Searched defs:identity (Results 76 - 100 of 199) sorted by relevance

12345678

/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_11_auth.c40 char *identity; member in struct:hostapd_cached_radius_acl
58 os_free(e->identity);
104 char **identity, char **radius_cui)
127 if (identity) {
128 if (entry->identity)
129 *identity = os_strdup(entry->identity);
131 *identity = NULL;
225 * @identity: Buffer for returning identity (fro
100 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument
232 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_ikev2.c61 const u8 *identity, *password; local
65 identity = eap_get_config_identity(sm, &identity_len);
66 if (identity == NULL) {
67 wpa_printf(MSG_INFO, "EAP-IKEV2: No identity available");
89 os_memcpy(data->ikev2.IDr, identity, identity_len);
H A Deap_leap.c65 const u8 *pos, *challenge, *identity, *password; local
72 identity = eap_get_config_identity(sm, &identity_len);
74 if (identity == NULL || password == NULL)
125 wpabuf_put_data(resp, identity, identity_len);
140 const u8 *identity; local
145 identity = eap_get_config_identity(sm, &identity_len);
146 if (identity == NULL)
175 wpabuf_put_data(resp, identity, identity_len);
H A Deap_pax.c51 const u8 *identity, *password; local
54 identity = eap_get_config_identity(sm, &identity_len);
56 if (!identity || !password) {
77 os_memcpy(data->cid, identity, identity_len);
H A Deap_psk.c36 const u8 *identity, *password; local
57 identity = eap_get_config_identity(sm, &identity_len);
58 if (identity) {
61 os_memcpy(data->id_p, identity, identity_len);
65 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity");
H A Deap_sake.c71 const u8 *identity, *password; local
86 identity = eap_get_config_identity(sm, &identity_len);
87 if (identity) {
93 os_memcpy(data->peerid, identity, identity_len);
H A Deap_wsc.c145 const u8 *identity; local
163 identity = eap_get_config_identity(sm, &identity_len);
165 if (identity && identity_len == WSC_ID_REGISTRAR_LEN &&
166 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0)
168 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN &&
169 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0)
172 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity",
173 identity, identity_len);
H A Deap_config.h17 * identity - EAP Identity
19 * This field is used to set the real user identity or NAI (for
22 u8 *identity; member in struct:eap_peer_config
33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
34 * real identity (identity field) only to the authentication server.
36 * If not set, the identity field will be used for both unencrypted and
40 * pseudonym identity.
586 * pending_req_identity - Whether there is a pending identity request
H A Deap_eke.c71 const u8 *identity, *password; local
86 identity = eap_get_config_identity(sm, &identity_len);
87 if (identity) {
93 os_memcpy(data->peerid, identity, identity_len);
/external/apache-xml/src/main/java/org/apache/xml/dtm/ref/
H A DDTMDefaultBaseIterators.java43 * @param dtmIdentity The DTM identity ID for this DTM.
65 * @param dtmIdentity The DTM identity ID for this DTM.
1085 * The node identity of _startNode for this iterator
1254 /* _currentNode precedes candidates. This is the identity, not the handle! */
1849 * Tell if this node identity is a descendant. Assumes that
1859 * @param identity The index number of the node in question.
1862 protected boolean isDescendant(int identity) argument
1864 return (_parent(identity) >= _startNode) || (_startNode == identity);
/external/apache-xml/src/main/java/org/apache/xml/dtm/ref/dom2dtm/
H A DDOM2DTM.java111 * @param dtmIdentity The DTM identity ID for this DTM.
180 * @return The index identity of the node that was added.
607 int identity = makeNodeIdentity(nodeHandle);
609 return (Node) m_nodes.elementAt(identity);
613 * Get a Node from an identity index.
625 * Get the next node identity value in the list, and call the iterator
628 * @param identity The node identity (index).
629 * @return identity+1, or DTM.NULL.
631 protected int getNextNodeIdentity(int identity) argument
[all...]
/external/chromium-trace/trace-viewer/tracing/third_party/gl-matrix/src/gl-matrix/
H A Dmat4.js30 * Creates a new identity mat4
110 * Set a mat4 to the identity matrix
115 mat4.identity = function(out) {
608 * mat4.identity(dest);
639 * mat4.identity(dest);
670 * mat4.identity(dest);
718 * mat4.identity(dest);
753 * mat4.identity(dest);
788 * mat4.identity(dest);
823 * mat4.identity(des
[all...]
/external/clang/test/SemaTemplate/
H A Dinstantiate-method.cpp11 int identity(int x) { return x; } function
16 xf->f(&identity);
17 xf->g(identity);
19 X<int(int)>::h(identity, &identity);
/external/llvm/include/llvm/ADT/
H A DSTLExtras.h36 struct identity : public std::unary_function<Ty, Ty> { struct in namespace:llvm
/external/skia/src/ports/
H A DSkRemotableFontMgr_win_dw.cpp27 IUnknown* fLoader; // In COM only IUnknown pointers may be safely used for identity.
182 SkFontIdentity identity = { SkFontIdentity::kInvalidDataId }; variable
187 identity);
194 identity);
196 HR_GENERAL(FontToIdentity(font.get(), &identity), NULL, identity); variable
198 return identity;
244 SkFontIdentity identity = { SkFontIdentity::kInvalidDataId }; variable
248 HR_GENERAL(getDefaultFontFamilyName(&dwFamilyName), NULL, identity); variable
250 HR_GENERAL(sk_cstring_to_wchar(familyName, &dwFamilyName), NULL, identity); variable
395 SkFontIdentity identity = { SkFontIdentity::kInvalidDataId }; variable
408 HR_GENERAL(getDefaultFontFamilyName(&dwFamilyName), NULL, identity); variable
410 HR_GENERAL(sk_cstring_to_wchar(familyName, &dwFamilyName), NULL, identity); variable
419 HR_GENERAL(sk_cstring_to_wchar(bcp47[bcp47Count-1], &dwBcp47Local), NULL, identity); variable
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_config.h17 * identity - EAP Identity
19 * This field is used to set the real user identity or NAI (for
22 u8 *identity; member in struct:eap_peer_config
33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
34 * real identity (identity field) only to the authentication server.
36 * If not set, the identity field will be used for both unencrypted and
40 * pseudonym identity.
586 * pending_req_identity - Whether there is a pending identity request
H A Deap_eke.c71 const u8 *identity, *password; local
86 identity = eap_get_config_identity(sm, &identity_len);
87 if (identity) {
93 os_memcpy(data->peerid, identity, identity_len);
H A Deap_gpsk.c82 const u8 *identity, *password; local
97 identity = eap_get_config_identity(sm, &identity_len);
98 if (identity) {
104 os_memcpy(data->id_peer, identity, identity_len);
H A Deap_pwd.c88 const u8 *identity, *password; local
99 identity = eap_get_config_identity(sm, &identity_len);
100 if (identity == NULL) {
101 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!");
123 os_memcpy(data->id_peer, identity, identity_len);
278 os_memcpy(data->id_server, id->identity, data->id_server_len);
/external/wpa_supplicant_8/hostapd/src/eapol_auth/
H A Deapol_auth_sm.c763 const char *identity, const char *radius_cui)
847 if (identity) {
848 sm->identity = (u8 *) os_strdup(identity);
849 if (sm->identity)
850 sm->identity_len = os_strlen(identity);
1007 static int eapol_sm_get_eap_user(void *ctx, const u8 *identity, argument
1014 ret = sm->eapol->cb.get_eap_user(sm->eapol->conf.ctx, identity,
760 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr, int flags, const struct wpabuf *assoc_wps_ie, const struct wpabuf *assoc_p2p_ie, void *sta_ctx, const char *identity, const char *radius_cui) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_config.h17 * identity - EAP Identity
19 * This field is used to set the real user identity or NAI (for
22 u8 *identity; member in struct:eap_peer_config
33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the
34 * real identity (identity field) only to the authentication server.
36 * If not set, the identity field will be used for both unencrypted and
40 * pseudonym identity.
586 * pending_req_identity - Whether there is a pending identity request
H A Deap_eke.c71 const u8 *identity, *password; local
86 identity = eap_get_config_identity(sm, &identity_len);
87 if (identity) {
93 os_memcpy(data->peerid, identity, identity_len);
H A Deap_gpsk.c82 const u8 *identity, *password; local
97 identity = eap_get_config_identity(sm, &identity_len);
98 if (identity) {
104 os_memcpy(data->id_peer, identity, identity_len);
H A Deap_pwd.c88 const u8 *identity, *password; local
99 identity = eap_get_config_identity(sm, &identity_len);
100 if (identity == NULL) {
101 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!");
123 os_memcpy(data->id_peer, identity, identity_len);
278 os_memcpy(data->id_server, id->identity, data->id_server_len);
/external/wpa_supplicant_8/src/eapol_auth/
H A Deapol_auth_sm.c763 const char *identity, const char *radius_cui)
847 if (identity) {
848 sm->identity = (u8 *) os_strdup(identity);
849 if (sm->identity)
850 sm->identity_len = os_strlen(identity);
1007 static int eapol_sm_get_eap_user(void *ctx, const u8 *identity, argument
1014 ret = sm->eapol->cb.get_eap_user(sm->eapol->conf.ctx, identity,
760 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr, int flags, const struct wpabuf *assoc_wps_ie, const struct wpabuf *assoc_p2p_ie, void *sta_ctx, const char *identity, const char *radius_cui) argument

Completed in 386 milliseconds

12345678