HomeSort by: relevance | last modified time | path
    Searched refs:identity (Results 1 - 25 of 249) sorted by relevancy

1 2 3 4 5 6 7 8 910

  /src/external/bsd/wpa/dist/wpa_supplicant/examples/
ieee8021x.conf 10 identity="user name"
openCryptoki.conf 26 identity="User"
  /src/external/bsd/wpa/dist/wpa_supplicant/
wpa_supplicant.conf 1235 # identity: Identity string for EAP
1238 # anonymous_identity: Anonymous identity string for EAP (to be used as the
1239 # unencrypted identity with EAP types that support different tunnelled
1240 # identity, e.g., EAP-TTLS). This field can also be used with
1241 # EAP-SIM/AKA/AKA' to store the pseudonym identity.
1814 identity="user@example.com"
1828 identity="user@example.com"
1836 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
1837 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel
    [all...]
  /src/external/bsd/wpa/dist/src/ap/
eap_user_db.c 110 if (os_strcmp(col[i], "identity") == 0 && argv[i])
121 os_memcmp(argv[id], user->identity, len) == 0 &&
135 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity,
145 wpa_printf(MSG_DEBUG, "%s: identity len too big: %d >= %d",
150 os_memcpy(id_str, identity, identity_len);
164 wpa_printf(MSG_INFO, "DB: Unsupported character in identity");
168 bin_clear_free(hapd->tmp_eap_user.identity,
174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1);
175 if (hapd->tmp_eap_user.identity == NULL)
177 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len)
    [all...]
pmksa_cache_auth.c 42 os_free(entry->identity);
152 if (eapol->identity) {
153 entry->identity = os_malloc(eapol->identity_len);
154 if (entry->identity) {
156 os_memcpy(entry->identity, eapol->identity,
190 if (entry->identity) {
191 os_free(eapol->identity);
192 eapol->identity = os_malloc(entry->identity_len);
193 if (eapol->identity) {
    [all...]
ieee802_11_auth.h 24 char *identity; member in struct:radius_sta
  /src/external/bsd/wpa/dist/src/eap_server/
eap_server_gtc.c 131 if (sm->identity && sm->require_identity_match &&
133 os_memcmp(pos, sm->identity, sm->identity_len))) {
134 wpa_printf(MSG_DEBUG, "EAP-GTC: Phase 2 Identity did "
135 "not match with required Identity");
137 "identity",
138 sm->identity, sm->identity_len);
142 os_free(sm->identity);
144 sm->identity = os_memdup(pos, sm->identity_len);
145 if (sm->identity == NULL) {
151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0)
    [all...]
eap_server_identity.c 2 * hostapd / EAP-Identity
70 wpa_printf(MSG_ERROR, "EAP-Identity: Failed to allocate "
91 wpa_printf(MSG_INFO, "EAP-Identity: Invalid frame");
109 wpa_printf(MSG_DEBUG, "EAP-Identity: failed to pick "
122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
126 eap_log_msg(sm, "EAP-Response/Identity '%s'", buf);
129 if (sm->identity)
131 os_free(sm->identity);
132 sm->identity = os_malloc(len ? len : 1)
    [all...]
  /src/external/mpl/bind/dist/lib/dns/
ssu.c 46 dns_name_t *identity; /*%< the identity to match */ member in struct:dns_ssurule
88 if (rule->identity != NULL) {
89 dns_name_free(rule->identity, mctx);
90 isc_mem_put(mctx, rule->identity,
91 sizeof(*rule->identity));
136 const dns_name_t *identity, dns_ssumatchtype_t matchtype,
143 REQUIRE(dns_name_isabsolute(identity));
156 rule->identity = NULL;
162 rule->identity = isc_mem_get(mctx, sizeof(*rule->identity))
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/
ssu.c 48 dns_name_t *identity; /*%< the identity to match */ member in struct:dns_ssurule
91 if (rule->identity != NULL) {
92 dns_name_free(rule->identity, mctx);
93 isc_mem_put(mctx, rule->identity, sizeof(dns_name_t));
138 const dns_name_t *identity, dns_ssumatchtype_t matchtype,
145 REQUIRE(dns_name_isabsolute(identity));
158 rule->identity = NULL;
164 rule->identity = isc_mem_get(mctx, sizeof(dns_name_t));
165 dns_name_init(rule->identity, NULL)
    [all...]
  /src/external/bsd/wpa/dist/src/eap_peer/
mschapv2.c 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len,
48 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity",
49 identity, identity_len);
51 username = mschapv2_remove_domain(identity, &username_len);
eap_gtc.c 50 const u8 *pos, *password, *identity; local
99 identity = eap_get_config_identity(sm, &identity_len);
100 if (identity == NULL)
110 wpabuf_put_data(resp, identity, identity_len);
eap_leap.c 65 const u8 *pos, *challenge, *identity, *password; local
72 identity = eap_get_config_identity(sm, &identity_len);
74 if (identity == NULL || password == NULL)
129 wpabuf_put_data(resp, identity, identity_len);
144 const u8 *identity; local
149 identity = eap_get_config_identity(sm, &identity_len);
150 if (identity == NULL)
179 wpabuf_put_data(resp, identity, identity_len);
  /src/external/mit/isl/dist/
isl_multi_identity_templ.c 18 __isl_give MULTI(BASE) *FN(MULTI(BASE),identity)(__isl_take isl_space *space)
72 return FN(MULTI(BASE),identity)(isl_space_map_from_set(space));
95 return FN(MULTI(BASE),identity)(space);
  /src/external/bsd/unbound/dist/testdata/stat_values.tdir/
stat_values_cachedb.conf 14 identity: "stat_values"
stat_values_downstream_cookies.conf 13 identity: "stat_values"
stat_values_discard_wait_limit.conf 14 identity: "stat_values"
  /src/external/bsd/wpa/dist/src/eap_common/
eap_sim_common.h 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
108 static inline void eap_aka_prime_derive_keys(const u8 *identity,
117 const u8 *identity,
186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
  /src/external/gpl3/gcc.old/dist/libstdc++-v3/include/bits/
ranges_algo.h 74 typename _Proj = identity,
86 template<input_range _Range, typename _Proj = identity,
102 typename _Proj = identity,
114 template<input_range _Range, typename _Proj = identity,
130 typename _Proj = identity,
142 template<input_range _Range, typename _Proj = identity,
181 typename _Proj = identity,
191 template<input_range _Range, typename _Proj = identity,
209 template<input_iterator _Iter, typename _Proj = identity,
244 typename _Proj1 = identity, typename _Proj2 = identity
    [all...]
  /src/external/apache2/mDNSResponder/dist/mDNSShared/
tls-keychain.h 33 #define DNSSD_PROXY_IDENTITY_NAME SRP_APPLICATION_IDENTIFIER " identity" // The identity name used by dnssd-proxy
116 * Add the identity into keychain.
118 * @param identity
129 * errSecSuccess if the identity is added into keychain successfully, otherwise, an error code to indicate the error.
132 * When an identity is added into keychain, the private key part of the identity will remain locally, and it will not be synced to iCloud keychain.
133 * The certificate part of the identity will be synced to iCloud keychain.
136 keychain_identity_add(const SecIdentityRef _Nonnull identity, const CFStringRef _Nonnull uuid);
140 * Retrieve the identity added by <code>keychain_identity_add()</code> on the same device
    [all...]
  /src/external/bsd/wpa/dist/src/radius/
radius_server.h 64 * @identity: User identity
65 * @identity_len: identity buffer length in octets
66 * @phase2: Whether this is for Phase 2 identity
75 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
79 * eap_req_id_text - Optional data for EAP-Request/Identity
82 * will be sent in EAP-Request/Identity. This string can contain an
  /src/external/bsd/wpa/dist/src/eapol_auth/
eapol_auth_sm.h 51 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
73 const char *identity, const char *radius_cui);
  /src/external/mpl/bind/dist/bin/tests/system/dnstap/
good-dnstap-in-options.conf 16 dnstap-identity hostname;
good-dnstap-in-view.conf 16 dnstap-identity hostname;
  /src/external/mpl/bind/dist/bin/tests/system/dnstap/ns1/
named.conf.j2 25 dnstap-identity "ns1";

Completed in 41 milliseconds

1 2 3 4 5 6 7 8 910