Searched refs:identity (Results 1 - 25 of 96) sorted by relevance

1234

/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.dg/pch/
H A Dstruct-1.c4 int identity; member in struct:ChainSearchRecord
10 s->identity = 0x6a73616d;
12 s->identity = 0x616d;
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/testsuite/gcc.dg/pch/
H A Dstruct-1.c4 int identity; member in struct:ChainSearchRecord
9 s->identity = 0x6a73616d;
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/libstdc++-v3/testsuite/20_util/identity/requirements/
H A Dtypedefs.cc31 typedef std::identity<int> test_type;
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/libstdc++-v3/testsuite/20_util/identity/
H A Dvalue.cc28 using std::identity;
32 VERIFY( (is_same<identity<int>::type, int>::value) );
33 VERIFY( (is_same<identity<int&>::type, int&>::value) );
34 VERIFY( (is_same<identity<int&&>::type, int&&>::value) );
35 VERIFY( (is_same<identity<int*>::type, int*>::value) );
36 VERIFY( (is_same<identity<ClassType&&>::type, ClassType&&>::value) );
37 VERIFY( (is_same<identity<ClassType>::type, ClassType>::value) );
38 VERIFY( (is_same<identity<int(int)>::type, int(int)>::value) );
39 VERIFY( (is_same<identity<void>::type, void>::value) );
40 VERIFY( (is_same<identity<cons
[all...]
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/g++.dg/ext/visibility/
H A Dtemplate3.C11 template <class T> T identity(T t) { return t; } function
12 template __attribute__((visibility("hidden"))) double identity(double);
13 template int identity(int);
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/wpa_supplicant/examples/
H A Dieee8021x.conf10 identity="user name"
H A DopenCryptoki.conf26 identity="User"
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/g++.dg/cpp0x/
H A Denum5.C15 struct identity { struct
20 dependant<identity<int>> y;
H A Dvariadic-unify-2.C6 template <typename T> struct identity struct
10 int forward_call(RT (*) (A...), typename identity<A>::type...);
H A Ddecltype5.C27 struct identity { struct
33 identity id;
H A Dpr33996.C14 struct identity struct
21 forward(typename identity<_Tp>::type&& __t)
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_server/
H A Deap_sim_db.h34 int eap_sim_db_get_gsm_triplets(void *priv, const u8 *identity,
42 int eap_sim_db_identity_known(void *priv, const u8 *identity,
49 int eap_sim_db_add_pseudonym(void *priv, const u8 *identity,
52 int eap_sim_db_add_reauth(void *priv, const u8 *identity,
55 int eap_sim_db_add_reauth_prime(void *priv, const u8 *identity,
60 const u8 * eap_sim_db_get_permanent(void *priv, const u8 *identity,
65 u8 *identity; member in struct:eap_sim_reauth
77 eap_sim_db_get_reauth_entry(void *priv, const u8 *identity,
82 int eap_sim_db_get_aka_auth(void *priv, const u8 *identity,
87 int eap_sim_db_resynchronize(void *priv, const u8 *identity,
[all...]
H A Deap_sim_db.c34 u8 *identity; member in struct:eap_sim_pseudonym
431 os_free(p->identity);
439 os_free(r->identity);
523 * @identity: User name identity
524 * @identity_len: Length of identity in bytes
547 int eap_sim_db_get_gsm_triplets(void *priv, const u8 *identity, argument
558 if (identity_len < 2 || identity[0] != EAP_SIM_PERMANENT_PREFIX) {
559 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM DB: unexpected identity",
560 identity, identity_le
646 eap_sim_db_get_pseudonym(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument
686 eap_sim_db_get_pseudonym_id(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument
709 eap_sim_db_get_reauth(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument
749 eap_sim_db_get_reauth_id(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len) argument
788 eap_sim_db_identity_known(void *priv, const u8 *identity, size_t identity_len) argument
900 eap_sim_db_add_pseudonym(void *priv, const u8 *identity, size_t identity_len, char *pseudonym) argument
946 eap_sim_db_add_reauth_data(struct eap_sim_db_data *data, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter) argument
1007 eap_sim_db_add_reauth(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *mk) argument
1045 eap_sim_db_add_reauth_prime(void *priv, const u8 *identity, size_t identity_len, char *reauth_id, u16 counter, const u8 *k_encr, const u8 *k_aut, const u8 *k_re) argument
1076 eap_sim_db_get_permanent(void *priv, const u8 *identity, size_t identity_len, size_t *len) argument
1105 eap_sim_db_get_reauth_entry(void *priv, const u8 *identity, size_t identity_len) argument
1174 eap_sim_db_get_aka_auth(void *priv, const u8 *identity, size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
1281 eap_sim_db_resynchronize(void *priv, const u8 *identity, size_t identity_len, const u8 *auts, const u8 *_rand) argument
[all...]
H A Deap_server_sim.c113 if (eap_sim_db_identity_known(sm->eap_sim_db_priv, sm->identity,
119 * RFC 4186, Chap. 4.2.4 recommends that identity from EAP is
120 * ignored and the SIM/Start is used to request the identity.
242 eap_sim_derive_keys_reauth(data->counter, sm->identity,
394 const u8 *identity; local
400 if (attr->identity) {
401 os_free(sm->identity);
402 sm->identity = os_malloc(attr->identity_len);
403 if (sm->identity) {
404 os_memcpy(sm->identity, att
513 const u8 *identity; local
565 const u8 *identity, *id2; local
[all...]
H A Deap_server_aka.c273 if (eap_sim_db_identity_known(sm->eap_sim_db_priv, sm->identity,
279 * RFC 4187, Chap. 4.1.4 recommends that identity from EAP is
281 * identity.
450 sm->identity,
457 eap_sim_derive_keys_reauth(data->counter, sm->identity,
613 const u8 *identity; local
617 identity = NULL;
621 identity = data->reauth->identity;
623 } else if (sm->identity
804 const u8 *identity; local
956 const u8 *identity, *id2; local
[all...]
H A Deap_server_gtc.c137 if (sm->identity && sm->require_identity_match &&
139 os_memcmp(pos, sm->identity, sm->identity_len))) {
143 "identity",
144 sm->identity, sm->identity_len);
148 os_free(sm->identity);
150 sm->identity = os_malloc(sm->identity_len);
151 if (sm->identity == NULL) {
155 os_memcpy(sm->identity, pos, sm->identity_len);
158 if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) {
162 sm->identity, s
[all...]
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/g++.dg/init/
H A Dinit-ref1.C17 int &identity (int &x) function
36 int &c = ++identity (++foo (a));
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/testsuite/g++.dg/init/
H A Dinit-ref1.C17 int &identity (int &x) function
36 int &c = ++identity (++foo (a));
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/wpa_supplicant/
H A Dwpa_supplicant.conf392 # identity: Identity string for EAP
395 # anonymous_identity: Anonymous identity string for EAP (to be used as the
396 # unencrypted identity with EAP types that support different tunnelled
397 # identity, e.g., EAP-TTLS)
606 identity="user@example.com"
620 identity="user@example.com"
628 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
629 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
634 identity="user@example.com"
641 # EAP-TTLS/MSCHAPv2 configuration with anonymous identity fo
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/
H A Dssu.c53 dns_name_t *identity; /*%< the identity to match */ member in struct:dns_ssurule
103 if (rule->identity != NULL) {
104 dns_name_free(rule->identity, mctx);
105 isc_mem_put(mctx, rule->identity, sizeof(dns_name_t));
163 dns_name_t *identity, unsigned int matchtype,
172 REQUIRE(dns_name_isabsolute(identity));
185 rule->identity = NULL;
191 rule->identity = isc_mem_get(mctx, sizeof(dns_name_t));
192 if (rule->identity
162 dns_ssutable_addrule(dns_ssutable_t *table, isc_boolean_t grant, dns_name_t *identity, unsigned int matchtype, dns_name_t *name, unsigned int ntypes, dns_rdatatype_t *types) argument
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/ap/
H A Dpmksa_cache_auth.c48 os_free(entry->identity);
136 if (eapol->identity) {
137 entry->identity = os_malloc(eapol->identity_len);
138 if (entry->identity) {
140 os_memcpy(entry->identity, eapol->identity,
160 if (entry->identity) {
161 os_free(eapol->identity);
162 eapol->identity = os_malloc(entry->identity_len);
163 if (eapol->identity) {
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/
H A Dmschapv2.c42 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument
55 identity, identity_len);
57 username = mschapv2_remove_domain(identity, &username_len);
H A Deap_gtc.c56 const u8 *pos, *password, *identity; local
105 identity = eap_get_config_identity(sm, &identity_len);
106 if (identity == NULL)
116 wpabuf_put_data(resp, identity, identity_len);
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/radius/
H A Dradius_server.h76 * eap_fast_a_id - EAP-FAST authority identity (A-ID)
162 * @identity: User identity
163 * @identity_len: identity buffer length in octets
164 * @phase2: Whether this is for Phase 2 identity
173 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/libstdc++-v3/include/bits/
H A Dmove.h1 // Move, forward and identity for C++0x + swap -*- C++ -*-
42 /// identity
44 struct identity struct
53 forward(typename std::identity<_Tp>::type& __t)
59 forward(typename std::identity<_Tp>::type&& __t)
65 forward(typename std::identity<_Tp>::type __t)

Completed in 405 milliseconds

1234