/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_sim_db.c | 1071 * This function is used to generate a fast re-authentication identity for 1201 * @identity_len: Length of identity 1219 "identity '%s'", reauth_id, permanent); 1262 "identity '%s'", reauth_id, permanent); 1283 * eap_sim_db_get_permanent - EAP-SIM DB: Get permanent identity 1543 * sim_get_username - Extract username from SIM identity 1544 * @identity: Identity 1546 * Returns: Allocated buffer with the username part of the identity 1550 char * sim_get_username(const u8 *identity, size_t identity_len) argument 1554 if (identity [all...] |
/external/wpa_supplicant_8/hostapd/src/eapol_auth/ |
H A D | eapol_auth_sm_i.h | 154 u8 *identity; member in struct:eapol_state_machine
|
/external/wpa_supplicant_8/src/ap/ |
H A D | sta_info.h | 159 char *identity; /* User-Name from RADIUS */ member in struct:sta_info
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 108 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument 117 const u8 *identity, 186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_aka.c | 377 const u8 *identity = NULL; local 387 /* Look for the realm of the permanent identity */ 388 identity = eap_get_config_identity(sm, &identity_len); 389 if (identity) { 390 for (realm = identity, realm_len = identity_len; 601 const u8 *identity = NULL; local 607 identity = data->reauth_id; 612 identity = data->pseudonym; 616 identity = eap_get_config_identity(sm, &identity_len); 617 if (identity) { 891 const u8 *identity; local [all...] |
H A D | eap_ttls.c | 486 const u8 *identity, *password; 492 identity = eap_get_config_identity(sm, &identity_len); 494 if (identity == NULL || password == NULL) 507 identity, identity_len); 541 if (mschapv2_derive_response(identity, identity_len, password, 580 const u8 *identity, *password; 586 identity = eap_get_config_identity(sm, &identity_len); 588 if (identity == NULL || password == NULL) 601 identity, identity_len); 664 const u8 *identity, *passwor local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_i.h | 160 u8 *identity; member in struct:eap_sm 162 /* Whether Phase 2 method should validate identity match */ 220 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
H A D | eap_server_fast.c | 61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data 131 u8 *identity = NULL; local 218 identity = pos; 234 if (identity) { 236 "PAC-Opaque", identity, identity_len); 237 os_free(data->identity); 238 data->identity = os_malloc(identity_len); 239 if (data->identity) { 240 os_memcpy(data->identity, identity, identity_le [all...] |
H A D | eap_sim_db.c | 1071 * This function is used to generate a fast re-authentication identity for 1201 * @identity_len: Length of identity 1219 "identity '%s'", reauth_id, permanent); 1262 "identity '%s'", reauth_id, permanent); 1283 * eap_sim_db_get_permanent - EAP-SIM DB: Get permanent identity 1543 * sim_get_username - Extract username from SIM identity 1544 * @identity: Identity 1546 * Returns: Allocated buffer with the username part of the identity 1550 char * sim_get_username(const u8 *identity, size_t identity_len) argument 1554 if (identity [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
H A D | eapol_auth_sm_i.h | 154 u8 *identity; member in struct:eapol_state_machine
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | sta_info.h | 159 char *identity; /* User-Name from RADIUS */ member in struct:sta_info
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 108 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument 117 const u8 *identity, 186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_aka.c | 377 const u8 *identity = NULL; local 387 /* Look for the realm of the permanent identity */ 388 identity = eap_get_config_identity(sm, &identity_len); 389 if (identity) { 390 for (realm = identity, realm_len = identity_len; 601 const u8 *identity = NULL; local 607 identity = data->reauth_id; 612 identity = data->pseudonym; 616 identity = eap_get_config_identity(sm, &identity_len); 617 if (identity) { 891 const u8 *identity; local [all...] |
H A D | eap_ttls.c | 486 const u8 *identity, *password; 492 identity = eap_get_config_identity(sm, &identity_len); 494 if (identity == NULL || password == NULL) 507 identity, identity_len); 541 if (mschapv2_derive_response(identity, identity_len, password, 580 const u8 *identity, *password; 586 identity = eap_get_config_identity(sm, &identity_len); 588 if (identity == NULL || password == NULL) 601 identity, identity_len); 664 const u8 *identity, *passwor local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_i.h | 160 u8 *identity; member in struct:eap_sm 162 /* Whether Phase 2 method should validate identity match */ 220 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
H A D | eap_server_fast.c | 61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data 131 u8 *identity = NULL; local 218 identity = pos; 234 if (identity) { 236 "PAC-Opaque", identity, identity_len); 237 os_free(data->identity); 238 data->identity = os_malloc(identity_len); 239 if (data->identity) { 240 os_memcpy(data->identity, identity, identity_le [all...] |
H A D | eap_sim_db.c | 1071 * This function is used to generate a fast re-authentication identity for 1201 * @identity_len: Length of identity 1219 "identity '%s'", reauth_id, permanent); 1262 "identity '%s'", reauth_id, permanent); 1283 * eap_sim_db_get_permanent - EAP-SIM DB: Get permanent identity 1543 * sim_get_username - Extract username from SIM identity 1544 * @identity: Identity 1546 * Returns: Allocated buffer with the username part of the identity 1550 char * sim_get_username(const u8 *identity, size_t identity_len) argument 1554 if (identity [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/ |
H A D | eapol_auth_sm_i.h | 154 u8 *identity; member in struct:eapol_state_machine
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.ecf.filetransfer_4.0.0.v20100529-0735.jar | ... org/eclipse/ecf/filetransfer/events/socketfactory/ org/eclipse/ecf/filetransfer/identity/ org/eclipse/ecf/filetransfer/service/ org/eclipse/ecf/internal/ org ... |
/external/apache-xml/src/main/java/org/apache/xml/dtm/ref/ |
H A D | DTMDefaultBase.java | 51 /** The identity of the root node. */ 120 /** The document identity number(s). If we have overflowed the addressing 124 /** The mask for the identity. 160 * @param dtmIdentity The DTM identity ID for this DTM. 180 * @param dtmIdentity The DTM identity ID for this DTM. 315 * @param identity The node identity index. 317 protected void indexNode(int expandedTypeID, int identity) argument 332 index[index[0]] = identity; 349 * to the identity argumen 420 getNextNodeIdentity(int identity) argument 459 _type(int identity) argument 477 _exptype(int identity) argument 500 _level(int identity) argument 522 _firstch(int identity) argument 555 _nextsib(int identity) argument 587 _prevsib(int identity) argument 614 _parent(int identity) argument 1072 getFirstAttributeIdentity(int identity) argument 1230 getNextAttributeIdentity(int identity) argument [all...] |
/external/boringssl/src/ssl/test/ |
H A D | bssl_shim.cc | 792 // Account for the trailing '\0' for the identity. 805 static unsigned PskServerCallback(SSL *ssl, const char *identity, argument 809 if (strcmp(identity, config->psk_identity.c_str()) != 0) { 810 fprintf(stderr, "Client PSK identity did not match.\n");
|
/external/conscrypt/openjdk/src/test/java/org/conscrypt/ |
H A D | NativeCryptoTest.java | 786 public int clientPSKKeyRequested(String identityHint, byte[] identity, byte[] key) { argument 790 + " identityHint=" + identityHint + " identity capacity=" + identity.length 800 System.arraycopy(clientPSKKeyRequestedResultIdentity, 0, identity, 0, 801 Math.min(clientPSKKeyRequestedResultIdentity.length, identity.length)); 812 public int serverPSKKeyRequested(String identityHint, String identity, byte[] key) { argument 816 + " identityHint=" + identityHint + " identity=" + identity 821 serverPSKKeyRequestedIdentity = identity; 1350 // identity hin [all...] |
/external/conscrypt/platform/src/test/java/org/conscrypt/ |
H A D | NativeCryptoTest.java | 784 public int clientPSKKeyRequested(String identityHint, byte[] identity, byte[] key) { argument 788 + " identityHint=" + identityHint + " identity capacity=" + identity.length 798 System.arraycopy(clientPSKKeyRequestedResultIdentity, 0, identity, 0, 799 Math.min(clientPSKKeyRequestedResultIdentity.length, identity.length)); 810 public int serverPSKKeyRequested(String identityHint, String identity, byte[] key) { argument 814 + " identityHint=" + identityHint + " identity=" + identity 819 serverPSKKeyRequestedIdentity = identity; 1284 // identity hin [all...] |
/external/mesa3d/src/gallium/state_trackers/vega/ |
H A D | path.c | 1597 struct matrix identity; local 1599 matrix_load_identity(&identity); 1602 struct polygon_array *polygon_array = path_get_fill_polygons(p, &identity); 1616 struct matrix identity; local 1619 matrix_load_identity(&identity); 1620 stroke = path_create_stroke(p, &identity); 1768 struct matrix identity; local 1772 matrix_load_identity(&identity); 1777 arc_to_path(&arc, path, &identity); 1851 struct matrix identity; local 1943 struct matrix identity; local 2050 struct matrix identity; local [all...] |
H A D | stroker.c | 468 const VGfloat identity[] = {0, 0, 1, 0}; local 469 VGfloat angle = line_angles(line, identity);
|