| /src/external/bsd/openldap/dist/servers/slapd/back-sql/rdbms_depend/mssql/ |
| testdb_create.sql | 9 id int IDENTITY (1, 1) NOT NULL , 17 id int IDENTITY (1, 1) NOT NULL , 24 id int IDENTITY (1, 1) NOT NULL , 32 id int IDENTITY (1, 1) NOT NULL ,
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_sake.c | 17 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 40 case IDENTITY: 41 return "IDENTITY"; 71 const u8 *identity, *password; local 84 data->state = IDENTITY; 86 identity = eap_get_config_identity(sm, &identity_len); 87 if (identity) { 88 data->peerid = os_memdup(identity, identity_len); 150 if (data->state != IDENTITY) { 155 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); [all...] |
| eap_eke.c | 18 IDENTITY, COMMIT, CONFIRM, SUCCESS, FAILURE 41 case IDENTITY: 42 return "IDENTITY"; 71 const u8 *identity, *password; local 84 eap_eke_state(data, IDENTITY); 86 identity = eap_get_config_identity(sm, &identity_len); 87 if (identity) { 88 data->peerid = os_memdup(identity, identity_len); 233 if (data->state != IDENTITY) { 302 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short ID/Request Data to include IDType/Identity"); [all...] |
| eap.c | 452 if (config->identity) { 454 if (config->identity[i] == '@') 462 os_memcpy(realm, &config->identity[i + 1], realm_len); 486 /* When identity is not provided in the config, build the realm from 489 if (!config->identity && !config->anonymous_identity && 992 * Handles requests for Identity method and builds a response. 994 SM_STATE(EAP, IDENTITY) 998 SM_ENTRY(EAP, IDENTITY); 1244 SM_ENTER(EAP, SUCCESS); /* EAP-Success after Identity */ 1263 SM_ENTER(EAP, IDENTITY); 1675 const u8 *identity; local [all...] |
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_sake.c | 18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 36 case IDENTITY: 37 return "IDENTITY"; 123 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity"); 220 case IDENTITY: 268 if (data->state == IDENTITY && subtype == EAP_SAKE_SUBTYPE_IDENTITY) 292 if (data->state != IDENTITY) 295 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Identity"); 296 /* TODO: update identity and select new user data */
|
| eap_server_aka.c | 37 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 65 case IDENTITY: 66 return "IDENTITY"; 107 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - " 108 "request full auth identity"); 109 /* Remain in IDENTITY state for another round */ 118 "EAP-AKA: Permanent identity recognized - skip AKA-Identity exchange"); 159 const u8 *identity = sm->identity; local [all...] |
| eap_server_eke.c | 19 IDENTITY, COMMIT, CONFIRM, FAILURE_REPORT, SUCCESS, FAILURE 41 case IDENTITY: 42 return "IDENTITY"; 84 eap_eke_state(data, IDENTITY); 187 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Identity"); 224 /* Server IDType + Identity */ 367 case IDENTITY: 401 if (data->state == IDENTITY && eke_exch == EAP_EKE_ID) 428 wpa_printf(MSG_DEBUG, "EAP-EKE: Received Response/Identity"); 430 if (data->state != IDENTITY) { [all...] |
| /src/external/bsd/nsd/include/ |
| config.h | 537 /* Define to the default nsd identity. */ 538 #define IDENTITY "NetBSD server"
|
| /src/external/gpl3/gdb/dist/gdb/ |
| d-exp.y | 171 %left IDENTITY NOTIDENTITY 268 ShiftExpression IDENTITY ShiftExpression 982 {"is", IDENTITY, OP_NULL},
|
| /src/external/gpl3/gdb.old/dist/gdb/ |
| d-exp.y | 171 %left IDENTITY NOTIDENTITY 268 ShiftExpression IDENTITY ShiftExpression 980 {"is", IDENTITY, OP_NULL},
|
| /src/external/bsd/nsd/dist/ |
| config.h.in | 536 /* Define to the default nsd identity. */ 537 #undef IDENTITY
|
| nsd.c | 100 " -i identity Specify the identity when queried for id.server CHAOS TXT.\n" 888 nsd.identity = 0; 905 /* Set up our default identity to gethostname(2) */ 907 nsd.identity = hostname; 910 "failed to get the host name: %s - using default identity", 912 nsd.identity = IDENTITY; 957 nsd.identity = optarg; 1055 if (strlen(nsd.identity) > UCHAR_MAX) [all...] |