/external/wpa_supplicant_8/src/eap_server/ |
eap_sim_db.c | 33 char *pseudonym; /* pseudonym username */ member in struct:eap_sim_pseudonym 96 " pseudonym CHAR(21) NOT NULL" 100 "pseudonym information"); 178 const char *permanent, char *pseudonym) 183 if (!valid_db_string(permanent) || !valid_db_string(pseudonym)) { 184 os_free(pseudonym); 189 "(permanent, pseudonym) VALUES ('%s', '%s');", 190 permanent, pseudonym); 191 os_free(pseudonym); [all...] |
eap_sim_db.h | 55 const char *permanent, char *pseudonym); 65 const char *pseudonym);
|
eap_server_aka.c | 156 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'", 162 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym " 170 * Since pseudonym username was recognized, skip AKA/Identity 402 /* Do not update pseudonym during re-authentication */ 750 wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'", 756 wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym " [all...] |
eap_server_sim.c | 157 /* Do not update pseudonym during re-authentication */ 480 wpa_printf(MSG_DEBUG, "EAP-SIM: Pseudonym username '%s'", 486 wpa_printf(MSG_DEBUG, "EAP-SIM: Unknown pseudonym "
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_aka.c | 36 u8 *pseudonym; member in struct:eap_aka_data 107 data->pseudonym = os_malloc(config->anonymous_identity_len); 108 if (data->pseudonym) { 109 os_memcpy(data->pseudonym, config->anonymous_identity, 135 os_free(data->pseudonym); 243 if ((id & CLEAR_PSEUDONYM) && data->pseudonym) { 244 wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old pseudonym"); 245 os_free(data->pseudonym); 246 data->pseudonym = NULL; 278 os_free(data->pseudonym); [all...] |
eap_sim.c | 37 u8 *pseudonym; member in struct:eap_sim_data 121 data->pseudonym = os_malloc(config->anonymous_identity_len); 122 if (data->pseudonym) { 123 os_memcpy(data->pseudonym, config->anonymous_identity, 140 os_free(data->pseudonym); 273 if ((id & CLEAR_PSEUDONYM) && data->pseudonym) { 274 wpa_printf(MSG_DEBUG, "EAP-SIM: forgetting old pseudonym"); 275 os_free(data->pseudonym); 276 data->pseudonym = NULL; 308 os_free(data->pseudonym); [all...] |
eap.h | 242 * @id: Anonymous identity (e.g., EAP-SIM pseudonym) or %NULL to clear
|
eap_config.h | 40 * pseudonym identity.
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x500/style/ |
BCStyle.java | 102 * RFC 3039 Pseudonym - DirectoryString(SIZE(1..64) 104 public static final ASN1ObjectIdentifier PSEUDONYM = new ASN1ObjectIdentifier( 227 DefaultSymbols.put(PSEUDONYM, "Pseudonym"); 262 DefaultLookUp.put("pseudonym", PSEUDONYM);
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/uicc/ |
UsimServiceTable.java | 84 PSEUDONYM,
|
/external/ppp/pppd/ |
eap.c | 83 static char *pn_secret = NULL; /* Pseudonym generating secret */ 104 "Long term pseudonym generation secret" }, 105 { "srp-use-pseudonym", o_bool, &eap_states[0].es_usepseudo, 106 "Use pseudonym if offered one by server", 1 }, 312 * Set DES key according to pseudonym-generating secret and current 460 /* If we've got a pseudonym, try to decode to real name. */ 477 "pseudonym"); 506 dbglog("decoded pseudonym to \"%.*q\"", 771 /* Generate pseudonym */ 781 dbglog("no DES here; not generating pseudonym"); [all...] |
eap.h | 132 bool es_usepseudo; /* Use SRP Pseudonym if offered one */
|
pppd.8 | [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
X509Name.java | 124 * RFC 3039 Pseudonym - DirectoryString(SIZE(1..64) 126 public static final ASN1ObjectIdentifier PSEUDONYM = new ASN1ObjectIdentifier( 285 DefaultSymbols.put(PSEUDONYM, "Pseudonym"); 338 DefaultLookUp.put("pseudonym", PSEUDONYM); [all...] |
/external/nist-sip/java/gov/nist/javax/sip/header/ |
Warning.java | 56 /** the name or pseudonym of the server adding
|
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.h | 246 * @id: Anonymous identity (e.g., EAP-SIM pseudonym)
|
/external/chromium_org/chrome/app/resources/terms/ |
terms_de.html | 41 <p>Für die Nutzung einiger Dienste benötigen Sie ein Google Konto. Um sich für ein Google Konto zu registrieren, benötigen Sie eventuell einen Nutzernamen, eine eigene Emailadresse und ein Passwort. Wenn Sie sich für einen Dienst registrieren, ist es wichtig, dass Sie Google richtige und vollständige Angaben machen, z.B. damit wir Sie im Einzelfall per Email kontaktieren können. Die Nutzung der Dienste ist auch unter einem Pseudonym möglich. Sie sind für die Nutzung Ihres Google Kontos selbst verantwortlich und sollten die Geheimhaltung Ihres Passworts sicherstellen. Sollten Sie eine unautorisierte Nutzung Ihres Passworts oder Ihres Kontos bemerken, sind Sie verpflichtet, Google dieses mitzuteilen. Einzelheiten zu dem Verfahren finden Sie unter http://www.google.de/support/accounts/bin/answer.py?answer=48601.
|
/external/chromium_org/third_party/openssl/openssl/crypto/objects/ |
obj_mac.num | 510 pseudonym 510
|
/external/openssl/crypto/objects/ |
obj_mac.num | 510 pseudonym 510
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ChangeLog | 58 * EAP-AKA: keep pseudonym identity across EAP exchanges to match EAP-SIM 99 * EAP-SIM/AKA: append realm to pseudonym identity 100 * EAP-SIM/AKA: store pseudonym identity in network configuration to [all...] |
/sdk/files/typos/ |
typos-hu.txt | 224 # the name of the Original Author (or pseudonym, if applicable) if
|
typos-nb.txt | 224 # the name of the Original Author (or pseudonym, if applicable) if
|
typos-es.txt | 224 # the name of the Original Author (or pseudonym, if applicable) if
|
typos-it.txt | 224 # the name of the Original Author (or pseudonym, if applicable) if
|
/external/wpa_supplicant_8/hostapd/ |
ChangeLog | 48 * EAP-SIM: fixed re-authentication not to update pseudonym 55 * EAP-SIM/AKA: allow pseudonym to be used after unknown reauth id [all...] |