Searched refs:identity (Results 126 - 150 of 521) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; local
72 identity = eap_get_config_identity(sm, &identity_len);
74 if (identity == NULL || password == NULL)
125 wpabuf_put_data(resp, identity, identity_len);
140 const u8 *identity; local
145 identity = eap_get_config_identity(sm, &identity_len);
146 if (identity == NULL)
175 wpabuf_put_data(resp, identity, identity_len);
H A Deap_config.h17 * identity - EAP Identity
19 * This field is used to set the real user identity or NAI (for
22 u8 *identity; member in struct:eap_peer_config
33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
34 * real identity (identity field) only to the authentication server.
36 * If not set, the identity field will be used for both unencrypted and
40 * pseudonym identity.
547 * pending_req_identity - Whether there is a pending identity request
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_i.h145 u8 *identity; member in struct:eap_sm
147 /* Whether Phase 2 method should validate identity match */
200 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; local
72 identity = eap_get_config_identity(sm, &identity_len);
74 if (identity == NULL || password == NULL)
125 wpabuf_put_data(resp, identity, identity_len);
140 const u8 *identity; local
145 identity = eap_get_config_identity(sm, &identity_len);
146 if (identity == NULL)
175 wpabuf_put_data(resp, identity, identity_len);
H A Deap_config.h17 * identity - EAP Identity
19 * This field is used to set the real user identity or NAI (for
22 u8 *identity; member in struct:eap_peer_config
33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
34 * real identity (identity field) only to the authentication server.
36 * If not set, the identity field will be used for both unencrypted and
40 * pseudonym identity.
547 * pending_req_identity - Whether there is a pending identity request
/external/wpa_supplicant_8/src/eap_server/
H A Deap_i.h145 u8 *identity; member in struct:eap_sm
147 /* Whether Phase 2 method should validate identity match */
200 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; local
72 identity = eap_get_config_identity(sm, &identity_len);
74 if (identity == NULL || password == NULL)
125 wpabuf_put_data(resp, identity, identity_len);
140 const u8 *identity; local
145 identity = eap_get_config_identity(sm, &identity_len);
146 if (identity == NULL)
175 wpabuf_put_data(resp, identity, identity_len);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_i.h145 u8 *identity; member in struct:eap_sm
147 /* Whether Phase 2 method should validate identity match */
200 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
/external/apache-xml/src/main/java/org/apache/xml/dtm/ref/dom2dtm/
H A DDOM2DTM.java111 * @param dtmIdentity The DTM identity ID for this DTM.
180 * @return The index identity of the node that was added.
607 int identity = makeNodeIdentity(nodeHandle);
609 return (Node) m_nodes.elementAt(identity);
613 * Get a Node from an identity index.
625 * Get the next node identity value in the list, and call the iterator
628 * @param identity The node identity (index).
629 * @return identity+1, or DTM.NULL.
631 protected int getNextNodeIdentity(int identity) argument
[all...]
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/identity/
H A DUuidBasedUniqueIdentificationGenerator.java5 package org.chromium.chrome.browser.identity;
/external/chromium_org/chrome/android/javatests/src/org/chromium/chrome/browser/identity/
H A DUniqueIdentificationGeneratorFactoryTest.java5 package org.chromium.chrome.browser.identity;
/external/chromium_org/chrome/browser/ui/search/
H A Dsearch_ipc_router.cc55 const base::string16& identity,
60 Send(new ChromeViewMsg_ChromeIdentityCheckResult(routing_id(), identity,
324 const base::string16& identity) const {
332 delegate_->OnChromeIdentityCheck(identity);
54 SendChromeIdentityCheckResult( const base::string16& identity, bool identity_match) argument
/external/chromium_org/third_party/angle/samples/angle/sample_util/
H A DMatrix.h22 static Matrix4 identity();
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Dtransportchannelimpl.h98 // Set DTLS local identity. The identity object is not copied, but the caller
102 virtual bool SetLocalIdentity(rtc::SSLIdentity* identity) = 0;
104 // Set DTLS Remote fingerprint. Must be after local identity set.
/external/chromium_org/third_party/libjingle/source/talk/session/tunnel/
H A Dsecuretunnelsessionclient.h67 // The client takes ownership of the identity object.
69 void SetIdentity(rtc::SSLIdentity* identity);
71 // Generates an identity from nothing.
76 // Returns our identity for SSL purposes, as either set by
78 // method only after our identity has been successfully established
103 // Our identity (key and certificate) for SSL purposes. The
105 // description. The identity will be passed to the SSLStreamAdapter
140 // configures it with our identity and role.
/external/chromium_org/third_party/webrtc/base/
H A Dsslstreamadapter.h60 // Specify our SSL identity: key and certificate. Mostly this is
66 virtual void SetIdentity(SSLIdentity* identity) = 0;
H A Dsslstreamadapterhelper.h38 virtual void SetIdentity(SSLIdentity* identity);
/external/guava/guava/src/com/google/common/collect/
H A DBstModificationResult.java34 static <N extends BstNode<?, N>> BstModificationResult<N> identity(@Nullable N target) { method in class:BstModificationResult
/external/kernel-headers/original/uapi/linux/
H A Dwatchdog.h20 __u8 identity[32]; /* Identity of the board */ member in struct:watchdog_info
/external/llvm/include/llvm/ADT/
H A DIndexedMap.h30 template <typename T, typename ToIndexT = llvm::identity<unsigned> >
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dpmksa_cache_auth.h26 u8 *identity; member in struct:rsn_pmksa_cache_entry
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_pwd_common.h55 u8 identity[0]; /* length inferred from payload */ member in struct:eap_pwd_id
/external/wpa_supplicant_8/src/ap/
H A Dpmksa_cache_auth.h26 u8 *identity; member in struct:rsn_pmksa_cache_entry
/external/wpa_supplicant_8/src/eap_common/
H A Deap_pwd_common.h55 u8 identity[0]; /* length inferred from payload */ member in struct:eap_pwd_id
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dpmksa_cache_auth.h26 u8 *identity; member in struct:rsn_pmksa_cache_entry

Completed in 2753 milliseconds

1234567891011>>