/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_hostap.c | 145 int ver; local 166 ver = fc & WLAN_FC_PVER; 171 if (ver == 3) { 180 } else if (ver == 1 || ver == 2) { 181 handle_tx_callback(drv, buf, data_len, ver == 2 ? 1 : 0); 183 } else if (ver != 0) { 184 printf("unknown protocol version %d\n", ver);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | tncc.c | 1169 static struct wpabuf * tncc_build_soh(int ver) argument 1197 wpabuf_put_be16(buf, ver); /* Inner Type */ 1200 if (ver == 2) { 1282 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len) argument
|
/external/chromium_org/third_party/icu/source/common/ |
H A D | uresbund.cpp | 2871 ures_getVersionByKey(const UResourceBundle* res, const char *key, UVersionInfo ver, UErrorCode *status) { argument 2876 u_versionFromUString(ver, str);
|
/external/fio/ |
H A D | stat.c | 841 struct group_run_stats *rs, int ver) 850 log_info("%d;%s;%s;%d;%d", ver, fio_version_string, 857 if (ver == 4) 840 show_thread_status_terse_v3_v4(struct thread_stat *ts, struct group_run_stats *rs, int ver) argument
|
/external/icu/icu4c/source/common/ |
H A D | uresbund.cpp | 2871 ures_getVersionByKey(const UResourceBundle* res, const char *key, UVersionInfo ver, UErrorCode *status) { argument 2876 u_versionFromUString(ver, str);
|
/external/icu/icu4c/source/tools/genrb/ |
H A D | parse.cpp | 933 char ver[40]; local 936 if (length >= (int32_t) sizeof(ver)) 938 length = (int32_t) sizeof(ver) - 1; 941 u_UCharsToChars(member->u.fString.fChars, ver, length + 1); /* +1 for copying NULL */ 942 u_versionFromString(version, ver);
|
/external/openssl/ssl/ |
H A D | s3_srvr.c | 176 static const SSL_METHOD *ssl3_get_server_method(int ver); 178 static const SSL_METHOD *ssl3_get_server_method(int ver) argument 180 if (ver == SSL3_VERSION)
|
H A D | ssl_lib.c | 2800 SSL_METHOD *ssl_bad_method(int ver) argument
|
/external/pdfium/core/src/fxge/win32/ |
H A D | fx_win32_device.cpp | 411 OSVERSIONINFO ver;
local 412 ver.dwOSVersionInfoSize = sizeof(ver);
413 GetVersionEx(&ver);
414 pPlatformData->m_bHalfTone = ver.dwMajorVersion >= 5;
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.c | 882 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK; local 887 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) { 897 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 30 * @ver: Version field from Key Info 38 int ver, const u8 *dest, u16 proto, 59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { 62 "version %d MIC", ver); 89 int key_info, ver; local 93 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED; 96 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC; 98 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES; 100 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4; 116 key_info = WPA_KEY_INFO_REQUEST | ver; 37 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument 275 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument 379 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1033 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument 1070 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1238 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument 1316 wpa_supplicant_send_2_of_2(struct wpa_sm *sm, const struct wpa_eapol_key *key, int ver, u16 key_info) argument 1352 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument 1410 wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument 1464 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument 1601 u16 key_info, ver; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth.c | 882 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK; local 887 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) { 897 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa.c | 30 * @ver: Version field from Key Info 38 int ver, const u8 *dest, u16 proto, 59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { 62 "version %d MIC", ver); 89 int key_info, ver; local 93 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED; 96 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC; 98 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES; 100 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4; 116 key_info = WPA_KEY_INFO_REQUEST | ver; 37 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument 275 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument 379 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1033 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument 1070 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1238 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument 1316 wpa_supplicant_send_2_of_2(struct wpa_sm *sm, const struct wpa_eapol_key *key, int ver, u16 key_info) argument 1352 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument 1410 wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument 1464 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument 1601 u16 key_info, ver; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth.c | 882 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK; local 887 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) { 897 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.c | 30 * @ver: Version field from Key Info 38 int ver, const u8 *dest, u16 proto, 59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) { 62 "version %d MIC", ver); 89 int key_info, ver; local 93 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED; 96 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC; 98 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES; 100 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4; 116 key_info = WPA_KEY_INFO_REQUEST | ver; 37 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument 275 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument 379 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1033 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument 1070 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1238 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument 1316 wpa_supplicant_send_2_of_2(struct wpa_sm *sm, const struct wpa_eapol_key *key, int ver, u16 key_info) argument 1352 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument 1410 wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument 1464 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument 1601 u16 key_info, ver; local [all...] |
/external/chromium_org/third_party/libaddressinput/src/java/testlibs/ |
H A D | httpcore-4.1.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/http/ org/apache/http/message/ ... |
/external/robolectric/lib/main/ |
H A D | httpcore-4.0.1.jar | ... io.IOException org.apache.http.ProtocolVersion ver
org.apache.http.HttpEntity entity
org. ... |
/external/smack/asmack-master/lib/ |
H A D | httpcore-4.1.4.jar | META-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/http/ org/apache/http/impl/ ... |
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | ssl_lib.c | 2590 SSL_METHOD *ssl_bad_method(int ver) argument
|
/external/javasqlite/src/main/native/ |
H A D | sqlite_jni.c | 55 int ver; /* version code */ member in struct:__anon22642 615 if (h->ver >= 0x020506 && cols[ncol]) { 650 if (h->ver >= 0x020506 && cols[ncol]) { 1111 h->ver = 0; 1254 h->ver = ((maj & 0xFF) << 16) | ((min & 0xFF) << 8) | (lev & 0xFF); 1467 } else if (h->ver >= 0x020500 && *p == 'Q') { 3154 v->hh.ver = h->ver; 3360 v->hh.ver = h->ver; [all...] |
/external/valgrind/main/coregrind/m_debuginfo/ |
H A D | readdwarf.c | 946 UShort ver; local 962 ver = ML_(cur_step_UShort)(&p); 1095 p = ML_(cur_plus)(p, (ver == 2) ? addr_size 1169 UShort ver; local 1204 ver = ML_(cur_read_UShort)( ML_(cur_plus)(block_img, blklen_len) ); 1205 if ( ver != 2 && ver != 3 && ver != 4 ) {
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.update.configurator_3.3.100.v20100512.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
H A D | org.eclipse.equinox.p2.updatesite_1.0.201.R36x_v20100823.jar | ... .p2.updatesite.SiteFeature feature
String id
String ver
boolean noId
org.eclipse.equinox.internal. ... |
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211.c | 7394 u32 ver; local 7462 ver = 0; 7464 ver |= NL80211_WPA_VERSION_1; 7466 ver |= NL80211_WPA_VERSION_2; 7467 if (ver) 7468 NLA_PUT_U32(msg, NL80211_ATTR_WPA_VERSIONS, ver); 8922 enum nl80211_wpa_versions ver = 0; local 8925 ver |= NL80211_WPA_VERSION_1; 8927 ver |= NL80211_WPA_VERSION_2; 8929 wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver); [all...] |
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211.c | 7394 u32 ver; local 7462 ver = 0; 7464 ver |= NL80211_WPA_VERSION_1; 7466 ver |= NL80211_WPA_VERSION_2; 7467 if (ver) 7468 NLA_PUT_U32(msg, NL80211_ATTR_WPA_VERSIONS, ver); 8922 enum nl80211_wpa_versions ver = 0; local 8925 ver |= NL80211_WPA_VERSION_1; 8927 ver |= NL80211_WPA_VERSION_2; 8929 wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver); [all...] |