Searched defs:allowed (Results 1 - 25 of 131) sorted by last modified time

123456

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dacs.c359 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local
363 for (i = 0; i < ARRAY_SIZE(allowed); i++)
364 if (chan->chan == allowed[i])
373 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local
376 for (i = 0; i < ARRAY_SIZE(allowed); i++)
377 if (chan->chan == allowed[i])
553 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40",
562 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
H A Ddfs.c94 int *allowed = allowed_40; local
99 allowed = allowed_40;
103 allowed = allowed_80;
107 allowed = allowed_160;
116 if (chan->chan == allowed[i])
H A Dhw_features.c227 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, 157, local
239 /* Verify that HT40 secondary channel is an allowed 20 MHz
252 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed",
258 * Verify that HT40 primary,secondary channel pair is allowed per
261 * the list of allowed channels (already checked above).
272 for (k = 0; k < ARRAY_SIZE(allowed); k++) {
273 if (first == allowed[k]) {
279 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
519 * allowed per IEEE Std 802.11-2012, 10.15.3.2 */
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_nl80211.c12520 static int nl80211_roaming(void *priv, int allowed, const u8 *bssid) argument
12527 wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed);
12550 allowed ? QCA_ROAMING_ALLOWED_WITHIN_ESS :
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius_das.c39 u8 allowed[] = { local
64 attr = radius_msg_find_unlisted_attr(msg, allowed);
/external/wpa_supplicant_8/src/ap/
H A Dacs.c359 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local
363 for (i = 0; i < ARRAY_SIZE(allowed); i++)
364 if (chan->chan == allowed[i])
373 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local
376 for (i = 0; i < ARRAY_SIZE(allowed); i++)
377 if (chan->chan == allowed[i])
553 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40",
562 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
H A Ddfs.c94 int *allowed = allowed_40; local
99 allowed = allowed_40;
103 allowed = allowed_80;
107 allowed = allowed_160;
116 if (chan->chan == allowed[i])
H A Dhw_features.c227 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, 157, local
239 /* Verify that HT40 secondary channel is an allowed 20 MHz
252 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed",
258 * Verify that HT40 primary,secondary channel pair is allowed per
261 * the list of allowed channels (already checked above).
272 for (k = 0; k < ARRAY_SIZE(allowed); k++) {
273 if (first == allowed[k]) {
279 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
519 * allowed per IEEE Std 802.11-2012, 10.15.3.2 */
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_nl80211.c12520 static int nl80211_roaming(void *priv, int allowed, const u8 *bssid) argument
12527 wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed);
12550 allowed ? QCA_ROAMING_ALLOWED_WITHIN_ESS :
/external/wpa_supplicant_8/src/radius/
H A Dradius_das.c39 u8 allowed[] = { local
64 attr = radius_msg_find_unlisted_attr(msg, allowed);
/external/wpa_supplicant_8/wpa_supplicant/
H A Ddriver_i.h635 static inline int wpa_drv_roaming(struct wpa_supplicant *wpa_s, int allowed, argument
640 return wpa_s->driver->roaming(wpa_s->drv_priv, allowed, bssid);
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dacs.c359 const int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, local
363 for (i = 0; i < ARRAY_SIZE(allowed); i++)
364 if (chan->chan == allowed[i])
373 const int allowed[] = { 36, 52, 100, 116, 132, 149 }; local
376 for (i = 0; i < ARRAY_SIZE(allowed); i++)
377 if (chan->chan == allowed[i])
553 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for HT40",
562 wpa_printf(MSG_DEBUG, "ACS: Channel %d: not allowed as primary channel for VHT80",
H A Ddfs.c94 int *allowed = allowed_40; local
99 allowed = allowed_40;
103 allowed = allowed_80;
107 allowed = allowed_160;
116 if (chan->chan == allowed[i])
H A Dhw_features.c227 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, 157, local
239 /* Verify that HT40 secondary channel is an allowed 20 MHz
252 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed",
258 * Verify that HT40 primary,secondary channel pair is allowed per
261 * the list of allowed channels (already checked above).
272 for (k = 0; k < ARRAY_SIZE(allowed); k++) {
273 if (first == allowed[k]) {
279 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
519 * allowed per IEEE Std 802.11-2012, 10.15.3.2 */
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_nl80211.c12520 static int nl80211_roaming(void *priv, int allowed, const u8 *bssid) argument
12527 wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed);
12550 allowed ? QCA_ROAMING_ALLOWED_WITHIN_ESS :
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius_das.c39 u8 allowed[] = { local
64 attr = radius_msg_find_unlisted_attr(msg, allowed);
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/
H A Dnetworkconfig.cpp166 QStringList allowed; local
167 allowed << "MSCHAPV2" << "MD5" << "GTC" << "TLS" << "OTP" << "SIM"
170 if (allowed.contains(eapSelect->itemText(i))) {
/external/vixl/test/
H A Dtest-assembler-a64.cc7770 const RegList allowed = ~stack_pointer.Bit(); local
7772 reg_count = CountSetBits(allowed, kNumberOfRegisters);
7778 allowed);
7946 static RegList const allowed = ~0; local
7948 reg_count = CountSetBits(allowed, kNumberOfFPRegisters);
7954 allowed);
8113 const RegList allowed = ~stack_pointer.Bit(); local
8117 PopulateRegisterArray(NULL, x, r, reg_size, 10, allowed);
8213 const RegList allowed = ~stack_pointer.Bit(); local
8215 reg_count = CountSetBits(allowed, kNumberOfRegister
[all...]
H A Dtest-utils-a64.cc214 int reg_size, int reg_count, RegList allowed) {
218 if (((UINT64_C(1) << n) & allowed) != 0) {
219 // Only assign allowed registers.
241 int reg_size, int reg_count, RegList allowed) {
245 if (((UINT64_C(1) << n) & allowed) != 0) {
246 // Only assigned allowed registers.
213 PopulateRegisterArray(Register* w, Register* x, Register* r, int reg_size, int reg_count, RegList allowed) argument
240 PopulateFPRegisterArray(FPRegister* s, FPRegister* d, FPRegister* v, int reg_size, int reg_count, RegList allowed) argument
/external/valgrind/main/coregrind/m_syswrap/
H A Dsyswrap-generic.c1211 which isn't allowed. */
1256 /* Return true if we're allowed to use or create this fd */
1260 Bool allowed = True; local
1264 allowed = False;
1266 /* hijacking the output fds is never allowed */
1268 allowed = False;
1273 allowed = False;
1278 allowed = False;
1294 if ((!allowed) && VG_(showing_core_errors)() ) {
1313 return allowed;
[all...]
/external/robolectric/lib/main/
H A Dandroid.jarMETA-INF/ META-INF/MANIFEST.MF com/ com/android/ com/android/internal/ com/android/internal/util/ ...
/external/qemu/distrib/libpng-1.2.46/
H A Dpngset.c1225 png_set_benign_errors(png_structp png_ptr, int allowed) argument
1229 if (allowed)
/external/qemu/distrib/libselinux/include/selinux/
H A Dselinux.h110 access_vector_t allowed; member in struct:av_decision
/external/owasp/sanitizer/distrib/lib/
H A Dowasp-java-html-sanitizer.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/owasp/ org/owasp/html/ org/owasp/html/AbstractTokenStream ...
/external/llvm/lib/CodeGen/
H A DRegAllocPBQP.cpp181 assert(option <= allowedSet.size() && "Option outside allowed set.");
216 // Compute an initial allowed set for the current vreg.
254 // Record the mapping and allowed set in the problem.
348 const PBQPRAProblem::AllowedSet &allowed = p->getAllowedSet(src); local
350 while (pregOpt < allowed.size() && allowed[pregOpt] != dst) {
353 if (pregOpt < allowed.size()) {

Completed in 434 milliseconds

123456