| /src/external/bsd/nsd/dist/dnstap/ |
| dnstap.h | 54 /** dnstap "identity" field, NULL if disabled */ 55 char *identity; member in struct:dt_env 60 /** length of "identity" field */
|
| /src/external/bsd/wpa/dist/src/ap/ |
| ieee802_11_auth.h | 24 char *identity; member in struct:radius_sta
|
| pmksa_cache_auth.h | 30 u8 *identity; member in struct:rsn_pmksa_cache_entry
|
| /src/external/gpl3/gcc/dist/libstdc++-v3/include/bits/ |
| ranges_cmp.h | 43 // Define std::identity here so that <iterator> and <ranges> 46 /// [func.identity] The identity function. 47 struct identity struct
|
| /src/external/gpl3/gcc.old/dist/libstdc++-v3/include/bits/ |
| ranges_cmp.h | 43 // Define std::identity here so that <iterator> and <ranges> 46 /// [func.identity] The identity function. 47 struct identity struct
|
| /src/external/bsd/unbound/dist/dnstap/ |
| dnstap.h | 55 /** dnstap "identity" field, NULL if disabled */ 56 char *identity; member in struct:dt_env 61 /** length of "identity" field */
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_gtc.c | 50 const u8 *pos, *password, *identity; local 99 identity = eap_get_config_identity(sm, &identity_len); 100 if (identity == NULL) 110 wpabuf_put_data(resp, identity, identity_len);
|
| eap_ikev2.c | 61 const u8 *identity, *password; local 65 identity = eap_get_config_identity(sm, &identity_len); 66 if (identity == NULL) { 67 wpa_printf(MSG_INFO, "EAP-IKEV2: No identity available"); 86 data->ikev2.IDr = os_memdup(identity, identity_len);
|
| eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 72 identity = eap_get_config_identity(sm, &identity_len); 74 if (identity == NULL || password == NULL) 129 wpabuf_put_data(resp, identity, identity_len); 144 const u8 *identity; local 149 identity = eap_get_config_identity(sm, &identity_len); 150 if (identity == NULL) 179 wpabuf_put_data(resp, identity, identity_len);
|
| eap_pax.c | 51 const u8 *identity, *password; local 54 identity = eap_get_config_identity(sm, &identity_len); 56 if (!identity || !password) { 72 data->cid = os_memdup(identity, identity_len);
|
| eap_psk.c | 36 const u8 *identity, *password; local 57 identity = eap_get_config_identity(sm, &identity_len); 58 if (identity) { 61 os_memcpy(data->id_p, identity, identity_len); 65 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity");
|
| eap_sake.c | 17 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 40 case IDENTITY: 41 return "IDENTITY"; 71 const u8 *identity, *password; local 84 data->state = IDENTITY; 86 identity = eap_get_config_identity(sm, &identity_len); 87 if (identity) { 88 data->peerid = os_memdup(identity, identity_len); 150 if (data->state != IDENTITY) { 155 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); [all...] |
| eap_wsc.c | 141 const u8 *identity; local 159 identity = eap_get_config_identity(sm, &identity_len); 161 if (identity && identity_len == WSC_ID_REGISTRAR_LEN && 162 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0) 164 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN && 165 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0) 168 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity", 169 identity, identity_len);
|
| eap_config.h | 285 * identity - EAP Identity 287 * This field is used to set the real user identity or NAI (for 290 u8 *identity; member in struct:eap_peer_config 293 * identity_len - EAP Identity length 298 * anonymous_identity - Anonymous EAP Identity 301 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 302 * real identity (identity field) only to the authentication server. 304 * If not set, the identity field will be used for both unencrypted an [all...] |
| eap_eke.c | 18 IDENTITY, COMMIT, CONFIRM, SUCCESS, FAILURE 41 case IDENTITY: 42 return "IDENTITY"; 71 const u8 *identity, *password; local 84 eap_eke_state(data, IDENTITY); 86 identity = eap_get_config_identity(sm, &identity_len); 87 if (identity) { 88 data->peerid = os_memdup(identity, identity_len); 233 if (data->state != IDENTITY) { 302 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short ID/Request Data to include IDType/Identity"); [all...] |
| eap_gpsk.c | 82 const u8 *identity, *password; local 97 identity = eap_get_config_identity(sm, &identity_len); 98 if (identity) { 99 data->id_peer = os_memdup(identity, identity_len);
|
| eap_mschapv2.c | 161 const u8 *identity, *password; local 166 identity = eap_get_config_identity(sm, &identity_len); 168 if (identity == NULL || password == NULL) 211 if (mschapv2_derive_response(identity, identity_len, password, 225 wpabuf_put_data(resp, identity, identity_len); 719 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Identity not configured");
|
| eap_pwd.c | 95 const u8 *identity, *password; local 107 identity = eap_get_config_identity(sm, &identity_len); 108 if (identity == NULL) { 109 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); 124 os_memcpy(data->id_peer, identity, identity_len); 323 os_memcpy(data->id_server, id->identity, data->id_server_len);
|
| /src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/engine/disp/ |
| outp.h | 21 bool identity; member in struct:nvkm_outp
|
| ior.h | 21 bool identity; member in struct:nvkm_ior
|
| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_pwd_common.h | 52 u8 identity[0]; /* length inferred from payload */ member in struct:eap_pwd_id
|
| /src/sys/external/bsd/compiler_rt/dist/lib/interception/tests/ |
| interception_win_test.cc | 320 IdentityFunction identity = (IdentityFunction)identity_address; local 324 EXPECT_EQ(0, identity(0)); 325 EXPECT_EQ(42, identity(42)); 344 EXPECT_EQ(0, identity(0)); 345 EXPECT_EQ(42, identity(42));
|
| /src/external/mpl/bind/dist/lib/dns/ |
| ssu.c | 46 dns_name_t *identity; /*%< the identity to match */ member in struct:dns_ssurule 88 if (rule->identity != NULL) { 89 dns_name_free(rule->identity, mctx); 90 isc_mem_put(mctx, rule->identity, 91 sizeof(*rule->identity)); 136 const dns_name_t *identity, dns_ssumatchtype_t matchtype, 143 REQUIRE(dns_name_isabsolute(identity)); 156 rule->identity = NULL; 162 rule->identity = isc_mem_get(mctx, sizeof(*rule->identity)) [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| ssu.c | 48 dns_name_t *identity; /*%< the identity to match */ member in struct:dns_ssurule 91 if (rule->identity != NULL) { 92 dns_name_free(rule->identity, mctx); 93 isc_mem_put(mctx, rule->identity, sizeof(dns_name_t)); 138 const dns_name_t *identity, dns_ssumatchtype_t matchtype, 145 REQUIRE(dns_name_isabsolute(identity)); 158 rule->identity = NULL; 164 rule->identity = isc_mem_get(mctx, sizeof(dns_name_t)); 165 dns_name_init(rule->identity, NULL) [all...] |
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_sim.c | 119 username = sim_get_username(sm->identity, sm->identity_len); 129 wpa_printf(MSG_DEBUG, " No identity request"); 132 * RFC 4186, Chap. 4.2.4 recommends that identity from EAP is 133 * ignored and the SIM/Start is used to request the identity. 145 * already know the identity of the peer, there is no need to 146 * request any identity in this case. 148 } else if (sm->identity && sm->identity_len > 0 && 149 sm->identity[0] == EAP_SIM_REAUTH_ID_PREFIX) { 288 eap_sim_derive_keys_reauth(data->counter, sm->identity, 453 const u8 *identity; local [all...] |