os_strlcpy(data->permanent, permanent, [all...] |
/external/chromium_org/crypto/ |
H A D | ec_private_key.h | 47 // fails. The created key is permanent and is not exportable in plaintext 65 // This can return NULL if initialization fails. The created key is permanent 85 bool permanent, 127 // TODO(cmasone): consider replacing |permanent| and |sensitive| with a 130 bool permanent, 140 bool permanent,
|
H A D | ec_private_key_nss.cc | 95 false /* not permanent */, 103 slot, true /* permanent */, true /* sensitive */); 120 false /* not permanent */, 136 true /* permanent */, 148 bool permanent, 203 permanent, 318 bool permanent, 350 permanent, 368 bool permanent, 390 permanent, 142 ImportFromEncryptedPrivateKeyInfo( PK11SlotInfo* slot, const std::string& password, const uint8* encrypted_private_key_info, size_t encrypted_private_key_info_len, CERTSubjectPublicKeyInfo* decoded_spki, bool permanent, bool sensitive, SECKEYPrivateKey** key, SECKEYPublicKey** public_key) argument 317 CreateWithParams(PK11SlotInfo* slot, bool permanent, bool sensitive) argument 363 CreateFromEncryptedPrivateKeyInfoWithParams( PK11SlotInfo* slot, const std::string& password, const std::vector<uint8>& encrypted_private_key_info, const std::vector<uint8>& subject_public_key_info, bool permanent, bool sensitive) argument [all...] |
H A D | rsa_private_key_nss.cc | 90 false /* not permanent */, 103 false /* not permanent */, 113 true /* permanent */, 123 true /* permanent */, 247 bool permanent, 261 permanent, 274 bool permanent, 289 slot, &der_private_key_info, NULL, NULL, permanent, sensitive, 245 CreateWithParams(PK11SlotInfo* slot, uint16 num_bits, bool permanent, bool sensitive) argument 271 CreateFromPrivateKeyInfoWithParams( PK11SlotInfo* slot, const std::vector<uint8>& input, bool permanent, bool sensitive) argument
|
/external/chromium_org/crypto/third_party/nss/ |
H A D | chromium-nss.h | 67 PRBool permanent,
|
H A D | pk11akey.cc | 54 PRBool permanent, 84 public_value, permanent, sensitive, CKK_EC, 48 ImportEncryptedECPrivateKeyInfoAndReturnKey( PK11SlotInfo* slot, SECKEYEncryptedPrivateKeyInfo* epki, SECItem* password, SECItem* nickname, SECItem* public_value, PRBool permanent, PRBool sensitive, SECKEYPrivateKey** private_key, void* wincx) argument
|
/external/chromium_org/chrome/common/extensions/docs/server2/ |
H A D | render_servlet.py | 52 return Response.Redirect('/' + path, permanent=True) 96 return Response.Redirect(redirect, permanent=False) 101 return Response.Redirect('/' + redirect_path, permanent=False) 107 permanent=False)
|
H A D | patch_servlet.py | 114 redirect_url, permanent = response.GetRedirect() 117 permanent)
|
H A D | render_servlet_test.py | 28 Response.Redirect('/apps/storage', permanent=False), 34 Response.Redirect('/extensions/storage', permanent=True), 40 permanent=False), 44 permanent=False),
|
H A D | servlet.py | 92 def Redirect(url, permanent=False): 95 status = 301 if permanent else 302
|
/external/chromium_org/net/base/ |
H A D | net_util_posix.cc | 45 NetworkInterfaceInfo() : permanent(true) { } 47 bool permanent; // IPv6 has notion of temporary address. If the address is member in struct:net::__anon9034::NetworkInterfaceInfo 52 // This method will remove permanent IPv6 addresses if a temporary address 63 if (!i->permanent && i->interface.address.size() == kIPv6AddressSize) { 74 // If the address is IPv6 and it's permanent and there is temporary 76 if ((i->interface.address.size() == kIPv6AddressSize) && i->permanent && 235 network_info.permanent = !(ifr.ifr_ifru.ifru_flags & IN6_IFF_TEMPORARY);
|
/external/valgrind/main/VEX/priv/ |
H A D | main_util.c | 65 static HChar permanent[N_PERMANENT_BYTES] __attribute__((aligned(8))); variable 66 static HChar* permanent_first = &permanent[0]; 67 static HChar* permanent_curr = &permanent[0]; 68 static HChar* permanent_last = &permanent[N_PERMANENT_BYTES-1]; 76 vassert(permanent_first == &permanent[0]); 77 vassert(permanent_last == &permanent[N_PERMANENT_BYTES-1]); 163 if (private_LibVEX_alloc_first == &permanent[0]) pool = "PERM";
|
/external/libselinux/include/selinux/ |
H A D | selinux.h | 212 SELboolean * const boollist, int permanent);
|
/external/qemu/distrib/libselinux/include/selinux/ |
H A D | selinux.h | 212 SELboolean * const boollist, int permanent);
|