/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_fast_common.c | 19 void eap_fast_put_tlv_hdr(struct wpabuf *buf, u16 type, u16 len) 28 void eap_fast_put_tlv(struct wpabuf *buf, u16 type, const void *data, 29 u16 len) 36 void eap_fast_put_tlv_buf(struct wpabuf *buf, u16 type,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_fast_common.c | 19 void eap_fast_put_tlv_hdr(struct wpabuf *buf, u16 type, u16 len) 28 void eap_fast_put_tlv(struct wpabuf *buf, u16 type, const void *data, 29 u16 len) 36 void eap_fast_put_tlv_buf(struct wpabuf *buf, u16 type,
|
/external/qemu/distrib/sdl-1.2.15/src/video/nds/ |
H A D | SDL_ndsvideo.c | 162 u16* frontBuffer;// = (u16*)(0x06000000); 163 u16* backBuffer;// = (u16*)(0x06000000 + 256 * 256 * 2); 223 consoleInitDefault((u16*)SCREEN_BASE_BLOCK_SUB(8), (u16*)CHAR_BASE_BLOCK_SUB(0), 16); 226 frontBuffer =(u16*)(0x06000000); 227 //backBuffer =(u16*)(0x06000000 + 1024 * 512*2); 328 backBuffer=(u16*)SDL_malloc(1024*512*2); 353 //backBuffer=(u16*)mallo [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.h | 190 void (*disconnect)(void *ctx, const u8 *addr, u16 reason); 207 int (*send_ether)(void *ctx, const u8 *dst, u16 proto, const u8 *data, 290 u16 auth_transaction, const u8 *ies, size_t ies_len, 292 u16 auth_transaction, u16 resp, 295 u16 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies,
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth.h | 190 void (*disconnect)(void *ctx, const u8 *addr, u16 reason); 207 int (*send_ether)(void *ctx, const u8 *dst, u16 proto, const u8 *data, 290 u16 auth_transaction, const u8 *ies, size_t ies_len, 292 u16 auth_transaction, u16 resp, 295 u16 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies,
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth.h | 190 void (*disconnect)(void *ctx, const u8 *addr, u16 reason); 207 int (*send_ether)(void *ctx, const u8 *dst, u16 proto, const u8 *data, 290 u16 auth_transaction, const u8 *ies, size_t ies_len, 292 u16 auth_transaction, u16 resp, 295 u16 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies,
|
/external/bluetooth/bluedroid/stack/sdp/ |
H A D | sdp_api.c | 360 p_uuid->uu.uuid16 = p_sattr->attr_value.v.u16; 393 p_uuid->uu.uuid16 = p_extra_sattr->attr_value.v.u16; 409 p_uuid->uu.uuid16 = p_attr->attr_value.v.u16; 517 p_sattr->attr_value.v.u16, service_uuid); 520 if( (p_sattr->attr_value.v.u16==UUID_SERVCLASS_HDP_SOURCE) || ( p_sattr->attr_value.v.u16==UUID_SERVCLASS_HDP_SINK)) 531 && p_sattr->attr_value.v.u16 == service_uuid))) 552 && ((p_extra_sattr->attr_value.v.u16 == service_uuid) || (service_uuid == 0))) 567 && ((p_attr->attr_value.v.u16 == service_uuid) || service_uuid == 0)) 751 /* SDP_TRACE_DEBUG ("SDP - p_sattr 0x%x, layer_uuid:0x%x, u16 [all...] |
/external/chromium_org/third_party/libvpx/source/libvpx/vp8/encoder/arm/neon/ |
H A D | fastquantizeb_neon.asm | 127 vmax.u16 q0, q0, q1 ; find maximum value in q0, q1 131 vmax.u16 q10, q10, q11 ; find maximum value in q10, q11 133 vmax.u16 d0, d0, d1 134 vmax.u16 d20, d20, d21 135 vmovl.u16 q0, d0 136 vmovl.u16 q10, d20 222 vmax.u16 q0, q10, q11 ; find maximum value in q0, q1 223 vmax.u16 d0, d0, d1 224 vmovl.u16 q0, d0
|
/external/compiler-rt/lib/ubsan/ |
H A D | ubsan_value.h | 93 u16 TypeKind; 97 u16 TypeInfo;
|
/external/libvpx/libvpx/vp8/encoder/arm/neon/ |
H A D | fastquantizeb_neon.asm | 127 vmax.u16 q0, q0, q1 ; find maximum value in q0, q1 131 vmax.u16 q10, q10, q11 ; find maximum value in q10, q11 133 vmax.u16 d0, d0, d1 134 vmax.u16 d20, d20, d21 135 vmovl.u16 q0, d0 136 vmovl.u16 q10, d20 222 vmax.u16 q0, q10, q11 ; find maximum value in q0, q1 223 vmax.u16 d0, d0, d1 224 vmovl.u16 q0, d0
|
/external/linux-tools-perf/perf-3.12.0/tools/perf/util/ |
H A D | sort.h | 96 u16 row_offset; 97 u16 nr_rows;
|
/external/llvm/test/MC/ARM/ |
H A D | neon-cmp-encoding.s | 25 vcge.u16 d16, d16, d17 32 vcge.u16 q8, q8, q9 42 @ CHECK: vcge.u16 d16, d16, d17 @ encoding: [0xb1,0x03,0x50,0xf3] 49 @ CHECK: vcge.u16 q8, q8, q9 @ encoding: [0xf2,0x03,0x50,0xf3] 59 vcgt.u16 d16, d16, d17 66 vcgt.u16 q8, q8, q9 76 @ CHECK: vcgt.u16 d16, d16, d17 @ encoding: [0xa1,0x03,0x50,0xf3] 83 @ CHECK: vcgt.u16 q8, q8, q9 @ encoding: [0xe2,0x03,0x50,0xf3] 120 vclt.u16 q12, q13, q3 128 vclt.u16 d1 [all...] |
/external/valgrind/main/memcheck/tests/vbit-test/ |
H A D | binary.c | 20 case 16: val2.u16 = ~val2.u16 & 0xffff; break; 33 new.bits.u16 = (v1.bits.u16 & ~v2.bits.u16 & val2.u16) & 0xffff; 229 case 16: val.u16 = 0; break; 246 case 16: val.u16 = 0xffff; break;
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_sd.c | 23 u16 len; 39 u16 info = WPA_GET_BE16(pos); 162 static struct wpabuf * p2p_build_sd_query(u16 update_indic, 203 static struct wpabuf * p2p_build_sd_response(u8 dialog_token, u16 status_code, 204 u16 comeback_delay, 205 u16 update_indic, 234 u16 status_code, 235 u16 update_indic, 238 u16 total_len) 317 u16 sle [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_common.c | 107 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite) 289 int tls_version_ok(u16 ver) 306 const char * tls_version_str(u16 ver) 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, 338 int tlsv12_key_x_server_params_hash(u16 tls_version, 362 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 401 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, 408 u16 slen;
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | wpabuf.h | 107 static inline void wpabuf_put_le16(struct wpabuf *buf, u16 data) 119 static inline void wpabuf_put_be16(struct wpabuf *buf, u16 data)
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_upnp_i.h | 99 u16 dev_password_id; 100 u16 config_methods;
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_sd.c | 23 u16 len; 39 u16 info = WPA_GET_BE16(pos); 162 static struct wpabuf * p2p_build_sd_query(u16 update_indic, 203 static struct wpabuf * p2p_build_sd_response(u8 dialog_token, u16 status_code, 204 u16 comeback_delay, 205 u16 update_indic, 234 u16 status_code, 235 u16 update_indic, 238 u16 total_len) 317 u16 sle [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_common.c | 107 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite) 289 int tls_version_ok(u16 ver) 306 const char * tls_version_str(u16 ver) 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, 338 int tlsv12_key_x_server_params_hash(u16 tls_version, 362 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 401 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, 408 u16 slen;
|
/external/wpa_supplicant_8/src/utils/ |
H A D | wpabuf.h | 107 static inline void wpabuf_put_le16(struct wpabuf *buf, u16 data) 119 static inline void wpabuf_put_be16(struct wpabuf *buf, u16 data)
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_upnp_i.h | 99 u16 dev_password_id; 100 u16 config_methods;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ap.h | 48 void ap_mgmt_tx_cb(void *ctx, const u8 *buf, size_t len, u16 stype, int ok); 75 int wpas_ap_wps_add_nfc_pw(struct wpa_supplicant *wpa_s, u16 pw_id,
|
H A D | bss.h | 76 u16 beacon_int; 78 u16 caps;
|
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_sd.c | 23 u16 len; 39 u16 info = WPA_GET_BE16(pos); 162 static struct wpabuf * p2p_build_sd_query(u16 update_indic, 203 static struct wpabuf * p2p_build_sd_response(u8 dialog_token, u16 status_code, 204 u16 comeback_delay, 205 u16 update_indic, 234 u16 status_code, 235 u16 update_indic, 238 u16 total_len) 317 u16 sle [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_common.c | 107 const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite) 289 int tls_version_ok(u16 ver) 306 const char * tls_version_str(u16 ver) 321 int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, 338 int tlsv12_key_x_server_params_hash(u16 tls_version, 362 int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 401 int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, 408 u16 slen;
|