Searched refs:ver (Results 1 - 25 of 123) sorted by relevance

12345

/external/openssl/ssl/
H A Ds23_meth.c63 static SSL_METHOD *ssl23_get_method(int ver);
64 static SSL_METHOD *ssl23_get_method(int ver) argument
67 if (ver == SSL2_VERSION)
72 if (ver == SSL3_VERSION)
77 if (ver == TLS1_VERSION)
H A Dd1_meth.c64 static SSL_METHOD *dtls1_get_method(int ver);
65 static SSL_METHOD *dtls1_get_method(int ver) argument
67 if (ver == DTLS1_VERSION)
H A Ds3_meth.c63 static SSL_METHOD *ssl3_get_method(int ver);
64 static SSL_METHOD *ssl3_get_method(int ver) argument
66 if (ver == SSL3_VERSION)
H A Dt1_meth.c63 static SSL_METHOD *tls1_get_method(int ver);
64 static SSL_METHOD *tls1_get_method(int ver) argument
66 if (ver == TLS1_VERSION)
H A Ds2_meth.c64 static SSL_METHOD *ssl2_get_method(int ver);
65 static SSL_METHOD *ssl2_get_method(int ver) argument
67 if (ver == SSL2_VERSION)
H A Dt1_clnt.c66 static SSL_METHOD *tls1_get_client_method(int ver);
67 static SSL_METHOD *tls1_get_client_method(int ver) argument
69 if (ver == TLS1_VERSION)
H A Dt1_srvr.c67 static SSL_METHOD *tls1_get_server_method(int ver);
68 static SSL_METHOD *tls1_get_server_method(int ver) argument
70 if (ver == TLS1_VERSION)
/external/e2fsprogs/lib/e2p/
H A Dsetversion.c27 int ver; local
29 ver = (int) version;
30 return ioctl (fd, EXT2_IOC_SETVERSION, &ver);
H A Dgetversion.c27 int r, ver; local
29 r = ioctl (fd, EXT2_IOC_GETVERSION, &ver);
30 *version = ver;
H A Dfgetversion.c41 int fd, r, ver, save_errno = 0; local
46 r = ioctl (fd, EXT2_IOC_GETVERSION, &ver);
49 *version = ver;
55 int ver=-1, err;
56 err = syscall(SYS_fsctl, name, EXT2_IOC_GETVERSION, &ver, 0);
57 *version = ver;
H A Dfsetversion.c41 int fd, r, ver, save_errno = 0; local
46 ver = (int) version;
47 r = ioctl (fd, EXT2_IOC_SETVERSION, &ver);
55 int ver = (int)version;
56 return syscall(SYS_fsctl, name, EXT2_IOC_SETVERSION, &ver, 0);
/external/opencore/fileformats/mp4/parser/src/
H A Dmovieextendsheaderatom.cpp33 uint8 ver = getVersion(); local
35 _version = ver;
38 if (ver == 0)
47 else if (ver == 1)
/external/apache-http/src/org/apache/http/
H A DHttpResponse.java71 * @param ver the HTTP version
74 void setStatusLine(ProtocolVersion ver, int code); argument
79 * @param ver the HTTP version
83 void setStatusLine(ProtocolVersion ver, int code, String reason); argument
H A DHttpResponseFactory.java51 * @param ver the protocol version
59 HttpResponse newHttpResponse(ProtocolVersion ver, int status, argument
/external/webkit/JavaScriptCore/tests/mozilla/js1_5/Scope/
H A Dregress-77578-001.js83 function testA(ver)
86 version(ver);
92 sTestScript += "status = 'Section A of test; JS ' + ver/100;";
102 function testB(ver)
105 version(ver);
111 sTestScript += "status = 'Section B of test; JS ' + ver/100;";
123 function testC(ver)
126 version(ver);
132 sTestScript += "status = 'Section C of test; JS ' + ver/100;";
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.h48 struct wpa_eapol_key *key, u16 ver,
51 struct wpa_eapol_key *key, u16 key_info, u16 ver);
54 u16 key_info, u16 ver);
62 struct wpa_eapol_key *key, u16 ver,
70 struct wpa_eapol_key *key, u16 key_info, u16 ver)
77 u16 key_info, u16 ver)
60 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
69 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver) argument
75 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument
H A Dpeerkey.c69 u16 mui, u16 error_type, int ver)
89 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC |
120 wpa_eapol_key_send(sm, sm->ptk.kck, ver, dst, ETH_P_EAPOL,
130 int ver, struct wpa_peerkey *peerkey)
150 key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC |
172 wpa_eapol_key_send(sm, sm->ptk.kck, ver, src_addr, ETH_P_EAPOL,
181 const struct wpa_eapol_key *key, size_t extra_len, int ver)
236 ver);
286 wpa_supplicant_send_smk_m3(sm, src_addr, key, ver, peerkey);
340 u16 key_info, ver; local
67 wpa_supplicant_send_smk_error(struct wpa_sm *sm, const u8 *dst, const u8 *peer, u16 mui, u16 error_type, int ver) argument
127 wpa_supplicant_send_smk_m3(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey) argument
179 wpa_supplicant_process_smk_m2( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument
397 u16 key_info, ver; local
468 wpa_supplicant_process_smk_m5(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, int ver, struct wpa_peerkey *peerkey, struct wpa_eapol_ie_parse *kde) argument
525 wpa_supplicant_process_smk_m45( struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, size_t extra_len, int ver) argument
667 wpa_supplicant_process_stk_1_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument
777 wpa_supplicant_process_stk_2_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument
826 wpa_supplicant_process_stk_3_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument
902 wpa_supplicant_process_stk_4_of_4(struct wpa_sm *sm, struct wpa_peerkey *peerkey, const struct wpa_eapol_key *key, u16 ver) argument
933 peerkey_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
1005 int key_info, ver; local
1144 peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, struct wpa_eapol_key *key, u16 key_info, u16 ver) argument
1164 peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, struct wpa_eapol_key *key, size_t extra_len, u16 key_info, u16 ver) argument
[all...]
/external/apache-http/src/org/apache/http/message/
H A DBasicHttpResponse.java101 * @param ver the protocol version of the response
106 public BasicHttpResponse(final ProtocolVersion ver, argument
109 this(new BasicStatusLine(ver, code, reason), null, null);
142 public void setStatusLine(final ProtocolVersion ver, final int code) { argument
144 this.statusline = new BasicStatusLine(ver, code, getReason(code));
148 public void setStatusLine(final ProtocolVersion ver, final int code, argument
151 this.statusline = new BasicStatusLine(ver, code, reason);
157 ProtocolVersion ver = this.statusline.getProtocolVersion();
158 this.statusline = new BasicStatusLine(ver, code, getReason(code));
H A DBasicHttpRequest.java67 public BasicHttpRequest(final String method, final String uri, final ProtocolVersion ver) { argument
68 this(new BasicRequestLine(method, uri, ver));
93 ProtocolVersion ver = HttpProtocolParams.getVersion(getParams());
94 return new BasicRequestLine(this.method, this.uri, ver);
H A DBasicHttpEntityEnclosingRequest.java60 final ProtocolVersion ver) {
61 this(new BasicRequestLine(method, uri, ver));
59 BasicHttpEntityEnclosingRequest(final String method, final String uri, final ProtocolVersion ver) argument
/external/tcpdump/
H A Dprint-cnfp.c87 int nrecs, ver; local
98 ver = (EXTRACT_32BITS(&nh->ver_cnt) & 0xffff0000) >> 16;
108 printf("NetFlow v%x, %u.%03u uptime, %u.%09u, ", ver,
113 if (ver == 5 || ver == 6) {
135 if (ver == 5 || ver == 6) {
144 if (ver == 5 || ver ==6) {
165 if (ver
[all...]
/external/apache-http/src/org/apache/http/impl/
H A DDefaultHttpResponseFactory.java85 public HttpResponse newHttpResponse(final ProtocolVersion ver, argument
88 if (ver == null) {
93 StatusLine statusline = new BasicStatusLine(ver, status, reason);
/external/apache-http/src/org/apache/http/protocol/
H A DRequestContent.java72 ProtocolVersion ver = request.getRequestLine().getProtocolVersion();
80 if (ver.lessEquals(HttpVersion.HTTP_1_0)) {
82 "Chunked transfer encoding not allowed for " + ver);
/external/openssl/apps/
H A Ds_time.c447 int ver; local
534 ver='r';
537 ver=SSL_version(scon);
538 if (ver == TLS1_VERSION)
539 ver='t';
540 else if (ver == SSL3_VERSION)
541 ver='3';
542 else if (ver == SSL2_VERSION)
543 ver='2';
545 ver
[all...]
/external/bluetooth/hcidump/src/
H A Dcsrsniff.c54 uint16_t ver; member in struct:__anon635
136 return firmware_map[i].ver;
158 struct hci_version ver; local
211 if (hci_read_local_version(dd, &ver, 1000) < 0) {
218 if (ver.manufacturer != 10 || id2ver(ver.hci_rev) < 0) {
271 printf("CSR sniffer - Bluetooth packet analyzer ver %s\n", VERSION);

Completed in 245 milliseconds

12345