/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.dg/pch/ |
H A D | struct-1.c | 4 int identity; member in struct:ChainSearchRecord 10 s->identity = 0x6a73616d; 12 s->identity = 0x616d;
|
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/testsuite/gcc.dg/pch/ |
H A D | struct-1.c | 4 int identity; member in struct:ChainSearchRecord 9 s->identity = 0x6a73616d;
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/libstdc++-v3/testsuite/20_util/identity/requirements/ |
H A D | typedefs.cc | 31 typedef std::identity<int> test_type;
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/libstdc++-v3/testsuite/20_util/identity/ |
H A D | value.cc | 28 using std::identity; 32 VERIFY( (is_same<identity<int>::type, int>::value) ); 33 VERIFY( (is_same<identity<int&>::type, int&>::value) ); 34 VERIFY( (is_same<identity<int&&>::type, int&&>::value) ); 35 VERIFY( (is_same<identity<int*>::type, int*>::value) ); 36 VERIFY( (is_same<identity<ClassType&&>::type, ClassType&&>::value) ); 37 VERIFY( (is_same<identity<ClassType>::type, ClassType>::value) ); 38 VERIFY( (is_same<identity<int(int)>::type, int(int)>::value) ); 39 VERIFY( (is_same<identity<void>::type, void>::value) ); 40 VERIFY( (is_same<identity<cons [all...] |
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/g++.dg/ext/visibility/ |
H A D | template3.C | 11 template <class T> T identity(T t) { return t; } function 12 template __attribute__((visibility("hidden"))) double identity(double); 13 template int identity(int);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/wpa_supplicant/examples/ |
H A D | ieee8021x.conf | 10 identity="user name"
|
H A D | openCryptoki.conf | 26 identity="User"
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/g++.dg/cpp0x/ |
H A D | enum5.C | 15 struct identity { struct 20 dependant<identity<int>> y;
|
H A D | variadic-unify-2.C | 6 template <typename T> struct identity struct 10 int forward_call(RT (*) (A...), typename identity<A>::type...);
|
H A D | decltype5.C | 27 struct identity { struct 33 identity id;
|
H A D | pr33996.C | 14 struct identity struct 21 forward(typename identity<_Tp>::type&& __t)
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_server/ |
H A D | eap_sim_db.h | 34 int eap_sim_db_get_gsm_triplets(void *priv, const u8 *identity, 42 int eap_sim_db_identity_known(void *priv, const u8 *identity, 49 int eap_sim_db_add_pseudonym(void *priv, const u8 *identity, 52 int eap_sim_db_add_reauth(void *priv, const u8 *identity, 55 int eap_sim_db_add_reauth_prime(void *priv, const u8 *identity, 60 const u8 * eap_sim_db_get_permanent(void *priv, const u8 *identity, 65 u8 *identity; member in struct:eap_sim_reauth 77 eap_sim_db_get_reauth_entry(void *priv, const u8 *identity, 82 int eap_sim_db_get_aka_auth(void *priv, const u8 *identity, 87 int eap_sim_db_resynchronize(void *priv, const u8 *identity, [all...] |
H A D | eap_sim_db.c | 34 u8 *identity; member in struct:eap_sim_pseudonym 431 os_free(p->identity); 439 os_free(r->identity); 523 * @identity: User name identity 524 * @identity_len: Length of identity in bytes 547 int eap_sim_db_get_gsm_triplets(void *priv, const u8 *identity, argument 558 if (identity_len < 2 || identity[0] != EAP_SIM_PERMANENT_PREFIX) { 559 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM DB: unexpected identity", 560 identity, identity_le 646 eap_sim_db_get_pseudonym(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 686 eap_sim_db_get_pseudonym_id(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 709 eap_sim_db_get_reauth(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 749 eap_sim_db_get_reauth_id(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument 788 eap_sim_db_identity_known(void *priv, const u8 *identity, size_t identity_len) argument 900 eap_sim_db_add_pseudonym(void *priv, const u8 *identity, size_t identity_len, char *pseudonym) argument 946 eap_sim_db_add_reauth_data(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter) argument 1007 eap_sim_db_add_reauth(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *mk) argument 1045 eap_sim_db_add_reauth_prime(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument 1076 eap_sim_db_get_permanent(void *priv, const u8 *identity, size_t identity_len, size_t *len) argument 1105 eap_sim_db_get_reauth_entry(void *priv, const u8 *identity, size_t identity_len) argument 1174 eap_sim_db_get_aka_auth(void *priv, const u8 *identity, size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1281 eap_sim_db_resynchronize(void *priv, const u8 *identity, size_t identity_len, const u8 *auts, const u8 *_rand) argument [all...] |
H A D | eap_server_sim.c | 113 if (eap_sim_db_identity_known(sm->eap_sim_db_priv, sm->identity, 119 * RFC 4186, Chap. 4.2.4 recommends that identity from EAP is 120 * ignored and the SIM/Start is used to request the identity. 242 eap_sim_derive_keys_reauth(data->counter, sm->identity, 394 const u8 *identity; local 400 if (attr->identity) { 401 os_free(sm->identity); 402 sm->identity = os_malloc(attr->identity_len); 403 if (sm->identity) { 404 os_memcpy(sm->identity, att 513 const u8 *identity; local 565 const u8 *identity, *id2; local [all...] |
H A D | eap_server_aka.c | 273 if (eap_sim_db_identity_known(sm->eap_sim_db_priv, sm->identity, 279 * RFC 4187, Chap. 4.1.4 recommends that identity from EAP is 281 * identity. 450 sm->identity, 457 eap_sim_derive_keys_reauth(data->counter, sm->identity, 613 const u8 *identity; local 617 identity = NULL; 621 identity = data->reauth->identity; 623 } else if (sm->identity 804 const u8 *identity; local 956 const u8 *identity, *id2; local [all...] |
H A D | eap_server_gtc.c | 137 if (sm->identity && sm->require_identity_match && 139 os_memcmp(pos, sm->identity, sm->identity_len))) { 143 "identity", 144 sm->identity, sm->identity_len); 148 os_free(sm->identity); 150 sm->identity = os_malloc(sm->identity_len); 151 if (sm->identity == NULL) { 155 os_memcpy(sm->identity, pos, sm->identity_len); 158 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) { 162 sm->identity, s [all...] |
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/g++.dg/init/ |
H A D | init-ref1.C | 17 int &identity (int &x) function 36 int &c = ++identity (++foo (a));
|
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/testsuite/g++.dg/init/ |
H A D | init-ref1.C | 17 int &identity (int &x) function 36 int &c = ++identity (++foo (a));
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/wpa_supplicant/ |
H A D | wpa_supplicant.conf | 392 # identity: Identity string for EAP 395 # anonymous_identity: Anonymous identity string for EAP (to be used as the 396 # unencrypted identity with EAP types that support different tunnelled 397 # identity, e.g., EAP-TTLS) 606 identity="user@example.com" 620 identity="user@example.com" 628 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the 629 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel. 634 identity="user@example.com" 641 # EAP-TTLS/MSCHAPv2 configuration with anonymous identity fo [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/ |
H A D | ssu.c | 53 dns_name_t *identity; /*%< the identity to match */ member in struct:dns_ssurule 103 if (rule->identity != NULL) { 104 dns_name_free(rule->identity, mctx); 105 isc_mem_put(mctx, rule->identity, sizeof(dns_name_t)); 163 dns_name_t *identity, unsigned int matchtype, 172 REQUIRE(dns_name_isabsolute(identity)); 185 rule->identity = NULL; 191 rule->identity = isc_mem_get(mctx, sizeof(dns_name_t)); 192 if (rule->identity 162 dns_ssutable_addrule(dns_ssutable_t *table, isc_boolean_t grant, dns_name_t *identity, unsigned int matchtype, dns_name_t *name, unsigned int ntypes, dns_rdatatype_t *types) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/ap/ |
H A D | pmksa_cache_auth.c | 48 os_free(entry->identity); 136 if (eapol->identity) { 137 entry->identity = os_malloc(eapol->identity_len); 138 if (entry->identity) { 140 os_memcpy(entry->identity, eapol->identity, 160 if (entry->identity) { 161 os_free(eapol->identity); 162 eapol->identity = os_malloc(entry->identity_len); 163 if (eapol->identity) { [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/ |
H A D | mschapv2.c | 42 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument 55 identity, identity_len); 57 username = mschapv2_remove_domain(identity, &username_len);
|
H A D | eap_gtc.c | 56 const u8 *pos, *password, *identity; local 105 identity = eap_get_config_identity(sm, &identity_len); 106 if (identity == NULL) 116 wpabuf_put_data(resp, identity, identity_len);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/radius/ |
H A D | radius_server.h | 76 * eap_fast_a_id - EAP-FAST authority identity (A-ID) 162 * @identity: User identity 163 * @identity_len: identity buffer length in octets 164 * @phase2: Whether this is for Phase 2 identity 173 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/libstdc++-v3/include/bits/ |
H A D | move.h | 1 // Move, forward and identity for C++0x + swap -*- C++ -*- 42 /// identity 44 struct identity struct 53 forward(typename std::identity<_Tp>::type& __t) 59 forward(typename std::identity<_Tp>::type&& __t) 65 forward(typename std::identity<_Tp>::type __t)
|