HomeSort by: relevance | last modified time | path
    Searched refs:IDENTITY (Results 1 - 12 of 12) sorted by relevancy

  /src/external/bsd/openldap/dist/servers/slapd/back-sql/rdbms_depend/mssql/
testdb_create.sql 9 id int IDENTITY (1, 1) NOT NULL ,
17 id int IDENTITY (1, 1) NOT NULL ,
24 id int IDENTITY (1, 1) NOT NULL ,
32 id int IDENTITY (1, 1) NOT NULL ,
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_sake.c 17 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state;
40 case IDENTITY:
41 return "IDENTITY";
71 const u8 *identity, *password; local
84 data->state = IDENTITY;
86 identity = eap_get_config_identity(sm, &identity_len);
87 if (identity) {
88 data->peerid = os_memdup(identity, identity_len);
150 if (data->state != IDENTITY) {
155 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity");
    [all...]
eap_eke.c 18 IDENTITY, COMMIT, CONFIRM, SUCCESS, FAILURE
41 case IDENTITY:
42 return "IDENTITY";
71 const u8 *identity, *password; local
84 eap_eke_state(data, IDENTITY);
86 identity = eap_get_config_identity(sm, &identity_len);
87 if (identity) {
88 data->peerid = os_memdup(identity, identity_len);
233 if (data->state != IDENTITY) {
302 wpa_printf(MSG_DEBUG, "EAP-EKE: Too short ID/Request Data to include IDType/Identity");
    [all...]
eap.c 452 if (config->identity) {
454 if (config->identity[i] == '@')
462 os_memcpy(realm, &config->identity[i + 1], realm_len);
486 /* When identity is not provided in the config, build the realm from
489 if (!config->identity && !config->anonymous_identity &&
992 * Handles requests for Identity method and builds a response.
994 SM_STATE(EAP, IDENTITY)
998 SM_ENTRY(EAP, IDENTITY);
1244 SM_ENTER(EAP, SUCCESS); /* EAP-Success after Identity */
1263 SM_ENTER(EAP, IDENTITY);
1675 const u8 *identity; local
    [all...]
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_sake.c 18 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state;
36 case IDENTITY:
37 return "IDENTITY";
123 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity");
220 case IDENTITY:
268 if (data->state == IDENTITY && subtype == EAP_SAKE_SUBTYPE_IDENTITY)
292 if (data->state != IDENTITY)
295 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Identity");
296 /* TODO: update identity and select new user data */
eap_server_aka.c 37 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
65 case IDENTITY:
66 return "IDENTITY";
107 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
108 "request full auth identity");
109 /* Remain in IDENTITY state for another round */
118 "EAP-AKA: Permanent identity recognized - skip AKA-Identity exchange");
159 const u8 *identity = sm->identity; local
    [all...]
eap_server_eke.c 19 IDENTITY, COMMIT, CONFIRM, FAILURE_REPORT, SUCCESS, FAILURE
41 case IDENTITY:
42 return "IDENTITY";
84 eap_eke_state(data, IDENTITY);
187 wpa_printf(MSG_DEBUG, "EAP-EKE: Request/Identity");
224 /* Server IDType + Identity */
367 case IDENTITY:
401 if (data->state == IDENTITY && eke_exch == EAP_EKE_ID)
428 wpa_printf(MSG_DEBUG, "EAP-EKE: Received Response/Identity");
430 if (data->state != IDENTITY) {
    [all...]
  /src/external/bsd/nsd/include/
config.h 537 /* Define to the default nsd identity. */
538 #define IDENTITY "NetBSD server"
  /src/external/gpl3/gdb/dist/gdb/
d-exp.y 171 %left IDENTITY NOTIDENTITY
268 ShiftExpression IDENTITY ShiftExpression
982 {"is", IDENTITY, OP_NULL},
  /src/external/gpl3/gdb.old/dist/gdb/
d-exp.y 171 %left IDENTITY NOTIDENTITY
268 ShiftExpression IDENTITY ShiftExpression
980 {"is", IDENTITY, OP_NULL},
  /src/external/bsd/nsd/dist/
config.h.in 536 /* Define to the default nsd identity. */
537 #undef IDENTITY
nsd.c 100 " -i identity Specify the identity when queried for id.server CHAOS TXT.\n"
888 nsd.identity = 0;
905 /* Set up our default identity to gethostname(2) */
907 nsd.identity = hostname;
910 "failed to get the host name: %s - using default identity",
912 nsd.identity = IDENTITY;
957 nsd.identity = optarg;
1055 if (strlen(nsd.identity) > UCHAR_MAX)
    [all...]

Completed in 37 milliseconds