/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | authsrv.c | 52 static int hostapd_radius_get_eap_user(void *ctx, const u8 *identity, argument 60 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2);
|
H A D | eap_user_db.c | 108 if (os_strcmp(col[i], "identity") == 0 && argv[i]) 119 os_memcmp(argv[id], user->identity, len) == 0 && 133 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, argument 142 wpa_printf(MSG_DEBUG, "%s: identity len too big: %d >= %d", 147 os_memcpy(id_str, identity, identity_len); 161 wpa_printf(MSG_INFO, "DB: Unsupported character in identity"); 165 bin_clear_free(hapd->tmp_eap_user.identity, 171 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); 172 if (hapd->tmp_eap_user.identity == NULL) 174 os_memcpy(hapd->tmp_eap_user.identity, identit 224 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; local 99 identity = eap_get_config_identity(sm, &identity_len); 100 if (identity == NULL) 110 wpabuf_put_data(resp, identity, identity_len);
|
H A D | mschapv2.c | 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument 49 identity, identity_len); 51 username = mschapv2_remove_domain(identity, &username_len);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | authsrv.c | 52 static int hostapd_radius_get_eap_user(void *ctx, const u8 *identity, argument 60 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2);
|
H A D | eap_user_db.c | 108 if (os_strcmp(col[i], "identity") == 0 && argv[i]) 119 os_memcmp(argv[id], user->identity, len) == 0 && 133 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, argument 142 wpa_printf(MSG_DEBUG, "%s: identity len too big: %d >= %d", 147 os_memcpy(id_str, identity, identity_len); 161 wpa_printf(MSG_INFO, "DB: Unsupported character in identity"); 165 bin_clear_free(hapd->tmp_eap_user.identity, 171 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); 172 if (hapd->tmp_eap_user.identity == NULL) 174 os_memcpy(hapd->tmp_eap_user.identity, identit 224 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; local 99 identity = eap_get_config_identity(sm, &identity_len); 100 if (identity == NULL) 110 wpabuf_put_data(resp, identity, identity_len);
|
H A D | mschapv2.c | 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument 49 identity, identity_len); 51 username = mschapv2_remove_domain(identity, &username_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | authsrv.c | 52 static int hostapd_radius_get_eap_user(void *ctx, const u8 *identity, argument 60 eap_user = hostapd_get_eap_user(ctx, identity, identity_len, phase2);
|
H A D | eap_user_db.c | 108 if (os_strcmp(col[i], "identity") == 0 && argv[i]) 119 os_memcmp(argv[id], user->identity, len) == 0 && 133 eap_user_sqlite_get(struct hostapd_data *hapd, const u8 *identity, argument 142 wpa_printf(MSG_DEBUG, "%s: identity len too big: %d >= %d", 147 os_memcpy(id_str, identity, identity_len); 161 wpa_printf(MSG_INFO, "DB: Unsupported character in identity"); 165 bin_clear_free(hapd->tmp_eap_user.identity, 171 hapd->tmp_eap_user.identity = os_zalloc(identity_len + 1); 172 if (hapd->tmp_eap_user.identity == NULL) 174 os_memcpy(hapd->tmp_eap_user.identity, identit 224 hostapd_get_eap_user(struct hostapd_data *hapd, const u8 *identity, size_t identity_len, int phase2) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_gtc.c | 50 const u8 *pos, *password, *identity; local 99 identity = eap_get_config_identity(sm, &identity_len); 100 if (identity == NULL) 110 wpabuf_put_data(resp, identity, identity_len);
|
H A D | mschapv2.c | 36 int mschapv2_derive_response(const u8 *identity, size_t identity_len, argument 49 identity, identity_len); 51 username = mschapv2_remove_domain(identity, &username_len);
|
/external/wpa_supplicant_8/wpa_supplicant/tests/ |
H A D | link_test.c | 73 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity, argument
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.ecf.identity_3.1.0.v20100529-0735.jar | ... org/eclipse/ecf/internal/core/identity/ org/eclipse/ecf/core/identity/BaseID.class BaseID.java package org.eclipse ... |
/external/chromium-trace/trace-viewer/tracing/third_party/gl-matrix/src/gl-matrix/ |
H A D | mat2.js | 30 * Creates a new identity mat2 74 * Set a mat2 to the identity matrix 79 mat2.identity = function(out) { 229 * mat2.identity(dest); 250 * mat2.identity(dest);
|
H A D | mat2d.js | 44 * Creates a new identity mat2d 94 * Set a mat2d to the identity matrix 99 mat2d.identity = function(out) { 236 * mat2d.identity(dest); 258 * mat2d.identity(dest); 279 * mat2d.identity(dest);
|
H A D | quat.js | 33 * Creates a new identity quat 163 * Set a quat to the identity quaternion 168 quat.identity = function(out) {
|
/external/clang/test/SemaTemplate/ |
H A D | address-spaces.cpp | 63 template<typename T> struct identity {}; struct 66 identity<T> accept_arg_in_address_space_1(__attribute__((address_space(1))) T &ir1); 69 identity<T> accept_any_arg(T &ir1); 73 identity<int> ii = accept_arg_in_address_space_1(int_1); 74 identity<int __attribute__((address_space(1)))> ii2 = accept_any_arg(int_1);
|
/external/conscrypt/src/test/java/org/conscrypt/ |
H A D | DuckTypedPSKKeyManagerTest.java | 102 String identity = "identity"; 122 mockInvocationHandler.returnValue = identity; 123 assertSame(identity, pskKeyManager.chooseClientKeyIdentity(identityHint, mSSLSocket)); 131 mockInvocationHandler.returnValue = identity; 132 assertSame(identity, pskKeyManager.chooseClientKeyIdentity(identityHint, mSSLEngine)); 142 assertSame(key, pskKeyManager.getKey(identityHint, identity, mSSLSocket)); 148 assertSame(identity, mockInvocationHandler.lastInvokedMethodArgs[1]); 152 assertSame(key, pskKeyManager.getKey(identityHint, identity, mSSLEngine)); 158 assertSame(identity, mockInvocationHandle 193 getKey(String identityHint, String identity, Socket socket) argument 224 getKey(String identityHint, String identity, Socket socket) argument 228 getKey(String identityHint, String identity, SSLEngine engine) argument 258 getKey(String identityHint, String identity, Socket socket) argument 263 getKey(String identityHint, String identity, SSLEngine engine) argument 292 getKey(String identityHint, String identity, Socket socket) argument 297 getKey(String identityHint, String identity, SSLEngine engine) argument [all...] |
/external/eigen/test/ |
H A D | cwiseop.cpp | 84 identity = Matrix<Scalar, MatrixType::RowsAtCompileTime, MatrixType::RowsAtCompileTime> local 107 VERIFY(identity.isIdentity());
|
H A D | product_extra.cpp | 28 identity = MatrixType::Identity(rows, rows), local
|
/external/guava/guava/src/com/google/common/base/ |
H A D | Equivalence.java | 30 * equivalences are the {@linkplain #identity() identity equivalence} and {@linkplain #equals equals 133 * For example, {@code Equivalence.identity().onResultOf(Functions.toStringFunction())} is broken 317 public static Equivalence<Object> identity() { method in class:Equivalence
|
H A D | Functions.java | 75 * Returns the identity function. 79 public static <E> Function<E, E> identity() { method in class:Functions 94 return "identity";
|
/external/kernel-headers/original/uapi/linux/ |
H A D | watchdog.h | 20 __u8 identity[32]; /* Identity of the board */ member in struct:watchdog_info
|
/external/valgrind/helgrind/tests/ |
H A D | tc17_sembar.c | 221 static sem_t* my_sem_init (char* identity, int pshared, unsigned count) argument 236 sprintf(name, "anonsem_%s_pid%d", identity, (int)getpid());
|