Searched defs:authorized (Results 1 - 25 of 34) sorted by relevance

12

/external/chromium_org/third_party/libjingle/source/talk/base/
H A Dwinfirewall_unittest.cc39 bool authorized; local
41 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized));
45 EXPECT_TRUE(fw.QueryAuthorized("bogus.exe", &authorized));
48 // about whether we're authorized. It will depend on the settings of the
52 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized));
H A Dwinfirewall.cc92 bool WinFirewall::QueryAuthorized(const char* filename, bool* authorized)
94 return QueryAuthorizedW(ToUtf16(filename).c_str(), authorized);
97 bool WinFirewall::QueryAuthorizedW(const wchar_t* filename, bool* authorized)
99 *authorized = false;
119 *authorized = (fwEnabled != VARIANT_FALSE);
122 // No entry in list of authorized apps
135 bool authorized,
138 ToUtf16(friendly_name).c_str(), authorized, result);
143 bool authorized,
160 hr = app->put_Enabled(authorized
133 AddApplication(const char* filename, const char* friendly_name, bool authorized, HRESULT* result) argument
141 AddApplicationW(const wchar_t* filename, const wchar_t* friendly_name, bool authorized, HRESULT* result) argument
[all...]
/external/chromium_org/third_party/webrtc/base/
H A Dwinfirewall_unittest.cc22 bool authorized; local
24 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized));
28 EXPECT_TRUE(fw.QueryAuthorized("bogus.exe", &authorized));
31 // about whether we're authorized. It will depend on the settings of the
35 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized));
H A Dwinfirewall.cc75 bool WinFirewall::QueryAuthorized(const char* filename, bool* authorized)
77 return QueryAuthorizedW(ToUtf16(filename).c_str(), authorized);
80 bool WinFirewall::QueryAuthorizedW(const wchar_t* filename, bool* authorized)
82 *authorized = false;
102 *authorized = (fwEnabled != VARIANT_FALSE);
105 // No entry in list of authorized apps
118 bool authorized,
121 ToUtf16(friendly_name).c_str(), authorized, result);
126 bool authorized,
143 hr = app->put_Enabled(authorized
116 AddApplication(const char* filename, const char* friendly_name, bool authorized, HRESULT* result) argument
124 AddApplicationW(const wchar_t* filename, const wchar_t* friendly_name, bool authorized, HRESULT* result) argument
[all...]
/external/smack/src/org/apache/harmony/javax/security/sasl/
H A DAuthorizeCallback.java43 * Store authorized Serialized field.
45 private boolean authorized; field in class:AuthorizeCallback
63 return (authorized ? authorizedID : null);
67 return authorized;
71 authorized = ok;
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dsta_info.c940 int authorized)
949 if (!!authorized == !!(sta->flags & WLAN_STA_AUTHORIZED))
967 if (authorized) {
1002 sta->addr, authorized, dev_addr);
939 ap_sta_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
H A Dap_drv_ops.c241 struct sta_info *sta, int authorized)
243 if (authorized) {
240 hostapd_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
H A Dieee802_1x.c82 struct sta_info *sta, int authorized)
89 if (authorized) {
107 if (authorized) {
1932 int authorized)
1936 ieee802_1x_set_sta_authorized(hapd, sta, authorized);
81 ieee802_1x_set_sta_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
1931 ieee802_1x_set_port_authorized(void *ctx, void *sta_ctx, int authorized) argument
/external/wpa_supplicant_8/src/ap/
H A Dsta_info.c940 int authorized)
949 if (!!authorized == !!(sta->flags & WLAN_STA_AUTHORIZED))
967 if (authorized) {
1002 sta->addr, authorized, dev_addr);
939 ap_sta_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
H A Dap_drv_ops.c241 struct sta_info *sta, int authorized)
243 if (authorized) {
240 hostapd_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
H A Dieee802_1x.c82 struct sta_info *sta, int authorized)
89 if (authorized) {
107 if (authorized) {
1932 int authorized)
1936 ieee802_1x_set_sta_authorized(hapd, sta, authorized);
81 ieee802_1x_set_sta_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
1931 ieee802_1x_set_port_authorized(void *ctx, void *sta_ctx, int authorized) argument
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dsta_info.c940 int authorized)
949 if (!!authorized == !!(sta->flags & WLAN_STA_AUTHORIZED))
967 if (authorized) {
1002 sta->addr, authorized, dev_addr);
939 ap_sta_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
H A Dap_drv_ops.c241 struct sta_info *sta, int authorized)
243 if (authorized) {
240 hostapd_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
H A Dieee802_1x.c82 struct sta_info *sta, int authorized)
89 if (authorized) {
107 if (authorized) {
1932 int authorized)
1936 ieee802_1x_set_sta_authorized(hapd, sta, authorized);
81 ieee802_1x_set_sta_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
1931 ieee802_1x_set_port_authorized(void *ctx, void *sta_ctx, int authorized) argument
/external/wpa_supplicant_8/wpa_supplicant/
H A Dibss_rsn.c360 struct ibss_rsn_peer *peer, int authorized)
364 if (authorized) {
359 ibss_set_sta_authorized(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int authorized) argument
H A Dnotify.c546 /* Notify listeners a new station has been authorized */
569 const u8 *mac_addr, int authorized,
572 if (authorized)
568 wpas_notify_sta_authorized(struct wpa_supplicant *wpa_s, const u8 *mac_addr, int authorized, const u8 *p2p_dev_addr) argument
H A Dap.c417 int authorized, const u8 *p2p_dev_addr)
419 wpas_notify_sta_authorized(ctx, mac_addr, authorized, p2p_dev_addr);
416 ap_sta_authorized_cb(void *ctx, const u8 *mac_addr, int authorized, const u8 *p2p_dev_addr) argument
H A Dwpas_glue.c749 static void wpa_supplicant_port_cb(void *ctx, int authorized) argument
756 authorized ? "Authorized" : "Unauthorized");
761 authorized ? "Authorized" : "Unauthorized");
762 wpa_drv_set_supp_port(wpa_s, authorized);
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_madwifi.c351 madwifi_set_sta_authorized(void *priv, const u8 *addr, int authorized) argument
357 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d",
358 __func__, ether_sprintf(addr), authorized);
360 if (authorized)
369 __func__, authorized ? "" : "un", MAC2STR(addr));
H A Ddriver_atheros.c403 atheros_set_sta_authorized(void *priv, const u8 *addr, int authorized) argument
409 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d",
410 __func__, ether_sprintf(addr), authorized);
412 if (authorized)
421 __func__, authorized ? "" : "un", MAC2STR(addr));
H A Ddriver_bsd.c890 int authorized = -1; local
894 authorized = 1;
896 authorized = 0;
898 if (authorized < 0)
901 return bsd_send_mlme_param(priv, authorized ?
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_madwifi.c351 madwifi_set_sta_authorized(void *priv, const u8 *addr, int authorized) argument
357 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d",
358 __func__, ether_sprintf(addr), authorized);
360 if (authorized)
369 __func__, authorized ? "" : "un", MAC2STR(addr));
H A Ddriver_atheros.c403 atheros_set_sta_authorized(void *priv, const u8 *addr, int authorized) argument
409 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d",
410 __func__, ether_sprintf(addr), authorized);
412 if (authorized)
421 __func__, authorized ? "" : "un", MAC2STR(addr));
H A Ddriver_bsd.c890 int authorized = -1; local
894 authorized = 1;
896 authorized = 0;
898 if (authorized < 0)
901 return bsd_send_mlme_param(priv, authorized ?
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_madwifi.c351 madwifi_set_sta_authorized(void *priv, const u8 *addr, int authorized) argument
357 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d",
358 __func__, ether_sprintf(addr), authorized);
360 if (authorized)
369 __func__, authorized ? "" : "un", MAC2STR(addr));

Completed in 350 milliseconds

12