/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_common.h | 15 const u8 *keyname; member in struct:erp_tlvs
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_common.h | 15 const u8 *keyname; member in struct:erp_tlvs
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_common.h | 15 const u8 *keyname; member in struct:erp_tlvs
|
/external/syslinux/com32/libutil/ |
H A D | keyname.c | 29 * keyname.c 44 struct keyname { struct 49 static const struct keyname key_names[] = { 84 const struct keyname *name; 108 const struct keyname *name;
|
/external/libdrm/radeon/ |
H A D | bof.c | 64 bof_t *bof_object_get(bof_t *object, const char *keyname) argument 69 if (!strcmp(object->array[i]->value, keyname)) { 76 int bof_object_set(bof_t *object, const char *keyname, bof_t *value) argument 86 key = bof_string(keyname);
|
/external/f2fs-tools/tools/ |
H A D | f2fstat.c | 82 char keyname[32]; local 84 struct mm_table key = { keyname, NULL }; 140 if (strlen(head) >= sizeof(keyname)) { 148 strcpy(keyname, head);
|
/external/libpcap/ |
H A D | pcap-win32.c | 705 char keyname[512]; local 707 snprintf(keyname, sizeof(keyname), "%s\\CardParams\\%s", 712 status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, keyname, 0, KEY_READ, &dagkey);
|
/external/llvm/lib/Target/NVPTX/ |
H A D | NVPTXUtilities.cpp | 58 std::string keyname = prop->getString().str(); local 59 if (retval.find(keyname) != retval.end()) 60 retval[keyname].push_back(Val->getZExtValue()); 64 retval[keyname] = tmp;
|
/external/wpa_supplicant_8/hostapd/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 1064 const char *keyname) 1067 return sm->eapol->cb.erp_get_key(sm->eapol->conf.ctx, keyname); 1063 eapol_sm_erp_get_key(void *ctx, const char *keyname) argument
|
/external/wpa_supplicant_8/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 1064 const char *keyname) 1067 return sm->eapol->cb.erp_get_key(sm->eapol->conf.ctx, keyname); 1063 eapol_sm_erp_get_key(void *ctx, const char *keyname) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 1064 const char *keyname) 1067 return sm->eapol->cb.erp_get_key(sm->eapol->conf.ctx, keyname); 1063 eapol_sm_erp_get_key(void *ctx, const char *keyname) argument
|
/external/e2fsprogs/lib/ext2fs/ |
H A D | tdbtool.c | 207 static void insert_tdb(char *keyname, size_t keylen, char* data, size_t datalen) argument 211 if ((keyname == NULL) || (keylen == 0)) { 216 key.dptr = (unsigned char *)keyname; 226 static void store_tdb(char *keyname, size_t keylen, char* data, size_t datalen) argument 230 if ((keyname == NULL) || (keylen == 0)) { 240 key.dptr = (unsigned char *)keyname; 253 static void show_tdb(char *keyname, size_t keylen) argument 257 if ((keyname == NULL) || (keylen == 0)) { 262 key.dptr = (unsigned char *)keyname; 278 static void delete_tdb(char *keyname, size_ argument 295 move_rec(char *keyname, size_t keylen, char* tdbname) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server.c | 67 const char *keyname) 70 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname); 836 if (!parse.keyname) { 843 parse.keyname, parse.keyname_len); 849 os_memcpy(nai, parse.keyname, parse.keyname_len); 862 sm->identity = (u8 *) dup_binstr(parse.keyname, 885 start = parse.keyname + parse.keyname_len; 1994 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname) 1998 parse.keyname, parse.keyname_len); 2002 os_memcpy(sm->identity, parse.keyname, pars 66 eap_erp_get_key(struct eap_sm *sm, const char *keyname) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server.c | 67 const char *keyname) 70 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname); 836 if (!parse.keyname) { 843 parse.keyname, parse.keyname_len); 849 os_memcpy(nai, parse.keyname, parse.keyname_len); 862 sm->identity = (u8 *) dup_binstr(parse.keyname, 885 start = parse.keyname + parse.keyname_len; 1994 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname) 1998 parse.keyname, parse.keyname_len); 2002 os_memcpy(sm->identity, parse.keyname, pars 66 eap_erp_get_key(struct eap_sm *sm, const char *keyname) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server.c | 67 const char *keyname) 70 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname); 836 if (!parse.keyname) { 843 parse.keyname, parse.keyname_len); 849 os_memcpy(nai, parse.keyname, parse.keyname_len); 862 sm->identity = (u8 *) dup_binstr(parse.keyname, 885 start = parse.keyname + parse.keyname_len; 1994 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname) 1998 parse.keyname, parse.keyname_len); 2002 os_memcpy(sm->identity, parse.keyname, pars 66 eap_erp_get_key(struct eap_sm *sm, const char *keyname) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_1x.c | 2182 ieee802_1x_erp_get_key(void *ctx, const char *keyname) argument 2189 if (os_strcmp(erp->keyname_nai, keyname) == 0)
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_server.c | 2087 radius_server_erp_get_key(void *ctx, const char *keyname) argument 2095 if (os_strcmp(erp->keyname_nai, keyname) == 0)
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_1x.c | 2182 ieee802_1x_erp_get_key(void *ctx, const char *keyname) argument 2189 if (os_strcmp(erp->keyname_nai, keyname) == 0)
|
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_server.c | 2087 radius_server_erp_get_key(void *ctx, const char *keyname) argument 2095 if (os_strcmp(erp->keyname_nai, keyname) == 0)
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_1x.c | 2182 ieee802_1x_erp_get_key(void *ctx, const char *keyname) argument 2189 if (os_strcmp(erp->keyname_nai, keyname) == 0)
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_server.c | 2087 radius_server_erp_get_key(void *ctx, const char *keyname) argument 2095 if (os_strcmp(erp->keyname_nai, keyname) == 0)
|
/external/mdnsresponder/mDNSCore/ |
H A D | uDNS.c | 294 debugf("GetAuthInfoForName %##s Matched %##s Key name %##s", name->c, ptr->domain.c, ptr->keyname.c); 318 LogInfo("GetAuthInfoForName_internal deleting expired key %##s %##s", info->domain.c, info->keyname.c); 352 const domainname *domain, const domainname *keyname, const char *b64keydata, const domainname *hostname, mDNSIPPort *port, const char *autoTunnelPrefix) 358 LogInfo("mDNS_SetSecretForDomain: domain %##s key %##s%s%s", domain->c, keyname->c, autoTunnelPrefix ? " prefix " : "", autoTunnelPrefix ? autoTunnelPrefix : ""); 362 AssignDomainName(&info->keyname, keyname); 375 LogMsg("mDNS_SetSecretForDomain: ERROR: Could not convert shared secret from base64: domain %##s key %##s %s", domain->c, keyname->c, mDNS_LoggingEnabled ? b64keydata : ""); 2555 if (AuthInfo) tsigSize = DomainNameLength(&AuthInfo->keyname) + rr_base_size + 58; 351 mDNS_SetSecretForDomain(mDNS *m, DomainAuthInfo *info, const domainname *domain, const domainname *keyname, const char *b64keydata, const domainname *hostname, mDNSIPPort *port, const char *autoTunnelPrefix) argument
|
/external/mdnsresponder/mDNSShared/ |
H A D | dnsextd.c | 2478 if ( SameDomainName( lcr.r.resrec.name, &(*key)->keyname ) ) 3130 const domainname *domain, const domainname *keyname, const char *b64keydata, const domainname *hostname, mDNSIPPort *port, const char *autoTunnelPrefix) 3131 { ( void ) m; ( void ) info; ( void ) domain; ( void ) keyname; ( void ) b64keydata; ( void ) hostname; (void) port; ( void ) autoTunnelPrefix; return 0; } 3129 mDNS_SetSecretForDomain(mDNS *m, DomainAuthInfo *info, const domainname *domain, const domainname *keyname, const char *b64keydata, const domainname *hostname, mDNSIPPort *port, const char *autoTunnelPrefix) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_ndis.c | 2392 TCHAR keyname[256], devname[256]; local 2427 len = sizeof(keyname); 2428 ret = RegEnumKeyEx(hk, i, keyname, &len, NULL, NULL, NULL, 2437 ret = RegOpenKeyEx(hk, keyname, 0, 0, &hk2);
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_ndis.c | 2392 TCHAR keyname[256], devname[256]; local 2427 len = sizeof(keyname); 2428 ret = RegEnumKeyEx(hk, i, keyname, &len, NULL, NULL, NULL, 2437 ret = RegOpenKeyEx(hk, keyname, 0, 0, &hk2);
|