/external/clang/test/CodeCompletion/Inputs/ |
macros.h | 3 #define IDENTITY(X) X
|
/external/webkit/Source/WebCore/platform/graphics/transforms/ |
IdentityTransformOperation.h | 41 virtual OperationType getOperationType() const { return IDENTITY; } 42 virtual bool isSameType(const TransformOperation& o) const { return o.getOperationType() == IDENTITY; }
|
TransformOperation.h | 51 IDENTITY, NONE
|
/external/apache-http/src/org/apache/http/entity/ |
ContentLengthStrategy.java | 49 public static final int IDENTITY = -1;
|
/external/clang/test/CodeCompletion/ |
macros.c | 12 switch (p->IDENTITY(color)) { 31 // CC2: IDENTITY(<#X#>)
|
/external/apache-http/src/org/apache/http/impl/entity/ |
LaxContentLengthStrategy.java | 71 * than "identity", then the transfer-length is defined by use of the "chunked" transfer- 209 // Currently only chunk and identity are supported 222 return IDENTITY; 230 return IDENTITY; 253 return IDENTITY; 256 return IDENTITY;
|
StrictContentLengthStrategy.java | 67 * than "identity", then the transfer-length is defined by use of the "chunked" transfer- 202 return IDENTITY; 216 return IDENTITY;
|
EntitySerializer.java | 76 } else if (len == ContentLengthStrategy.IDENTITY) {
|
EntityDeserializer.java | 82 } else if (len == ContentLengthStrategy.IDENTITY) {
|
/frameworks/base/services/surfaceflinger/ |
Transform.cpp | 59 if (CC_LIKELY(mType == IDENTITY)) 63 if (rhs.mType == IDENTITY) 103 mType = IDENTITY; 149 H.mType |= isZero(w) ? IDENTITY : TRANSLATE; 157 V.mType |= isZero(h) ? IDENTITY : TRANSLATE; 166 R.mType |= isZero(original_w) ? IDENTITY : TRANSLATE; 339 type.append("IDENTITY ");
|
Transform.h | 53 IDENTITY = 0,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sake.c | 22 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 45 case IDENTITY: 46 return "IDENTITY"; 76 const u8 *identity, *password; local 89 data->state = IDENTITY; 91 identity = eap_get_config_identity(sm, &identity_len); 92 if (identity) { 98 os_memcpy(data->peerid, identity, identity_len); 156 if (data->state != IDENTITY) { 161 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); [all...] |
eap.c | 408 * Handles requests for Identity method and builds a response. 410 SM_STATE(EAP, IDENTITY) 414 SM_ENTRY(EAP, IDENTITY); 634 SM_ENTER(EAP, IDENTITY); 857 * RFC 3748 - 5.1: Identity 865 wpa_hexdump_ascii(MSG_DEBUG, "EAP: EAP-Request Identity data", 897 os_free(conf->identity); 898 conf->identity = os_malloc(1 + imsi_len); 899 if (conf->identity == NULL) { 901 "IMSI-based identity"); 965 const u8 *identity; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 23 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 46 case IDENTITY: 47 return "IDENTITY"; 77 const u8 *identity, *password; local 90 data->state = IDENTITY; 92 identity = eap_get_config_identity(sm, &identity_len); 93 if (identity) { 99 os_memcpy(data->peerid, identity, identity_len); 157 if (data->state != IDENTITY) { 162 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); [all...] |
eap.c | 417 * Handles requests for Identity method and builds a response. 419 SM_STATE(EAP, IDENTITY) 423 SM_ENTRY(EAP, IDENTITY); 643 SM_ENTER(EAP, IDENTITY); 866 * RFC 3748 - 5.1: Identity 874 wpa_hexdump_ascii(MSG_DEBUG, "EAP: EAP-Request Identity data", 906 os_free(conf->identity); 907 conf->identity = os_malloc(1 + imsi_len); 908 if (conf->identity == NULL) { 910 "IMSI-based identity"); 974 const u8 *identity; local [all...] |
/external/wpa_supplicant/ |
eap_sake.c | 23 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 46 case IDENTITY: 47 return "IDENTITY"; 94 data->state = IDENTITY; 165 if (data->state != IDENTITY) { 170 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Request/Identity"); 177 "AT_ANY_ID_REQ in Request/Identity"); 181 wpa_printf(MSG_DEBUG, "EAP-SAKE: Sending Response/Identity"); 212 if (data->state != IDENTITY && data->state != CHALLENGE) { 218 if (data->state == IDENTITY) [all...] |
eap.c | 386 * Handles requests for Identity method and builds a response. 388 SM_STATE(EAP, IDENTITY) 393 SM_ENTRY(EAP, IDENTITY); 639 SM_ENTER(EAP, IDENTITY); 839 * RFC 3748 - 5.1: Identity 847 wpa_hexdump_ascii(MSG_DEBUG, "EAP: EAP-Request Identity data", 878 os_free(ssid->identity); 879 ssid->identity = os_malloc(1 + imsi_len); 880 if (ssid->identity == NULL) { 882 "IMSI-based identity"); 947 const u8 *identity; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sake.c | 23 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 43 case IDENTITY: 44 return "IDENTITY"; 136 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity"); 240 case IDENTITY: 288 if (data->state == IDENTITY && subtype == EAP_SAKE_SUBTYPE_IDENTITY) 312 if (data->state != IDENTITY) 315 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Identity"); 316 /* TODO: update identity and select new user data */
|
eap_aka.c | 41 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 69 case IDENTITY: 70 return "IDENTITY"; 111 data->state = IDENTITY; 145 data->state = IDENTITY; 195 * No EAP-AKA/Identity packets were exchanged - send empty 202 /* Checkcode is SHA1 hash over all EAP-AKA/Identity packets. */ 231 "indicates that AKA/Identity messages were " 243 "that AKA/Identity message were not used, but they " 248 /* Checkcode is SHA1 hash over all EAP-AKA/Identity packets. * 614 const u8 *identity; local 805 const u8 *identity; local 957 const u8 *identity, *id2; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sake.c | 24 enum { IDENTITY, CHALLENGE, CONFIRM, SUCCESS, FAILURE } state; 44 case IDENTITY: 45 return "IDENTITY"; 137 wpa_printf(MSG_DEBUG, "EAP-SAKE: Request/Identity"); 241 case IDENTITY: 289 if (data->state == IDENTITY && subtype == EAP_SAKE_SUBTYPE_IDENTITY) 313 if (data->state != IDENTITY) 316 wpa_printf(MSG_DEBUG, "EAP-SAKE: Received Response/Identity"); 317 /* TODO: update identity and select new user data */
|
eap_server_aka.c | 41 IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE 69 case IDENTITY: 70 return "IDENTITY"; 111 data->state = IDENTITY; 145 data->state = IDENTITY; 195 * No EAP-AKA/Identity packets were exchanged - send empty 202 /* Checkcode is SHA1 hash over all EAP-AKA/Identity packets. */ 231 "indicates that AKA/Identity messages were " 243 "that AKA/Identity message were not used, but they " 248 /* Checkcode is SHA1 hash over all EAP-AKA/Identity packets. * 614 const u8 *identity; local 805 const u8 *identity; local 957 const u8 *identity, *id2; local [all...] |
/frameworks/base/core/java/android/net/http/ |
AndroidHttpClientConnection.java | 394 } else if (len == ContentLengthStrategy.IDENTITY) { 427 return ContentLengthStrategy.IDENTITY;
|
Headers.java | 187 transferEncoding = ContentLengthStrategy.IDENTITY; 193 transferEncoding = ContentLengthStrategy.IDENTITY;
|
/external/opencv/ml/src/ |
mlann_mlp.cpp | 405 case IDENTITY: 426 if( activ_func == IDENTITY ) 485 if( activ_func == IDENTITY ) [all...] |
/external/webkit/Source/WebCore/platform/graphics/ca/ |
GraphicsLayerCA.cpp | 78 case TransformOperation::IDENTITY: 165 case TransformOperation::IDENTITY: [all...] |