Searched defs:identity (Results 101 - 125 of 199) sorted by relevance

12345678

/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_gpsk.c82 const u8 *identity, *password; local
97 identity = eap_get_config_identity(sm, &identity_len);
98 if (identity) {
104 os_memcpy(data->id_peer, identity, identity_len);
H A Deap_pwd.c88 const u8 *identity, *password; local
99 identity = eap_get_config_identity(sm, &identity_len);
100 if (identity == NULL) {
101 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!");
123 os_memcpy(data->id_peer, identity, identity_len);
278 os_memcpy(data->id_server, id->identity, data->id_server_len);
H A Deap_mschapv2.c157 const u8 *identity, *password; local
162 identity = eap_get_config_identity(sm, &identity_len);
164 if (identity == NULL || password == NULL)
207 if (mschapv2_derive_response(identity, identity_len, password,
221 wpabuf_put_data(resp, identity, identity_len);
H A Deap_sim.c394 const u8 *identity = NULL; local
404 /* Look for the realm of the permanent identity */
405 identity = eap_get_config_identity(sm, &identity_len);
406 if (identity) {
407 for (realm = identity, realm_len = identity_len;
475 const u8 *identity = NULL; local
481 identity = data->reauth_id;
486 identity = data->pseudonym;
490 identity = eap_get_config_identity(sm, &identity_len);
491 if (identity) {
701 const u8 *identity; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/
H A Deapol_auth_sm.c763 const char *identity, const char *radius_cui)
847 if (identity) {
848 sm->identity = (u8 *) os_strdup(identity);
849 if (sm->identity)
850 sm->identity_len = os_strlen(identity);
1007 static int eapol_sm_get_eap_user(void *ctx, const u8 *identity, argument
1014 ret = sm->eapol->cb.get_eap_user(sm->eapol->conf.ctx, identity,
760 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr, int flags, const struct wpabuf *assoc_wps_ie, const struct wpabuf *assoc_p2p_ie, void *sta_ctx, const char *identity, const char *radius_cui) argument
/external/conscrypt/src/main/java/org/conscrypt/
H A DOpenSSLEngineImpl.java614 public int clientPSKKeyRequested(String identityHint, byte[] identity, byte[] key) { argument
615 return sslParameters.clientPSKKeyRequested(identityHint, identity, key, this);
619 public int serverPSKKeyRequested(String identityHint, String identity, byte[] key) { argument
620 return sslParameters.serverPSKKeyRequested(identityHint, identity, key, this);
757 public SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity) { argument
758 return keyManager.getKey(identityHint, identity, this);
H A DOpenSSLSocketImpl.java454 public int clientPSKKeyRequested(String identityHint, byte[] identity, byte[] key) { argument
455 return sslParameters.clientPSKKeyRequested(identityHint, identity, key, this);
460 public int serverPSKKeyRequested(String identityHint, String identity, byte[] key) { argument
461 return sslParameters.serverPSKKeyRequested(identityHint, identity, key, this);
1276 public SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity) { argument
1277 return keyManager.getKey(identityHint, identity, this);
/external/deqp/modules/gles2/scripts/
H A Dgenutil.py581 def identity (numCols, numRows): member in class:Mat
599 res = Mat.identity(numCols, numRows)
/external/deqp/modules/gles3/scripts/
H A Dgenutil.py732 def identity (numCols, numRows): member in class:Mat
746 res = Mat.identity(numCols, numRows)
/external/deqp/modules/gles31/scripts/
H A Dgenutil.py734 def identity (numCols, numRows): member in class:Mat
748 res = Mat.identity(numCols, numRows)
/external/skia/src/ports/
H A DSkFontConfigInterface_direct.cpp556 SkStreamAsset* SkFontConfigInterfaceDirect::openStream(const FontIdentity& identity) { argument
557 return SkStream::NewFromFile(identity.fString.c_str());
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument
37 addr[0] = identity;
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument
62 addr[0] = identity;
108 const u8 *identity, size_t identity_len,
118 while (identity_len > 0 && identity[identity_len - 1] == 0) {
120 "character from the end of identity");
123 addr[0] = identity;
136 identity, identity_len);
276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_mschapv2.c157 const u8 *identity, *password; local
162 identity = eap_get_config_identity(sm, &identity_len);
164 if (identity == NULL || password == NULL)
207 if (mschapv2_derive_response(identity, identity_len, password,
221 wpabuf_put_data(resp, identity, identity_len);
H A Deap_sim.c394 const u8 *identity = NULL; local
404 /* Look for the realm of the permanent identity */
405 identity = eap_get_config_identity(sm, &identity_len);
406 if (identity) {
407 for (realm = identity, realm_len = identity_len;
475 const u8 *identity = NULL; local
481 identity = data->reauth_id;
486 identity = data->pseudonym;
490 identity = eap_get_config_identity(sm, &identity_len);
491 if (identity) {
701 const u8 *identity; local
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server.c151 * @identity: Identity (User-Name) of the user
152 * @identity_len: Length of identity in bytes
157 * selected based on the specified identity. sm->user and
161 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, argument
177 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity,
227 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) {
852 * EAP Identity exchange. Use keyName-NAI as the user identity
857 "EAP: Use keyName-NAI as user identity for backend authentication");
859 sm->identity = (u8 *) dup_binstr(parse.keyname,
861 if (!sm->identity)
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument
37 addr[0] = identity;
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument
62 addr[0] = identity;
108 const u8 *identity, size_t identity_len,
118 while (identity_len > 0 && identity[identity_len - 1] == 0) {
120 "character from the end of identity");
123 addr[0] = identity;
136 identity, identity_len);
276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_mschapv2.c157 const u8 *identity, *password; local
162 identity = eap_get_config_identity(sm, &identity_len);
164 if (identity == NULL || password == NULL)
207 if (mschapv2_derive_response(identity, identity_len, password,
221 wpabuf_put_data(resp, identity, identity_len);
H A Deap_sim.c394 const u8 *identity = NULL; local
404 /* Look for the realm of the permanent identity */
405 identity = eap_get_config_identity(sm, &identity_len);
406 if (identity) {
407 for (realm = identity, realm_len = identity_len;
475 const u8 *identity = NULL; local
481 identity = data->reauth_id;
486 identity = data->pseudonym;
490 identity = eap_get_config_identity(sm, &identity_len);
491 if (identity) {
701 const u8 *identity; local
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server.c151 * @identity: Identity (User-Name) of the user
152 * @identity_len: Length of identity in bytes
157 * selected based on the specified identity. sm->user and
161 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, argument
177 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity,
227 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) {
852 * EAP Identity exchange. Use keyName-NAI as the user identity
857 "EAP: Use keyName-NAI as user identity for backend authentication");
859 sm->identity = (u8 *) dup_binstr(parse.keyname,
861 if (!sm->identity)
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument
37 addr[0] = identity;
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument
62 addr[0] = identity;
108 const u8 *identity, size_t identity_len,
118 while (identity_len > 0 && identity[identity_len - 1] == 0) {
120 "character from the end of identity");
123 addr[0] = identity;
136 identity, identity_len);
276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server.c151 * @identity: Identity (User-Name) of the user
152 * @identity_len: Length of identity in bytes
157 * selected based on the specified identity. sm->user and
161 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, argument
177 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity,
227 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) {
852 * EAP Identity exchange. Use keyName-NAI as the user identity
857 "EAP: Use keyName-NAI as user identity for backend authentication");
859 sm->identity = (u8 *) dup_binstr(parse.keyname,
861 if (!sm->identity)
[all...]
/external/apache-xml/src/main/java/org/apache/xml/dtm/ref/sax2dtm/
H A DSAX2DTM.java211 * @param dtmIdentity The DTM identity ID for this DTM.
234 * @param dtmIdentity The DTM identity ID for this DTM.
303 * Get the data or qualified name for the given node identity.
305 * @param identity The node identity.
309 protected int _dataOrQName(int identity) argument
312 if (identity < m_size)
313 return m_dataOrQName.elementAt(identity);
324 else if (identity < m_size)
325 return m_dataOrQName.elementAt(identity);
709 getNextNodeIdentity(int identity) argument
[all...]
H A DSAX2DTM2.java616 * The node identity of _startNode for this iterator
813 /* _currentNode precedes candidates. This is the identity, not the handle! */
1544 * Tell if this node identity is a descendant. Assumes that
1554 * @param identity The index number of the node in question.
1557 protected final boolean isDescendant(int identity) argument
1559 return (_parent2(identity) >= _startNode) || (_startNode == identity);
1901 public final int _exptype(int identity) argument
1903 return m_exptype.elementAt(identity);
1919 * @param identity
1922 _exptype2(int identity) argument
1938 _nextsib2(int identity) argument
1954 _firstch2(int identity) argument
1970 _parent2(int identity) argument
1986 _type2(int identity) argument
2521 getFirstAttributeIdentity(int identity) argument
2563 getNextAttributeIdentity(int identity) argument
[all...]
/external/boringssl/src/ssl/
H A Ds3_clnt.c1087 omitted if no identity hint is sent. Set session->sess_cert anyway to
1139 /* Store PSK identity hint for later use, hint is used in
1141 * identity hint can be as long as the maximum length of a PSK identity.
1145 * a specific identity. */
1154 /* Save the identity hint as a C string. */
1639 char identity[PSK_MAX_IDENTITY_LEN + 1]; local
1648 memset(identity, 0, sizeof(identity));
1650 s->psk_client_callback(s, s->s3->tmp.peer_psk_identity_hint, identity,
[all...]
/external/boringssl/src/ssl/test/
H A Dbssl_shim.cc258 // Account for the trailing '\0' for the identity.
271 static unsigned PskServerCallback(SSL *ssl, const char *identity, argument
275 if (strcmp(identity, config->psk_identity.c_str()) != 0) {
276 fprintf(stderr, "Client PSK identity did not match.\n");

Completed in 784 milliseconds

12345678