Searched defs:identity (Results 176 - 200 of 304) sorted by relevance

1234567891011>>

/external/chromium_org/third_party/skia/tests/
H A DMatrixTest.cpp69 SkMatrix identity; local
70 identity.reset();
71 return nearly_equal(m, identity);
126 SkMatrix identity; local
127 identity.reset();
128 REPORTER_ASSERT(reporter, SK_Scalar1 == identity.getMinScale());
129 REPORTER_ASSERT(reporter, SK_Scalar1 == identity.getMaxScale());
130 success = identity.getMinMaxScales(scales);
251 // identity
456 // identity
[all...]
/external/chromium_org/third_party/webrtc/base/
H A Dopensslstreamadapter.cc183 void OpenSSLStreamAdapter::SetIdentity(SSLIdentity* identity) { argument
185 identity_.reset(static_cast<OpenSSLIdentity*>(identity));
/external/chromium_org/ui/gfx/
H A Dtransform_unittest.cc1331 Transform identity; local
1333 EXPECT_TRUE(MatricesAreNearlyEqual(identity, composed));
1421 // The inverse() function should reset the output matrix to identity.
1432 // reset to identity.
2130 // be identity.
/external/conscrypt/src/main/java/org/conscrypt/
H A DOpenSSLEngineImpl.java614 public int clientPSKKeyRequested(String identityHint, byte[] identity, byte[] key) { argument
615 return sslParameters.clientPSKKeyRequested(identityHint, identity, key, this);
619 public int serverPSKKeyRequested(String identityHint, String identity, byte[] key) { argument
620 return sslParameters.serverPSKKeyRequested(identityHint, identity, key, this);
757 public SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity) { argument
758 return keyManager.getKey(identityHint, identity, this);
/external/deqp/modules/gles2/scripts/
H A Dgenutil.py581 def identity (numCols, numRows): member in class:Mat
599 res = Mat.identity(numCols, numRows)
/external/deqp/modules/gles3/scripts/
H A Dgenutil.py726 def identity (numCols, numRows): member in class:Mat
740 res = Mat.identity(numCols, numRows)
/external/deqp/modules/gles31/scripts/
H A Dgenutil.py728 def identity (numCols, numRows): member in class:Mat
742 res = Mat.identity(numCols, numRows)
/external/skia/src/gpu/gl/
H A DGrGLProgramEffects.cpp543 GrGLfloat identity[] = {1, 0, 0, local
547 identity);
/external/skia/src/ports/
H A DSkFontConfigInterface_direct.cpp549 SkStream* SkFontConfigInterfaceDirect::openStream(const FontIdentity& identity) { argument
550 return SkStream::NewFromFile(identity.fString.c_str());
/external/skia/tests/
H A DMatrixTest.cpp69 SkMatrix identity; local
70 identity.reset();
71 return nearly_equal(m, identity);
126 SkMatrix identity; local
127 identity.reset();
128 REPORTER_ASSERT(reporter, SK_Scalar1 == identity.getMinScale());
129 REPORTER_ASSERT(reporter, SK_Scalar1 == identity.getMaxScale());
130 success = identity.getMinMaxScales(scales);
251 // identity
426 // identity
[all...]
/external/stlport/stlport/stl/
H A D_function.h321 // identity is an extension: it is not part of the standard.
322 template <class _Tp> struct identity : public _STLP_PRIV _Identity<_Tp> {}; struct in inherits:_STLP_PRIV_Identity
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dsta_info.h102 char *identity; /* User-Name from RADIUS */ member in struct:sta_info
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument
37 addr[0] = identity;
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument
62 addr[0] = identity;
108 const u8 *identity, size_t identity_len,
118 while (identity_len > 0 && identity[identity_len - 1] == 0) {
120 "character from the end of identity");
123 addr[0] = identity;
136 identity, identity_len);
276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_mschapv2.c157 const u8 *identity, *password; local
162 identity = eap_get_config_identity(sm, &identity_len);
164 if (identity == NULL || password == NULL)
207 if (mschapv2_derive_response(identity, identity_len, password,
221 wpabuf_put_data(resp, identity, identity_len);
H A Deap_sim.c394 const u8 *identity = NULL; local
404 /* Look for the realm of the permanent identity */
405 identity = eap_get_config_identity(sm, &identity_len);
406 if (identity) {
407 for (realm = identity, realm_len = identity_len;
475 const u8 *identity = NULL; local
481 identity = data->reauth_id;
486 identity = data->pseudonym;
490 identity = eap_get_config_identity(sm, &identity_len);
491 if (identity) {
701 const u8 *identity; local
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dsta_info.h102 char *identity; /* User-Name from RADIUS */ member in struct:sta_info
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument
37 addr[0] = identity;
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument
62 addr[0] = identity;
108 const u8 *identity, size_t identity_len,
118 while (identity_len > 0 && identity[identity_len - 1] == 0) {
120 "character from the end of identity");
123 addr[0] = identity;
136 identity, identity_len);
276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_mschapv2.c157 const u8 *identity, *password; local
162 identity = eap_get_config_identity(sm, &identity_len);
164 if (identity == NULL || password == NULL)
207 if (mschapv2_derive_response(identity, identity_len, password,
221 wpabuf_put_data(resp, identity, identity_len);
H A Deap_sim.c394 const u8 *identity = NULL; local
404 /* Look for the realm of the permanent identity */
405 identity = eap_get_config_identity(sm, &identity_len);
406 if (identity) {
407 for (realm = identity, realm_len = identity_len;
475 const u8 *identity = NULL; local
481 identity = data->reauth_id;
486 identity = data->pseudonym;
490 identity = eap_get_config_identity(sm, &identity_len);
491 if (identity) {
701 const u8 *identity; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dsta_info.h102 char *identity; /* User-Name from RADIUS */ member in struct:sta_info
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.c28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument
37 addr[0] = identity;
56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument
62 addr[0] = identity;
108 const u8 *identity, size_t identity_len,
118 while (identity_len > 0 && identity[identity_len - 1] == 0) {
120 "character from the end of identity");
123 addr[0] = identity;
136 identity, identity_len);
276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_mschapv2.c157 const u8 *identity, *password; local
162 identity = eap_get_config_identity(sm, &identity_len);
164 if (identity == NULL || password == NULL)
207 if (mschapv2_derive_response(identity, identity_len, password,
221 wpabuf_put_data(resp, identity, identity_len);
H A Deap_sim.c394 const u8 *identity = NULL; local
404 /* Look for the realm of the permanent identity */
405 identity = eap_get_config_identity(sm, &identity_len);
406 if (identity) {
407 for (realm = identity, realm_len = identity_len;
475 const u8 *identity = NULL; local
481 identity = data->reauth_id;
486 identity = data->pseudonym;
490 identity = eap_get_config_identity(sm, &identity_len);
491 if (identity) {
701 const u8 *identity; local
[all...]
/external/apache-xml/src/main/java/org/apache/xml/dtm/ref/sax2dtm/
H A DSAX2DTM.java211 * @param dtmIdentity The DTM identity ID for this DTM.
234 * @param dtmIdentity The DTM identity ID for this DTM.
303 * Get the data or qualified name for the given node identity.
305 * @param identity The node identity.
309 protected int _dataOrQName(int identity) argument
312 if (identity < m_size)
313 return m_dataOrQName.elementAt(identity);
324 else if (identity < m_size)
325 return m_dataOrQName.elementAt(identity);
709 getNextNodeIdentity(int identity) argument
[all...]
H A DSAX2DTM2.java616 * The node identity of _startNode for this iterator
813 /* _currentNode precedes candidates. This is the identity, not the handle! */
1544 * Tell if this node identity is a descendant. Assumes that
1554 * @param identity The index number of the node in question.
1557 protected final boolean isDescendant(int identity) argument
1559 return (_parent2(identity) >= _startNode) || (_startNode == identity);
1901 public final int _exptype(int identity) argument
1903 return m_exptype.elementAt(identity);
1919 * @param identity
1922 _exptype2(int identity) argument
1938 _nextsib2(int identity) argument
1954 _firstch2(int identity) argument
1970 _parent2(int identity) argument
1986 _type2(int identity) argument
2521 getFirstAttributeIdentity(int identity) argument
2563 getNextAttributeIdentity(int identity) argument
[all...]

Completed in 361 milliseconds

1234567891011>>