HomeSort by relevance Sort by last modified time
    Searched full:identity (Results 301 - 325 of 763) sorted by null

<<11121314151617181920>>

  /frameworks/base/libs/surfaceflinger_client/
Surface.cpp 113 mToken(data.token), mIdentity(data.identity),
232 LOGE("invalid token (%d, identity=%u) or client (%p)",
238 LOGE("cblk is null (surface id=%d, identity=%u)", mToken, mIdentity);
243 LOGE("surface (id=%d, identity=%u) is invalid, err=%d (%s)",
247 uint32_t identity = cblk->getIdentity(mToken); local
248 if (mIdentity != identity) {
249 LOGE("using an invalid surface id=%d, identity=%u should be %d",
250 mToken, mIdentity, identity);
262 uint32_t identity = 0; local
269 identity = control->mIdentity
409 uint32_t identity = cblk->getIdentity(mToken); local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_aka.c 333 * No EAP-AKA/Identity packets were exchanged - send empty
340 /* Checkcode is SHA1/SHA256 hash over all EAP-AKA/Identity packets. */
371 "indicates that AKA/Identity messages were "
383 "indicates that AKA/Identity message were not "
388 /* Checkcode is SHA1/SHA256 hash over all EAP-AKA/Identity packets. */
464 const u8 *identity = NULL; local
470 identity = data->reauth_id;
475 identity = data->pseudonym;
479 identity = eap_get_config_identity(sm, &identity_len);
480 if (identity) {
753 const u8 *identity; local
    [all...]
eap_leap.c 70 const u8 *pos, *challenge, *identity, *password; local
77 identity = eap_get_config_identity(sm, &identity_len);
79 if (identity == NULL || password == NULL)
130 wpabuf_put_data(resp, identity, identity_len);
145 const u8 *identity; local
150 identity = eap_get_config_identity(sm, &identity_len);
151 if (identity == NULL)
180 wpabuf_put_data(resp, identity, identity_len);
eap_wsc.c 71 const u8 *identity; local
85 identity = eap_get_config_identity(sm, &identity_len);
87 if (identity && identity_len == WSC_ID_REGISTRAR_LEN &&
88 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0)
90 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN &&
91 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0)
94 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity",
95 identity, identity_len);
eap.c 408 * Handles requests for Identity method and builds a response.
410 SM_STATE(EAP, IDENTITY)
414 SM_ENTRY(EAP, IDENTITY);
634 SM_ENTER(EAP, IDENTITY);
857 * RFC 3748 - 5.1: Identity
865 wpa_hexdump_ascii(MSG_DEBUG, "EAP: EAP-Request Identity data",
897 os_free(conf->identity);
898 conf->identity = os_malloc(1 + imsi_len);
899 if (conf->identity == NULL) {
901 "IMSI-based identity");
965 const u8 *identity; local
    [all...]
eap_sim.c 353 const u8 *identity = NULL; local
359 identity = data->reauth_id;
364 identity = data->pseudonym;
368 identity = eap_get_config_identity(sm, &identity_len);
369 if (identity) {
391 if (identity) {
393 identity, identity_len);
395 identity, identity_len);
577 const u8 *identity; local
630 identity = data->last_eap_identity
    [all...]
  /external/wpa_supplicant/
eap_aka.c 244 const u8 *identity = NULL; local
250 identity = data->reauth_id;
255 identity = data->pseudonym;
259 identity = eap_get_config_identity(sm, &identity_len);
260 if (identity) {
268 wpa_printf(MSG_DEBUG, "Generating EAP-AKA Identity (id=%d)",
273 if (identity) {
275 identity, identity_len);
277 identity, identity_len);
387 wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Identity");
428 const u8 *identity; local
    [all...]
eap_leap.c 72 const u8 *pos, *challenge, *identity, *password; local
78 identity = eap_get_config_identity(sm, &identity_len);
80 if (identity == NULL || password == NULL)
131 os_memcpy(rpos, identity, identity_len);
147 const u8 *identity; local
152 identity = eap_get_config_identity(sm, &identity_len);
153 if (identity == NULL)
184 os_memcpy(pos, identity, identity_len);
eap_sim.c 255 const u8 *identity = NULL; local
261 identity = data->reauth_id;
266 identity = data->pseudonym;
270 identity = eap_get_config_identity(sm, &identity_len);
271 if (identity) {
294 if (identity) {
296 identity, identity_len);
298 identity, identity_len);
485 const u8 *identity; local
538 identity = data->last_eap_identity
    [all...]
eap.c 386 * Handles requests for Identity method and builds a response.
388 SM_STATE(EAP, IDENTITY)
393 SM_ENTRY(EAP, IDENTITY);
639 SM_ENTER(EAP, IDENTITY);
839 * RFC 3748 - 5.1: Identity
847 wpa_hexdump_ascii(MSG_DEBUG, "EAP: EAP-Request Identity data",
878 os_free(ssid->identity);
879 ssid->identity = os_malloc(1 + imsi_len);
880 if (ssid->identity == NULL) {
882 "IMSI-based identity");
947 const u8 *identity; local
    [all...]
wpa_supplicant.conf 294 # identity: Identity string for EAP
295 # anonymous_identity: Anonymous identity string for EAP (to be used as the
296 # unencrypted identity with EAP types that support different tunnelled
297 # identity, e.g., EAP-TTLS)
475 # identity="user@example.com"
489 # identity="user@example.com"
497 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
498 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
503 # identity="user@example.com
    [all...]
  /external/skia/tests/
MatrixTest.cpp 25 SkMatrix identity; local
26 identity.reset();
27 return nearly_equal(m, identity);
  /frameworks/base/core/java/android/view/animation/
Transformation.java 30 * Indicates a transformation that has no effect (alpha = 1 and identity matrix.)
34 * Indicates a transformation that applies an alpha only (uses an identity matrix.)
51 * Creates a new transformation with alpha = 1 and the identity matrix.
  /frameworks/base/include/private/surfaceflinger/
SharedBufferStack.h 94 void init(int32_t identity);
108 int32_t identity; // surface's identity (const) member in class:android::SharedBufferStack
143 int32_t identity);
186 (stack.identity == mIdentity) &&
195 LOGE("waitForCondition(%s) timed out (identity=%d), "
198 stack.identity);
202 "(identity=%d, status=%d). "
204 stack.identity, stack.status);
213 return (stack.identity != mIdentity) ? status_t(BAD_INDEX) : stack.status
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.c 33 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
42 addr[0] = identity;
55 /* MK = SHA1(Identity|n*Kc|NONCE_MT|Version List|Selected Version) */
61 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
67 addr[0] = identity;
74 /* MK = SHA1(Identity|IK|CK) */
113 const u8 *identity, size_t identity_len,
123 while (identity_len > 0 && identity[identity_len - 1] == 0) {
125 "character from the end of identity");
128 addr[0] = identity;
    [all...]
  /external/icu4c/data/xml/rbnf/
en.xml 7 <identity>
12 </identity>
mt.xml 7 <identity>
12 </identity>
  /external/webkit/WebCore/platform/network/
Credential.h 59 Credential(SecIdentityRef identity, CFArrayRef certificates, CredentialPersistence);
70 SecIdentityRef identity() const;
  /external/wpa_supplicant/wpa_gui-qt4/
userdatarequest.cpp 72 } else if (strcmp(tmp, "IDENTITY") == 0)
73 queryField->setText("Identity: ");
  /external/wpa_supplicant_6/wpa_supplicant/wpa_gui-qt4/
userdatarequest.cpp 72 } else if (strcmp(tmp, "IDENTITY") == 0)
73 queryField->setText("Identity: ");
  /frameworks/base/awt/java/awt/font/
TransformAttribute.java 77 * Checks if this transform is an identity transform.
79 * @return true, if this transform is an identity transform, false
  /frameworks/base/core/java/android/net/
SSLCertificateSocketFactory.java 67 * must verify the identity of the server you are connected to.
70 * verify the server's identity, allowing man-in-the-middle attacks.</b>
74 * verify the server's identity yourself to ensure a secure connection.</p>
76 * <p>One way to verify the server's identity is to use
186 * @throws SSLPeerUnverifiedException if the server cannot prove its identity
265 * with this method. You MUST verify the server's identity after connecting
279 * with this method. You MUST verify the server's identity after connecting
295 * with this method. You MUST verify the server's identity after connecting
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap.c 88 * @identity: Identity (User-Name) of the user
89 * @identity_len: Length of identity in bytes
94 * selected based on the specified identity. sm->user and
98 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
114 if (sm->eapol_cb->get_eap_user(sm->eapol_ctx, identity,
511 * if (respMethod == IDENTITY)
513 * This is already taken care of by the EAP-Identity method which
514 * stores the identity into sm->identity
    [all...]
  /frameworks/base/services/java/com/android/server/
NotificationManagerService.java 249 long identity = Binder.clearCallingIdentity();
254 Binder.restoreCallingIdentity(identity);
257 identity = Binder.clearCallingIdentity();
262 Binder.restoreCallingIdentity(identity);
281 long identity = Binder.clearCallingIdentity();
286 Binder.restoreCallingIdentity(identity);
291 identity = Binder.clearCallingIdentity();
296 Binder.restoreCallingIdentity(identity);
735 long identity = Binder.clearCallingIdentity(); local
740 Binder.restoreCallingIdentity(identity);
743 long identity = Binder.clearCallingIdentity(); local
757 long identity = Binder.clearCallingIdentity(); local
796 long identity = Binder.clearCallingIdentity(); local
865 long identity = Binder.clearCallingIdentity(); local
878 long identity = Binder.clearCallingIdentity(); local
890 long identity = Binder.clearCallingIdentity(); local
    [all...]
  /dalvik/libcore/crypto/src/main/java/javax/crypto/
NullCipher.java 33 * This class provides an identity cipher that does not transform the input data

Completed in 786 milliseconds

<<11121314151617181920>>