/external/wpa_supplicant_8/src/radius/ |
H A D | radius_server.h | 80 * eap_fast_a_id - EAP-FAST authority identity (A-ID) 157 * server_id - Server identity 178 * @identity: User identity 179 * @identity_len: identity buffer length in octets 180 * @phase2: Whether this is for Phase 2 identity 189 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_server.h | 80 * eap_fast_a_id - EAP-FAST authority identity (A-ID) 157 * server_id - Server identity 178 * @identity: User identity 179 * @identity_len: identity buffer length in octets 180 * @phase2: Whether this is for Phase 2 identity 189 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
H A D | link_test.c | 73 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, argument
|
/external/chromium-libpac/ |
H A D | Android.mk | 6 # Set up the target identity
|
/external/chromium_org/chrome/common/extensions/docs/server2/ |
H A D | chained_compiled_file_system.py | 42 def __init__(self, compiled_fs_chain, identity): 47 self._identity = identity
|
/external/chromium_org/remoting/webapp/ |
H A D | third_party_token_fetcher.js | 47 if (chrome.identity) { 166 * Fetch a token from a token server using the identity.launchWebAuthFlow API. 171 chrome.identity.launchWebAuthFlow(
|
H A D | host_controller.js | 188 var hostOwnerEmail = remoting.identity.getCachedEmail(); 255 remoting.identity.getCachedEmail(), 309 remoting.identity.callWithToken( 326 remoting.identity.callWithToken( 558 remoting.identity.getEmail( 571 remoting.identity.callWithToken(connectSignalingWithToken, onError);
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | bind.h.pump | 51 template <class T> struct identity { typedef T type; }; 101 typename detail::identity<P$j>::type p$j]]) { 113 typename detail::identity<P$j>::type p$j]]) { 125 typename detail::identity<P$j>::type p$j]]) {
|
H A D | sslstreamadapterhelper.cc | 26 void SSLStreamAdapterHelper::SetIdentity(SSLIdentity* identity) { argument 28 identity_.reset(identity);
|
H A D | sslidentity_unittest.cc | 191 rtc::scoped_ptr<SSLIdentity> identity( 193 EXPECT_TRUE(identity); 194 EXPECT_EQ(kCERT_PEM, identity->certificate().ToPEMString());
|
/external/smali/dexlib2/src/main/java/org/jf/dexlib2/dexbacked/raw/ |
H A D | SectionAnnotator.java | 104 public void setItemIdentity(int itemOffset, String identity) { argument 105 itemIdentities.put(itemOffset, identity);
|
/external/valgrind/main/helgrind/tests/ |
H A D | tc24_nonzero_sem.c | 49 static sem_t* my_sem_init (char* identity, int pshared, unsigned count) argument 64 sprintf(name, "anonsem_%s_pid%d", identity, (int)getpid());
|
/external/wpa_supplicant_8/hostapd/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 65 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len, 84 const char *identity, const char *radius_cui);
|
/external/wpa_supplicant_8/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 65 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len, 84 const char *identity, const char *radius_cui);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 65 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len, 84 const char *identity, const char *radius_cui);
|
/external/chromium-trace/trace-viewer/third_party/gl-matrix/spec/gl-matrix/ |
H A D | mat2-spec.js | 24 var out, matA, matB, identity, result; 36 identity = [1, 0, 42 it("should return a 4 element array initialized to a 2x2 identity matrix", function() { expect(result).toBeEqualish(identity); }); 56 describe("identity", function() { 57 beforeEach(function() { result = mat2.identity(out); }); 58 it("should place values into out", function() { expect(result).toBeEqualish(identity); });
|
/external/eigen/unsupported/test/ |
H A D | matrix_exponential.cpp | 105 MatrixType m1(rows, cols), m2(rows, cols), identity = MatrixType::Identity(rows, cols); local 113 std::cout << "randomTest: error funm = " << relerr(identity, m2); 114 VERIFY(identity.isApprox(m2, static_cast<RealScalar>(tol))); 117 std::cout << " error expm = " << relerr(identity, m2) << "\n"; 118 VERIFY(identity.isApprox(m2, static_cast<RealScalar>(tol)));
|
/external/chromium_org/chrome/browser/ui/search/ |
H A D | search_ipc_router.h | 77 // Called when the SearchBox wants to verify the signed-in Chrome identity 78 // against the provided |identity|. Will make a round-trip to the browser 80 // Calls SendChromeIdentityCheckResult with true if both the identity 83 // checking both the identity and the user's sync state. 84 virtual void OnChromeIdentityCheck(const base::string16& identity) = 0; 129 // Tells the renderer about the result of the Chrome identity check. 130 void SendChromeIdentityCheckResult(const base::string16& identity, 210 const base::string16& identity) const;
|
/external/clang/test/CXX/temp/temp.decls/temp.variadic/ |
H A D | p4.cpp | 7 struct identity { struct 165 extract_nested_types<identity<int>, identity<float> >::types *t_int_float_2
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_fast.c | 61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data 131 u8 *identity = NULL; local 214 identity = pos + 2; 230 if (identity) { 232 "PAC-Opaque", identity, identity_len); 233 os_free(data->identity); 234 data->identity = os_malloc(identity_len); 235 if (data->identity) { 236 os_memcpy(data->identity, identity, identity_le [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_fast.c | 61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data 131 u8 *identity = NULL; local 214 identity = pos + 2; 230 if (identity) { 232 "PAC-Opaque", identity, identity_len); 233 os_free(data->identity); 234 data->identity = os_malloc(identity_len); 235 if (data->identity) { 236 os_memcpy(data->identity, identity, identity_le [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_fast.c | 61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data 131 u8 *identity = NULL; local 214 identity = pos + 2; 230 if (identity) { 232 "PAC-Opaque", identity, identity_len); 233 os_free(data->identity); 234 data->identity = os_malloc(identity_len); 235 if (data->identity) { 236 os_memcpy(data->identity, identity, identity_le [all...] |
/external/chromium_org/chrome/renderer/resources/extensions/ |
H A D | searchbox_api.js | 142 this.checkIsUserSignedIntoChromeAs = function(identity) { 143 CheckIsUserSignedInToChromeAs(identity);
|
/external/chromium_org/chrome/renderer/searchbox/ |
H A D | searchbox.h | 41 void CheckIsUserSignedInToChromeAs(const base::string16& identity); 120 void OnChromeIdentityCheckResult(const base::string16& identity,
|
/external/chromium_org/content/common/ |
H A D | font_config_ipc_linux.cc | 97 SkStream* FontConfigIPC::openStream(const FontIdentity& identity) { argument 101 request.WriteUInt32(identity.fID);
|