/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 72 identity = eap_get_config_identity(sm, &identity_len); 74 if (identity == NULL || password == NULL) 125 wpabuf_put_data(resp, identity, identity_len); 140 const u8 *identity; local 145 identity = eap_get_config_identity(sm, &identity_len); 146 if (identity == NULL) 175 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_config.h | 17 * identity - EAP Identity 19 * This field is used to set the real user identity or NAI (for 22 u8 *identity; member in struct:eap_peer_config 33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 34 * real identity (identity field) only to the authentication server. 36 * If not set, the identity field will be used for both unencrypted and 40 * pseudonym identity. 547 * pending_req_identity - Whether there is a pending identity request
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_i.h | 145 u8 *identity; member in struct:eap_sm 147 /* Whether Phase 2 method should validate identity match */ 200 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 72 identity = eap_get_config_identity(sm, &identity_len); 74 if (identity == NULL || password == NULL) 125 wpabuf_put_data(resp, identity, identity_len); 140 const u8 *identity; local 145 identity = eap_get_config_identity(sm, &identity_len); 146 if (identity == NULL) 175 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_config.h | 17 * identity - EAP Identity 19 * This field is used to set the real user identity or NAI (for 22 u8 *identity; member in struct:eap_peer_config 33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 34 * real identity (identity field) only to the authentication server. 36 * If not set, the identity field will be used for both unencrypted and 40 * pseudonym identity. 547 * pending_req_identity - Whether there is a pending identity request
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_i.h | 145 u8 *identity; member in struct:eap_sm 147 /* Whether Phase 2 method should validate identity match */ 200 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 72 identity = eap_get_config_identity(sm, &identity_len); 74 if (identity == NULL || password == NULL) 125 wpabuf_put_data(resp, identity, identity_len); 140 const u8 *identity; local 145 identity = eap_get_config_identity(sm, &identity_len); 146 if (identity == NULL) 175 wpabuf_put_data(resp, identity, identity_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_i.h | 145 u8 *identity; member in struct:eap_sm 147 /* Whether Phase 2 method should validate identity match */ 200 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
/external/apache-xml/src/main/java/org/apache/xml/dtm/ref/dom2dtm/ |
H A D | DOM2DTM.java | 111 * @param dtmIdentity The DTM identity ID for this DTM. 180 * @return The index identity of the node that was added. 607 int identity = makeNodeIdentity(nodeHandle); 609 return (Node) m_nodes.elementAt(identity); 613 * Get a Node from an identity index. 625 * Get the next node identity value in the list, and call the iterator 628 * @param identity The node identity (index). 629 * @return identity+1, or DTM.NULL. 631 protected int getNextNodeIdentity(int identity) argument [all...] |
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/identity/ |
H A D | UuidBasedUniqueIdentificationGenerator.java | 5 package org.chromium.chrome.browser.identity;
|
/external/chromium_org/chrome/android/javatests/src/org/chromium/chrome/browser/identity/ |
H A D | UniqueIdentificationGeneratorFactoryTest.java | 5 package org.chromium.chrome.browser.identity;
|
/external/chromium_org/chrome/browser/ui/search/ |
H A D | search_ipc_router.cc | 55 const base::string16& identity, 60 Send(new ChromeViewMsg_ChromeIdentityCheckResult(routing_id(), identity, 324 const base::string16& identity) const { 332 delegate_->OnChromeIdentityCheck(identity); 54 SendChromeIdentityCheckResult( const base::string16& identity, bool identity_match) argument
|
/external/chromium_org/third_party/angle/samples/angle/sample_util/ |
H A D | Matrix.h | 22 static Matrix4 identity();
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | transportchannelimpl.h | 98 // Set DTLS local identity. The identity object is not copied, but the caller 102 virtual bool SetLocalIdentity(rtc::SSLIdentity* identity) = 0; 104 // Set DTLS Remote fingerprint. Must be after local identity set.
|
/external/chromium_org/third_party/libjingle/source/talk/session/tunnel/ |
H A D | securetunnelsessionclient.h | 67 // The client takes ownership of the identity object. 69 void SetIdentity(rtc::SSLIdentity* identity); 71 // Generates an identity from nothing. 76 // Returns our identity for SSL purposes, as either set by 78 // method only after our identity has been successfully established 103 // Our identity (key and certificate) for SSL purposes. The 105 // description. The identity will be passed to the SSLStreamAdapter 140 // configures it with our identity and role.
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | sslstreamadapter.h | 60 // Specify our SSL identity: key and certificate. Mostly this is 66 virtual void SetIdentity(SSLIdentity* identity) = 0;
|
H A D | sslstreamadapterhelper.h | 38 virtual void SetIdentity(SSLIdentity* identity);
|
/external/guava/guava/src/com/google/common/collect/ |
H A D | BstModificationResult.java | 34 static <N extends BstNode<?, N>> BstModificationResult<N> identity(@Nullable N target) { method in class:BstModificationResult
|
/external/kernel-headers/original/uapi/linux/ |
H A D | watchdog.h | 20 __u8 identity[32]; /* Identity of the board */ member in struct:watchdog_info
|
/external/llvm/include/llvm/ADT/ |
H A D | IndexedMap.h | 30 template <typename T, typename ToIndexT = llvm::identity<unsigned> >
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | pmksa_cache_auth.h | 26 u8 *identity; member in struct:rsn_pmksa_cache_entry
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pwd_common.h | 55 u8 identity[0]; /* length inferred from payload */ member in struct:eap_pwd_id
|
/external/wpa_supplicant_8/src/ap/ |
H A D | pmksa_cache_auth.h | 26 u8 *identity; member in struct:rsn_pmksa_cache_entry
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pwd_common.h | 55 u8 identity[0]; /* length inferred from payload */ member in struct:eap_pwd_id
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | pmksa_cache_auth.h | 26 u8 *identity; member in struct:rsn_pmksa_cache_entry
|