Searched refs:identity (Results 26 - 50 of 96) sorted by relevance

1234

/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/include/dns/
H A Dssu.h104 dns_name_t *identity, unsigned int matchtype,
109 * either grants or denies update privileges of an identity (or set of
115 * name to be updated matches the signing identity.
125 *\li 'identity' is a valid absolute name
207 dns_ssu_external_match(dns_name_t *identity, dns_name_t *signer,
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_common/
H A Deap_sim_common.h80 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
84 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
89 const u8 *identity, size_t identity_len,
98 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
102 const u8 *identity, size_t identity_len,
114 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument
123 const u8 *identity,
192 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
122 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.c33 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument
42 addr[0] = identity;
61 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument
67 addr[0] = identity;
113 const u8 *identity, size_t identity_len,
123 while (identity_len > 0 && identity[identity_len - 1] == 0) {
125 "character from the end of identity");
128 addr[0] = identity;
141 identity, identity_len);
281 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument
112 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
330 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/g++.dg/cpp0x/
H A Dpr33955.C34 struct identity struct
39 apply_args<args<or_>, args<identity<int>>, float, double> a1;
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_server/
H A Deap_server_identity.c127 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len);
128 if (sm->identity)
130 os_free(sm->identity);
131 sm->identity = os_malloc(len ? len : 1);
132 if (sm->identity == NULL) {
135 os_memcpy(sm->identity, pos, len);
H A Deap_server_fast.c66 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data
136 u8 *identity = NULL; local
219 identity = pos + 2;
234 if (identity) {
236 "PAC-Opaque", identity, identity_len);
237 os_free(data->identity);
238 data->identity = os_malloc(identity_len);
239 if (data->identity) {
240 os_memcpy(data->identity, identity, identity_le
[all...]
H A Deap_i.h151 u8 *identity; member in struct:eap_sm
153 /* Whether Phase 2 method should validate identity match */
192 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
H A Deap.h87 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
H A Deap_server_wsc.c90 if (sm->identity && sm->identity_len == WSC_ID_REGISTRAR_LEN &&
91 os_memcmp(sm->identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) ==
94 else if (sm->identity && sm->identity_len == WSC_ID_ENROLLEE_LEN &&
95 os_memcmp(sm->identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN)
99 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity",
100 sm->identity, sm->identity_len);
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/wpa_supplicant/tests/
H A Dlink_test.c73 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, argument
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/servers/slapd/back-sql/rdbms_depend/mssql/
H A Dbacksql_create.sql2 id int identity (1, 1) not null ,
29 id int identity (1, 1) not null ,
52 id int identity (1, 1) not null ,
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/ap/
H A Dieee802_1x.c392 const u8 *identity; local
399 identity = eap_get_identity(sm->eap, &identity_len);
400 if (identity == NULL)
403 /* Save station identity for future RADIUS packets */
404 os_free(sm->identity);
405 sm->identity = os_malloc(identity_len + 1);
406 if (sm->identity == NULL) {
411 os_memcpy(sm->identity, identity, identity_len);
413 sm->identity[identity_le
1112 u8 *buf, *identity; local
1464 const u8 *identity; local
1511 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
[all...]
H A Dpmksa_cache_auth.h32 u8 *identity; member in struct:rsn_pmksa_cache_entry
H A Dap_config.c324 os_free(user->identity);
555 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, argument
562 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0) {
571 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0) {
584 if (!phase2 && user->identity == NULL) {
591 os_memcmp(user->identity, identity, user->identity_len) ==
599 os_memcmp(user->identity, identity, identity_len) == 0)
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/
H A Deap_leap.c70 const u8 *pos, *challenge, *identity, *password; local
77 identity = eap_get_config_identity(sm, &identity_len);
79 if (identity == NULL || password == NULL)
130 wpabuf_put_data(resp, identity, identity_len);
145 const u8 *identity; local
150 identity = eap_get_config_identity(sm, &identity_len);
151 if (identity == NULL)
180 wpabuf_put_data(resp, identity, identity_len);
H A Deap_config.h23 * identity - EAP Identity
25 * This field is used to set the real user identity or NAI (for
28 u8 *identity; member in struct:eap_peer_config
39 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
40 * real identity (identity field) only to the authentication server.
42 * If not set, the identity field will be used for both unencrypted and
524 * pending_req_identity - Whether there is a pending identity request
H A Deap_wsc.c137 const u8 *identity; local
153 identity = eap_get_config_identity(sm, &identity_len);
155 if (identity && identity_len == WSC_ID_REGISTRAR_LEN &&
156 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0)
158 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN &&
159 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0)
162 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity",
163 identity, identity_len);
H A Deap_sim.c351 const u8 *identity = NULL; local
357 identity = data->reauth_id;
362 identity = data->pseudonym;
366 identity = eap_get_config_identity(sm, &identity_len);
367 if (identity) {
389 if (identity) {
391 identity, identity_len);
393 identity, identity_len);
575 const u8 *identity; local
628 identity
[all...]
H A Deap.c903 os_free(conf->identity);
904 conf->identity = os_malloc(1 + imsi_len);
905 if (conf->identity == NULL) {
907 "IMSI-based identity");
911 conf->identity[0] = aka ? '0' : '1';
912 os_memcpy(conf->identity + 1, imsi, imsi_len);
971 const u8 *identity; local
981 (identity = sm->m->get_identity(sm, sm->eap_method_priv,
984 "identity", identity, identity_le
[all...]
H A Deap_aka.c462 const u8 *identity = NULL; local
468 identity = data->reauth_id;
473 identity = data->pseudonym;
477 identity = eap_get_config_identity(sm, &identity_len);
478 if (identity) {
490 if (identity) {
492 identity, identity_len);
494 identity, identity_len);
751 const u8 *identity; local
857 identity
[all...]
/netbsd-6-1-5-RELEASE/sys/conf/
H A Dnewvers.sh109 * NetBSD identity note.
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/hostapd/
H A Ddump_state.c47 if (sm->identity) {
51 fprint_char(f, sm->identity[i]);
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eapol_auth/
H A Deapol_auth_sm.h65 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/wps/
H A Dwps_attr_process.c229 const u8 *identity,
232 if (identity == NULL)
236 identity, identity_len);
228 wps_process_cred_eap_identity(struct wps_credential *cred, const u8 *identity, size_t identity_len) argument
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/
H A Dengine.c95 static void identity(char *ptr) function
287 if(cmds) sk_OPENSSL_STRING_pop_free(cmds, identity);
536 sk_OPENSSL_STRING_pop_free(engines, identity);
537 sk_OPENSSL_STRING_pop_free(pre_cmds, identity);
538 sk_OPENSSL_STRING_pop_free(post_cmds, identity);

Completed in 129 milliseconds

1234