/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_gpsk.c | 82 const u8 *identity, *password; local 97 identity = eap_get_config_identity(sm, &identity_len); 98 if (identity) { 104 os_memcpy(data->id_peer, identity, identity_len);
|
H A D | eap_pwd.c | 88 const u8 *identity, *password; local 99 identity = eap_get_config_identity(sm, &identity_len); 100 if (identity == NULL) { 101 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); 123 os_memcpy(data->id_peer, identity, identity_len); 278 os_memcpy(data->id_server, id->identity, data->id_server_len);
|
H A D | eap_mschapv2.c | 157 const u8 *identity, *password; local 162 identity = eap_get_config_identity(sm, &identity_len); 164 if (identity == NULL || password == NULL) 207 if (mschapv2_derive_response(identity, identity_len, password, 221 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_sim.c | 394 const u8 *identity = NULL; local 404 /* Look for the realm of the permanent identity */ 405 identity = eap_get_config_identity(sm, &identity_len); 406 if (identity) { 407 for (realm = identity, realm_len = identity_len; 475 const u8 *identity = NULL; local 481 identity = data->reauth_id; 486 identity = data->pseudonym; 490 identity = eap_get_config_identity(sm, &identity_len); 491 if (identity) { 701 const u8 *identity; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 763 const char *identity, const char *radius_cui) 847 if (identity) { 848 sm->identity = (u8 *) os_strdup(identity); 849 if (sm->identity) 850 sm->identity_len = os_strlen(identity); 1007 static int eapol_sm_get_eap_user(void *ctx, const u8 *identity, argument 1014 ret = sm->eapol->cb.get_eap_user(sm->eapol->conf.ctx, identity, 760 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr, int flags, const struct wpabuf *assoc_wps_ie, const struct wpabuf *assoc_p2p_ie, void *sta_ctx, const char *identity, const char *radius_cui) argument
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | OpenSSLEngineImpl.java | 614 public int clientPSKKeyRequested(String identityHint, byte[] identity, byte[] key) { argument 615 return sslParameters.clientPSKKeyRequested(identityHint, identity, key, this); 619 public int serverPSKKeyRequested(String identityHint, String identity, byte[] key) { argument 620 return sslParameters.serverPSKKeyRequested(identityHint, identity, key, this); 757 public SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity) { argument 758 return keyManager.getKey(identityHint, identity, this);
|
H A D | OpenSSLSocketImpl.java | 454 public int clientPSKKeyRequested(String identityHint, byte[] identity, byte[] key) { argument 455 return sslParameters.clientPSKKeyRequested(identityHint, identity, key, this); 460 public int serverPSKKeyRequested(String identityHint, String identity, byte[] key) { argument 461 return sslParameters.serverPSKKeyRequested(identityHint, identity, key, this); 1276 public SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity) { argument 1277 return keyManager.getKey(identityHint, identity, this);
|
/external/deqp/modules/gles2/scripts/ |
H A D | genutil.py | 581 def identity (numCols, numRows): member in class:Mat 599 res = Mat.identity(numCols, numRows)
|
/external/deqp/modules/gles3/scripts/ |
H A D | genutil.py | 732 def identity (numCols, numRows): member in class:Mat 746 res = Mat.identity(numCols, numRows)
|
/external/deqp/modules/gles31/scripts/ |
H A D | genutil.py | 734 def identity (numCols, numRows): member in class:Mat 748 res = Mat.identity(numCols, numRows)
|
/external/skia/src/ports/ |
H A D | SkFontConfigInterface_direct.cpp | 556 SkStreamAsset* SkFontConfigInterfaceDirect::openStream(const FontIdentity& identity) { argument 557 return SkStream::NewFromFile(identity.fString.c_str());
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument 37 addr[0] = identity; 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument 62 addr[0] = identity; 108 const u8 *identity, size_t identity_len, 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { 120 "character from the end of identity"); 123 addr[0] = identity; 136 identity, identity_len); 276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_mschapv2.c | 157 const u8 *identity, *password; local 162 identity = eap_get_config_identity(sm, &identity_len); 164 if (identity == NULL || password == NULL) 207 if (mschapv2_derive_response(identity, identity_len, password, 221 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_sim.c | 394 const u8 *identity = NULL; local 404 /* Look for the realm of the permanent identity */ 405 identity = eap_get_config_identity(sm, &identity_len); 406 if (identity) { 407 for (realm = identity, realm_len = identity_len; 475 const u8 *identity = NULL; local 481 identity = data->reauth_id; 486 identity = data->pseudonym; 490 identity = eap_get_config_identity(sm, &identity_len); 491 if (identity) { 701 const u8 *identity; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server.c | 151 * @identity: Identity (User-Name) of the user 152 * @identity_len: Length of identity in bytes 157 * selected based on the specified identity. sm->user and 161 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, argument 177 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity, 227 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) { 852 * EAP Identity exchange. Use keyName-NAI as the user identity 857 "EAP: Use keyName-NAI as user identity for backend authentication"); 859 sm->identity = (u8 *) dup_binstr(parse.keyname, 861 if (!sm->identity) [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument 37 addr[0] = identity; 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument 62 addr[0] = identity; 108 const u8 *identity, size_t identity_len, 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { 120 "character from the end of identity"); 123 addr[0] = identity; 136 identity, identity_len); 276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_mschapv2.c | 157 const u8 *identity, *password; local 162 identity = eap_get_config_identity(sm, &identity_len); 164 if (identity == NULL || password == NULL) 207 if (mschapv2_derive_response(identity, identity_len, password, 221 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_sim.c | 394 const u8 *identity = NULL; local 404 /* Look for the realm of the permanent identity */ 405 identity = eap_get_config_identity(sm, &identity_len); 406 if (identity) { 407 for (realm = identity, realm_len = identity_len; 475 const u8 *identity = NULL; local 481 identity = data->reauth_id; 486 identity = data->pseudonym; 490 identity = eap_get_config_identity(sm, &identity_len); 491 if (identity) { 701 const u8 *identity; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server.c | 151 * @identity: Identity (User-Name) of the user 152 * @identity_len: Length of identity in bytes 157 * selected based on the specified identity. sm->user and 161 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, argument 177 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity, 227 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) { 852 * EAP Identity exchange. Use keyName-NAI as the user identity 857 "EAP: Use keyName-NAI as user identity for backend authentication"); 859 sm->identity = (u8 *) dup_binstr(parse.keyname, 861 if (!sm->identity) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument 37 addr[0] = identity; 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument 62 addr[0] = identity; 108 const u8 *identity, size_t identity_len, 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { 120 "character from the end of identity"); 123 addr[0] = identity; 136 identity, identity_len); 276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server.c | 151 * @identity: Identity (User-Name) of the user 152 * @identity_len: Length of identity in bytes 157 * selected based on the specified identity. sm->user and 161 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, argument 177 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity, 227 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) { 852 * EAP Identity exchange. Use keyName-NAI as the user identity 857 "EAP: Use keyName-NAI as user identity for backend authentication"); 859 sm->identity = (u8 *) dup_binstr(parse.keyname, 861 if (!sm->identity) [all...] |
/external/apache-xml/src/main/java/org/apache/xml/dtm/ref/sax2dtm/ |
H A D | SAX2DTM.java | 211 * @param dtmIdentity The DTM identity ID for this DTM. 234 * @param dtmIdentity The DTM identity ID for this DTM. 303 * Get the data or qualified name for the given node identity. 305 * @param identity The node identity. 309 protected int _dataOrQName(int identity) argument 312 if (identity < m_size) 313 return m_dataOrQName.elementAt(identity); 324 else if (identity < m_size) 325 return m_dataOrQName.elementAt(identity); 709 getNextNodeIdentity(int identity) argument [all...] |
H A D | SAX2DTM2.java | 616 * The node identity of _startNode for this iterator 813 /* _currentNode precedes candidates. This is the identity, not the handle! */ 1544 * Tell if this node identity is a descendant. Assumes that 1554 * @param identity The index number of the node in question. 1557 protected final boolean isDescendant(int identity) argument 1559 return (_parent2(identity) >= _startNode) || (_startNode == identity); 1901 public final int _exptype(int identity) argument 1903 return m_exptype.elementAt(identity); 1919 * @param identity 1922 _exptype2(int identity) argument 1938 _nextsib2(int identity) argument 1954 _firstch2(int identity) argument 1970 _parent2(int identity) argument 1986 _type2(int identity) argument 2521 getFirstAttributeIdentity(int identity) argument 2563 getNextAttributeIdentity(int identity) argument [all...] |
/external/boringssl/src/ssl/ |
H A D | s3_clnt.c | 1087 omitted if no identity hint is sent. Set session->sess_cert anyway to 1139 /* Store PSK identity hint for later use, hint is used in 1141 * identity hint can be as long as the maximum length of a PSK identity. 1145 * a specific identity. */ 1154 /* Save the identity hint as a C string. */ 1639 char identity[PSK_MAX_IDENTITY_LEN + 1]; local 1648 memset(identity, 0, sizeof(identity)); 1650 s->psk_client_callback(s, s->s3->tmp.peer_psk_identity_hint, identity, [all...] |
/external/boringssl/src/ssl/test/ |
H A D | bssl_shim.cc | 258 // Account for the trailing '\0' for the identity. 271 static unsigned PskServerCallback(SSL *ssl, const char *identity, argument 275 if (strcmp(identity, config->psk_identity.c_str()) != 0) { 276 fprintf(stderr, "Client PSK identity did not match.\n");
|