/external/chromium_org/cc/animation/ |
H A D | transform_operations_unittest.cc | 771 TransformOperations identity; local 773 box, identity, min_progress, max_progress, &bounds)); 777 EXPECT_TRUE(identity.BlendedBoundsForBox( 806 TransformOperations identity; local 808 box, identity, min_progress, max_progress, &bounds)); 812 EXPECT_TRUE(identity.BlendedBoundsForBox( 1273 TransformOperations identity; local 1275 box, identity, min_progress, max_progress, &bounds)); 1279 EXPECT_TRUE(identity.BlendedBoundsForBox( 1289 TransformOperations identity; local 1348 TransformOperations identity; local [all...] |
/external/chromium_org/chrome/renderer/searchbox/ |
H A D | searchbox_extension.cc | 351 // Sends a Chrome identity check to the browser. 474 const base::string16& identity, 476 std::string escaped_identity = base::GetQuotedJSONString(identity); 472 DispatchChromeIdentityCheckResult( blink::WebFrame* frame, const base::string16& identity, bool identity_match) argument
|
/external/chromium_org/skia/ext/ |
H A D | vector_platform_device_emf_win.cc | 341 SkMatrix identity; local 342 identity.reset(); 343 LoadTransformToDC(hdc_, identity);
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | s3_clnt.c | 1180 omitted if no identity hint is sent. Set 1245 /* Store PSK identity hint for later use, hint is used in 1247 * length of a PSK identity hint can be as long as the maximum 1248 * length of a PSK identity. Also do not allow NULL 1252 * rather than a specific identity. */ 1261 /* Save the identity hint as a C string. */ 1896 char identity[PSK_MAX_IDENTITY_LEN + 1]; local 1910 memset(identity, 0, sizeof(identity)); 1912 identity, sizeo [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | fakesession.h | 225 bool SetLocalIdentity(rtc::SSLIdentity* identity) { argument 226 identity_ = identity; 252 virtual bool GetLocalIdentity(rtc::SSLIdentity** identity) const { 256 *identity = identity_->GetReference(); 367 void set_identity(rtc::SSLIdentity* identity) { argument 368 identity_ = identity; 390 virtual void SetIdentity_w(rtc::SSLIdentity* identity) { argument 391 identity_ = identity; 393 virtual bool GetIdentity_w(rtc::SSLIdentity** identity) { argument 397 *identity 480 set_ssl_identity(rtc::SSLIdentity* identity) argument [all...] |
H A D | session.h | 148 void SetIdentity(rtc::SSLIdentity* identity); 374 rtc::SSLIdentity* identity() { return identity_; } function in class:cricket::BaseSession 377 // Specifies the identity to use in this session. 378 bool SetIdentity(rtc::SSLIdentity* identity);
|
H A D | transport.cc | 169 void Transport::SetIdentity(rtc::SSLIdentity* identity) { argument 170 worker_thread_->Invoke<void>(Bind(&Transport::SetIdentity_w, this, identity)); 173 bool Transport::GetIdentity(rtc::SSLIdentity** identity) { argument 174 // The identity is set on the worker thread, so for safety it must also be 177 Bind(&Transport::GetIdentity_w, this, identity));
|
/external/chromium_org/third_party/mesa/src/src/gallium/state_trackers/vega/ |
H A D | matrix.h | 101 static const VGfloat identity[9] = {1.f, 0.f, 0.f, local 104 memcpy(matrix->m, identity, sizeof(identity));
|
/external/chromium_org/third_party/skia/src/core/ |
H A D | SkBitmap.cpp | 1096 SkMatrix identity; local 1107 identity.reset(); 1109 if (!filter->filterMask(&dstM, srcM, identity, NULL)) { 1133 if (!filter->filterMask(&dstM, srcM, identity, NULL)) {
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | nssstreamadapter.cc | 396 // identity set. 465 NSSIdentity *identity; local 468 identity = static_cast<NSSIdentity *>(identity_.get()); 470 LOG(LS_ERROR) << "Can't be an SSL server without an identity"; 474 rv = SSL_ConfigSecureServer(ssl_fd_, identity->certificate().certificate(), 475 identity->keypair()->privkey(), 857 LOG(LS_ERROR) << "No identity available"; 861 NSSIdentity *identity = static_cast<NSSIdentity *>(stream->identity_.get()); local 863 *pRetCert = CERT_DupCertificate(identity->certificate().certificate()); 864 *pRetKey = SECKEY_CopyPrivateKey(identity [all...] |
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | OpenSSLSocketImpl.java | 448 public int clientPSKKeyRequested(String identityHint, byte[] identity, byte[] key) { argument 449 return sslParameters.clientPSKKeyRequested(identityHint, identity, key, this); 454 public int serverPSKKeyRequested(String identityHint, String identity, byte[] key) { argument 455 return sslParameters.serverPSKKeyRequested(identityHint, identity, key, this); 1260 public SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity) { argument 1261 return keyManager.getKey(identityHint, identity, this);
|
H A D | SSLParametersImpl.java | 666 String identity = pskCallbacks.chooseClientPSKIdentity(pskKeyManager, identityHint); 667 // Store identity in NULL-terminated modified UTF-8 representation into ientityBytesOut 669 if (identity == null) { 670 identity = ""; 672 } else if (identity.isEmpty()) { 676 identityBytes = identity.getBytes("UTF-8"); 690 SecretKey secretKey = pskCallbacks.getPSKKey(pskKeyManager, identityHint, identity); 706 String identityHint, String identity, byte[] key, PSKCallbacks pskCallbacks) { 711 SecretKey secretKey = pskCallbacks.getPSKKey(pskKeyManager, identityHint, identity); 782 SecretKey getPSKKey(PSKKeyManager keyManager, String identityHint, String identity); argument 705 serverPSKKeyRequested( String identityHint, String identity, byte[] key, PSKCallbacks pskCallbacks) argument [all...] |
/external/mesa3d/src/gallium/state_trackers/vega/ |
H A D | matrix.h | 101 static const VGfloat identity[9] = {1.f, 0.f, 0.f, local 104 memcpy(matrix->m, identity, sizeof(identity));
|
/external/openssl/ssl/ |
H A D | s3_clnt.c | 1392 omitted if no identity hint is sent. Set 1469 /* Store PSK identity hint for later use, hint is used 1471 * maximum length of a PSK identity hint can be as 1472 * long as the maximum length of a PSK identity. */ 1488 /* If received PSK identity hint contains NULL 2474 * to return a \0-terminated identity. The last byte 2476 char identity[PSK_MAX_IDENTITY_LEN + 2]; local 2491 memset(identity, 0, sizeof(identity)); 2493 identity, sizeo [all...] |
/external/skia/src/core/ |
H A D | SkBitmap.cpp | 1151 SkMatrix identity; local 1162 identity.reset(); 1164 if (!filter->filterMask(&dstM, srcM, identity, NULL)) { 1188 if (!filter->filterMask(&dstM, srcM, identity, NULL)) {
|
/external/skia/src/ports/ |
H A D | SkFontConfigInterface_android.cpp | 457 SkStream* SkFontConfigInterfaceAndroid::openStream(const FontIdentity& identity) { argument 458 return SkStream::NewFromFile(identity.fString.c_str());
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | hostapd.c | 314 bin_clear_free(hapd->tmp_eap_user.identity, 635 u8 *identity; local 637 identity = ieee802_1x_get_identity(sta->eapol_sm, 639 if (identity && 641 os_memcmp(identity, attr->user_name, identity_len)
|
H A D | ieee802_11.c | 557 char *identity = NULL; local 634 &psk, &identity, &radius_cui); 680 sta->identity = identity; 681 identity = NULL; 746 os_free(identity);
|
H A D | ieee802_1x.c | 283 const u8 *identity; local 290 identity = eap_get_identity(sm->eap, &identity_len); 291 if (identity == NULL) 294 /* Save station identity for future RADIUS packets */ 295 os_free(sm->identity); 296 sm->identity = (u8 *) dup_binstr(identity, identity_len); 297 if (sm->identity == NULL) { 304 HOSTAPD_LEVEL_DEBUG, "STA identity '%s'", sm->identity); 1287 u8 *buf, *identity; local 1813 const u8 *identity; local 1860 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.h | 74 void eap_sim_derive_mk(const u8 *identity, size_t identity_len, 78 void eap_aka_derive_mk(const u8 *identity, size_t identity_len, 83 const u8 *identity, size_t identity_len, 92 void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len, 96 const u8 *identity, size_t identity_len, 108 static inline void eap_aka_prime_derive_keys(const u8 *identity, argument 117 const u8 *identity, 186 const u8 *nonce_mt, *identity, *res, *auts; member in struct:eap_sim_attrs 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 1035 wpa_printf(MSG_WARNING, "Too short IMSI for SIM identity"); 1040 wpa_printf(MSG_WARNING, "Could not add realm to SIM identity"); 1060 os_free(conf->identity); 1061 conf->identity = os_malloc(1 + imsi_len); 1062 if (conf->identity == NULL) { 1064 "IMSI-based identity"); 1070 conf->identity[0] = '1'; 1073 conf->identity[0] = '0'; 1076 conf->identity[0] = '6'; 1079 os_memcpy(conf->identity 1139 const u8 *identity; local [all...] |
H A D | eap_aka.c | 374 const u8 *identity = NULL; local 384 /* Look for the realm of the permanent identity */ 385 identity = eap_get_config_identity(sm, &identity_len); 386 if (identity) { 387 for (realm = identity, realm_len = identity_len; 596 const u8 *identity = NULL; local 602 identity = data->reauth_id; 607 identity = data->pseudonym; 611 identity = eap_get_config_identity(sm, &identity_len); 612 if (identity) { 886 const u8 *identity; local [all...] |
H A D | eap_ttls.c | 430 const u8 *identity, *password; local 436 identity = eap_get_config_identity(sm, &identity_len); 438 if (identity == NULL || password == NULL) 451 identity, identity_len); 485 if (mschapv2_derive_response(identity, identity_len, password, 519 const u8 *identity, *password; local 525 identity = eap_get_config_identity(sm, &identity_len); 527 if (identity == NULL || password == NULL) 540 identity, identity_len); 602 const u8 *identity, *passwor local 655 const u8 *identity, *password; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_i.h | 145 u8 *identity; member in struct:eap_sm 147 /* Whether Phase 2 method should validate identity match */ 200 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
|
H A D | eap_server_fast.c | 61 u8 *identity; /* from PAC-Opaque */ member in struct:eap_fast_data 131 u8 *identity = NULL; local 214 identity = pos + 2; 230 if (identity) { 232 "PAC-Opaque", identity, identity_len); 233 os_free(data->identity); 234 data->identity = os_malloc(identity_len); 235 if (data->identity) { 236 os_memcpy(data->identity, identity, identity_le [all...] |