/dalvik/libcore/x-net/src/main/java/javax/net/ssl/ |
HttpsURLConnection.java | 121 * the local identity certificate followed by CAs, or {@code null} 133 * identity certificate followed by CAs. 135 * if the identity of the peer has not been verified.. 146 * if the identity of the peer has not been verified.
|
SSLPeerUnverifiedException.java | 21 * The exception that is thrown when the identity of a peer has not beed
|
/external/wpa_supplicant_6/wpa_supplicant/examples/ |
openCryptoki.conf | 26 identity="User"
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius_server.h | 38 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
link_test.c | 73 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity,
|
/external/wpa_supplicant/ |
eap_sake.c | 23 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 46 case IDENTITY: 47 return "IDENTITY"; 94 data->state = IDENTITY; 165 if (data->state != IDENTITY) { 170 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); 177 "AT_ANY_ID_REQ in Request/Identity"); 181 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity"); 212 if (data->state != IDENTITY && data->state != CHALLENGE) { 218 if (data->state == IDENTITY) [all...] |
eap_sim_common.c | 31 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 40 addr[0] = identity; 53 /* MK = SHA1(Identity|n*Kc|NONCE_MT|Version List|Selected Version) */ 59 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 65 addr[0] = identity; 72 /* MK = SHA1(Identity|IK|CK) */ 111 const u8 *identity, size_t identity_len, 121 while (identity_len > 0 && identity[identity_len - 1] == 0) { 123 "character from the end of identity"); 126 addr[0] = identity; [all...] |
/external/webkit/WebCore/platform/network/mac/ |
AuthenticationMac.mm | 234 return [[[NSURLCredential alloc] initWithIdentity:coreCredential.identity() 320 SecIdentityRef identity = [macCredential identity]; 321 if (identity) 322 return Credential(identity, (CFArrayRef)[macCredential certificates], persistence);
|
/dalvik/libcore/xml/src/main/java/org/apache/xml/dtm/ref/sax2dtm/ |
SAX2DTM.java | 211 * @param dtmIdentity The DTM identity ID for this DTM. 234 * @param dtmIdentity The DTM identity ID for this DTM. 303 * Get the data or qualified name for the given node identity. 305 * @param identity The node identity. 309 protected int _dataOrQName(int identity) 312 if (identity < m_size) 313 return m_dataOrQName.elementAt(identity); 324 else if (identity < m_size) 325 return m_dataOrQName.elementAt(identity); 504 int identity = makeNodeIdentity(nodeHandle); local 1001 int identity = makeNodeIdentity(nodeHandle); local 1140 int identity = makeNodeIdentity(nodeHandle); local 1250 int identity = makeNodeIdentity(nodeHandle); local 1325 int identity = makeNodeIdentity(nodeHandle); local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_fast.c | 66 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data 136 u8 *identity = NULL; local 219 identity = pos + 2; 234 if (identity) { 235 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: Identity from " 236 "PAC-Opaque", identity, identity_len); 237 os_free(data->identity); 238 data->identity = os_malloc(identity_len); 239 if (data->identity) { 240 os_memcpy(data->identity, identity, identity_len) [all...] |
eap_wsc.c | 88 if (sm->identity && sm->identity_len == WSC_ID_REGISTRAR_LEN && 89 os_memcmp(sm->identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 92 else if (sm->identity && sm->identity_len == WSC_ID_ENROLLEE_LEN && 93 os_memcmp(sm->identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) 97 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity", 98 sm->identity, sm->identity_len);
|
/external/dbus/dbus/ |
dbus-auth.c | 161 DBusString identity; /**< Current identity we're authorizing member in struct:DBusAuth 171 DBusCredentials desired_identity; /**< Identity client has requested */ 356 if (!_dbus_string_init (&auth->identity)) 376 _dbus_string_free (&auth->identity); 391 _dbus_string_set_length (&auth->identity, 0); 501 if (_dbus_string_get_length (&auth->identity) > 0) 504 _dbus_verbose ("%s: client tried to send auth identity, but we already have one\n", 510 /* this is our auth identity */ 511 if (!_dbus_string_copy (data, 0, &auth->identity, 0) [all...] |
/external/webkit/WebCore/platform/graphics/chromium/ |
TransparencyWin.cpp | 314 // so it's maintained. We know the new layer has the identity 325 // We now have a new layer with the identity transform, which is the 348 // It will have the scaled size, and an identity transform loaded. 445 SkMatrix identity; local 446 identity.reset(); 447 destCanvas->setMatrix(identity); 487 SkMatrix identity; local 488 identity.reset(); 489 destCanvas->setMatrix(identity);
|
/frameworks/base/core/java/android/os/ |
Binder.java | 60 * system services to determine its identity and check permissions. 69 * higher-level system services to determine its identity and check 76 * Reset the identity of the incoming IPC on the current thread. This can 84 * original calling identity by passing it to 94 * Restore the identity of the incoming IPC on the current thread 95 * back to a previously identity that was returned by {@link
|
/external/icu4c/data/xml/rbnf/ |
ga.xml | 7 <identity> 11 </identity>
|
/frameworks/base/services/java/com/android/server/am/ |
ReceiverList.java | 56 // Want object identity, not the array identity we are inheriting.
|
/hardware/ti/wlan/wl1271/stad/src/Connection_Managment/ |
rsn.h | 111 char id[RSN_MAX_IDENTITY_LEN]; /**< User identity string */ 112 TI_UINT8 idLength; /**< User identity string length */
|
/system/wlan/ti/wilink_6_1/stad/src/Connection_Managment/ |
rsn.h | 109 char id[RSN_MAX_IDENTITY_LEN]; /**< User identity string */ 110 TI_UINT8 idLength; /**< User identity string length */
|
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_supplicant.conf | 354 # identity: Identity string for EAP 357 # anonymous_identity: Anonymous identity string for EAP (to be used as the 358 # unencrypted identity with EAP types that support different tunnelled 359 # identity, e.g., EAP-TTLS) 558 identity="user@example.com" 572 identity="user@example.com" 580 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the 581 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel. 586 identity="user@example.com [all...] |
/external/icu4c/common/ |
servnotf.cpp | 83 // identity equality check
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_attr_process.c | 222 const u8 *identity, 225 if (identity == NULL) 228 wpa_hexdump_ascii(MSG_DEBUG, "WPS: EAP Identity", 229 identity, identity_len);
|
/frameworks/base/services/java/com/android/server/ |
VibratorService.java | 150 long identity = Binder.clearCallingIdentity(); local 190 Binder.restoreCallingIdentity(identity); 200 long identity = Binder.clearCallingIdentity(); local 211 Binder.restoreCallingIdentity(identity);
|
/hardware/ti/wlan/wl1271/CUDK/configurationutility/inc/ |
wpa_core.h | 64 S32 WpaCore_SetCredentials(THandle hWpaCore, PU8 Identity, PU8 Passward);
|
/packages/apps/Gallery/src/com/android/camera/ |
RotateBitmap.java | 54 // By default this is an identity matrix.
|
/packages/apps/Gallery3D/src/com/cooliris/media/ |
RotateBitmap.java | 54 // By default this is an identity matrix.
|