| /src/external/bsd/wpa/dist/wpa_supplicant/examples/ |
| ieee8021x.conf | 10 identity="user name"
|
| openCryptoki.conf | 26 identity="User"
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| wpa_supplicant.conf | 1235 # identity: Identity string for EAP 1238 # anonymous_identity: Anonymous identity string for EAP (to be used as the 1239 # unencrypted identity with EAP types that support different tunnelled 1240 # identity, e.g., EAP-TTLS). This field can also be used with 1241 # EAP-SIM/AKA/AKA' to store the pseudonym identity. 1814 identity="user@example.com" 1828 identity="user@example.com" 1836 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the 1837 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel [all...] |
| /src/external/bsd/wpa/dist/src/ap/ |
| eap_user_db.c | 110 if (os_strcmp(col[i], "identity") == 0 && argv[i]) 121 os_memcmp(argv[id], user->identity, len) == 0 && 135 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, 145 wpa_printf(MSG_DEBUG, "%s: identity len too big: %d >= %d", 150 os_memcpy(id_str, identity, identity_len); 164 wpa_printf(MSG_INFO, "DB: Unsupported character in identity"); 168 bin_clear_free(hapd->tmp_eap_user.identity, 174 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); 175 if (hapd->tmp_eap_user.identity == NULL) 177 os_memcpy(hapd->tmp_eap_user.identity, identity, identity_len) [all...] |
| pmksa_cache_auth.c | 42 os_free(entry->identity); 152 if (eapol->identity) { 153 entry->identity = os_malloc(eapol->identity_len); 154 if (entry->identity) { 156 os_memcpy(entry->identity, eapol->identity, 190 if (entry->identity) { 191 os_free(eapol->identity); 192 eapol->identity = os_malloc(entry->identity_len); 193 if (eapol->identity) { [all...] |
| ieee802_11_auth.h | 24 char *identity; member in struct:radius_sta
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_gtc.c | 131 if (sm->identity && sm->require_identity_match && 133 os_memcmp(pos, sm->identity, sm->identity_len))) { 134 wpa_printf(MSG_DEBUG, "EAP-GTC: Phase 2 Identity did " 135 "not match with required Identity"); 137 "identity", 138 sm->identity, sm->identity_len); 142 os_free(sm->identity); 144 sm->identity = os_memdup(pos, sm->identity_len); 145 if (sm->identity == NULL) { 151 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) [all...] |
| eap_server_identity.c | 2 * hostapd / EAP-Identity 70 wpa_printf(MSG_ERROR, "EAP-Identity: Failed to allocate " 91 wpa_printf(MSG_INFO, "EAP-Identity: Invalid frame"); 109 wpa_printf(MSG_DEBUG, "EAP-Identity: failed to pick " 122 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len); 126 eap_log_msg(sm, "EAP-Response/Identity '%s'", buf); 129 if (sm->identity) 131 os_free(sm->identity); 132 sm->identity = os_malloc(len ? len : 1) [all...] |
| /src/external/mpl/bind/dist/lib/dns/ |
| ssu.c | 46 dns_name_t *identity; /*%< the identity to match */ member in struct:dns_ssurule 88 if (rule->identity != NULL) { 89 dns_name_free(rule->identity, mctx); 90 isc_mem_put(mctx, rule->identity, 91 sizeof(*rule->identity)); 136 const dns_name_t *identity, dns_ssumatchtype_t matchtype, 143 REQUIRE(dns_name_isabsolute(identity)); 156 rule->identity = NULL; 162 rule->identity = isc_mem_get(mctx, sizeof(*rule->identity)) [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| ssu.c | 48 dns_name_t *identity; /*%< the identity to match */ member in struct:dns_ssurule 91 if (rule->identity != NULL) { 92 dns_name_free(rule->identity, mctx); 93 isc_mem_put(mctx, rule->identity, sizeof(dns_name_t)); 138 const dns_name_t *identity, dns_ssumatchtype_t matchtype, 145 REQUIRE(dns_name_isabsolute(identity)); 158 rule->identity = NULL; 164 rule->identity = isc_mem_get(mctx, sizeof(dns_name_t)); 165 dns_name_init(rule->identity, NULL) [all...] |
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| mschapv2.c | 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, 48 wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity", 49 identity, identity_len); 51 username = mschapv2_remove_domain(identity, &username_len);
|
| eap_gtc.c | 50 const u8 *pos, *password, *identity; local 99 identity = eap_get_config_identity(sm, &identity_len); 100 if (identity == NULL) 110 wpabuf_put_data(resp, identity, identity_len);
|
| eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 72 identity = eap_get_config_identity(sm, &identity_len); 74 if (identity == NULL || password == NULL) 129 wpabuf_put_data(resp, identity, identity_len); 144 const u8 *identity; local 149 identity = eap_get_config_identity(sm, &identity_len); 150 if (identity == NULL) 179 wpabuf_put_data(resp, identity, identity_len);
|
| /src/external/mit/isl/dist/ |
| isl_multi_identity_templ.c | 18 __isl_give MULTI(BASE) *FN(MULTI(BASE),identity)(__isl_take isl_space *space) 72 return FN(MULTI(BASE),identity)(isl_space_map_from_set(space)); 95 return FN(MULTI(BASE),identity)(space);
|
| /src/external/bsd/unbound/dist/testdata/stat_values.tdir/ |
| stat_values_cachedb.conf | 14 identity: "stat_values"
|
| stat_values_downstream_cookies.conf | 13 identity: "stat_values"
|
| stat_values_discard_wait_limit.conf | 14 identity: "stat_values"
|
| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 108 static inline void eap_aka_prime_derive_keys(const u8 *identity, 117 const u8 *identity, 186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
|
| /src/external/gpl3/gcc.old/dist/libstdc++-v3/include/bits/ |
| ranges_algo.h | 74 typename _Proj = identity, 86 template<input_range _Range, typename _Proj = identity, 102 typename _Proj = identity, 114 template<input_range _Range, typename _Proj = identity, 130 typename _Proj = identity, 142 template<input_range _Range, typename _Proj = identity, 181 typename _Proj = identity, 191 template<input_range _Range, typename _Proj = identity, 209 template<input_iterator _Iter, typename _Proj = identity, 244 typename _Proj1 = identity, typename _Proj2 = identity [all...] |
| /src/external/apache2/mDNSResponder/dist/mDNSShared/ |
| tls-keychain.h | 33 #define DNSSD_PROXY_IDENTITY_NAME SRP_APPLICATION_IDENTIFIER " identity" // The identity name used by dnssd-proxy 116 * Add the identity into keychain. 118 * @param identity 129 * errSecSuccess if the identity is added into keychain successfully, otherwise, an error code to indicate the error. 132 * When an identity is added into keychain, the private key part of the identity will remain locally, and it will not be synced to iCloud keychain. 133 * The certificate part of the identity will be synced to iCloud keychain. 136 keychain_identity_add(const SecIdentityRef _Nonnull identity, const CFStringRef _Nonnull uuid); 140 * Retrieve the identity added by <code>keychain_identity_add()</code> on the same device [all...] |
| /src/external/bsd/wpa/dist/src/radius/ |
| radius_server.h | 64 * @identity: User identity 65 * @identity_len: identity buffer length in octets 66 * @phase2: Whether this is for Phase 2 identity 75 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len, 79 * eap_req_id_text - Optional data for EAP-Request/Identity 82 * will be sent in EAP-Request/Identity. This string can contain an
|
| /src/external/bsd/wpa/dist/src/eapol_auth/ |
| eapol_auth_sm.h | 51 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len, 73 const char *identity, const char *radius_cui);
|
| /src/external/mpl/bind/dist/bin/tests/system/dnstap/ |
| good-dnstap-in-options.conf | 16 dnstap-identity hostname;
|
| good-dnstap-in-view.conf | 16 dnstap-identity hostname;
|
| /src/external/mpl/bind/dist/bin/tests/system/dnstap/ns1/ |
| named.conf.j2 | 25 dnstap-identity "ns1";
|