HomeSort by relevance Sort by last modified time
    Searched full:identity (Results 326 - 350 of 763) sorted by null

<<11121314151617181920>>

  /dalvik/libcore/x-net/src/main/java/javax/net/ssl/
HttpsURLConnection.java 121 * the local identity certificate followed by CAs, or {@code null}
133 * identity certificate followed by CAs.
135 * if the identity of the peer has not been verified..
146 * if the identity of the peer has not been verified.
SSLPeerUnverifiedException.java 21 * The exception that is thrown when the identity of a peer has not beed
  /external/wpa_supplicant_6/wpa_supplicant/examples/
openCryptoki.conf 26 identity="User"
  /external/wpa_supplicant_6/wpa_supplicant/src/radius/
radius_server.h 38 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
  /external/wpa_supplicant_6/wpa_supplicant/tests/
link_test.c 73 hostapd_get_eap_user(const struct hostapd_bss_config *conf, const u8 *identity,
  /external/wpa_supplicant/
eap_sake.c 23 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state;
46 case IDENTITY:
47 return "IDENTITY";
94 data->state = IDENTITY;
165 if (data->state != IDENTITY) {
170 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity");
177 "AT_ANY_ID_REQ in Request/Identity");
181 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity");
212 if (data->state != IDENTITY && data->state != CHALLENGE) {
218 if (data->state == IDENTITY)
    [all...]
eap_sim_common.c 31 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
40 addr[0] = identity;
53 /* MK = SHA1(Identity|n*Kc|NONCE_MT|Version List|Selected Version) */
59 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
65 addr[0] = identity;
72 /* MK = SHA1(Identity|IK|CK) */
111 const u8 *identity, size_t identity_len,
121 while (identity_len > 0 && identity[identity_len - 1] == 0) {
123 "character from the end of identity");
126 addr[0] = identity;
    [all...]
  /external/webkit/WebCore/platform/network/mac/
AuthenticationMac.mm 234 return [[[NSURLCredential alloc] initWithIdentity:coreCredential.identity()
320 SecIdentityRef identity = [macCredential identity];
321 if (identity)
322 return Credential(identity, (CFArrayRef)[macCredential certificates], persistence);
  /dalvik/libcore/xml/src/main/java/org/apache/xml/dtm/ref/sax2dtm/
SAX2DTM.java 211 * @param dtmIdentity The DTM identity ID for this DTM.
234 * @param dtmIdentity The DTM identity ID for this DTM.
303 * Get the data or qualified name for the given node identity.
305 * @param identity The node identity.
309 protected int _dataOrQName(int identity)
312 if (identity < m_size)
313 return m_dataOrQName.elementAt(identity);
324 else if (identity < m_size)
325 return m_dataOrQName.elementAt(identity);
504 int identity = makeNodeIdentity(nodeHandle); local
1001 int identity = makeNodeIdentity(nodeHandle); local
1140 int identity = makeNodeIdentity(nodeHandle); local
1250 int identity = makeNodeIdentity(nodeHandle); local
1325 int identity = makeNodeIdentity(nodeHandle); local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_fast.c 66 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data
136 u8 *identity = NULL; local
219 identity = pos + 2;
234 if (identity) {
235 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: Identity from "
236 "PAC-Opaque", identity, identity_len);
237 os_free(data->identity);
238 data->identity = os_malloc(identity_len);
239 if (data->identity) {
240 os_memcpy(data->identity, identity, identity_len)
    [all...]
eap_wsc.c 88 if (sm->identity && sm->identity_len == WSC_ID_REGISTRAR_LEN &&
89 os_memcmp(sm->identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) ==
92 else if (sm->identity && sm->identity_len == WSC_ID_ENROLLEE_LEN &&
93 os_memcmp(sm->identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN)
97 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity",
98 sm->identity, sm->identity_len);
  /external/dbus/dbus/
dbus-auth.c 161 DBusString identity; /**< Current identity we're authorizing member in struct:DBusAuth
171 DBusCredentials desired_identity; /**< Identity client has requested */
356 if (!_dbus_string_init (&auth->identity))
376 _dbus_string_free (&auth->identity);
391 _dbus_string_set_length (&auth->identity, 0);
501 if (_dbus_string_get_length (&auth->identity) > 0)
504 _dbus_verbose ("%s: client tried to send auth identity, but we already have one\n",
510 /* this is our auth identity */
511 if (!_dbus_string_copy (data, 0, &auth->identity, 0)
    [all...]
  /external/webkit/WebCore/platform/graphics/chromium/
TransparencyWin.cpp 314 // so it's maintained. We know the new layer has the identity
325 // We now have a new layer with the identity transform, which is the
348 // It will have the scaled size, and an identity transform loaded.
445 SkMatrix identity; local
446 identity.reset();
447 destCanvas->setMatrix(identity);
487 SkMatrix identity; local
488 identity.reset();
489 destCanvas->setMatrix(identity);
  /frameworks/base/core/java/android/os/
Binder.java 60 * system services to determine its identity and check permissions.
69 * higher-level system services to determine its identity and check
76 * Reset the identity of the incoming IPC on the current thread. This can
84 * original calling identity by passing it to
94 * Restore the identity of the incoming IPC on the current thread
95 * back to a previously identity that was returned by {@link
  /external/icu4c/data/xml/rbnf/
ga.xml 7 <identity>
11 </identity>
  /frameworks/base/services/java/com/android/server/am/
ReceiverList.java 56 // Want object identity, not the array identity we are inheriting.
  /hardware/ti/wlan/wl1271/stad/src/Connection_Managment/
rsn.h 111 char id[RSN_MAX_IDENTITY_LEN]; /**< User identity string */
112 TI_UINT8 idLength; /**< User identity string length */
  /system/wlan/ti/wilink_6_1/stad/src/Connection_Managment/
rsn.h 109 char id[RSN_MAX_IDENTITY_LEN]; /**< User identity string */
110 TI_UINT8 idLength; /**< User identity string length */
  /external/wpa_supplicant_6/wpa_supplicant/
wpa_supplicant.conf 354 # identity: Identity string for EAP
357 # anonymous_identity: Anonymous identity string for EAP (to be used as the
358 # unencrypted identity with EAP types that support different tunnelled
359 # identity, e.g., EAP-TTLS)
558 identity="user@example.com"
572 identity="user@example.com"
580 # EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the
581 # unencrypted use. Real identity is sent only within an encrypted TLS tunnel.
586 identity="user@example.com
    [all...]
  /external/icu4c/common/
servnotf.cpp 83 // identity equality check
  /external/wpa_supplicant_6/wpa_supplicant/src/wps/
wps_attr_process.c 222 const u8 *identity,
225 if (identity == NULL)
228 wpa_hexdump_ascii(MSG_DEBUG, "WPS: EAP Identity",
229 identity, identity_len);
  /frameworks/base/services/java/com/android/server/
VibratorService.java 150 long identity = Binder.clearCallingIdentity(); local
190 Binder.restoreCallingIdentity(identity);
200 long identity = Binder.clearCallingIdentity(); local
211 Binder.restoreCallingIdentity(identity);
  /hardware/ti/wlan/wl1271/CUDK/configurationutility/inc/
wpa_core.h 64 S32 WpaCore_SetCredentials(THandle hWpaCore, PU8 Identity, PU8 Passward);
  /packages/apps/Gallery/src/com/android/camera/
RotateBitmap.java 54 // By default this is an identity matrix.
  /packages/apps/Gallery3D/src/com/cooliris/media/
RotateBitmap.java 54 // By default this is an identity matrix.

Completed in 3274 milliseconds

<<11121314151617181920>>