HomeSort by relevance Sort by last modified time
    Searched refs:identity (Results 76 - 100 of 328) sorted by null

1 2 34 5 6 7 8 91011>>

  /external/valgrind/main/helgrind/tests/
tc24_nonzero_sem.c 49 static sem_t* my_sem_init (char* identity, int pshared, unsigned count)
64 sprintf(name, "anonsem_%s_pid%d", identity, (int)getpid());
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_leap.c 70 const u8 *pos, *challenge, *identity, *password; local
77 identity = eap_get_config_identity(sm, &identity_len);
79 if (identity == NULL || password == NULL)
130 wpabuf_put_data(resp, identity, identity_len);
145 const u8 *identity; local
150 identity = eap_get_config_identity(sm, &identity_len);
151 if (identity == NULL)
180 wpabuf_put_data(resp, identity, identity_len);
eap.c 408 * Handles requests for Identity method and builds a response.
410 SM_STATE(EAP, IDENTITY)
414 SM_ENTRY(EAP, IDENTITY);
634 SM_ENTER(EAP, IDENTITY);
857 * RFC 3748 - 5.1: Identity
865 wpa_hexdump_ascii(MSG_DEBUG, "EAP: EAP-Request Identity data",
897 os_free(conf->identity);
898 conf->identity = os_malloc(1 + imsi_len);
899 if (conf->identity == NULL) {
901 "IMSI-based identity");
965 const u8 *identity; local
    [all...]
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.h 62 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
81 const char *identity, const char *radius_cui);
  /external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/lightopenid/
openid.php 12 * $openid->identity = 'ID supplied by user';
52 private $identity, $claimed_id;
82 case 'identity':
104 case 'identity':
105 # We return claimed_id instead of identity,
107 # i.e. what he set as identity, not the op-local identifier (which is what we verify)
175 * @param $url Identity URL.
181 if (!$url) throw new ErrorException('No identity supplied.');
229 if (isset($delegate[2])) $this->identity = trim($delegate[2]);
251 if (isset($delegate[1])) $this->identity = $delegate[1]
294 $this->identity = $delegate; variable
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_1x.c 384 const u8 *identity; local
391 identity = eap_get_identity(sm->eap, &identity_len);
392 if (identity == NULL)
395 /* Save station identity for future RADIUS packets */
396 os_free(sm->identity);
397 sm->identity = os_malloc(identity_len + 1);
398 if (sm->identity == NULL) {
403 os_memcpy(sm->identity, identity, identity_len);
405 sm->identity[identity_len] = '\0'
1249 u8 *buf, *identity; local
1632 const u8 *identity; local
    [all...]
  /external/clang/test/CXX/temp/temp.decls/temp.variadic/
p4.cpp 7 struct identity { struct
165 extract_nested_types<identity<int>, identity<float> >::types *t_int_float_2
  /external/skia/tests/
Matrix44Test.cpp 62 SkMatrix44 identity; local
63 identity.reset();
64 return nearly_equal(m, identity);
MatrixTest.cpp 36 SkMatrix identity; local
37 identity.reset();
38 return nearly_equal(m, identity);
61 SkMatrix identity; local
62 identity.reset();
63 REPORTER_ASSERT(reporter, SK_Scalar1 == identity.getMaxStretch());
  /external/webkit/Source/WebCore/platform/graphics/chromium/
TransparencyWin.cpp 314 // so it's maintained. We know the new layer has the identity
325 // We now have a new layer with the identity transform, which is the
348 // It will have the scaled size, and an identity transform loaded.
445 SkMatrix identity; local
446 identity.reset();
447 destCanvas->setMatrix(identity);
487 SkMatrix identity; local
488 identity.reset();
489 destCanvas->setMatrix(identity);
  /external/wpa_supplicant_8/src/eap_server/
eap_server_fast.c 61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data
131 u8 *identity = NULL; local
214 identity = pos + 2;
229 if (identity) {
230 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: Identity from "
231 "PAC-Opaque", identity, identity_len);
232 os_free(data->identity);
233 data->identity = os_malloc(identity_len);
234 if (data->identity) {
235 os_memcpy(data->identity, identity, identity_len)
    [all...]
eap_i.h 145 u8 *identity; member in struct:eap_sm
147 /* Whether Phase 2 method should validate identity match */
193 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
  /frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/
AccessPointParserHelper.java 48 * security, eap, phase2, identity, password, anonymousidentity, cacert, usercert,
60 * <identity>donut</identity</identity>
115 boolean identity = false;
145 if (tagName.equalsIgnoreCase("identity")) {
146 identity = true;
221 config.identity.setValue("");
268 if (identity) {
270 config.identity.setValue(identityValue)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_i.h 151 u8 *identity; member in struct:eap_sm
153 /* Whether Phase 2 method should validate identity match */
190 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
eap_fast.c 66 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data
136 u8 *identity = NULL; local
219 identity = pos + 2;
234 if (identity) {
235 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: Identity from "
236 "PAC-Opaque", identity, identity_len);
237 os_free(data->identity);
238 data->identity = os_malloc(identity_len);
239 if (data->identity) {
240 os_memcpy(data->identity, identity, identity_len)
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_leap.c 65 const u8 *pos, *challenge, *identity, *password; local
72 identity = eap_get_config_identity(sm, &identity_len);
74 if (identity == NULL || password == NULL)
125 wpabuf_put_data(resp, identity, identity_len);
140 const u8 *identity; local
145 identity = eap_get_config_identity(sm, &identity_len);
146 if (identity == NULL)
175 wpabuf_put_data(resp, identity, identity_len);
eap_sim.c 299 const u8 *identity = NULL; local
309 /* Look for the realm of the permanent identity */
310 identity = eap_get_config_identity(sm, &identity_len);
311 if (identity) {
312 for (realm = identity, realm_len = identity_len;
380 const u8 *identity = NULL; local
386 identity = data->reauth_id;
391 identity = data->pseudonym;
395 identity = eap_get_config_identity(sm, &identity_len);
396 if (identity) {
605 const u8 *identity; local
    [all...]
  /frameworks/native/libs/gui/
ISurfaceComposerClient.cpp 119 identity = parcel.readInt32();
126 parcel->writeInt32(identity);
  /external/apache-xml/src/main/java/org/apache/xml/dtm/ref/dom2dtm/
DOM2DTM.java 111 * @param dtmIdentity The DTM identity ID for this DTM.
180 * @return The index identity of the node that was added.
187 // Have we overflowed a DTM Identity's addressing range?
607 int identity = makeNodeIdentity(nodeHandle); local
609 return (Node) m_nodes.elementAt(identity);
613 * Get a Node from an identity index.
625 * Get the next node identity value in the list, and call the iterator
628 * @param identity The node identity (index).
629 * @return identity+1, or DTM.NULL
765 int identity = makeNodeIdentity(nodeHandle); local
1360 int identity = m_nodes.size()-1; local
    [all...]
  /frameworks/base/services/java/com/android/server/
NotificationManagerService.java 413 long identity = Binder.clearCallingIdentity();
421 Binder.restoreCallingIdentity(identity);
424 identity = Binder.clearCallingIdentity();
428 Binder.restoreCallingIdentity(identity);
461 long identity = Binder.clearCallingIdentity();
469 Binder.restoreCallingIdentity(identity);
474 identity = Binder.clearCallingIdentity();
478 Binder.restoreCallingIdentity(identity);
1007 long identity = Binder.clearCallingIdentity(); local
1015 long identity = Binder.clearCallingIdentity(); local
1033 long identity = Binder.clearCallingIdentity(); local
1075 final long identity = Binder.clearCallingIdentity(); local
1169 long identity = Binder.clearCallingIdentity(); local
1182 final long identity = Binder.clearCallingIdentity(); local
1197 long identity = Binder.clearCallingIdentity(); local
    [all...]
  /external/chromium/third_party/libjingle/source/talk/base/
opensslstreamadapter.h 77 virtual void SetIdentity(SSLIdentity* identity);
  /external/chromium/third_party/libjingle/source/talk/session/tunnel/
securetunnelsessionclient.cc 83 void SecureTunnelSessionClient::SetIdentity(talk_base::SSLIdentity* identity) {
85 identity_.reset(identity);
105 LOG(LS_ERROR) << "Failed to generate SSL identity";
317 talk_base::SSLIdentity* identity = local
320 ssl_stream->SetIdentity(identity);
securetunnelsessionclient.h 67 // The client takes ownership of the identity object.
69 void SetIdentity(talk_base::SSLIdentity* identity);
71 // Generates an identity from nothing.
76 // Returns our identity for SSL purposes, as either set by
78 // method only after our identity has been successfully established
103 // Our identity (key and certificate) for SSL purposes. The
105 // description. The identity will be passed to the SSLStreamAdapter
140 // configures it with our identity and role.
  /external/guava/guava/src/com/google/common/collect/
BstModificationResult.java 31 IDENTITY, REBUILDING_CHANGE, REBALANCING_CHANGE;
34 static <N extends BstNode<?, N>> BstModificationResult<N> identity(@Nullable N target) { method in class:BstModificationResult
35 return new BstModificationResult<N>(target, target, ModificationType.IDENTITY);
  /external/llvm/include/llvm/ADT/
IndexedMap.h 30 template <typename T, typename ToIndexT = llvm::identity<unsigned> >

Completed in 1285 milliseconds

1 2 34 5 6 7 8 91011>>