Searched defs:keyname (Results 1 - 25 of 29) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_common.h15 const u8 *keyname; member in struct:erp_tlvs
/external/wpa_supplicant_8/src/eap_common/
H A Deap_common.h15 const u8 *keyname; member in struct:erp_tlvs
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_common.h15 const u8 *keyname; member in struct:erp_tlvs
/external/syslinux/com32/libutil/
H A Dkeyname.c29 * keyname.c
44 struct keyname { struct
49 static const struct keyname key_names[] = {
84 const struct keyname *name;
108 const struct keyname *name;
/external/libdrm/radeon/
H A Dbof.c64 bof_t *bof_object_get(bof_t *object, const char *keyname) argument
69 if (!strcmp(object->array[i]->value, keyname)) {
76 int bof_object_set(bof_t *object, const char *keyname, bof_t *value) argument
86 key = bof_string(keyname);
/external/f2fs-tools/tools/
H A Df2fstat.c82 char keyname[32]; local
84 struct mm_table key = { keyname, NULL };
140 if (strlen(head) >= sizeof(keyname)) {
148 strcpy(keyname, head);
/external/libpcap/
H A Dpcap-win32.c705 char keyname[512]; local
707 snprintf(keyname, sizeof(keyname), "%s\\CardParams\\%s",
712 status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, keyname, 0, KEY_READ, &dagkey);
/external/llvm/lib/Target/NVPTX/
H A DNVPTXUtilities.cpp58 std::string keyname = prop->getString().str(); local
59 if (retval.find(keyname) != retval.end())
60 retval[keyname].push_back(Val->getZExtValue());
64 retval[keyname] = tmp;
/external/wpa_supplicant_8/hostapd/src/eapol_auth/
H A Deapol_auth_sm.c1064 const char *keyname)
1067 return sm->eapol->cb.erp_get_key(sm->eapol->conf.ctx, keyname);
1063 eapol_sm_erp_get_key(void *ctx, const char *keyname) argument
/external/wpa_supplicant_8/src/eapol_auth/
H A Deapol_auth_sm.c1064 const char *keyname)
1067 return sm->eapol->cb.erp_get_key(sm->eapol->conf.ctx, keyname);
1063 eapol_sm_erp_get_key(void *ctx, const char *keyname) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/
H A Deapol_auth_sm.c1064 const char *keyname)
1067 return sm->eapol->cb.erp_get_key(sm->eapol->conf.ctx, keyname);
1063 eapol_sm_erp_get_key(void *ctx, const char *keyname) argument
/external/e2fsprogs/lib/ext2fs/
H A Dtdbtool.c207 static void insert_tdb(char *keyname, size_t keylen, char* data, size_t datalen) argument
211 if ((keyname == NULL) || (keylen == 0)) {
216 key.dptr = (unsigned char *)keyname;
226 static void store_tdb(char *keyname, size_t keylen, char* data, size_t datalen) argument
230 if ((keyname == NULL) || (keylen == 0)) {
240 key.dptr = (unsigned char *)keyname;
253 static void show_tdb(char *keyname, size_t keylen) argument
257 if ((keyname == NULL) || (keylen == 0)) {
262 key.dptr = (unsigned char *)keyname;
278 static void delete_tdb(char *keyname, size_ argument
295 move_rec(char *keyname, size_t keylen, char* tdbname) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server.c67 const char *keyname)
70 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname);
836 if (!parse.keyname) {
843 parse.keyname, parse.keyname_len);
849 os_memcpy(nai, parse.keyname, parse.keyname_len);
862 sm->identity = (u8 *) dup_binstr(parse.keyname,
885 start = parse.keyname + parse.keyname_len;
1994 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname)
1998 parse.keyname, parse.keyname_len);
2002 os_memcpy(sm->identity, parse.keyname, pars
66 eap_erp_get_key(struct eap_sm *sm, const char *keyname) argument
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server.c67 const char *keyname)
70 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname);
836 if (!parse.keyname) {
843 parse.keyname, parse.keyname_len);
849 os_memcpy(nai, parse.keyname, parse.keyname_len);
862 sm->identity = (u8 *) dup_binstr(parse.keyname,
885 start = parse.keyname + parse.keyname_len;
1994 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname)
1998 parse.keyname, parse.keyname_len);
2002 os_memcpy(sm->identity, parse.keyname, pars
66 eap_erp_get_key(struct eap_sm *sm, const char *keyname) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server.c67 const char *keyname)
70 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname);
836 if (!parse.keyname) {
843 parse.keyname, parse.keyname_len);
849 os_memcpy(nai, parse.keyname, parse.keyname_len);
862 sm->identity = (u8 *) dup_binstr(parse.keyname,
885 start = parse.keyname + parse.keyname_len;
1994 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname)
1998 parse.keyname, parse.keyname_len);
2002 os_memcpy(sm->identity, parse.keyname, pars
66 eap_erp_get_key(struct eap_sm *sm, const char *keyname) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_1x.c2182 ieee802_1x_erp_get_key(void *ctx, const char *keyname) argument
2189 if (os_strcmp(erp->keyname_nai, keyname) == 0)
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius_server.c2087 radius_server_erp_get_key(void *ctx, const char *keyname) argument
2095 if (os_strcmp(erp->keyname_nai, keyname) == 0)
/external/wpa_supplicant_8/src/ap/
H A Dieee802_1x.c2182 ieee802_1x_erp_get_key(void *ctx, const char *keyname) argument
2189 if (os_strcmp(erp->keyname_nai, keyname) == 0)
/external/wpa_supplicant_8/src/radius/
H A Dradius_server.c2087 radius_server_erp_get_key(void *ctx, const char *keyname) argument
2095 if (os_strcmp(erp->keyname_nai, keyname) == 0)
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_1x.c2182 ieee802_1x_erp_get_key(void *ctx, const char *keyname) argument
2189 if (os_strcmp(erp->keyname_nai, keyname) == 0)
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius_server.c2087 radius_server_erp_get_key(void *ctx, const char *keyname) argument
2095 if (os_strcmp(erp->keyname_nai, keyname) == 0)
/external/mdnsresponder/mDNSCore/
H A DuDNS.c294 debugf("GetAuthInfoForName %##s Matched %##s Key name %##s", name->c, ptr->domain.c, ptr->keyname.c);
318 LogInfo("GetAuthInfoForName_internal deleting expired key %##s %##s", info->domain.c, info->keyname.c);
352 const domainname *domain, const domainname *keyname, const char *b64keydata, const domainname *hostname, mDNSIPPort *port, const char *autoTunnelPrefix)
358 LogInfo("mDNS_SetSecretForDomain: domain %##s key %##s%s%s", domain->c, keyname->c, autoTunnelPrefix ? " prefix " : "", autoTunnelPrefix ? autoTunnelPrefix : "");
362 AssignDomainName(&info->keyname, keyname);
375 LogMsg("mDNS_SetSecretForDomain: ERROR: Could not convert shared secret from base64: domain %##s key %##s %s", domain->c, keyname->c, mDNS_LoggingEnabled ? b64keydata : "");
2555 if (AuthInfo) tsigSize = DomainNameLength(&AuthInfo->keyname) + rr_base_size + 58;
351 mDNS_SetSecretForDomain(mDNS *m, DomainAuthInfo *info, const domainname *domain, const domainname *keyname, const char *b64keydata, const domainname *hostname, mDNSIPPort *port, const char *autoTunnelPrefix) argument
/external/mdnsresponder/mDNSShared/
H A Ddnsextd.c2478 if ( SameDomainName( lcr.r.resrec.name, &(*key)->keyname ) )
3130 const domainname *domain, const domainname *keyname, const char *b64keydata, const domainname *hostname, mDNSIPPort *port, const char *autoTunnelPrefix)
3131 { ( void ) m; ( void ) info; ( void ) domain; ( void ) keyname; ( void ) b64keydata; ( void ) hostname; (void) port; ( void ) autoTunnelPrefix; return 0; }
3129 mDNS_SetSecretForDomain(mDNS *m, DomainAuthInfo *info, const domainname *domain, const domainname *keyname, const char *b64keydata, const domainname *hostname, mDNSIPPort *port, const char *autoTunnelPrefix) argument
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_ndis.c2392 TCHAR keyname[256], devname[256]; local
2427 len = sizeof(keyname);
2428 ret = RegEnumKeyEx(hk, i, keyname, &len, NULL, NULL, NULL,
2437 ret = RegOpenKeyEx(hk, keyname, 0, 0, &hk2);
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_ndis.c2392 TCHAR keyname[256], devname[256]; local
2427 len = sizeof(keyname);
2428 ret = RegEnumKeyEx(hk, i, keyname, &len, NULL, NULL, NULL,
2437 ret = RegOpenKeyEx(hk, keyname, 0, 0, &hk2);

Completed in 490 milliseconds

12