/external/chromium_org/third_party/libjingle/source/talk/base/ |
H A D | winfirewall_unittest.cc | 39 bool authorized; local 41 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized)); 45 EXPECT_TRUE(fw.QueryAuthorized("bogus.exe", &authorized)); 48 // about whether we're authorized. It will depend on the settings of the 52 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized));
|
H A D | winfirewall.cc | 92 bool WinFirewall::QueryAuthorized(const char* filename, bool* authorized) 94 return QueryAuthorizedW(ToUtf16(filename).c_str(), authorized); 97 bool WinFirewall::QueryAuthorizedW(const wchar_t* filename, bool* authorized) 99 *authorized = false; 119 *authorized = (fwEnabled != VARIANT_FALSE); 122 // No entry in list of authorized apps 135 bool authorized, 138 ToUtf16(friendly_name).c_str(), authorized, result); 143 bool authorized, 160 hr = app->put_Enabled(authorized 133 AddApplication(const char* filename, const char* friendly_name, bool authorized, HRESULT* result) argument 141 AddApplicationW(const wchar_t* filename, const wchar_t* friendly_name, bool authorized, HRESULT* result) argument [all...] |
/external/chromium_org/third_party/webrtc/base/ |
H A D | winfirewall_unittest.cc | 22 bool authorized; local 24 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized)); 28 EXPECT_TRUE(fw.QueryAuthorized("bogus.exe", &authorized)); 31 // about whether we're authorized. It will depend on the settings of the 35 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized));
|
H A D | winfirewall.cc | 75 bool WinFirewall::QueryAuthorized(const char* filename, bool* authorized) 77 return QueryAuthorizedW(ToUtf16(filename).c_str(), authorized); 80 bool WinFirewall::QueryAuthorizedW(const wchar_t* filename, bool* authorized) 82 *authorized = false; 102 *authorized = (fwEnabled != VARIANT_FALSE); 105 // No entry in list of authorized apps 118 bool authorized, 121 ToUtf16(friendly_name).c_str(), authorized, result); 126 bool authorized, 143 hr = app->put_Enabled(authorized 116 AddApplication(const char* filename, const char* friendly_name, bool authorized, HRESULT* result) argument 124 AddApplicationW(const wchar_t* filename, const wchar_t* friendly_name, bool authorized, HRESULT* result) argument [all...] |
/external/smack/src/org/apache/harmony/javax/security/sasl/ |
H A D | AuthorizeCallback.java | 43 * Store authorized Serialized field. 45 private boolean authorized; field in class:AuthorizeCallback 63 return (authorized ? authorizedID : null); 67 return authorized; 71 authorized = ok;
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | sta_info.c | 940 int authorized) 949 if (!!authorized == !!(sta->flags & WLAN_STA_AUTHORIZED)) 967 if (authorized) { 1002 sta->addr, authorized, dev_addr); 939 ap_sta_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
|
H A D | ap_drv_ops.c | 241 struct sta_info *sta, int authorized) 243 if (authorized) { 240 hostapd_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
|
H A D | ieee802_1x.c | 82 struct sta_info *sta, int authorized) 89 if (authorized) { 107 if (authorized) { 1932 int authorized) 1936 ieee802_1x_set_sta_authorized(hapd, sta, authorized); 81 ieee802_1x_set_sta_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument 1931 ieee802_1x_set_port_authorized(void *ctx, void *sta_ctx, int authorized) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | sta_info.c | 940 int authorized) 949 if (!!authorized == !!(sta->flags & WLAN_STA_AUTHORIZED)) 967 if (authorized) { 1002 sta->addr, authorized, dev_addr); 939 ap_sta_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
|
H A D | ap_drv_ops.c | 241 struct sta_info *sta, int authorized) 243 if (authorized) { 240 hostapd_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
|
H A D | ieee802_1x.c | 82 struct sta_info *sta, int authorized) 89 if (authorized) { 107 if (authorized) { 1932 int authorized) 1936 ieee802_1x_set_sta_authorized(hapd, sta, authorized); 81 ieee802_1x_set_sta_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument 1931 ieee802_1x_set_port_authorized(void *ctx, void *sta_ctx, int authorized) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | sta_info.c | 940 int authorized) 949 if (!!authorized == !!(sta->flags & WLAN_STA_AUTHORIZED)) 967 if (authorized) { 1002 sta->addr, authorized, dev_addr); 939 ap_sta_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
|
H A D | ap_drv_ops.c | 241 struct sta_info *sta, int authorized) 243 if (authorized) { 240 hostapd_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
|
H A D | ieee802_1x.c | 82 struct sta_info *sta, int authorized) 89 if (authorized) { 107 if (authorized) { 1932 int authorized) 1936 ieee802_1x_set_sta_authorized(hapd, sta, authorized); 81 ieee802_1x_set_sta_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument 1931 ieee802_1x_set_port_authorized(void *ctx, void *sta_ctx, int authorized) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ibss_rsn.c | 360 struct ibss_rsn_peer *peer, int authorized) 364 if (authorized) { 359 ibss_set_sta_authorized(struct ibss_rsn *ibss_rsn, struct ibss_rsn_peer *peer, int authorized) argument
|
H A D | notify.c | 546 /* Notify listeners a new station has been authorized */ 569 const u8 *mac_addr, int authorized, 572 if (authorized) 568 wpas_notify_sta_authorized(struct wpa_supplicant *wpa_s, const u8 *mac_addr, int authorized, const u8 *p2p_dev_addr) argument
|
H A D | ap.c | 417 int authorized, const u8 *p2p_dev_addr) 419 wpas_notify_sta_authorized(ctx, mac_addr, authorized, p2p_dev_addr); 416 ap_sta_authorized_cb(void *ctx, const u8 *mac_addr, int authorized, const u8 *p2p_dev_addr) argument
|
H A D | wpas_glue.c | 749 static void wpa_supplicant_port_cb(void *ctx, int authorized) argument 756 authorized ? "Authorized" : "Unauthorized"); 761 authorized ? "Authorized" : "Unauthorized"); 762 wpa_drv_set_supp_port(wpa_s, authorized);
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_madwifi.c | 351 madwifi_set_sta_authorized(void *priv, const u8 *addr, int authorized) argument 357 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d", 358 __func__, ether_sprintf(addr), authorized); 360 if (authorized) 369 __func__, authorized ? "" : "un", MAC2STR(addr));
|
H A D | driver_atheros.c | 403 atheros_set_sta_authorized(void *priv, const u8 *addr, int authorized) argument 409 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d", 410 __func__, ether_sprintf(addr), authorized); 412 if (authorized) 421 __func__, authorized ? "" : "un", MAC2STR(addr));
|
H A D | driver_bsd.c | 890 int authorized = -1; local 894 authorized = 1; 896 authorized = 0; 898 if (authorized < 0) 901 return bsd_send_mlme_param(priv, authorized ?
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_madwifi.c | 351 madwifi_set_sta_authorized(void *priv, const u8 *addr, int authorized) argument 357 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d", 358 __func__, ether_sprintf(addr), authorized); 360 if (authorized) 369 __func__, authorized ? "" : "un", MAC2STR(addr));
|
H A D | driver_atheros.c | 403 atheros_set_sta_authorized(void *priv, const u8 *addr, int authorized) argument 409 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d", 410 __func__, ether_sprintf(addr), authorized); 412 if (authorized) 421 __func__, authorized ? "" : "un", MAC2STR(addr));
|
H A D | driver_bsd.c | 890 int authorized = -1; local 894 authorized = 1; 896 authorized = 0; 898 if (authorized < 0) 901 return bsd_send_mlme_param(priv, authorized ?
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_madwifi.c | 351 madwifi_set_sta_authorized(void *priv, const u8 *addr, int authorized) argument 357 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d", 358 __func__, ether_sprintf(addr), authorized); 360 if (authorized) 369 __func__, authorized ? "" : "un", MAC2STR(addr));
|