HomeSort by: relevance | last modified time | path
    Searched defs:identity (Results 1 - 25 of 79) sorted by relevancy

1 2 3 4

  /src/external/bsd/nsd/dist/dnstap/
dnstap.h 54 /** dnstap "identity" field, NULL if disabled */
55 char *identity; member in struct:dt_env
60 /** length of "identity" field */
  /src/external/bsd/wpa/dist/src/ap/
ieee802_11_auth.h 24 char *identity; member in struct:radius_sta
pmksa_cache_auth.h 30 u8 *identity; member in struct:rsn_pmksa_cache_entry
  /src/external/gpl3/gcc/dist/libstdc++-v3/include/bits/
ranges_cmp.h 43 // Define std::identity here so that <iterator> and <ranges>
46 /// [func.identity] The identity function.
47 struct identity struct
  /src/external/gpl3/gcc.old/dist/libstdc++-v3/include/bits/
ranges_cmp.h 43 // Define std::identity here so that <iterator> and <ranges>
46 /// [func.identity] The identity function.
47 struct identity struct
  /src/external/bsd/unbound/dist/dnstap/
dnstap.h 55 /** dnstap "identity" field, NULL if disabled */
56 char *identity; member in struct:dt_env
61 /** length of "identity" field */
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_gtc.c 50 const u8 *pos, *password, *identity; local
99 identity = eap_get_config_identity(sm, &identity_len);
100 if (identity == NULL)
110 wpabuf_put_data(resp, identity, identity_len);
eap_ikev2.c 61 const u8 *identity, *password; local
65 identity = eap_get_config_identity(sm, &identity_len);
66 if (identity == NULL) {
67 wpa_printf(MSG_INFO, "EAP-IKEV2: No identity available");
86 data->ikev2.IDr = os_memdup(identity, identity_len);
eap_leap.c 65 const u8 *pos, *challenge, *identity, *password; local
72 identity = eap_get_config_identity(sm, &identity_len);
74 if (identity == NULL || password == NULL)
129 wpabuf_put_data(resp, identity, identity_len);
144 const u8 *identity; local
149 identity = eap_get_config_identity(sm, &identity_len);
150 if (identity == NULL)
179 wpabuf_put_data(resp, identity, identity_len);
eap_pax.c 51 const u8 *identity, *password; local
54 identity = eap_get_config_identity(sm, &identity_len);
56 if (!identity || !password) {
72 data->cid = os_memdup(identity, identity_len);
eap_psk.c 36 const u8 *identity, *password; local
57 identity = eap_get_config_identity(sm, &identity_len);
58 if (identity) {
61 os_memcpy(data->id_p, identity, identity_len);
65 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity");
eap_sake.c 17 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state;
40 case IDENTITY:
41 return "IDENTITY";
71 const u8 *identity, *password; local
84 data->state = IDENTITY;
86 identity = eap_get_config_identity(sm, &identity_len);
87 if (identity) {
88 data->peerid = os_memdup(identity, identity_len);
150 if (data->state != IDENTITY) {
155 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity");
    [all...]
eap_wsc.c 141 const u8 *identity; local
159 identity = eap_get_config_identity(sm, &identity_len);
161 if (identity && identity_len == WSC_ID_REGISTRAR_LEN &&
162 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0)
164 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN &&
165 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0)
168 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity",
169 identity, identity_len);
eap_config.h 285 * identity - EAP Identity
287 * This field is used to set the real user identity or NAI (for
290 u8 *identity; member in struct:eap_peer_config
293 * identity_len - EAP Identity length
298 * anonymous_identity - Anonymous EAP Identity
301 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
302 * real identity (identity field) only to the authentication server.
304 * If not set, the identity field will be used for both unencrypted an
    [all...]
eap_eke.c 18 IDENTITY, COMMIT, CONFIRM, SUCCESS, FAILURE
41 case IDENTITY:
42 return "IDENTITY";
71 const u8 *identity, *password; local
84 eap_eke_state(data, IDENTITY);
86 identity = eap_get_config_identity(sm, &identity_len);
87 if (identity) {
88 data->peerid = os_memdup(identity, identity_len);
233 if (data->state != IDENTITY) {
302 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short ID/Request Data to include IDType/Identity");
    [all...]
eap_gpsk.c 82 const u8 *identity, *password; local
97 identity = eap_get_config_identity(sm, &identity_len);
98 if (identity) {
99 data->id_peer = os_memdup(identity, identity_len);
eap_mschapv2.c 161 const u8 *identity, *password; local
166 identity = eap_get_config_identity(sm, &identity_len);
168 if (identity == NULL || password == NULL)
211 if (mschapv2_derive_response(identity, identity_len, password,
225 wpabuf_put_data(resp, identity, identity_len);
719 wpa_printf(MSG_INFO, "EAP-MSCHAPV2: Identity not configured");
eap_pwd.c 95 const u8 *identity, *password; local
107 identity = eap_get_config_identity(sm, &identity_len);
108 if (identity == NULL) {
109 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!");
124 os_memcpy(data->id_peer, identity, identity_len);
323 os_memcpy(data->id_server, id->identity, data->id_server_len);
  /src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/engine/disp/
outp.h 21 bool identity; member in struct:nvkm_outp
ior.h 21 bool identity; member in struct:nvkm_ior
  /src/external/bsd/wpa/dist/src/eap_common/
eap_pwd_common.h 52 u8 identity[0]; /* length inferred from payload */ member in struct:eap_pwd_id
  /src/sys/external/bsd/compiler_rt/dist/lib/interception/tests/
interception_win_test.cc 320 IdentityFunction identity = (IdentityFunction)identity_address; local
324 EXPECT_EQ(0, identity(0));
325 EXPECT_EQ(42, identity(42));
344 EXPECT_EQ(0, identity(0));
345 EXPECT_EQ(42, identity(42));
  /src/external/mpl/bind/dist/lib/dns/
ssu.c 46 dns_name_t *identity; /*%< the identity to match */ member in struct:dns_ssurule
88 if (rule->identity != NULL) {
89 dns_name_free(rule->identity, mctx);
90 isc_mem_put(mctx, rule->identity,
91 sizeof(*rule->identity));
136 const dns_name_t *identity, dns_ssumatchtype_t matchtype,
143 REQUIRE(dns_name_isabsolute(identity));
156 rule->identity = NULL;
162 rule->identity = isc_mem_get(mctx, sizeof(*rule->identity))
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/
ssu.c 48 dns_name_t *identity; /*%< the identity to match */ member in struct:dns_ssurule
91 if (rule->identity != NULL) {
92 dns_name_free(rule->identity, mctx);
93 isc_mem_put(mctx, rule->identity, sizeof(dns_name_t));
138 const dns_name_t *identity, dns_ssumatchtype_t matchtype,
145 REQUIRE(dns_name_isabsolute(identity));
158 rule->identity = NULL;
164 rule->identity = isc_mem_get(mctx, sizeof(dns_name_t));
165 dns_name_init(rule->identity, NULL)
    [all...]
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_sim.c 119 username = sim_get_username(sm->identity, sm->identity_len);
129 wpa_printf(MSG_DEBUG, " No identity request");
132 * RFC 4186, Chap. 4.2.4 recommends that identity from EAP is
133 * ignored and the SIM/Start is used to request the identity.
145 * already know the identity of the peer, there is no need to
146 * request any identity in this case.
148 } else if (sm->identity && sm->identity_len > 0 &&
149 sm->identity[0] == EAP_SIM_REAUTH_ID_PREFIX) {
288 eap_sim_derive_keys_reauth(data->counter, sm->identity,
453 const u8 *identity; local
    [all...]

Completed in 46 milliseconds

1 2 3 4