/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_11_auth.c | 40 char *identity; member in struct:hostapd_cached_radius_acl 58 os_free(e->identity); 104 char **identity, char **radius_cui) 127 if (identity) { 128 if (entry->identity) 129 *identity = os_strdup(entry->identity); 131 *identity = NULL; 225 * @identity: Buffer for returning identity (fro 100 hostapd_acl_cache_get(struct hostapd_data *hapd, const u8 *addr, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument 232 hostapd_allowed_address(struct hostapd_data *hapd, const u8 *addr, const u8 *msg, size_t len, u32 *session_timeout, u32 *acct_interim_interval, int *vlan_id, struct hostapd_sta_wpa_psk_short **psk, char **identity, char **radius_cui) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_ikev2.c | 61 const u8 *identity, *password; local 65 identity = eap_get_config_identity(sm, &identity_len); 66 if (identity == NULL) { 67 wpa_printf(MSG_INFO, "EAP-IKEV2: No identity available"); 89 os_memcpy(data->ikev2.IDr, identity, identity_len);
|
H A D | eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 72 identity = eap_get_config_identity(sm, &identity_len); 74 if (identity == NULL || password == NULL) 125 wpabuf_put_data(resp, identity, identity_len); 140 const u8 *identity; local 145 identity = eap_get_config_identity(sm, &identity_len); 146 if (identity == NULL) 175 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_pax.c | 51 const u8 *identity, *password; local 54 identity = eap_get_config_identity(sm, &identity_len); 56 if (!identity || !password) { 77 os_memcpy(data->cid, identity, identity_len);
|
H A D | eap_psk.c | 36 const u8 *identity, *password; local 57 identity = eap_get_config_identity(sm, &identity_len); 58 if (identity) { 61 os_memcpy(data->id_p, identity, identity_len); 65 wpa_printf(MSG_INFO, "EAP-PSK: could not get own identity");
|
H A D | eap_sake.c | 71 const u8 *identity, *password; local 86 identity = eap_get_config_identity(sm, &identity_len); 87 if (identity) { 93 os_memcpy(data->peerid, identity, identity_len);
|
H A D | eap_wsc.c | 145 const u8 *identity; local 163 identity = eap_get_config_identity(sm, &identity_len); 165 if (identity && identity_len == WSC_ID_REGISTRAR_LEN && 166 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0) 168 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN && 169 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0) 172 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity", 173 identity, identity_len);
|
H A D | eap_config.h | 17 * identity - EAP Identity 19 * This field is used to set the real user identity or NAI (for 22 u8 *identity; member in struct:eap_peer_config 33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 34 * real identity (identity field) only to the authentication server. 36 * If not set, the identity field will be used for both unencrypted and 40 * pseudonym identity. 586 * pending_req_identity - Whether there is a pending identity request
|
H A D | eap_eke.c | 71 const u8 *identity, *password; local 86 identity = eap_get_config_identity(sm, &identity_len); 87 if (identity) { 93 os_memcpy(data->peerid, identity, identity_len);
|
/external/apache-xml/src/main/java/org/apache/xml/dtm/ref/ |
H A D | DTMDefaultBaseIterators.java | 43 * @param dtmIdentity The DTM identity ID for this DTM. 65 * @param dtmIdentity The DTM identity ID for this DTM. 1085 * The node identity of _startNode for this iterator 1254 /* _currentNode precedes candidates. This is the identity, not the handle! */ 1849 * Tell if this node identity is a descendant. Assumes that 1859 * @param identity The index number of the node in question. 1862 protected boolean isDescendant(int identity) argument 1864 return (_parent(identity) >= _startNode) || (_startNode == identity);
|
/external/apache-xml/src/main/java/org/apache/xml/dtm/ref/dom2dtm/ |
H A D | DOM2DTM.java | 111 * @param dtmIdentity The DTM identity ID for this DTM. 180 * @return The index identity of the node that was added. 607 int identity = makeNodeIdentity(nodeHandle); 609 return (Node) m_nodes.elementAt(identity); 613 * Get a Node from an identity index. 625 * Get the next node identity value in the list, and call the iterator 628 * @param identity The node identity (index). 629 * @return identity+1, or DTM.NULL. 631 protected int getNextNodeIdentity(int identity) argument [all...] |
/external/chromium-trace/trace-viewer/tracing/third_party/gl-matrix/src/gl-matrix/ |
H A D | mat4.js | 30 * Creates a new identity mat4 110 * Set a mat4 to the identity matrix 115 mat4.identity = function(out) { 608 * mat4.identity(dest); 639 * mat4.identity(dest); 670 * mat4.identity(dest); 718 * mat4.identity(dest); 753 * mat4.identity(dest); 788 * mat4.identity(dest); 823 * mat4.identity(des [all...] |
/external/clang/test/SemaTemplate/ |
H A D | instantiate-method.cpp | 11 int identity(int x) { return x; } function 16 xf->f(&identity); 17 xf->g(identity); 19 X<int(int)>::h(identity, &identity);
|
/external/llvm/include/llvm/ADT/ |
H A D | STLExtras.h | 36 struct identity : public std::unary_function<Ty, Ty> { struct in namespace:llvm
|
/external/skia/src/ports/ |
H A D | SkRemotableFontMgr_win_dw.cpp | 27 IUnknown* fLoader; // In COM only IUnknown pointers may be safely used for identity. 182 SkFontIdentity identity = { SkFontIdentity::kInvalidDataId }; variable 187 identity); 194 identity); 196 HR_GENERAL(FontToIdentity(font.get(), &identity), NULL, identity); variable 198 return identity; 244 SkFontIdentity identity = { SkFontIdentity::kInvalidDataId }; variable 248 HR_GENERAL(getDefaultFontFamilyName(&dwFamilyName), NULL, identity); variable 250 HR_GENERAL(sk_cstring_to_wchar(familyName, &dwFamilyName), NULL, identity); variable 395 SkFontIdentity identity = { SkFontIdentity::kInvalidDataId }; variable 408 HR_GENERAL(getDefaultFontFamilyName(&dwFamilyName), NULL, identity); variable 410 HR_GENERAL(sk_cstring_to_wchar(familyName, &dwFamilyName), NULL, identity); variable 419 HR_GENERAL(sk_cstring_to_wchar(bcp47[bcp47Count-1], &dwBcp47Local), NULL, identity); variable [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_config.h | 17 * identity - EAP Identity 19 * This field is used to set the real user identity or NAI (for 22 u8 *identity; member in struct:eap_peer_config 33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 34 * real identity (identity field) only to the authentication server. 36 * If not set, the identity field will be used for both unencrypted and 40 * pseudonym identity. 586 * pending_req_identity - Whether there is a pending identity request
|
H A D | eap_eke.c | 71 const u8 *identity, *password; local 86 identity = eap_get_config_identity(sm, &identity_len); 87 if (identity) { 93 os_memcpy(data->peerid, identity, identity_len);
|
H A D | eap_gpsk.c | 82 const u8 *identity, *password; local 97 identity = eap_get_config_identity(sm, &identity_len); 98 if (identity) { 104 os_memcpy(data->id_peer, identity, identity_len);
|
H A D | eap_pwd.c | 88 const u8 *identity, *password; local 99 identity = eap_get_config_identity(sm, &identity_len); 100 if (identity == NULL) { 101 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); 123 os_memcpy(data->id_peer, identity, identity_len); 278 os_memcpy(data->id_server, id->identity, data->id_server_len);
|
/external/wpa_supplicant_8/hostapd/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 763 const char *identity, const char *radius_cui) 847 if (identity) { 848 sm->identity = (u8 *) os_strdup(identity); 849 if (sm->identity) 850 sm->identity_len = os_strlen(identity); 1007 static int eapol_sm_get_eap_user(void *ctx, const u8 *identity, argument 1014 ret = sm->eapol->cb.get_eap_user(sm->eapol->conf.ctx, identity, 760 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr, int flags, const struct wpabuf *assoc_wps_ie, const struct wpabuf *assoc_p2p_ie, void *sta_ctx, const char *identity, const char *radius_cui) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_config.h | 17 * identity - EAP Identity 19 * This field is used to set the real user identity or NAI (for 22 u8 *identity; member in struct:eap_peer_config 33 * different tunnelled identity, e.g., EAP-TTLS, in order to reveal the 34 * real identity (identity field) only to the authentication server. 36 * If not set, the identity field will be used for both unencrypted and 40 * pseudonym identity. 586 * pending_req_identity - Whether there is a pending identity request
|
H A D | eap_eke.c | 71 const u8 *identity, *password; local 86 identity = eap_get_config_identity(sm, &identity_len); 87 if (identity) { 93 os_memcpy(data->peerid, identity, identity_len);
|
H A D | eap_gpsk.c | 82 const u8 *identity, *password; local 97 identity = eap_get_config_identity(sm, &identity_len); 98 if (identity) { 104 os_memcpy(data->id_peer, identity, identity_len);
|
H A D | eap_pwd.c | 88 const u8 *identity, *password; local 99 identity = eap_get_config_identity(sm, &identity_len); 100 if (identity == NULL) { 101 wpa_printf(MSG_INFO, "EAP-PWD: No identity configured!"); 123 os_memcpy(data->id_peer, identity, identity_len); 278 os_memcpy(data->id_server, id->identity, data->id_server_len);
|
/external/wpa_supplicant_8/src/eapol_auth/ |
H A D | eapol_auth_sm.c | 763 const char *identity, const char *radius_cui) 847 if (identity) { 848 sm->identity = (u8 *) os_strdup(identity); 849 if (sm->identity) 850 sm->identity_len = os_strlen(identity); 1007 static int eapol_sm_get_eap_user(void *ctx, const u8 *identity, argument 1014 ret = sm->eapol->cb.get_eap_user(sm->eapol->conf.ctx, identity, 760 eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr, int flags, const struct wpabuf *assoc_wps_ie, const struct wpabuf *assoc_p2p_ie, void *sta_ctx, const char *identity, const char *radius_cui) argument
|