Searched defs:ver (Results 126 - 150 of 168) sorted by relevance

1234567

/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_hostap.c145 int ver; local
166 ver = fc & WLAN_FC_PVER;
171 if (ver == 3) {
180 } else if (ver == 1 || ver == 2) {
181 handle_tx_callback(drv, buf, data_len, ver == 2 ? 1 : 0);
183 } else if (ver != 0) {
184 printf("unknown protocol version %d\n", ver);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dtncc.c1169 static struct wpabuf * tncc_build_soh(int ver) argument
1197 wpabuf_put_be16(buf, ver); /* Inner Type */
1200 if (ver == 2) {
1282 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len) argument
/external/chromium_org/third_party/icu/source/common/
H A Duresbund.cpp2871 ures_getVersionByKey(const UResourceBundle* res, const char *key, UVersionInfo ver, UErrorCode *status) { argument
2876 u_versionFromUString(ver, str);
/external/fio/
H A Dstat.c841 struct group_run_stats *rs, int ver)
850 log_info("%d;%s;%s;%d;%d", ver, fio_version_string,
857 if (ver == 4)
840 show_thread_status_terse_v3_v4(struct thread_stat *ts, struct group_run_stats *rs, int ver) argument
/external/icu/icu4c/source/common/
H A Duresbund.cpp2871 ures_getVersionByKey(const UResourceBundle* res, const char *key, UVersionInfo ver, UErrorCode *status) { argument
2876 u_versionFromUString(ver, str);
/external/icu/icu4c/source/tools/genrb/
H A Dparse.cpp933 char ver[40]; local
936 if (length >= (int32_t) sizeof(ver))
938 length = (int32_t) sizeof(ver) - 1;
941 u_UCharsToChars(member->u.fString.fChars, ver, length + 1); /* +1 for copying NULL */
942 u_versionFromString(version, ver);
/external/openssl/ssl/
H A Ds3_srvr.c176 static const SSL_METHOD *ssl3_get_server_method(int ver);
178 static const SSL_METHOD *ssl3_get_server_method(int ver) argument
180 if (ver == SSL3_VERSION)
H A Dssl_lib.c2800 SSL_METHOD *ssl_bad_method(int ver) argument
/external/pdfium/core/src/fxge/win32/
H A Dfx_win32_device.cpp411 OSVERSIONINFO ver; local
412 ver.dwOSVersionInfoSize = sizeof(ver);
413 GetVersionEx(&ver);
414 pPlatformData->m_bHalfTone = ver.dwMajorVersion >= 5;
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth.c882 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK; local
887 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
897 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.c30 * @ver: Version field from Key Info
38 int ver, const u8 *dest, u16 proto,
59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) {
62 "version %d MIC", ver);
89 int key_info, ver; local
93 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED;
96 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC;
98 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES;
100 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4;
116 key_info = WPA_KEY_INFO_REQUEST | ver;
37 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument
275 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument
379 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1033 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument
1070 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1238 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument
1316 wpa_supplicant_send_2_of_2(struct wpa_sm *sm, const struct wpa_eapol_key *key, int ver, u16 key_info) argument
1352 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument
1410 wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
1464 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument
1601 u16 key_info, ver; local
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth.c882 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK; local
887 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
897 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa.c30 * @ver: Version field from Key Info
38 int ver, const u8 *dest, u16 proto,
59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) {
62 "version %d MIC", ver);
89 int key_info, ver; local
93 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED;
96 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC;
98 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES;
100 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4;
116 key_info = WPA_KEY_INFO_REQUEST | ver;
37 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument
275 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument
379 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1033 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument
1070 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1238 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument
1316 wpa_supplicant_send_2_of_2(struct wpa_sm *sm, const struct wpa_eapol_key *key, int ver, u16 key_info) argument
1352 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument
1410 wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
1464 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument
1601 u16 key_info, ver; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth.c882 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK; local
887 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
897 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.c30 * @ver: Version field from Key Info
38 int ver, const u8 *dest, u16 proto,
59 wpa_eapol_key_mic(kck, ver, msg, msg_len, key_mic)) {
62 "version %d MIC", ver);
89 int key_info, ver; local
93 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED;
96 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC;
98 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES;
100 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4;
116 key_info = WPA_KEY_INFO_REQUEST | ver;
37 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument
275 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument
379 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1033 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument
1070 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1238 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument
1316 wpa_supplicant_send_2_of_2(struct wpa_sm *sm, const struct wpa_eapol_key *key, int ver, u16 key_info) argument
1352 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument
1410 wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, const u8 *buf, size_t len) argument
1464 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument
1601 u16 key_info, ver; local
[all...]
/external/chromium_org/third_party/libaddressinput/src/java/testlibs/
H A Dhttpcore-4.1.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/http/ org/apache/http/message/ ...
/external/robolectric/lib/main/
H A Dhttpcore-4.0.1.jar ... io.IOException org.apache.http.ProtocolVersion ver org.apache.http.HttpEntity entity org. ...
/external/smack/asmack-master/lib/
H A Dhttpcore-4.1.4.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/http/ org/apache/http/impl/ ...
/external/chromium_org/third_party/boringssl/src/ssl/
H A Dssl_lib.c2590 SSL_METHOD *ssl_bad_method(int ver) argument
/external/javasqlite/src/main/native/
H A Dsqlite_jni.c55 int ver; /* version code */ member in struct:__anon22642
615 if (h->ver >= 0x020506 && cols[ncol]) {
650 if (h->ver >= 0x020506 && cols[ncol]) {
1111 h->ver = 0;
1254 h->ver = ((maj & 0xFF) << 16) | ((min & 0xFF) << 8) | (lev & 0xFF);
1467 } else if (h->ver >= 0x020500 && *p == 'Q') {
3154 v->hh.ver = h->ver;
3360 v->hh.ver = h->ver;
[all...]
/external/valgrind/main/coregrind/m_debuginfo/
H A Dreaddwarf.c946 UShort ver; local
962 ver = ML_(cur_step_UShort)(&p);
1095 p = ML_(cur_plus)(p, (ver == 2) ? addr_size
1169 UShort ver; local
1204 ver = ML_(cur_read_UShort)( ML_(cur_plus)(block_img, blklen_len) );
1205 if ( ver != 2 && ver != 3 && ver != 4 ) {
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.update.configurator_3.3.100.v20100512.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
H A Dorg.eclipse.equinox.p2.updatesite_1.0.201.R36x_v20100823.jar ... .p2.updatesite.SiteFeature feature String id String ver boolean noId org.eclipse.equinox.internal. ...
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_nl80211.c7394 u32 ver; local
7462 ver = 0;
7464 ver |= NL80211_WPA_VERSION_1;
7466 ver |= NL80211_WPA_VERSION_2;
7467 if (ver)
7468 NLA_PUT_U32(msg, NL80211_ATTR_WPA_VERSIONS, ver);
8922 enum nl80211_wpa_versions ver = 0; local
8925 ver |= NL80211_WPA_VERSION_1;
8927 ver |= NL80211_WPA_VERSION_2;
8929 wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver);
[all...]
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_nl80211.c7394 u32 ver; local
7462 ver = 0;
7464 ver |= NL80211_WPA_VERSION_1;
7466 ver |= NL80211_WPA_VERSION_2;
7467 if (ver)
7468 NLA_PUT_U32(msg, NL80211_ATTR_WPA_VERSIONS, ver);
8922 enum nl80211_wpa_versions ver = 0; local
8925 ver |= NL80211_WPA_VERSION_1;
8927 ver |= NL80211_WPA_VERSION_2;
8929 wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver);
[all...]

Completed in 720 milliseconds

1234567