Searched defs:identity (Results 201 - 225 of 304) sorted by relevance

1234567891011>>

/external/chromium_org/cc/animation/
H A Dtransform_operations_unittest.cc771 TransformOperations identity; local
773 box, identity, min_progress, max_progress, &bounds));
777 EXPECT_TRUE(identity.BlendedBoundsForBox(
806 TransformOperations identity; local
808 box, identity, min_progress, max_progress, &bounds));
812 EXPECT_TRUE(identity.BlendedBoundsForBox(
1273 TransformOperations identity; local
1275 box, identity, min_progress, max_progress, &bounds));
1279 EXPECT_TRUE(identity.BlendedBoundsForBox(
1289 TransformOperations identity; local
1348 TransformOperations identity; local
[all...]
/external/chromium_org/chrome/renderer/searchbox/
H A Dsearchbox_extension.cc351 // Sends a Chrome identity check to the browser.
474 const base::string16& identity,
476 std::string escaped_identity = base::GetQuotedJSONString(identity);
472 DispatchChromeIdentityCheckResult( blink::WebFrame* frame, const base::string16& identity, bool identity_match) argument
/external/chromium_org/skia/ext/
H A Dvector_platform_device_emf_win.cc341 SkMatrix identity; local
342 identity.reset();
343 LoadTransformToDC(hdc_, identity);
/external/chromium_org/third_party/boringssl/src/ssl/
H A Ds3_clnt.c1180 omitted if no identity hint is sent. Set
1245 /* Store PSK identity hint for later use, hint is used in
1247 * length of a PSK identity hint can be as long as the maximum
1248 * length of a PSK identity. Also do not allow NULL
1252 * rather than a specific identity. */
1261 /* Save the identity hint as a C string. */
1896 char identity[PSK_MAX_IDENTITY_LEN + 1]; local
1910 memset(identity, 0, sizeof(identity));
1912 identity, sizeo
[all...]
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Dfakesession.h225 bool SetLocalIdentity(rtc::SSLIdentity* identity) { argument
226 identity_ = identity;
252 virtual bool GetLocalIdentity(rtc::SSLIdentity** identity) const {
256 *identity = identity_->GetReference();
367 void set_identity(rtc::SSLIdentity* identity) { argument
368 identity_ = identity;
390 virtual void SetIdentity_w(rtc::SSLIdentity* identity) { argument
391 identity_ = identity;
393 virtual bool GetIdentity_w(rtc::SSLIdentity** identity) { argument
397 *identity
480 set_ssl_identity(rtc::SSLIdentity* identity) argument
[all...]
H A Dsession.h148 void SetIdentity(rtc::SSLIdentity* identity);
374 rtc::SSLIdentity* identity() { return identity_; } function in class:cricket::BaseSession
377 // Specifies the identity to use in this session.
378 bool SetIdentity(rtc::SSLIdentity* identity);
H A Dtransport.cc169 void Transport::SetIdentity(rtc::SSLIdentity* identity) { argument
170 worker_thread_->Invoke<void>(Bind(&Transport::SetIdentity_w, this, identity));
173 bool Transport::GetIdentity(rtc::SSLIdentity** identity) { argument
174 // The identity is set on the worker thread, so for safety it must also be
177 Bind(&Transport::GetIdentity_w, this, identity));
/external/chromium_org/third_party/mesa/src/src/gallium/state_trackers/vega/
H A Dmatrix.h101 static const VGfloat identity[9] = {1.f, 0.f, 0.f, local
104 memcpy(matrix->m, identity, sizeof(identity));
/external/chromium_org/third_party/skia/src/core/
H A DSkBitmap.cpp1096 SkMatrix identity; local
1107 identity.reset();
1109 if (!filter->filterMask(&dstM, srcM, identity, NULL)) {
1133 if (!filter->filterMask(&dstM, srcM, identity, NULL)) {
/external/chromium_org/third_party/webrtc/base/
H A Dnssstreamadapter.cc396 // identity set.
465 NSSIdentity *identity; local
468 identity = static_cast<NSSIdentity *>(identity_.get());
470 LOG(LS_ERROR) << "Can't be an SSL server without an identity";
474 rv = SSL_ConfigSecureServer(ssl_fd_, identity->certificate().certificate(),
475 identity->keypair()->privkey(),
857 LOG(LS_ERROR) << "No identity available";
861 NSSIdentity *identity = static_cast<NSSIdentity *>(stream->identity_.get()); local
863 *pRetCert = CERT_DupCertificate(identity->certificate().certificate());
864 *pRetKey = SECKEY_CopyPrivateKey(identity
[all...]
/external/conscrypt/src/main/java/org/conscrypt/
H A DOpenSSLSocketImpl.java448 public int clientPSKKeyRequested(String identityHint, byte[] identity, byte[] key) { argument
449 return sslParameters.clientPSKKeyRequested(identityHint, identity, key, this);
454 public int serverPSKKeyRequested(String identityHint, String identity, byte[] key) { argument
455 return sslParameters.serverPSKKeyRequested(identityHint, identity, key, this);
1260 public SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity) { argument
1261 return keyManager.getKey(identityHint, identity, this);
H A DSSLParametersImpl.java666 String identity = pskCallbacks.chooseClientPSKIdentity(pskKeyManager, identityHint);
667 // Store identity in NULL-terminated modified UTF-8 representation into ientityBytesOut
669 if (identity == null) {
670 identity = "";
672 } else if (identity.isEmpty()) {
676 identityBytes = identity.getBytes("UTF-8");
690 SecretKey secretKey = pskCallbacks.getPSKKey(pskKeyManager, identityHint, identity);
706 String identityHint, String identity, byte[] key, PSKCallbacks pskCallbacks) {
711 SecretKey secretKey = pskCallbacks.getPSKKey(pskKeyManager, identityHint, identity);
782 SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity); argument
705 serverPSKKeyRequested( String identityHint, String identity, byte[] key, PSKCallbacks pskCallbacks) argument
[all...]
/external/mesa3d/src/gallium/state_trackers/vega/
H A Dmatrix.h101 static const VGfloat identity[9] = {1.f, 0.f, 0.f, local
104 memcpy(matrix->m, identity, sizeof(identity));
/external/openssl/ssl/
H A Ds3_clnt.c1392 omitted if no identity hint is sent. Set
1469 /* Store PSK identity hint for later use, hint is used
1471 * maximum length of a PSK identity hint can be as
1472 * long as the maximum length of a PSK identity. */
1488 /* If received PSK identity hint contains NULL
2474 * to return a \0-terminated identity. The last byte
2476 char identity[PSK_MAX_IDENTITY_LEN + 2]; local
2491 memset(identity, 0, sizeof(identity));
2493 identity, sizeo
[all...]
/external/skia/src/core/
H A DSkBitmap.cpp1151 SkMatrix identity; local
1162 identity.reset();
1164 if (!filter->filterMask(&dstM, srcM, identity, NULL)) {
1188 if (!filter->filterMask(&dstM, srcM, identity, NULL)) {
/external/skia/src/ports/
H A DSkFontConfigInterface_android.cpp457 SkStream* SkFontConfigInterfaceAndroid::openStream(const FontIdentity& identity) { argument
458 return SkStream::NewFromFile(identity.fString.c_str());
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dhostapd.c314 bin_clear_free(hapd->tmp_eap_user.identity,
635 u8 *identity; local
637 identity = ieee802_1x_get_identity(sta->eapol_sm,
639 if (identity &&
641 os_memcmp(identity, attr->user_name, identity_len)
H A Dieee802_11.c557 char *identity = NULL; local
634 &psk, &identity, &radius_cui);
680 sta->identity = identity;
681 identity = NULL;
746 os_free(identity);
H A Dieee802_1x.c283 const u8 *identity; local
290 identity = eap_get_identity(sm->eap, &identity_len);
291 if (identity == NULL)
294 /* Save station identity for future RADIUS packets */
295 os_free(sm->identity);
296 sm->identity = (u8 *) dup_binstr(identity, identity_len);
297 if (sm->identity == NULL) {
304 HOSTAPD_LEVEL_DEBUG, "STA identity '%s'", sm->identity);
1287 u8 *buf, *identity; local
1813 const u8 *identity; local
1860 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.h74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
83 const u8 *identity, size_t identity_len,
92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
96 const u8 *identity, size_t identity_len,
108 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument
117 const u8 *identity,
186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap.c1035 wpa_printf(MSG_WARNING, "Too short IMSI for SIM identity");
1040 wpa_printf(MSG_WARNING, "Could not add realm to SIM identity");
1060 os_free(conf->identity);
1061 conf->identity = os_malloc(1 + imsi_len);
1062 if (conf->identity == NULL) {
1064 "IMSI-based identity");
1070 conf->identity[0] = '1';
1073 conf->identity[0] = '0';
1076 conf->identity[0] = '6';
1079 os_memcpy(conf->identity
1139 const u8 *identity; local
[all...]
H A Deap_aka.c374 const u8 *identity = NULL; local
384 /* Look for the realm of the permanent identity */
385 identity = eap_get_config_identity(sm, &identity_len);
386 if (identity) {
387 for (realm = identity, realm_len = identity_len;
596 const u8 *identity = NULL; local
602 identity = data->reauth_id;
607 identity = data->pseudonym;
611 identity = eap_get_config_identity(sm, &identity_len);
612 if (identity) {
886 const u8 *identity; local
[all...]
H A Deap_ttls.c430 const u8 *identity, *password; local
436 identity = eap_get_config_identity(sm, &identity_len);
438 if (identity == NULL || password == NULL)
451 identity, identity_len);
485 if (mschapv2_derive_response(identity, identity_len, password,
519 const u8 *identity, *password; local
525 identity = eap_get_config_identity(sm, &identity_len);
527 if (identity == NULL || password == NULL)
540 identity, identity_len);
602 const u8 *identity, *passwor local
655 const u8 *identity, *password; local
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_i.h145 u8 *identity; member in struct:eap_sm
147 /* Whether Phase 2 method should validate identity match */
200 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
H A Deap_server_fast.c61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data
131 u8 *identity = NULL; local
214 identity = pos + 2;
230 if (identity) {
232 "PAC-Opaque", identity, identity_len);
233 os_free(data->identity);
234 data->identity = os_malloc(identity_len);
235 if (data->identity) {
236 os_memcpy(data->identity, identity, identity_le
[all...]

Completed in 363 milliseconds

1234567891011>>