/external/webkit/WebCore/platform/graphics/transforms/ |
IdentityTransformOperation.h | 41 virtual OperationType getOperationType() const { return IDENTITY; } 42 virtual bool isSameType(const TransformOperation& o) const { return o.getOperationType() == IDENTITY; }
|
TransformOperation.h | 51 IDENTITY, NONE
|
/external/apache-http/src/org/apache/http/entity/ |
ContentLengthStrategy.java | 49 public static final int IDENTITY = -1;
|
/external/apache-http/src/org/apache/http/impl/entity/ |
LaxContentLengthStrategy.java | 71 * than "identity", then the transfer-length is defined by use of the "chunked" transfer- 209 // Currently only chunk and identity are supported 222 return IDENTITY; 230 return IDENTITY; 253 return IDENTITY; 256 return IDENTITY;
|
StrictContentLengthStrategy.java | 67 * than "identity", then the transfer-length is defined by use of the "chunked" transfer- 202 return IDENTITY; 216 return IDENTITY;
|
EntitySerializer.java | 76 } else if (len == ContentLengthStrategy.IDENTITY) {
|
EntityDeserializer.java | 82 } else if (len == ContentLengthStrategy.IDENTITY) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sake.c | 22 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 45 case IDENTITY: 46 return "IDENTITY"; 76 const u8 *identity, *password; local 89 data->state = IDENTITY; 91 identity = eap_get_config_identity(sm, &identity_len); 92 if (identity) { 98 os_memcpy(data->peerid, identity, identity_len); 156 if (data->state != IDENTITY) { 161 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); [all...] |
eap.c | 408 * Handles requests for Identity method and builds a response. 410 SM_STATE(EAP, IDENTITY) 414 SM_ENTRY(EAP, IDENTITY); 634 SM_ENTER(EAP, IDENTITY); 857 * RFC 3748 - 5.1: Identity 865 wpa_hexdump_ascii(MSG_DEBUG, "EAP: EAP-Request Identity data", 897 os_free(conf->identity); 898 conf->identity = os_malloc(1 + imsi_len); 899 if (conf->identity == NULL) { 901 "IMSI-based identity"); 965 const u8 *identity; local [all...] |
/frameworks/base/services/surfaceflinger/ |
Transform.cpp | 94 if (CC_LIKELY(mType == IDENTITY)) 98 if (rhs.mType == IDENTITY) 138 mType = IDENTITY; 184 H.mType |= isZero(w) ? IDENTITY : TRANSLATE; 192 V.mType |= isZero(h) ? IDENTITY : TRANSLATE; 201 R.mType |= isZero(original_w) ? IDENTITY : TRANSLATE; 371 type.append("IDENTITY ");
|
Transform.h | 53 IDENTITY = 0,
|
/external/wpa_supplicant/ |
eap_sake.c | 23 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 46 case IDENTITY: 47 return "IDENTITY"; 94 data->state = IDENTITY; 165 if (data->state != IDENTITY) { 170 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); 177 "AT_ANY_ID_REQ in Request/Identity"); 181 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity"); 212 if (data->state != IDENTITY && data->state != CHALLENGE) { 218 if (data->state == IDENTITY) [all...] |
eap.c | 386 * Handles requests for Identity method and builds a response. 388 SM_STATE(EAP, IDENTITY) 393 SM_ENTRY(EAP, IDENTITY); 639 SM_ENTER(EAP, IDENTITY); 839 * RFC 3748 - 5.1: Identity 847 wpa_hexdump_ascii(MSG_DEBUG, "EAP: EAP-Request Identity data", 878 os_free(ssid->identity); 879 ssid->identity = os_malloc(1 + imsi_len); 880 if (ssid->identity == NULL) { 882 "IMSI-based identity"); 947 const u8 *identity; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sake.c | 23 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 43 case IDENTITY: 44 return "IDENTITY"; 136 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity"); 240 case IDENTITY: 288 if (data->state == IDENTITY && subtype == EAP_SAKE_SUBTYPE_IDENTITY) 312 if (data->state != IDENTITY) 315 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Identity"); 316 /* TODO: update identity and select new user data */
|
eap_aka.c | 41 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 69 case IDENTITY: 70 return "IDENTITY"; 111 data->state = IDENTITY; 145 data->state = IDENTITY; 195 * No EAP-AKA/Identity packets were exchanged - send empty 202 /* Checkcode is SHA1 hash over all EAP-AKA/Identity packets. */ 231 "indicates that AKA/Identity messages were " 243 "that AKA/Identity message were not used, but they " 248 /* Checkcode is SHA1 hash over all EAP-AKA/Identity packets. * 614 const u8 *identity; local 805 const u8 *identity; local 957 const u8 *identity, *id2; local [all...] |
/frameworks/base/core/java/android/net/http/ |
AndroidHttpClientConnection.java | 394 } else if (len == ContentLengthStrategy.IDENTITY) { 427 return ContentLengthStrategy.IDENTITY;
|
Headers.java | 188 transferEncoding = ContentLengthStrategy.IDENTITY; 194 transferEncoding = ContentLengthStrategy.IDENTITY;
|
/prebuilt/common/eclipse/ |
org.eclipse.equinox.common_3.4.0.v20080421-2006.jar | |
/external/webkit/WebCore/platform/graphics/mac/ |
GraphicsLayerCA.mm | 189 case TransformOperation::IDENTITY: [all...] |
/prebuilt/sdk/4/ |
android.jar | |
/prebuilt/sdk/7/ |
android.jar | |
/prebuilt/sdk/8/ |
android.jar | |