/external/openssl/ssl/ |
H A D | s23_meth.c | 63 static SSL_METHOD *ssl23_get_method(int ver); 64 static SSL_METHOD *ssl23_get_method(int ver) argument 67 if (ver == SSL2_VERSION) 72 if (ver == SSL3_VERSION) 77 if (ver == TLS1_VERSION)
|
H A D | d1_meth.c | 64 static SSL_METHOD *dtls1_get_method(int ver); 65 static SSL_METHOD *dtls1_get_method(int ver) argument 67 if (ver == DTLS1_VERSION)
|
H A D | s3_meth.c | 63 static SSL_METHOD *ssl3_get_method(int ver); 64 static SSL_METHOD *ssl3_get_method(int ver) argument 66 if (ver == SSL3_VERSION)
|
H A D | t1_meth.c | 63 static SSL_METHOD *tls1_get_method(int ver); 64 static SSL_METHOD *tls1_get_method(int ver) argument 66 if (ver == TLS1_VERSION)
|
H A D | s2_meth.c | 64 static SSL_METHOD *ssl2_get_method(int ver); 65 static SSL_METHOD *ssl2_get_method(int ver) argument 67 if (ver == SSL2_VERSION)
|
H A D | t1_clnt.c | 66 static SSL_METHOD *tls1_get_client_method(int ver); 67 static SSL_METHOD *tls1_get_client_method(int ver) argument 69 if (ver == TLS1_VERSION)
|
H A D | t1_srvr.c | 67 static SSL_METHOD *tls1_get_server_method(int ver); 68 static SSL_METHOD *tls1_get_server_method(int ver) argument 70 if (ver == TLS1_VERSION)
|
/external/e2fsprogs/lib/e2p/ |
H A D | setversion.c | 27 int ver; local 29 ver = (int) version; 30 return ioctl (fd, EXT2_IOC_SETVERSION, &ver);
|
H A D | getversion.c | 27 int r, ver; local 29 r = ioctl (fd, EXT2_IOC_GETVERSION, &ver); 30 *version = ver;
|
H A D | fgetversion.c | 41 int fd, r, ver, save_errno = 0; local 46 r = ioctl (fd, EXT2_IOC_GETVERSION, &ver); 49 *version = ver; 55 int ver=-1, err; 56 err = syscall(SYS_fsctl, name, EXT2_IOC_GETVERSION, &ver, 0); 57 *version = ver;
|
H A D | fsetversion.c | 41 int fd, r, ver, save_errno = 0; local 46 ver = (int) version; 47 r = ioctl (fd, EXT2_IOC_SETVERSION, &ver); 55 int ver = (int)version; 56 return syscall(SYS_fsctl, name, EXT2_IOC_SETVERSION, &ver, 0);
|
/external/opencore/fileformats/mp4/parser/src/ |
H A D | movieextendsheaderatom.cpp | 33 uint8 ver = getVersion(); local 35 _version = ver; 38 if (ver == 0) 47 else if (ver == 1)
|
/external/apache-http/src/org/apache/http/ |
H A D | HttpResponse.java | 71 * @param ver the HTTP version 74 void setStatusLine(ProtocolVersion ver, int code); argument 79 * @param ver the HTTP version 83 void setStatusLine(ProtocolVersion ver, int code, String reason); argument
|
H A D | HttpResponseFactory.java | 51 * @param ver the protocol version 59 HttpResponse newHttpResponse(ProtocolVersion ver, int status, argument
|
/external/webkit/JavaScriptCore/tests/mozilla/js1_5/Scope/ |
H A D | regress-77578-001.js | 83 function testA(ver) 86 version(ver); 92 sTestScript += "status = 'Section A of test; JS ' + ver/100;"; 102 function testB(ver) 105 version(ver); 111 sTestScript += "status = 'Section B of test; JS ' + ver/100;"; 123 function testC(ver) 126 version(ver); 132 sTestScript += "status = 'Section C of test; JS ' + ver/100;";
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.h | 48 struct wpa_eapol_key *key, u16 ver, 51 struct wpa_eapol_key *key, u16 key_info, u16 ver); 54 u16 key_info, u16 ver); 62 struct wpa_eapol_key *key, u16 ver, 70 struct wpa_eapol_key *key, u16 key_info, u16 ver) 77 u16 key_info, u16 ver) 60 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument 69 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver) argument 75 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument
|
H A D | peerkey.c | 69 u16 mui, u16 error_type, int ver) 89 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC | 120 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL, 130 int ver, struct wpa_peerkey *peerkey) 150 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC | 172 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL, 181 const struct wpa_eapol_key *key, size_t extra_len, int ver) 236 ver); 286 wpa_supplicant_send_smk_m3(sm, src_addr, key, ver, peerkey); 340 u16 key_info, ver; local 67 wpa_supplicant_send_smk_error(struct wpa_sm *sm, const u8 *dst, const u8 *peer, u16 mui, u16 error_type, int ver) argument 127 wpa_supplicant_send_smk_m3(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey) argument 179 wpa_supplicant_process_smk_m2( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument 397 u16 key_info, ver; local 468 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument 525 wpa_supplicant_process_smk_m45( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument 667 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 777 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 826 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 902 wpa_supplicant_process_stk_4_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument 933 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument 1005 int key_info, ver; local 1144 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver) argument 1164 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument [all...] |
/external/apache-http/src/org/apache/http/message/ |
H A D | BasicHttpResponse.java | 101 * @param ver the protocol version of the response 106 public BasicHttpResponse(final ProtocolVersion ver, argument 109 this(new BasicStatusLine(ver, code, reason), null, null); 142 public void setStatusLine(final ProtocolVersion ver, final int code) { argument 144 this.statusline = new BasicStatusLine(ver, code, getReason(code)); 148 public void setStatusLine(final ProtocolVersion ver, final int code, argument 151 this.statusline = new BasicStatusLine(ver, code, reason); 157 ProtocolVersion ver = this.statusline.getProtocolVersion(); 158 this.statusline = new BasicStatusLine(ver, code, getReason(code));
|
H A D | BasicHttpRequest.java | 67 public BasicHttpRequest(final String method, final String uri, final ProtocolVersion ver) { argument 68 this(new BasicRequestLine(method, uri, ver)); 93 ProtocolVersion ver = HttpProtocolParams.getVersion(getParams()); 94 return new BasicRequestLine(this.method, this.uri, ver);
|
H A D | BasicHttpEntityEnclosingRequest.java | 60 final ProtocolVersion ver) { 61 this(new BasicRequestLine(method, uri, ver)); 59 BasicHttpEntityEnclosingRequest(final String method, final String uri, final ProtocolVersion ver) argument
|
/external/tcpdump/ |
H A D | print-cnfp.c | 87 int nrecs, ver; local 98 ver = (EXTRACT_32BITS(&nh->ver_cnt) & 0xffff0000) >> 16; 108 printf("NetFlow v%x, %u.%03u uptime, %u.%09u, ", ver, 113 if (ver == 5 || ver == 6) { 135 if (ver == 5 || ver == 6) { 144 if (ver == 5 || ver ==6) { 165 if (ver [all...] |
/external/apache-http/src/org/apache/http/impl/ |
H A D | DefaultHttpResponseFactory.java | 85 public HttpResponse newHttpResponse(final ProtocolVersion ver, argument 88 if (ver == null) { 93 StatusLine statusline = new BasicStatusLine(ver, status, reason);
|
/external/apache-http/src/org/apache/http/protocol/ |
H A D | RequestContent.java | 72 ProtocolVersion ver = request.getRequestLine().getProtocolVersion(); 80 if (ver.lessEquals(HttpVersion.HTTP_1_0)) { 82 "Chunked transfer encoding not allowed for " + ver);
|
/external/openssl/apps/ |
H A D | s_time.c | 447 int ver; local 534 ver='r'; 537 ver=SSL_version(scon); 538 if (ver == TLS1_VERSION) 539 ver='t'; 540 else if (ver == SSL3_VERSION) 541 ver='3'; 542 else if (ver == SSL2_VERSION) 543 ver='2'; 545 ver [all...] |
/external/bluetooth/hcidump/src/ |
H A D | csrsniff.c | 54 uint16_t ver; member in struct:__anon635 136 return firmware_map[i].ver; 158 struct hci_version ver; local 211 if (hci_read_local_version(dd, &ver, 1000) < 0) { 218 if (ver.manufacturer != 10 || id2ver(ver.hci_rev) < 0) { 271 printf("CSR sniffer - Bluetooth packet analyzer ver %s\n", VERSION);
|