/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/include/dns/ |
H A D | ssu.h | 104 dns_name_t *identity, unsigned int matchtype, 109 * either grants or denies update privileges of an identity (or set of 115 * name to be updated matches the signing identity. 125 *\li 'identity' is a valid absolute name 207 dns_ssu_external_match(dns_name_t *identity, dns_name_t *signer,
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_common/ |
H A D | eap_sim_common.h | 80 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 84 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 89 const u8 *identity, size_t identity_len, 98 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 102 const u8 *identity, size_t identity_len, 114 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument 123 const u8 *identity, 192 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs 122 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.c | 33 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument 42 addr[0] = identity; 61 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument 67 addr[0] = identity; 113 const u8 *identity, size_t identity_len, 123 while (identity_len > 0 && identity[identity_len - 1] == 0) { 125 "character from the end of identity"); 128 addr[0] = identity; 141 identity, identity_len); 281 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument 112 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 330 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/g++.dg/cpp0x/ |
H A D | pr33955.C | 34 struct identity struct 39 apply_args<args<or_>, args<identity<int>>, float, double> a1;
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_server/ |
H A D | eap_server_identity.c | 127 wpa_hexdump_ascii(MSG_DEBUG, "EAP-Identity: Peer identity", pos, len); 128 if (sm->identity) 130 os_free(sm->identity); 131 sm->identity = os_malloc(len ? len : 1); 132 if (sm->identity == NULL) { 135 os_memcpy(sm->identity, pos, len);
|
H A D | eap_server_fast.c | 66 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data 136 u8 *identity = NULL; local 219 identity = pos + 2; 234 if (identity) { 236 "PAC-Opaque", identity, identity_len); 237 os_free(data->identity); 238 data->identity = os_malloc(identity_len); 239 if (data->identity) { 240 os_memcpy(data->identity, identity, identity_le [all...] |
H A D | eap_i.h | 151 u8 *identity; member in struct:eap_sm 153 /* Whether Phase 2 method should validate identity match */ 192 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
H A D | eap.h | 87 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
H A D | eap_server_wsc.c | 90 if (sm->identity && sm->identity_len == WSC_ID_REGISTRAR_LEN && 91 os_memcmp(sm->identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 94 else if (sm->identity && sm->identity_len == WSC_ID_ENROLLEE_LEN && 95 os_memcmp(sm->identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) 99 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity", 100 sm->identity, sm->identity_len);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/wpa_supplicant/tests/ |
H A D | link_test.c | 73 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, argument
|
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/servers/slapd/back-sql/rdbms_depend/mssql/ |
H A D | backsql_create.sql | 2 id int identity (1, 1) not null , 29 id int identity (1, 1) not null , 52 id int identity (1, 1) not null ,
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/ap/ |
H A D | ieee802_1x.c | 392 const u8 *identity; local 399 identity = eap_get_identity(sm->eap, &identity_len); 400 if (identity == NULL) 403 /* Save station identity for future RADIUS packets */ 404 os_free(sm->identity); 405 sm->identity = os_malloc(identity_len + 1); 406 if (sm->identity == NULL) { 411 os_memcpy(sm->identity, identity, identity_len); 413 sm->identity[identity_le 1112 u8 *buf, *identity; local 1464 const u8 *identity; local 1511 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument [all...] |
H A D | pmksa_cache_auth.h | 32 u8 *identity; member in struct:rsn_pmksa_cache_entry
|
H A D | ap_config.c | 324 os_free(user->identity); 555 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, argument 562 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0) { 571 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0) { 584 if (!phase2 && user->identity == NULL) { 591 os_memcmp(user->identity, identity, user->identity_len) == 599 os_memcmp(user->identity, identity, identity_len) == 0)
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/ |
H A D | eap_leap.c | 70 const u8 *pos, *challenge, *identity, *password; local 77 identity = eap_get_config_identity(sm, &identity_len); 79 if (identity == NULL || password == NULL) 130 wpabuf_put_data(resp, identity, identity_len); 145 const u8 *identity; local 150 identity = eap_get_config_identity(sm, &identity_len); 151 if (identity == NULL) 180 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_config.h | 23 * identity - EAP Identity 25 * This field is used to set the real user identity or NAI (for 28 u8 *identity; member in struct:eap_peer_config 39 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 40 * real identity (identity field) only to the authentication server. 42 * If not set, the identity field will be used for both unencrypted and 524 * pending_req_identity - Whether there is a pending identity request
|
H A D | eap_wsc.c | 137 const u8 *identity; local 153 identity = eap_get_config_identity(sm, &identity_len); 155 if (identity && identity_len == WSC_ID_REGISTRAR_LEN && 156 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0) 158 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN && 159 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0) 162 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity", 163 identity, identity_len);
|
H A D | eap_sim.c | 351 const u8 *identity = NULL; local 357 identity = data->reauth_id; 362 identity = data->pseudonym; 366 identity = eap_get_config_identity(sm, &identity_len); 367 if (identity) { 389 if (identity) { 391 identity, identity_len); 393 identity, identity_len); 575 const u8 *identity; local 628 identity [all...] |
H A D | eap.c | 903 os_free(conf->identity); 904 conf->identity = os_malloc(1 + imsi_len); 905 if (conf->identity == NULL) { 907 "IMSI-based identity"); 911 conf->identity[0] = aka ? '0' : '1'; 912 os_memcpy(conf->identity + 1, imsi, imsi_len); 971 const u8 *identity; local 981 (identity = sm->m->get_identity(sm, sm->eap_method_priv, 984 "identity", identity, identity_le [all...] |
H A D | eap_aka.c | 462 const u8 *identity = NULL; local 468 identity = data->reauth_id; 473 identity = data->pseudonym; 477 identity = eap_get_config_identity(sm, &identity_len); 478 if (identity) { 490 if (identity) { 492 identity, identity_len); 494 identity, identity_len); 751 const u8 *identity; local 857 identity [all...] |
/netbsd-6-1-5-RELEASE/sys/conf/ |
H A D | newvers.sh | 109 * NetBSD identity note.
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/hostapd/ |
H A D | dump_state.c | 47 if (sm->identity) { 51 fprint_char(f, sm->identity[i]);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 65 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/wps/ |
H A D | wps_attr_process.c | 229 const u8 *identity, 232 if (identity == NULL) 236 identity, identity_len); 228 wps_process_cred_eap_identity(struct wps_credential *cred, const u8 *identity, size_t identity_len) argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/ |
H A D | engine.c | 95 static void identity(char *ptr) function 287 if(cmds) sk_OPENSSL_STRING_pop_free(cmds, identity); 536 sk_OPENSSL_STRING_pop_free(engines, identity); 537 sk_OPENSSL_STRING_pop_free(pre_cmds, identity); 538 sk_OPENSSL_STRING_pop_free(post_cmds, identity);
|