/external/chromium_org/third_party/skia/tests/ |
H A D | MatrixTest.cpp | 69 SkMatrix identity; local 70 identity.reset(); 71 return nearly_equal(m, identity); 126 SkMatrix identity; local 127 identity.reset(); 128 REPORTER_ASSERT(reporter, SK_Scalar1 == identity.getMinScale()); 129 REPORTER_ASSERT(reporter, SK_Scalar1 == identity.getMaxScale()); 130 success = identity.getMinMaxScales(scales); 251 // identity 456 // identity [all...] |
/external/chromium_org/third_party/webrtc/base/ |
H A D | opensslstreamadapter.cc | 183 void OpenSSLStreamAdapter::SetIdentity(SSLIdentity* identity) { argument 185 identity_.reset(static_cast<OpenSSLIdentity*>(identity));
|
/external/chromium_org/ui/gfx/ |
H A D | transform_unittest.cc | 1331 Transform identity; local 1333 EXPECT_TRUE(MatricesAreNearlyEqual(identity, composed)); 1421 // The inverse() function should reset the output matrix to identity. 1432 // reset to identity. 2130 // be identity.
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | OpenSSLEngineImpl.java | 614 public int clientPSKKeyRequested(String identityHint, byte[] identity, byte[] key) { argument 615 return sslParameters.clientPSKKeyRequested(identityHint, identity, key, this); 619 public int serverPSKKeyRequested(String identityHint, String identity, byte[] key) { argument 620 return sslParameters.serverPSKKeyRequested(identityHint, identity, key, this); 757 public SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity) { argument 758 return keyManager.getKey(identityHint, identity, this);
|
/external/deqp/modules/gles2/scripts/ |
H A D | genutil.py | 581 def identity (numCols, numRows): member in class:Mat 599 res = Mat.identity(numCols, numRows)
|
/external/deqp/modules/gles3/scripts/ |
H A D | genutil.py | 726 def identity (numCols, numRows): member in class:Mat 740 res = Mat.identity(numCols, numRows)
|
/external/deqp/modules/gles31/scripts/ |
H A D | genutil.py | 728 def identity (numCols, numRows): member in class:Mat 742 res = Mat.identity(numCols, numRows)
|
/external/skia/src/gpu/gl/ |
H A D | GrGLProgramEffects.cpp | 543 GrGLfloat identity[] = {1, 0, 0, local 547 identity);
|
/external/skia/src/ports/ |
H A D | SkFontConfigInterface_direct.cpp | 549 SkStream* SkFontConfigInterfaceDirect::openStream(const FontIdentity& identity) { argument 550 return SkStream::NewFromFile(identity.fString.c_str());
|
/external/skia/tests/ |
H A D | MatrixTest.cpp | 69 SkMatrix identity; local 70 identity.reset(); 71 return nearly_equal(m, identity); 126 SkMatrix identity; local 127 identity.reset(); 128 REPORTER_ASSERT(reporter, SK_Scalar1 == identity.getMinScale()); 129 REPORTER_ASSERT(reporter, SK_Scalar1 == identity.getMaxScale()); 130 success = identity.getMinMaxScales(scales); 251 // identity 426 // identity [all...] |
/external/stlport/stlport/stl/ |
H A D | _function.h | 321 // identity is an extension: it is not part of the standard. 322 template <class _Tp> struct identity : public _STLP_PRIV _Identity<_Tp> {}; struct in inherits:_STLP_PRIV_Identity
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | sta_info.h | 102 char *identity; /* User-Name from RADIUS */ member in struct:sta_info
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument 37 addr[0] = identity; 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument 62 addr[0] = identity; 108 const u8 *identity, size_t identity_len, 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { 120 "character from the end of identity"); 123 addr[0] = identity; 136 identity, identity_len); 276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_mschapv2.c | 157 const u8 *identity, *password; local 162 identity = eap_get_config_identity(sm, &identity_len); 164 if (identity == NULL || password == NULL) 207 if (mschapv2_derive_response(identity, identity_len, password, 221 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_sim.c | 394 const u8 *identity = NULL; local 404 /* Look for the realm of the permanent identity */ 405 identity = eap_get_config_identity(sm, &identity_len); 406 if (identity) { 407 for (realm = identity, realm_len = identity_len; 475 const u8 *identity = NULL; local 481 identity = data->reauth_id; 486 identity = data->pseudonym; 490 identity = eap_get_config_identity(sm, &identity_len); 491 if (identity) { 701 const u8 *identity; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | sta_info.h | 102 char *identity; /* User-Name from RADIUS */ member in struct:sta_info
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument 37 addr[0] = identity; 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument 62 addr[0] = identity; 108 const u8 *identity, size_t identity_len, 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { 120 "character from the end of identity"); 123 addr[0] = identity; 136 identity, identity_len); 276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_mschapv2.c | 157 const u8 *identity, *password; local 162 identity = eap_get_config_identity(sm, &identity_len); 164 if (identity == NULL || password == NULL) 207 if (mschapv2_derive_response(identity, identity_len, password, 221 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_sim.c | 394 const u8 *identity = NULL; local 404 /* Look for the realm of the permanent identity */ 405 identity = eap_get_config_identity(sm, &identity_len); 406 if (identity) { 407 for (realm = identity, realm_len = identity_len; 475 const u8 *identity = NULL; local 481 identity = data->reauth_id; 486 identity = data->pseudonym; 490 identity = eap_get_config_identity(sm, &identity_len); 491 if (identity) { 701 const u8 *identity; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | sta_info.h | 102 char *identity; /* User-Name from RADIUS */ member in struct:sta_info
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 28 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, argument 37 addr[0] = identity; 56 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, argument 62 addr[0] = identity; 108 const u8 *identity, size_t identity_len, 118 while (identity_len > 0 && identity[identity_len - 1] == 0) { 120 "character from the end of identity"); 123 addr[0] = identity; 136 identity, identity_len); 276 void eap_aka_prime_derive_keys(const u8 *identity, size_ argument 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_mschapv2.c | 157 const u8 *identity, *password; local 162 identity = eap_get_config_identity(sm, &identity_len); 164 if (identity == NULL || password == NULL) 207 if (mschapv2_derive_response(identity, identity_len, password, 221 wpabuf_put_data(resp, identity, identity_len);
|
H A D | eap_sim.c | 394 const u8 *identity = NULL; local 404 /* Look for the realm of the permanent identity */ 405 identity = eap_get_config_identity(sm, &identity_len); 406 if (identity) { 407 for (realm = identity, realm_len = identity_len; 475 const u8 *identity = NULL; local 481 identity = data->reauth_id; 486 identity = data->pseudonym; 490 identity = eap_get_config_identity(sm, &identity_len); 491 if (identity) { 701 const u8 *identity; local [all...] |
/external/apache-xml/src/main/java/org/apache/xml/dtm/ref/sax2dtm/ |
H A D | SAX2DTM.java | 211 * @param dtmIdentity The DTM identity ID for this DTM. 234 * @param dtmIdentity The DTM identity ID for this DTM. 303 * Get the data or qualified name for the given node identity. 305 * @param identity The node identity. 309 protected int _dataOrQName(int identity) argument 312 if (identity < m_size) 313 return m_dataOrQName.elementAt(identity); 324 else if (identity < m_size) 325 return m_dataOrQName.elementAt(identity); 709 getNextNodeIdentity(int identity) argument [all...] |
H A D | SAX2DTM2.java | 616 * The node identity of _startNode for this iterator 813 /* _currentNode precedes candidates. This is the identity, not the handle! */ 1544 * Tell if this node identity is a descendant. Assumes that 1554 * @param identity The index number of the node in question. 1557 protected final boolean isDescendant(int identity) argument 1559 return (_parent2(identity) >= _startNode) || (_startNode == identity); 1901 public final int _exptype(int identity) argument 1903 return m_exptype.elementAt(identity); 1919 * @param identity 1922 _exptype2(int identity) argument 1938 _nextsib2(int identity) argument 1954 _firstch2(int identity) argument 1970 _parent2(int identity) argument 1986 _type2(int identity) argument 2521 getFirstAttributeIdentity(int identity) argument 2563 getNextAttributeIdentity(int identity) argument [all...] |