/frameworks/base/libs/surfaceflinger_client/ |
Surface.cpp | 113 mToken(data.token), mIdentity(data.identity), 232 LOGE("invalid token (%d, identity=%u) or client (%p)", 238 LOGE("cblk is null (surface id=%d, identity=%u)", mToken, mIdentity); 243 LOGE("surface (id=%d, identity=%u) is invalid, err=%d (%s)", 247 uint32_t identity = cblk->getIdentity(mToken); local 248 if (mIdentity != identity) { 249 LOGE("using an invalid surface id=%d, identity=%u should be %d", 250 mToken, mIdentity, identity); 262 uint32_t identity = 0; local 269 identity = control->mIdentity 409 uint32_t identity = cblk->getIdentity(mToken); local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_aka.c | 333 * No EAP-AKA/Identity packets were exchanged - send empty 340 /* Checkcode is SHA1/SHA256 hash over all EAP-AKA/Identity packets. */ 371 "indicates that AKA/Identity messages were " 383 "indicates that AKA/Identity message were not " 388 /* Checkcode is SHA1/SHA256 hash over all EAP-AKA/Identity packets. */ 464 const u8 *identity = NULL; local 470 identity = data->reauth_id; 475 identity = data->pseudonym; 479 identity = eap_get_config_identity(sm, &identity_len); 480 if (identity) { 753 const u8 *identity; local [all...] |
eap_leap.c | 70 const u8 *pos, *challenge, *identity, *password; local 77 identity = eap_get_config_identity(sm, &identity_len); 79 if (identity == NULL || password == NULL) 130 wpabuf_put_data(resp, identity, identity_len); 145 const u8 *identity; local 150 identity = eap_get_config_identity(sm, &identity_len); 151 if (identity == NULL) 180 wpabuf_put_data(resp, identity, identity_len);
|
eap_wsc.c | 71 const u8 *identity; local 85 identity = eap_get_config_identity(sm, &identity_len); 87 if (identity && identity_len == WSC_ID_REGISTRAR_LEN && 88 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0) 90 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN && 91 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0) 94 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity", 95 identity, identity_len);
|
eap.c | 408 * Handles requests for Identity method and builds a response. 410 SM_STATE(EAP, IDENTITY) 414 SM_ENTRY(EAP, IDENTITY); 634 SM_ENTER(EAP, IDENTITY); 857 * RFC 3748 - 5.1: Identity 865 wpa_hexdump_ascii(MSG_DEBUG, "EAP: EAP-Request Identity data", 897 os_free(conf->identity); 898 conf->identity = os_malloc(1 + imsi_len); 899 if (conf->identity == NULL) { 901 "IMSI-based identity"); 965 const u8 *identity; local [all...] |
eap_sim.c | 353 const u8 *identity = NULL; local 359 identity = data->reauth_id; 364 identity = data->pseudonym; 368 identity = eap_get_config_identity(sm, &identity_len); 369 if (identity) { 391 if (identity) { 393 identity, identity_len); 395 identity, identity_len); 577 const u8 *identity; local 630 identity = data->last_eap_identity [all...] |
/external/wpa_supplicant/ |
eap_aka.c | 244 const u8 *identity = NULL; local 250 identity = data->reauth_id; 255 identity = data->pseudonym; 259 identity = eap_get_config_identity(sm, &identity_len); 260 if (identity) { 268 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Identity (id=%d)", 273 if (identity) { 275 identity, identity_len); 277 identity, identity_len); 387 wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Identity"); 428 const u8 *identity; local [all...] |
eap_leap.c | 72 const u8 *pos, *challenge, *identity, *password; local 78 identity = eap_get_config_identity(sm, &identity_len); 80 if (identity == NULL || password == NULL) 131 os_memcpy(rpos, identity, identity_len); 147 const u8 *identity; local 152 identity = eap_get_config_identity(sm, &identity_len); 153 if (identity == NULL) 184 os_memcpy(pos, identity, identity_len);
|
eap_sim.c | 255 const u8 *identity = NULL; local 261 identity = data->reauth_id; 266 identity = data->pseudonym; 270 identity = eap_get_config_identity(sm, &identity_len); 271 if (identity) { 294 if (identity) { 296 identity, identity_len); 298 identity, identity_len); 485 const u8 *identity; local 538 identity = data->last_eap_identity [all...] |
eap.c | 386 * Handles requests for Identity method and builds a response. 388 SM_STATE(EAP, IDENTITY) 393 SM_ENTRY(EAP, IDENTITY); 639 SM_ENTER(EAP, IDENTITY); 839 * RFC 3748 - 5.1: Identity 847 wpa_hexdump_ascii(MSG_DEBUG, "EAP: EAP-Request Identity data", 878 os_free(ssid->identity); 879 ssid->identity = os_malloc(1 + imsi_len); 880 if (ssid->identity == NULL) { 882 "IMSI-based identity"); 947 const u8 *identity; local [all...] |
wpa_supplicant.conf | 294 # identity: Identity string for EAP 295 # anonymous_identity: Anonymous identity string for EAP (to be used as the 296 # unencrypted identity with EAP types that support different tunnelled 297 # identity, e.g., EAP-TTLS) 475 # identity="user@example.com" 489 # identity="user@example.com" 497 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the 498 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel. 503 # identity="user@example.com [all...] |
/external/skia/tests/ |
MatrixTest.cpp | 25 SkMatrix identity; local 26 identity.reset(); 27 return nearly_equal(m, identity);
|
/frameworks/base/core/java/android/view/animation/ |
Transformation.java | 30 * Indicates a transformation that has no effect (alpha = 1 and identity matrix.) 34 * Indicates a transformation that applies an alpha only (uses an identity matrix.) 51 * Creates a new transformation with alpha = 1 and the identity matrix.
|
/frameworks/base/include/private/surfaceflinger/ |
SharedBufferStack.h | 94 void init(int32_t identity); 108 int32_t identity; // surface's identity (const) member in class:android::SharedBufferStack 143 int32_t identity); 186 (stack.identity == mIdentity) && 195 LOGE("waitForCondition(%s) timed out (identity=%d), " 198 stack.identity); 202 "(identity=%d, status=%d). " 204 stack.identity, stack.status); 213 return (stack.identity != mIdentity) ? status_t(BAD_INDEX) : stack.status [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sim_common.c | 33 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 42 addr[0] = identity; 55 /* MK = SHA1(Identity|n*Kc|NONCE_MT|Version List|Selected Version) */ 61 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 67 addr[0] = identity; 74 /* MK = SHA1(Identity|IK|CK) */ 113 const u8 *identity, size_t identity_len, 123 while (identity_len > 0 && identity[identity_len - 1] == 0) { 125 "character from the end of identity"); 128 addr[0] = identity; [all...] |
/external/icu4c/data/xml/rbnf/ |
en.xml | 7 <identity> 12 </identity>
|
mt.xml | 7 <identity> 12 </identity>
|
/external/webkit/WebCore/platform/network/ |
Credential.h | 59 Credential(SecIdentityRef identity, CFArrayRef certificates, CredentialPersistence); 70 SecIdentityRef identity() const;
|
/external/wpa_supplicant/wpa_gui-qt4/ |
userdatarequest.cpp | 72 } else if (strcmp(tmp, "IDENTITY") == 0) 73 queryField->setText("Identity: ");
|
/external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/ |
userdatarequest.cpp | 72 } else if (strcmp(tmp, "IDENTITY") == 0) 73 queryField->setText("Identity: ");
|
/frameworks/base/awt/java/awt/font/ |
TransformAttribute.java | 77 * Checks if this transform is an identity transform. 79 * @return true, if this transform is an identity transform, false
|
/frameworks/base/core/java/android/net/ |
SSLCertificateSocketFactory.java | 67 * must verify the identity of the server you are connected to. 70 * verify the server's identity, allowing man-in-the-middle attacks.</b> 74 * verify the server's identity yourself to ensure a secure connection.</p> 76 * <p>One way to verify the server's identity is to use 186 * @throws SSLPeerUnverifiedException if the server cannot prove its identity 265 * with this method. You MUST verify the server's identity after connecting 279 * with this method. You MUST verify the server's identity after connecting 295 * with this method. You MUST verify the server's identity after connecting
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap.c | 88 * @identity: Identity (User-Name) of the user 89 * @identity_len: Length of identity in bytes 94 * selected based on the specified identity. sm->user and 98 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len, 114 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity, 511 * if (respMethod == IDENTITY) 513 * This is already taken care of by the EAP-Identity method which 514 * stores the identity into sm->identity [all...] |
/frameworks/base/services/java/com/android/server/ |
NotificationManagerService.java | 249 long identity = Binder.clearCallingIdentity(); 254 Binder.restoreCallingIdentity(identity); 257 identity = Binder.clearCallingIdentity(); 262 Binder.restoreCallingIdentity(identity); 281 long identity = Binder.clearCallingIdentity(); 286 Binder.restoreCallingIdentity(identity); 291 identity = Binder.clearCallingIdentity(); 296 Binder.restoreCallingIdentity(identity); 735 long identity = Binder.clearCallingIdentity(); local 740 Binder.restoreCallingIdentity(identity); 743 long identity = Binder.clearCallingIdentity(); local 757 long identity = Binder.clearCallingIdentity(); local 796 long identity = Binder.clearCallingIdentity(); local 865 long identity = Binder.clearCallingIdentity(); local 878 long identity = Binder.clearCallingIdentity(); local 890 long identity = Binder.clearCallingIdentity(); local [all...] |
/dalvik/libcore/crypto/src/main/java/javax/crypto/ |
NullCipher.java | 33 * This class provides an identity cipher that does not transform the input data
|