Searched defs:identity (Results 126 - 150 of 236) sorted by relevance

12345678910

/external/wpa_supplicant_8/src/eap_peer/
H A Deap_sim.c399 const u8 *identity = NULL; local
409 /* Look for the realm of the permanent identity */
410 identity = eap_get_config_identity(sm, &identity_len);
411 if (identity) {
412 for (realm = identity, realm_len = identity_len;
482 const u8 *identity = NULL; local
488 identity = data->reauth_id;
493 identity = data->pseudonym;
497 identity = eap_get_config_identity(sm, &identity_len);
498 if (identity) {
708 const u8 *identity; local
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server.c152 * @identity: Identity (User-Name) of the user
153 * @identity_len: Length of identity in bytes
158 * selected based on the specified identity. sm->user and
162 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, argument
178 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity,
228 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) {
855 * EAP Identity exchange. Use keyName-NAI as the user identity
860 "EAP: Use keyName-NAI as user identity for backend authentication");
862 sm->identity = (u8 *) dup_binstr(parse.keyname,
864 if (!sm->identity)
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument
37 addr[0] = identity;
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument
62 addr[0] = identity;
108 const u8 *identity, size_t identity_len,
118 while (identity_len > 0 && identity[identity_len - 1] == 0) {
120 "character from the end of identity");
123 addr[0] = identity;
136 identity, identity_len);
276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_mschapv2.c157 const u8 *identity, *password; local
162 identity = eap_get_config_identity(sm, &identity_len);
164 if (identity == NULL || password == NULL)
207 if (mschapv2_derive_response(identity, identity_len, password,
221 wpabuf_put_data(resp, identity, identity_len);
H A Deap_sim.c399 const u8 *identity = NULL; local
409 /* Look for the realm of the permanent identity */
410 identity = eap_get_config_identity(sm, &identity_len);
411 if (identity) {
412 for (realm = identity, realm_len = identity_len;
482 const u8 *identity = NULL; local
488 identity = data->reauth_id;
493 identity = data->pseudonym;
497 identity = eap_get_config_identity(sm, &identity_len);
498 if (identity) {
708 const u8 *identity; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server.c152 * @identity: Identity (User-Name) of the user
153 * @identity_len: Length of identity in bytes
158 * selected based on the specified identity. sm->user and
162 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, argument
178 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity,
228 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) {
855 * EAP Identity exchange. Use keyName-NAI as the user identity
860 "EAP: Use keyName-NAI as user identity for backend authentication");
862 sm->identity = (u8 *) dup_binstr(parse.keyname,
864 if (!sm->identity)
[all...]
/external/apache-xml/src/main/java/org/apache/xml/dtm/ref/sax2dtm/
H A DSAX2DTM.java211 * @param dtmIdentity The DTM identity ID for this DTM.
234 * @param dtmIdentity The DTM identity ID for this DTM.
303 * Get the data or qualified name for the given node identity.
305 * @param identity The node identity.
309 protected int _dataOrQName(int identity) argument
312 if (identity < m_size)
313 return m_dataOrQName.elementAt(identity);
324 else if (identity < m_size)
325 return m_dataOrQName.elementAt(identity);
709 getNextNodeIdentity(int identity) argument
[all...]
H A DSAX2DTM2.java616 * The node identity of _startNode for this iterator
813 /* _currentNode precedes candidates. This is the identity, not the handle! */
1544 * Tell if this node identity is a descendant. Assumes that
1554 * @param identity The index number of the node in question.
1557 protected final boolean isDescendant(int identity) argument
1559 return (_parent2(identity) >= _startNode) || (_startNode == identity);
1901 public final int _exptype(int identity) argument
1903 return m_exptype.elementAt(identity);
1919 * @param identity
1922 _exptype2(int identity) argument
1938 _nextsib2(int identity) argument
1954 _firstch2(int identity) argument
1970 _parent2(int identity) argument
1986 _type2(int identity) argument
2521 getFirstAttributeIdentity(int identity) argument
2563 getNextAttributeIdentity(int identity) argument
[all...]
/external/boringssl/src/ssl/
H A Dhandshake_client.c1217 /* Store PSK identity hint for later use, hint is used in
1219 * identity hint can be as long as the maximum length of a PSK identity.
1223 * a specific identity. */
1231 /* Save non-empty identity hints as a C string. Empty identity hints we
1562 char identity[PSK_MAX_IDENTITY_LEN + 1]; local
1563 OPENSSL_memset(identity, 0, sizeof(identity));
1565 ssl->psk_client_callback(ssl, hs->peer_psk_identity_hint, identity,
[all...]
/external/conscrypt/common/src/main/java/org/conscrypt/
H A DOpenSSLEngineImpl.java1307 public int clientPSKKeyRequested(String identityHint, byte[] identity, byte[] key) { argument
1308 return sslParameters.clientPSKKeyRequested(identityHint, identity, key, this);
1312 public int serverPSKKeyRequested(String identityHint, String identity, byte[] key) { argument
1313 return sslParameters.serverPSKKeyRequested(identityHint, identity, key, this);
1459 public SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity) { argument
1460 return keyManager.getKey(identityHint, identity, this);
H A DOpenSSLSocketImpl.java488 public int clientPSKKeyRequested(String identityHint, byte[] identity, byte[] key) { argument
489 return sslParameters.clientPSKKeyRequested(identityHint, identity, key, this);
494 public int serverPSKKeyRequested(String identityHint, String identity, byte[] key) { argument
495 return sslParameters.serverPSKKeyRequested(identityHint, identity, key, this);
1336 public SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity) { argument
1337 return keyManager.getKey(identityHint, identity, this);
H A DSSLParametersImpl.java744 String identity = pskCallbacks.chooseClientPSKIdentity(pskKeyManager, identityHint);
745 // Store identity in NULL-terminated modified UTF-8 representation into ientityBytesOut
747 if (identity == null) {
748 identity = "";
750 } else if (identity.isEmpty()) {
754 identityBytes = identity.getBytes("UTF-8");
768 SecretKey secretKey = pskCallbacks.getPSKKey(pskKeyManager, identityHint, identity);
785 String identityHint, String identity, byte[] key, PSKCallbacks pskCallbacks) {
790 SecretKey secretKey = pskCallbacks.getPSKKey(pskKeyManager, identityHint, identity);
863 SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity); argument
784 serverPSKKeyRequested( String identityHint, String identity, byte[] key, PSKCallbacks pskCallbacks) argument
[all...]
/external/guava/guava-testlib/src/com/google/common/testing/
H A DFreshValueGenerator.java229 private final int identity = freshInt(); field in class:FreshValueGenerator.FreshInvocationHandler
241 return identity;
247 return identity == that.identity;
253 return paramString(interfaceType, identity);
/external/libcups/cups/
H A Dtls-darwin.c213 DEBUG_printf(("1cupsMakeServerCredentials: Unable to add identity to keychain: %d.", (int)err));
221 DEBUG_puts("1cupsMakeServerCredentials: Unable to create identity from cert and keys.");
1743 SecIdentityRef identity = NULL;/* Identity */ local
1799 err = SecItemCopyMatching(query, (CFTypeRef *)&identity);
1809 if (CFGetTypeID(identity) != SecIdentityGetTypeID())
1811 DEBUG_puts("4http_cdsa_copy_server: Search returned something that is not an identity.");
1815 if ((certificates = CFArrayCreate(NULL, (const void **)&identity, 1, &kCFTypeArrayCallBacks)) == NULL)
1825 if (identity)
1826 CFRelease(identity);
/external/mesa3d/src/gallium/state_trackers/vega/
H A Dmatrix.h101 static const VGfloat identity[9] = {1.f, 0.f, 0.f, local
104 memcpy(matrix->m, identity, sizeof(identity));
/external/openssh/
H A Dssh-agent.c112 typedef struct identity { struct
113 TAILQ_ENTRY(identity) next;
123 TAILQ_HEAD(idqueue, identity) idlist;
359 /* Unknown identity or protocol error. Send failure. */
381 struct identity *id;
453 logit("Warning: identity keysize mismatch: "
/external/skia/src/core/
H A DSkBitmap.cpp871 SkMatrix identity; local
882 identity.reset();
883 if (!filter->filterMask(&dstM, srcM, identity, nullptr)) {
907 if (!filter->filterMask(&dstM, srcM, identity, nullptr)) {
/external/skia/tests/
H A DMatrixTest.cpp69 SkMatrix identity; local
70 identity.reset();
71 return nearly_equal(m, identity);
165 SkMatrix identity; local
166 identity.reset();
167 REPORTER_ASSERT(reporter, SK_Scalar1 == identity.getMinScale());
168 REPORTER_ASSERT(reporter, SK_Scalar1 == identity.getMaxScale());
169 success = identity.getMinMaxScales(scales);
303 // identity
508 // identity
[all...]
/external/webrtc/webrtc/base/
H A Dopensslstreamadapter.cc316 void OpenSSLStreamAdapter::SetIdentity(SSLIdentity* identity) { argument
318 identity_.reset(static_cast<OpenSSLIdentity*>(identity));
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dsta_info.h159 char *identity; /* User-Name from RADIUS */ member in struct:sta_info
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
108 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument
117 const u8 *identity,
186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_aka.c377 const u8 *identity = NULL; local
387 /* Look for the realm of the permanent identity */
388 identity = eap_get_config_identity(sm, &identity_len);
389 if (identity) {
390 for (realm = identity, realm_len = identity_len;
601 const u8 *identity = NULL; local
607 identity = data->reauth_id;
612 identity = data->pseudonym;
616 identity = eap_get_config_identity(sm, &identity_len);
617 if (identity) {
891 const u8 *identity; local
[all...]
H A Deap_ttls.c486 const u8 *identity, *password;
492 identity = eap_get_config_identity(sm, &identity_len);
494 if (identity == NULL || password == NULL)
507 identity, identity_len);
541 if (mschapv2_derive_response(identity, identity_len, password,
580 const u8 *identity, *password;
586 identity = eap_get_config_identity(sm, &identity_len);
588 if (identity == NULL || password == NULL)
601 identity, identity_len);
664 const u8 *identity, *passwor local
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_i.h160 u8 *identity; member in struct:eap_sm
162 /* Whether Phase 2 method should validate identity match */
220 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
H A Deap_server_fast.c61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data
131 u8 *identity = NULL; local
218 identity = pos;
234 if (identity) {
236 "PAC-Opaque", identity, identity_len);
237 os_free(data->identity);
238 data->identity = os_malloc(identity_len);
239 if (data->identity) {
240 os_memcpy(data->identity, identity, identity_le
[all...]

Completed in 1624 milliseconds

12345678910