Searched defs:flags (Results 1 - 25 of 3497) sorted by last modified time

1234567891011>>

/external/yaffs2/yaffs2/direct/
H A Ddtest.c412 void fill_files(char *path,int flags, int maxIterations,int siz) argument
434 if( flags & 1)
441 if(flags & 2)
/external/zlib/src/examples/
H A Dgun.c211 unsigned flags; /* compress flags, then block compress flag */ local
225 /* process remainder of compress header -- a flags byte */
226 flags = NEXT();
229 if (flags & 0x60) {
230 strm->msg = (char *)"unknown lzw flags set";
233 max = flags & 0x1f;
240 flags &= 0x80; /* true if block compress */
245 end = flags ? 256 : 255;
302 if (code == 256 && flags) {
386 unsigned have, flags, len; local
[all...]
H A Dgzappend.c237 int flags; local
242 flags = read1(in);
243 if (flags & 0xe0) bye("unknown header flags set in", in->name);
245 if (flags & 4) {
250 if (flags & 8) while (read1(in) != 0) ;
251 if (flags & 16) while (read1(in) != 0) ;
252 if (flags & 2) skip(in, 2);
H A Dgzjoin.c206 int flags; local
212 /* get and verify flags */
213 flags = bget(in);
214 if ((flags & 0xe0) != 0)
217 /* skip modification time, extra flags, and os */
221 if (flags & 4) {
230 if (flags & 8)
235 if (flags & 16)
240 if (flags & 2)
/external/zlib/src/
H A Dinflate.h22 FLAGS, /* i: waiting for method and flags (gzip) */
24 OS, /* i: waiting for extra flags and operating system (gzip) */
86 int flags; /* gzip header method and flags (0 if zlib) */ member in struct:inflate_state
H A Dzutil.c37 uLong flags; local
39 flags = 0;
42 case 4: flags += 1; break;
43 case 8: flags += 2; break;
44 default: flags += 3;
48 case 4: flags += 1 << 2; break;
49 case 8: flags += 2 << 2; break;
50 default: flags += 3 << 2;
54 case 4: flags += 1 << 4; break;
55 case 8: flags
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dap_drv_ops.c24 u32 hostapd_sta_flags_to_drv(u32 flags) argument
27 if (flags & WLAN_STA_AUTHORIZED)
29 if (flags & WLAN_STA_WMM)
31 if (flags & WLAN_STA_SHORT_PREAMBLE)
33 if (flags & WLAN_STA_MFP)
246 sta->flags),
251 hostapd_sta_flags_to_drv(sta->flags),
259 total_flags = hostapd_sta_flags_to_drv(sta->flags);
263 sta->flags & WLAN_STA_AUTHORIZED)
361 u32 flags, u
355 hostapd_sta_add(struct hostapd_data *hapd, const u8 *addr, u16 aid, u16 capability, const u8 *supp_rates, size_t supp_rates_len, u16 listen_interval, const struct ieee80211_ht_capabilities *ht_capab, const struct ieee80211_vht_capabilities *vht_capab, u32 flags, u8 qosinfo, u8 vht_opmode) argument
632 hostapd_get_hw_feature_data(struct hostapd_data *hapd, u16 *num_modes, u16 *flags) argument
[all...]
H A Dap_drv_ops.h19 u32 hostapd_sta_flags_to_drv(u32 flags);
43 u32 flags, u8 qosinfo, u8 vht_opmode);
73 u16 *flags);
163 u32 flags)
169 hapd->own_addr, flags);
160 hostapd_drv_hapd_send_eapol(struct hostapd_data *hapd, const u8 *addr, const u8 *data, size_t data_len, int encrypt, u32 flags) argument
H A Dhostapd.h66 int flags; /* HOSTAPD_RATE_ flags */ member in struct:hostapd_rate_data
H A Dhw_features.c78 u16 num_modes, flags; local
83 modes = hostapd_get_hw_feature_data(hapd, &num_modes, &flags);
92 iface->hw_flags = flags;
203 rate->flags |= HOSTAPD_RATE_BASIC;
206 wpa_printf(MSG_DEBUG, "RATE[%d] rate=%d flags=0x%x",
207 iface->num_rates, rate->rate, rate->flags);
948 "%schannel [%i] (%i) is disabled for use in AP mode, flags: 0x%x%s%s%s",
H A Dieee802_1x.c69 if (sta->flags & WLAN_STA_PREAUTH) {
74 encrypt, hostapd_sta_flags_to_drv(sta->flags));
86 if (sta->flags & WLAN_STA_PREAUTH)
103 " flags for kernel driver (errno=%d).",
393 if (sta->flags & WLAN_STA_PREAUTH) {
753 int flags = 0; local
754 if (sta->flags & WLAN_STA_PREAUTH)
755 flags |= EAPOL_SM_PREAUTH;
757 flags |= EAPOL_SM_USES_WPA;
759 flags |
[all...]
H A Dsta_info.c156 if (sta->flags & WLAN_STA_WDS)
160 !(sta->flags & WLAN_STA_PREAUTH))
296 if (sta->flags & WLAN_STA_AUTH) {
323 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d",
324 __func__, MAC2STR(sta->addr), sta->flags,
334 if ((sta->flags & WLAN_STA_ASSOC) &&
357 sta->flags & WLAN_STA_ASSOC) {
377 if ((sta->flags & WLAN_STA_ASSOC) &&
379 !(sta->flags & WLAN_STA_PENDING_POLL) &&
399 (sta->flags
1065 ap_sta_flags_txt(u32 flags, char *buf, size_t buflen) argument
[all...]
H A Dsta_info.h12 /* STA flags */
45 u32 flags; /* Bitfield of WLAN_STA_* */ member in struct:sta_info
201 return sta->flags & WLAN_STA_AUTHORIZED;
207 int ap_sta_flags_txt(u32 flags, char *buf, size_t buflen);
H A Dwpa_auth_glue.c300 u32 flags = 0; local
304 flags = hostapd_sta_flags_to_drv(sta->flags);
307 encrypt, flags);
/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_ctrl.c92 int flags; local
203 flags = fcntl(ctrl->s, F_GETFL);
204 if (flags >= 0) {
205 flags |= O_NONBLOCK;
206 if (fcntl(ctrl->s, F_SETFL, flags) < 0) {
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls.h126 * @flags: Parameter options (TLS_CONN_*)
165 unsigned int flags; member in struct:tls_connection_params
553 void tls_connection_set_test_flags(struct tls_connection *conn, u32 flags);
H A Dtls_internal.c116 void tls_connection_set_test_flags(struct tls_connection *conn, u32 flags) argument
119 tlsv1_server_set_test_flags(conn->server, flags);
233 conn->client, !(params->flags & TLS_CONN_DISABLE_TIME_CHECKS));
H A Dtls_nss.c73 PRIntn flags, PRIntervalTime timeout)
105 PRIntn flags, PRIntervalTime timeout)
128 PRIntn flags, PRNetAddr *addr,
137 PRIntn flags, const PRNetAddr *addr,
72 nss_io_recv(PRFileDesc *fd, void *buf, PRInt32 amount, PRIntn flags, PRIntervalTime timeout) argument
104 nss_io_send(PRFileDesc *fd, const void *buf, PRInt32 amount, PRIntn flags, PRIntervalTime timeout) argument
127 nss_io_recvfrom(PRFileDesc *fd, void *buf, PRInt32 amount, PRIntn flags, PRNetAddr *addr, PRIntervalTime timeout) argument
136 nss_io_sendto(PRFileDesc *fd, const void *buf, PRInt32 amount, PRIntn flags, const PRNetAddr *addr, PRIntervalTime timeout) argument
H A Dtls_openssl.c124 unsigned int flags; member in struct:tls_connection
435 rsa_meth->flags = RSA_METHOD_FLAG_NO_CHECK;
1438 if (!preverify_ok && (conn->flags & TLS_CONN_DISABLE_TIME_CHECKS) &&
1750 int flags; local
1760 flags = X509_V_FLAG_CRL_CHECK;
1762 flags |= X509_V_FLAG_CRL_CHECK_ALL;
1763 X509_STORE_set_flags(cs, flags);
3035 return (conn->flags & TLS_CONN_REQUIRE_OCSP) ? 0 : 1;
3130 (conn->flags & TLS_CONN_REQUIRE_OCSP) ? "" :
3134 return (conn->flags
[all...]
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver.h76 * flag - Channel flags (HOSTAPD_CHAN_*)
166 unsigned int flags; /* HOSTAPD_MODE_FLAG_* */ member in struct:hostapd_hw_modes
194 * @flags: information flags about the BSS/IBSS (WPA_SCAN_*)
218 unsigned int flags; member in struct:wpa_scan_res
1023 unsigned int flags; member in struct:wpa_driver_capa
1081 unsigned long flags; member in struct:hostap_sta_driver_data
1100 u32 flags; /* bitmask of WPA_STA_* flags */ member in struct:hostapd_sta_add_params
1665 * flags
[all...]
H A Ddriver_atheros.c1418 iwr.u.data.flags = IEEE80211_IOC_P2P_FETCH_FRAME;
1538 if (iwe->u.data.flags != 0) {
1540 drv, (int) iwe->u.data.flags,
1651 int encrypt, const u8 *own_addr, u32 flags)
1821 iwr.u.essid.flags = 1; /* SSID active */
2014 iwr.u.data.flags = op;
2023 iwr.u.data.flags, errno, strerror(errno));
1650 atheros_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len, int encrypt, const u8 *own_addr, u32 flags) argument
H A Ddriver_bsd.c526 int encrypt, const u8 *own_addr, u32 flags)
1424 drv->capa.flags |= WPA_DRIVER_FLAGS_AP;
1444 drv->capa.flags |= WPA_DRIVER_FLAGS_AP;
525 bsd_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len, int encrypt, const u8 *own_addr, u32 flags) argument
H A Ddriver_hostap.c284 u32 flags)
438 param->u.crypt.flags = set_tx ? HOSTAP_CRYPT_FLAG_SET_TX_KEY : 0;
552 iwr.u.essid.flags = 1; /* SSID active */
1091 u16 *flags)
1105 *flags = 0;
282 hostap_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len, int encrypt, const u8 *own_addr, u32 flags) argument
1089 hostap_get_hw_feature_data(void *priv, u16 *num_modes, u16 *flags) argument
H A Ddriver_hostap.h167 u32 flags; member in struct:prism2_hostapd_param::__anon33615::__anon33618
H A Ddriver_macsec_qca.c122 capa->flags = WPA_DRIVER_FLAGS_WIRED;
127 static int macsec_qca_get_ifflags(const char *ifname, int *flags) argument
146 *flags = ifr.ifr_flags & 0xffff;
151 static int macsec_qca_set_ifflags(const char *ifname, int flags) argument
164 ifr.ifr_flags = flags & 0xffff;
307 int flags; local
331 if (macsec_qca_get_ifflags(ifname, &flags) == 0 &&
332 !(flags & IFF_UP) &&
333 macsec_qca_set_ifflags(ifname, flags | IFF_UP) == 0) {
349 } else if (macsec_qca_get_ifflags(ifname, &flags) <
385 int flags; local
[all...]

Completed in 984 milliseconds

1234567891011>>