/external/chromium_org/third_party/libjingle/source/talk/session/tunnel/ |
H A D | securetunnelsessionclient.cc | 87 void SecureTunnelSessionClient::SetIdentity(rtc::SSLIdentity* identity) { argument 89 identity_.reset(identity); 109 LOG(LS_ERROR) << "Failed to generate SSL identity"; 321 rtc::SSLIdentity* identity = local 324 ssl_stream->SetIdentity(identity);
|
/external/eigen/test/eigen2/ |
H A D | eigen2_nomalloc.cpp | 37 identity = Matrix<Scalar, MatrixType::RowsAtCompileTime, MatrixType::RowsAtCompileTime> local
|
H A D | product.h | 46 identity = RowSquareMatrixType::Identity(rows, rows), local 84 VERIFY_IS_APPROX(v1, identity*v1); 85 VERIFY_IS_APPROX(v1.transpose(), v1.transpose() * identity);
|
/external/guava/guava-tests/test/com/google/common/collect/ |
H A D | MapsTransformValuesTest.java | 59 Functions.<String>identity()); 113 underlying, Functions.<Integer>identity()); 245 = Maps.transformValues(underlying, Functions.<Integer>identity()); 252 equalToUnderlying, Functions.<Integer>identity());
|
/external/smack/src/org/jivesoftware/smackx/packet/ |
H A D | DiscoverInfo.java | 119 * Adds a new identity of the requested entity to the discovered information. 121 * @param identity the discovered entity's identity 123 public void addIdentity(Identity identity) { argument 125 identities.add(identity); 202 for (Identity identity : identities) { 203 buf.append(identity.toXML()); 252 * Represents the identity of a given XMPP entity. An entity may have many identities but all 268 * Creates a new identity for an XMPP entity. 280 * Creates a new identity fo [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_sim_db.h | 93 char * sim_get_username(const u8 *identity, size_t identity_len);
|
H A D | eap_server_wsc.c | 85 if (sm->identity && sm->identity_len == WSC_ID_REGISTRAR_LEN && 86 os_memcmp(sm->identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 89 else if (sm->identity && sm->identity_len == WSC_ID_ENROLLEE_LEN && 90 os_memcmp(sm->identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) 94 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity", 95 sm->identity, sm->identity_len);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_sim_db.h | 93 char * sim_get_username(const u8 *identity, size_t identity_len);
|
H A D | eap_server_wsc.c | 85 if (sm->identity && sm->identity_len == WSC_ID_REGISTRAR_LEN && 86 os_memcmp(sm->identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 89 else if (sm->identity && sm->identity_len == WSC_ID_ENROLLEE_LEN && 90 os_memcmp(sm->identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) 94 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity", 95 sm->identity, sm->identity_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.h | 93 char * sim_get_username(const u8 *identity, size_t identity_len);
|
H A D | eap_server_wsc.c | 85 if (sm->identity && sm->identity_len == WSC_ID_REGISTRAR_LEN && 86 os_memcmp(sm->identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 89 else if (sm->identity && sm->identity_len == WSC_ID_ENROLLEE_LEN && 90 os_memcmp(sm->identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) 94 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity", 95 sm->identity, sm->identity_len);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_1x.c | 283 const u8 *identity; local 290 identity = eap_get_identity(sm->eap, &identity_len); 291 if (identity == NULL) 294 /* Save station identity for future RADIUS packets */ 295 os_free(sm->identity); 296 sm->identity = (u8 *) dup_binstr(identity, identity_len); 297 if (sm->identity == NULL) { 304 HOSTAPD_LEVEL_DEBUG, "STA identity '%s'", sm->identity); 1287 u8 *buf, *identity; local 1813 const u8 *identity; local 1860 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_1x.c | 283 const u8 *identity; local 290 identity = eap_get_identity(sm->eap, &identity_len); 291 if (identity == NULL) 294 /* Save station identity for future RADIUS packets */ 295 os_free(sm->identity); 296 sm->identity = (u8 *) dup_binstr(identity, identity_len); 297 if (sm->identity == NULL) { 304 HOSTAPD_LEVEL_DEBUG, "STA identity '%s'", sm->identity); 1287 u8 *buf, *identity; local 1813 const u8 *identity; local 1860 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_1x.c | 283 const u8 *identity; local 290 identity = eap_get_identity(sm->eap, &identity_len); 291 if (identity == NULL) 294 /* Save station identity for future RADIUS packets */ 295 os_free(sm->identity); 296 sm->identity = (u8 *) dup_binstr(identity, identity_len); 297 if (sm->identity == NULL) { 304 HOSTAPD_LEVEL_DEBUG, "STA identity '%s'", sm->identity); 1287 u8 *buf, *identity; local 1813 const u8 *identity; local 1860 ieee802_1x_get_eap_user(void *ctx, const u8 *identity, size_t identity_len, int phase2, struct eap_user *user) argument [all...] |
/external/chromium_org/chrome/android/sync_shell/javatests/src/chromium/chrome/browser/sync/ |
H A D | SyncTest.java | 14 import org.chromium.chrome.browser.identity.UniqueIdentificationGenerator; 15 import org.chromium.chrome.browser.identity.UniqueIdentificationGeneratorFactory; 16 import org.chromium.chrome.browser.identity.UuidBasedUniqueIdentificationGenerator;
|
/external/chromium_org/chrome/common/extensions/docs/server2/ |
H A D | compiled_file_system_test.py | 40 identity = lambda _, x: x variable 124 compiled_fs = _GetTestCompiledFsCreator()(Cache(identity), 145 compiled_fs = _GetTestCompiledFsCreator()(identity, CompiledFileSystemTest)
|
/external/chromium_org/skia/ext/ |
H A D | bitmap_platform_device_win.cc | 229 SkMatrix identity; local 230 identity.reset(); 232 LoadTransformToDC(source_dc, identity);
|
/external/chromium_org/third_party/WebKit/Source/platform/graphics/filters/ |
H A D | FEComponentTransfer.cpp | 98 static void identity(unsigned char*, const ComponentTransferFunction&) function in namespace:blink 222 TransferType callEffect[] = {identity, identity, table, discrete, linear, gamma};
|
/external/eigen/test/ |
H A D | product.h | 43 identity = RowSquareMatrixType::Identity(rows, rows), local 76 VERIFY_IS_APPROX(v1, identity*v1); 77 VERIFY_IS_APPROX(v1.transpose(), v1.transpose() * identity);
|
/external/chromium_org/third_party/libjingle/source/talk/app/webrtc/ |
H A D | webrtcsessiondescriptionfactory.cc | 41 " failed because DTLS identity request failed"; 43 // Arbitrary constant used as common name for the identity. 149 LOG(LS_VERBOSE) << "DTLS-SRTP enabled; sent DTLS identity request."; 152 LOG(LS_ERROR) << "Failed to send DTLS identity request."; 157 // Do not generate the identity in the constructor since the caller has 292 LOG(LS_INFO) << "Generating identity."; 400 LOG(LS_ERROR) << "Async identity request failed: error = " << error; 430 rtc::SSLIdentity* identity = local 432 SetIdentity(identity); 436 rtc::SSLIdentity* identity) { 435 SetIdentity( rtc::SSLIdentity* identity) argument [all...] |
/external/openssl/apps/ |
H A D | engine.c | 95 static void identity(char *ptr) function 287 if(cmds) sk_OPENSSL_STRING_pop_free(cmds, identity); 536 sk_OPENSSL_STRING_pop_free(engines, identity); 537 sk_OPENSSL_STRING_pop_free(pre_cmds, identity); 538 sk_OPENSSL_STRING_pop_free(post_cmds, identity);
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | nssstreamadapter.cc | 396 // identity set. 465 NSSIdentity *identity; local 468 identity = static_cast<NSSIdentity *>(identity_.get()); 470 LOG(LS_ERROR) << "Can't be an SSL server without an identity"; 474 rv = SSL_ConfigSecureServer(ssl_fd_, identity->certificate().certificate(), 475 identity->keypair()->privkey(), 857 LOG(LS_ERROR) << "No identity available"; 861 NSSIdentity *identity = static_cast<NSSIdentity *>(stream->identity_.get()); local 863 *pRetCert = CERT_DupCertificate(identity->certificate().certificate()); 864 *pRetKey = SECKEY_CopyPrivateKey(identity [all...] |
/external/smack/src/org/jivesoftware/smackx/entitycaps/ |
H A D | EntityCapsManager.java | 432 * the local users identity type 434 * the local users identity name 590 // 3. For each identity, append the 'category/type/lang/name' to S, 593 DiscoverInfo.Identity identity = it.next(); 594 sb.append(identity.getCategory()); 596 sb.append(identity.getType()); 598 sb.append(identity.getLanguage() == null ? "" : identity.getLanguage()); 600 sb.append(identity.getName() == null ? "" : identity [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_wsc.c | 145 const u8 *identity; local 163 identity = eap_get_config_identity(sm, &identity_len); 165 if (identity && identity_len == WSC_ID_REGISTRAR_LEN && 166 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0) 168 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN && 169 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0) 172 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity", 173 identity, identity_len);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_wsc.c | 145 const u8 *identity; local 163 identity = eap_get_config_identity(sm, &identity_len); 165 if (identity && identity_len == WSC_ID_REGISTRAR_LEN && 166 os_memcmp(identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) == 0) 168 else if (identity && identity_len == WSC_ID_ENROLLEE_LEN && 169 os_memcmp(identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN) == 0) 172 wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity", 173 identity, identity_len);
|