/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_sim.c | 399 const u8 *identity = NULL; local 409 /* Look for the realm of the permanent identity */ 410 identity = eap_get_config_identity(sm, &identity_len); 411 if (identity) { 412 for (realm = identity, realm_len = identity_len; 482 const u8 *identity = NULL; local 488 identity = data->reauth_id; 493 identity = data->pseudonym; 497 identity = eap_get_config_identity(sm, &identity_len); 498 if (identity) { 708 const u8 *identity; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server.c | 152 * @identity: Identity (User-Name) of the user 153 * @identity_len: Length of identity in bytes 158 * selected based on the specified identity. sm->user and 162 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, argument 178 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity, 228 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) { 855 * EAP Identity exchange. Use keyName-NAI as the user identity 860 "EAP: Use keyName-NAI as user identity for backend authentication"); 862 sm->identity = (u8 *) dup_binstr(parse.keyname, 864 if (!sm->identity) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument 37 addr[0] = identity; 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument 62 addr[0] = identity; 108 const u8 *identity, size_t identity_len, 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { 120 "character from the end of identity"); 123 addr[0] = identity; 136 identity, identity_len); 276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_mschapv2.c | 157 const u8 *identity, *password; local 162 identity = eap_get_config_identity(sm, &identity_len); 164 if (identity == NULL || password == NULL) 207 if (mschapv2_derive_response(identity, identity_len, password, 221 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_sim.c | 399 const u8 *identity = NULL; local 409 /* Look for the realm of the permanent identity */ 410 identity = eap_get_config_identity(sm, &identity_len); 411 if (identity) { 412 for (realm = identity, realm_len = identity_len; 482 const u8 *identity = NULL; local 488 identity = data->reauth_id; 493 identity = data->pseudonym; 497 identity = eap_get_config_identity(sm, &identity_len); 498 if (identity) { 708 const u8 *identity; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server.c | 152 * @identity: Identity (User-Name) of the user 153 * @identity_len: Length of identity in bytes 158 * selected based on the specified identity. sm->user and 162 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, argument 178 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity, 228 if (sm->eap_if.eapRestart && !sm->eap_server && sm->identity) { 855 * EAP Identity exchange. Use keyName-NAI as the user identity 860 "EAP: Use keyName-NAI as user identity for backend authentication"); 862 sm->identity = (u8 *) dup_binstr(parse.keyname, 864 if (!sm->identity) [all...] |
/external/apache-xml/src/main/java/org/apache/xml/dtm/ref/sax2dtm/ |
H A D | SAX2DTM.java | 211 * @param dtmIdentity The DTM identity ID for this DTM. 234 * @param dtmIdentity The DTM identity ID for this DTM. 303 * Get the data or qualified name for the given node identity. 305 * @param identity The node identity. 309 protected int _dataOrQName(int identity) argument 312 if (identity < m_size) 313 return m_dataOrQName.elementAt(identity); 324 else if (identity < m_size) 325 return m_dataOrQName.elementAt(identity); 709 getNextNodeIdentity(int identity) argument [all...] |
H A D | SAX2DTM2.java | 616 * The node identity of _startNode for this iterator 813 /* _currentNode precedes candidates. This is the identity, not the handle! */ 1544 * Tell if this node identity is a descendant. Assumes that 1554 * @param identity The index number of the node in question. 1557 protected final boolean isDescendant(int identity) argument 1559 return (_parent2(identity) >= _startNode) || (_startNode == identity); 1901 public final int _exptype(int identity) argument 1903 return m_exptype.elementAt(identity); 1919 * @param identity 1922 _exptype2(int identity) argument 1938 _nextsib2(int identity) argument 1954 _firstch2(int identity) argument 1970 _parent2(int identity) argument 1986 _type2(int identity) argument 2521 getFirstAttributeIdentity(int identity) argument 2563 getNextAttributeIdentity(int identity) argument [all...] |
/external/boringssl/src/ssl/ |
H A D | handshake_client.c | 1217 /* Store PSK identity hint for later use, hint is used in 1219 * identity hint can be as long as the maximum length of a PSK identity. 1223 * a specific identity. */ 1231 /* Save non-empty identity hints as a C string. Empty identity hints we 1562 char identity[PSK_MAX_IDENTITY_LEN + 1]; local 1563 OPENSSL_memset(identity, 0, sizeof(identity)); 1565 ssl->psk_client_callback(ssl, hs->peer_psk_identity_hint, identity, [all...] |
/external/conscrypt/common/src/main/java/org/conscrypt/ |
H A D | OpenSSLEngineImpl.java | 1307 public int clientPSKKeyRequested(String identityHint, byte[] identity, byte[] key) { argument 1308 return sslParameters.clientPSKKeyRequested(identityHint, identity, key, this); 1312 public int serverPSKKeyRequested(String identityHint, String identity, byte[] key) { argument 1313 return sslParameters.serverPSKKeyRequested(identityHint, identity, key, this); 1459 public SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity) { argument 1460 return keyManager.getKey(identityHint, identity, this);
|
H A D | OpenSSLSocketImpl.java | 488 public int clientPSKKeyRequested(String identityHint, byte[] identity, byte[] key) { argument 489 return sslParameters.clientPSKKeyRequested(identityHint, identity, key, this); 494 public int serverPSKKeyRequested(String identityHint, String identity, byte[] key) { argument 495 return sslParameters.serverPSKKeyRequested(identityHint, identity, key, this); 1336 public SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity) { argument 1337 return keyManager.getKey(identityHint, identity, this);
|
H A D | SSLParametersImpl.java | 744 String identity = pskCallbacks.chooseClientPSKIdentity(pskKeyManager, identityHint); 745 // Store identity in NULL-terminated modified UTF-8 representation into ientityBytesOut 747 if (identity == null) { 748 identity = ""; 750 } else if (identity.isEmpty()) { 754 identityBytes = identity.getBytes("UTF-8"); 768 SecretKey secretKey = pskCallbacks.getPSKKey(pskKeyManager, identityHint, identity); 785 String identityHint, String identity, byte[] key, PSKCallbacks pskCallbacks) { 790 SecretKey secretKey = pskCallbacks.getPSKKey(pskKeyManager, identityHint, identity); 863 SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity); argument 784 serverPSKKeyRequested( String identityHint, String identity, byte[] key, PSKCallbacks pskCallbacks) argument [all...] |
/external/guava/guava-testlib/src/com/google/common/testing/ |
H A D | FreshValueGenerator.java | 229 private final int identity = freshInt(); field in class:FreshValueGenerator.FreshInvocationHandler 241 return identity; 247 return identity == that.identity; 253 return paramString(interfaceType, identity);
|
/external/libcups/cups/ |
H A D | tls-darwin.c | 213 DEBUG_printf(("1cupsMakeServerCredentials: Unable to add identity to keychain: %d.", (int)err)); 221 DEBUG_puts("1cupsMakeServerCredentials: Unable to create identity from cert and keys."); 1743 SecIdentityRef identity = NULL;/* Identity */ local 1799 err = SecItemCopyMatching(query, (CFTypeRef *)&identity); 1809 if (CFGetTypeID(identity) != SecIdentityGetTypeID()) 1811 DEBUG_puts("4http_cdsa_copy_server: Search returned something that is not an identity."); 1815 if ((certificates = CFArrayCreate(NULL, (const void **)&identity, 1, &kCFTypeArrayCallBacks)) == NULL) 1825 if (identity) 1826 CFRelease(identity);
|
/external/mesa3d/src/gallium/state_trackers/vega/ |
H A D | matrix.h | 101 static const VGfloat identity[9] = {1.f, 0.f, 0.f, local 104 memcpy(matrix->m, identity, sizeof(identity));
|
/external/openssh/ |
H A D | ssh-agent.c | 112 typedef struct identity { struct 113 TAILQ_ENTRY(identity) next; 123 TAILQ_HEAD(idqueue, identity) idlist; 359 /* Unknown identity or protocol error. Send failure. */ 381 struct identity *id; 453 logit("Warning: identity keysize mismatch: "
|
/external/skia/src/core/ |
H A D | SkBitmap.cpp | 871 SkMatrix identity; local 882 identity.reset(); 883 if (!filter->filterMask(&dstM, srcM, identity, nullptr)) { 907 if (!filter->filterMask(&dstM, srcM, identity, nullptr)) {
|
/external/skia/tests/ |
H A D | MatrixTest.cpp | 69 SkMatrix identity; local 70 identity.reset(); 71 return nearly_equal(m, identity); 165 SkMatrix identity; local 166 identity.reset(); 167 REPORTER_ASSERT(reporter, SK_Scalar1 == identity.getMinScale()); 168 REPORTER_ASSERT(reporter, SK_Scalar1 == identity.getMaxScale()); 169 success = identity.getMinMaxScales(scales); 303 // identity 508 // identity [all...] |
/external/webrtc/webrtc/base/ |
H A D | opensslstreamadapter.cc | 316 void OpenSSLStreamAdapter::SetIdentity(SSLIdentity* identity) { argument 318 identity_.reset(static_cast<OpenSSLIdentity*>(identity));
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | sta_info.h | 159 char *identity; /* User-Name from RADIUS */ member in struct:sta_info
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 108 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument 117 const u8 *identity, 186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_aka.c | 377 const u8 *identity = NULL; local 387 /* Look for the realm of the permanent identity */ 388 identity = eap_get_config_identity(sm, &identity_len); 389 if (identity) { 390 for (realm = identity, realm_len = identity_len; 601 const u8 *identity = NULL; local 607 identity = data->reauth_id; 612 identity = data->pseudonym; 616 identity = eap_get_config_identity(sm, &identity_len); 617 if (identity) { 891 const u8 *identity; local [all...] |
H A D | eap_ttls.c | 486 const u8 *identity, *password; 492 identity = eap_get_config_identity(sm, &identity_len); 494 if (identity == NULL || password == NULL) 507 identity, identity_len); 541 if (mschapv2_derive_response(identity, identity_len, password, 580 const u8 *identity, *password; 586 identity = eap_get_config_identity(sm, &identity_len); 588 if (identity == NULL || password == NULL) 601 identity, identity_len); 664 const u8 *identity, *passwor local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_i.h | 160 u8 *identity; member in struct:eap_sm 162 /* Whether Phase 2 method should validate identity match */ 220 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
H A D | eap_server_fast.c | 61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data 131 u8 *identity = NULL; local 218 identity = pos; 234 if (identity) { 236 "PAC-Opaque", identity, identity_len); 237 os_free(data->identity); 238 data->identity = os_malloc(identity_len); 239 if (data->identity) { 240 os_memcpy(data->identity, identity, identity_le [all...] |