/external/valgrind/main/helgrind/tests/ |
tc24_nonzero_sem.c | 49 static sem_t* my_sem_init (char* identity, int pshared, unsigned count) 64 sprintf(name, "anonsem_%s_pid%d", identity, (int)getpid());
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_leap.c | 70 const u8 *pos, *challenge, *identity, *password; local 77 identity = eap_get_config_identity(sm, &identity_len); 79 if (identity == NULL || password == NULL) 130 wpabuf_put_data(resp, identity, identity_len); 145 const u8 *identity; local 150 identity = eap_get_config_identity(sm, &identity_len); 151 if (identity == NULL) 180 wpabuf_put_data(resp, identity, identity_len);
|
eap.c | 408 * Handles requests for Identity method and builds a response. 410 SM_STATE(EAP, IDENTITY) 414 SM_ENTRY(EAP, IDENTITY); 634 SM_ENTER(EAP, IDENTITY); 857 * RFC 3748 - 5.1: Identity 865 wpa_hexdump_ascii(MSG_DEBUG, "EAP: EAP-Request Identity data", 897 os_free(conf->identity); 898 conf->identity = os_malloc(1 + imsi_len); 899 if (conf->identity == NULL) { 901 "IMSI-based identity"); 965 const u8 *identity; local [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.h | 62 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len, 81 const char *identity, const char *radius_cui);
|
/external/chromium/chrome/common/extensions/docs/examples/apps/hello-php/lib/lightopenid/ |
openid.php | 12 * $openid->identity = 'ID supplied by user'; 52 private $identity, $claimed_id; 82 case 'identity': 104 case 'identity': 105 # We return claimed_id instead of identity, 107 # i.e. what he set as identity, not the op-local identifier (which is what we verify) 175 * @param $url Identity URL. 181 if (!$url) throw new ErrorException('No identity supplied.'); 229 if (isset($delegate[2])) $this->identity = trim($delegate[2]); 251 if (isset($delegate[1])) $this->identity = $delegate[1] 294 $this->identity = $delegate; variable [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.c | 384 const u8 *identity; local 391 identity = eap_get_identity(sm->eap, &identity_len); 392 if (identity == NULL) 395 /* Save station identity for future RADIUS packets */ 396 os_free(sm->identity); 397 sm->identity = os_malloc(identity_len + 1); 398 if (sm->identity == NULL) { 403 os_memcpy(sm->identity, identity, identity_len); 405 sm->identity[identity_len] = '\0' 1249 u8 *buf, *identity; local 1632 const u8 *identity; local [all...] |
/external/clang/test/CXX/temp/temp.decls/temp.variadic/ |
p4.cpp | 7 struct identity { struct 165 extract_nested_types<identity<int>, identity<float> >::types *t_int_float_2
|
/external/skia/tests/ |
Matrix44Test.cpp | 62 SkMatrix44 identity; local 63 identity.reset(); 64 return nearly_equal(m, identity);
|
MatrixTest.cpp | 36 SkMatrix identity; local 37 identity.reset(); 38 return nearly_equal(m, identity); 61 SkMatrix identity; local 62 identity.reset(); 63 REPORTER_ASSERT(reporter, SK_Scalar1 == identity.getMaxStretch());
|
/external/webkit/Source/WebCore/platform/graphics/chromium/ |
TransparencyWin.cpp | 314 // so it's maintained. We know the new layer has the identity 325 // We now have a new layer with the identity transform, which is the 348 // It will have the scaled size, and an identity transform loaded. 445 SkMatrix identity; local 446 identity.reset(); 447 destCanvas->setMatrix(identity); 487 SkMatrix identity; local 488 identity.reset(); 489 destCanvas->setMatrix(identity);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_fast.c | 61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data 131 u8 *identity = NULL; local 214 identity = pos + 2; 229 if (identity) { 230 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: Identity from " 231 "PAC-Opaque", identity, identity_len); 232 os_free(data->identity); 233 data->identity = os_malloc(identity_len); 234 if (data->identity) { 235 os_memcpy(data->identity, identity, identity_len) [all...] |
eap_i.h | 145 u8 *identity; member in struct:eap_sm 147 /* Whether Phase 2 method should validate identity match */ 193 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
AccessPointParserHelper.java | 48 * security, eap, phase2, identity, password, anonymousidentity, cacert, usercert, 60 * <identity>donut</identity</identity> 115 boolean identity = false; 145 if (tagName.equalsIgnoreCase("identity")) { 146 identity = true; 221 config.identity.setValue(""); 268 if (identity) { 270 config.identity.setValue(identityValue) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_i.h | 151 u8 *identity; member in struct:eap_sm 153 /* Whether Phase 2 method should validate identity match */ 190 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
eap_fast.c | 66 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data 136 u8 *identity = NULL; local 219 identity = pos + 2; 234 if (identity) { 235 wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: Identity from " 236 "PAC-Opaque", identity, identity_len); 237 os_free(data->identity); 238 data->identity = os_malloc(identity_len); 239 if (data->identity) { 240 os_memcpy(data->identity, identity, identity_len) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_leap.c | 65 const u8 *pos, *challenge, *identity, *password; local 72 identity = eap_get_config_identity(sm, &identity_len); 74 if (identity == NULL || password == NULL) 125 wpabuf_put_data(resp, identity, identity_len); 140 const u8 *identity; local 145 identity = eap_get_config_identity(sm, &identity_len); 146 if (identity == NULL) 175 wpabuf_put_data(resp, identity, identity_len);
|
eap_sim.c | 299 const u8 *identity = NULL; local 309 /* Look for the realm of the permanent identity */ 310 identity = eap_get_config_identity(sm, &identity_len); 311 if (identity) { 312 for (realm = identity, realm_len = identity_len; 380 const u8 *identity = NULL; local 386 identity = data->reauth_id; 391 identity = data->pseudonym; 395 identity = eap_get_config_identity(sm, &identity_len); 396 if (identity) { 605 const u8 *identity; local [all...] |
/frameworks/native/libs/gui/ |
ISurfaceComposerClient.cpp | 119 identity = parcel.readInt32(); 126 parcel->writeInt32(identity);
|
/external/apache-xml/src/main/java/org/apache/xml/dtm/ref/dom2dtm/ |
DOM2DTM.java | 111 * @param dtmIdentity The DTM identity ID for this DTM. 180 * @return The index identity of the node that was added. 187 // Have we overflowed a DTM Identity's addressing range? 607 int identity = makeNodeIdentity(nodeHandle); local 609 return (Node) m_nodes.elementAt(identity); 613 * Get a Node from an identity index. 625 * Get the next node identity value in the list, and call the iterator 628 * @param identity The node identity (index). 629 * @return identity+1, or DTM.NULL 765 int identity = makeNodeIdentity(nodeHandle); local 1360 int identity = m_nodes.size()-1; local [all...] |
/frameworks/base/services/java/com/android/server/ |
NotificationManagerService.java | 413 long identity = Binder.clearCallingIdentity(); 421 Binder.restoreCallingIdentity(identity); 424 identity = Binder.clearCallingIdentity(); 428 Binder.restoreCallingIdentity(identity); 461 long identity = Binder.clearCallingIdentity(); 469 Binder.restoreCallingIdentity(identity); 474 identity = Binder.clearCallingIdentity(); 478 Binder.restoreCallingIdentity(identity); 1007 long identity = Binder.clearCallingIdentity(); local 1015 long identity = Binder.clearCallingIdentity(); local 1033 long identity = Binder.clearCallingIdentity(); local 1075 final long identity = Binder.clearCallingIdentity(); local 1169 long identity = Binder.clearCallingIdentity(); local 1182 final long identity = Binder.clearCallingIdentity(); local 1197 long identity = Binder.clearCallingIdentity(); local [all...] |
/external/chromium/third_party/libjingle/source/talk/base/ |
opensslstreamadapter.h | 77 virtual void SetIdentity(SSLIdentity* identity);
|
/external/chromium/third_party/libjingle/source/talk/session/tunnel/ |
securetunnelsessionclient.cc | 83 void SecureTunnelSessionClient::SetIdentity(talk_base::SSLIdentity* identity) { 85 identity_.reset(identity); 105 LOG(LS_ERROR) << "Failed to generate SSL identity"; 317 talk_base::SSLIdentity* identity = local 320 ssl_stream->SetIdentity(identity);
|
securetunnelsessionclient.h | 67 // The client takes ownership of the identity object. 69 void SetIdentity(talk_base::SSLIdentity* identity); 71 // Generates an identity from nothing. 76 // Returns our identity for SSL purposes, as either set by 78 // method only after our identity has been successfully established 103 // Our identity (key and certificate) for SSL purposes. The 105 // description. The identity will be passed to the SSLStreamAdapter 140 // configures it with our identity and role.
|
/external/guava/guava/src/com/google/common/collect/ |
BstModificationResult.java | 31 IDENTITY, REBUILDING_CHANGE, REBALANCING_CHANGE; 34 static <N extends BstNode<?, N>> BstModificationResult<N> identity(@Nullable N target) { method in class:BstModificationResult 35 return new BstModificationResult<N>(target, target, ModificationType.IDENTITY);
|
/external/llvm/include/llvm/ADT/ |
IndexedMap.h | 30 template <typename T, typename ToIndexT = llvm::identity<unsigned> >
|