/external/yaffs2/yaffs2/direct/ |
H A D | dtest.c | 412 void fill_files(char *path,int flags, int maxIterations,int siz) argument 434 if( flags & 1) 441 if(flags & 2)
|
/external/zlib/src/examples/ |
H A D | gun.c | 211 unsigned flags; /* compress flags, then block compress flag */ local 225 /* process remainder of compress header -- a flags byte */ 226 flags = NEXT(); 229 if (flags & 0x60) { 230 strm->msg = (char *)"unknown lzw flags set"; 233 max = flags & 0x1f; 240 flags &= 0x80; /* true if block compress */ 245 end = flags ? 256 : 255; 302 if (code == 256 && flags) { 386 unsigned have, flags, len; local [all...] |
H A D | gzappend.c | 237 int flags; local 242 flags = read1(in); 243 if (flags & 0xe0) bye("unknown header flags set in", in->name); 245 if (flags & 4) { 250 if (flags & 8) while (read1(in) != 0) ; 251 if (flags & 16) while (read1(in) != 0) ; 252 if (flags & 2) skip(in, 2);
|
H A D | gzjoin.c | 206 int flags; local 212 /* get and verify flags */ 213 flags = bget(in); 214 if ((flags & 0xe0) != 0) 217 /* skip modification time, extra flags, and os */ 221 if (flags & 4) { 230 if (flags & 8) 235 if (flags & 16) 240 if (flags & 2)
|
/external/zlib/src/ |
H A D | inflate.h | 22 FLAGS, /* i: waiting for method and flags (gzip) */ 24 OS, /* i: waiting for extra flags and operating system (gzip) */ 86 int flags; /* gzip header method and flags (0 if zlib) */ member in struct:inflate_state
|
H A D | zutil.c | 37 uLong flags; local 39 flags = 0; 42 case 4: flags += 1; break; 43 case 8: flags += 2; break; 44 default: flags += 3; 48 case 4: flags += 1 << 2; break; 49 case 8: flags += 2 << 2; break; 50 default: flags += 3 << 2; 54 case 4: flags += 1 << 4; break; 55 case 8: flags [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_drv_ops.c | 24 u32 hostapd_sta_flags_to_drv(u32 flags) argument 27 if (flags & WLAN_STA_AUTHORIZED) 29 if (flags & WLAN_STA_WMM) 31 if (flags & WLAN_STA_SHORT_PREAMBLE) 33 if (flags & WLAN_STA_MFP) 246 sta->flags), 251 hostapd_sta_flags_to_drv(sta->flags), 259 total_flags = hostapd_sta_flags_to_drv(sta->flags); 263 sta->flags & WLAN_STA_AUTHORIZED) 361 u32 flags, u 355 hostapd_sta_add(struct hostapd_data *hapd, const u8 *addr, u16 aid, u16 capability, const u8 *supp_rates, size_t supp_rates_len, u16 listen_interval, const struct ieee80211_ht_capabilities *ht_capab, const struct ieee80211_vht_capabilities *vht_capab, u32 flags, u8 qosinfo, u8 vht_opmode) argument 632 hostapd_get_hw_feature_data(struct hostapd_data *hapd, u16 *num_modes, u16 *flags) argument [all...] |
H A D | ap_drv_ops.h | 19 u32 hostapd_sta_flags_to_drv(u32 flags); 43 u32 flags, u8 qosinfo, u8 vht_opmode); 73 u16 *flags); 163 u32 flags) 169 hapd->own_addr, flags); 160 hostapd_drv_hapd_send_eapol(struct hostapd_data *hapd, const u8 *addr, const u8 *data, size_t data_len, int encrypt, u32 flags) argument
|
H A D | hostapd.h | 66 int flags; /* HOSTAPD_RATE_ flags */ member in struct:hostapd_rate_data
|
H A D | hw_features.c | 78 u16 num_modes, flags; local 83 modes = hostapd_get_hw_feature_data(hapd, &num_modes, &flags); 92 iface->hw_flags = flags; 203 rate->flags |= HOSTAPD_RATE_BASIC; 206 wpa_printf(MSG_DEBUG, "RATE[%d] rate=%d flags=0x%x", 207 iface->num_rates, rate->rate, rate->flags); 948 "%schannel [%i] (%i) is disabled for use in AP mode, flags: 0x%x%s%s%s",
|
H A D | ieee802_1x.c | 69 if (sta->flags & WLAN_STA_PREAUTH) { 74 encrypt, hostapd_sta_flags_to_drv(sta->flags)); 86 if (sta->flags & WLAN_STA_PREAUTH) 103 " flags for kernel driver (errno=%d).", 393 if (sta->flags & WLAN_STA_PREAUTH) { 753 int flags = 0; local 754 if (sta->flags & WLAN_STA_PREAUTH) 755 flags |= EAPOL_SM_PREAUTH; 757 flags |= EAPOL_SM_USES_WPA; 759 flags | [all...] |
H A D | sta_info.c | 156 if (sta->flags & WLAN_STA_WDS) 160 !(sta->flags & WLAN_STA_PREAUTH)) 296 if (sta->flags & WLAN_STA_AUTH) { 323 wpa_printf(MSG_DEBUG, "%s: " MACSTR " flags=0x%x timeout_next=%d", 324 __func__, MAC2STR(sta->addr), sta->flags, 334 if ((sta->flags & WLAN_STA_ASSOC) && 357 sta->flags & WLAN_STA_ASSOC) { 377 if ((sta->flags & WLAN_STA_ASSOC) && 379 !(sta->flags & WLAN_STA_PENDING_POLL) && 399 (sta->flags 1065 ap_sta_flags_txt(u32 flags, char *buf, size_t buflen) argument [all...] |
H A D | sta_info.h | 12 /* STA flags */ 45 u32 flags; /* Bitfield of WLAN_STA_* */ member in struct:sta_info 201 return sta->flags & WLAN_STA_AUTHORIZED; 207 int ap_sta_flags_txt(u32 flags, char *buf, size_t buflen);
|
H A D | wpa_auth_glue.c | 300 u32 flags = 0; local 304 flags = hostapd_sta_flags_to_drv(sta->flags); 307 encrypt, flags);
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_ctrl.c | 92 int flags; local 203 flags = fcntl(ctrl->s, F_GETFL); 204 if (flags >= 0) { 205 flags |= O_NONBLOCK; 206 if (fcntl(ctrl->s, F_SETFL, flags) < 0) {
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls.h | 126 * @flags: Parameter options (TLS_CONN_*) 165 unsigned int flags; member in struct:tls_connection_params 553 void tls_connection_set_test_flags(struct tls_connection *conn, u32 flags);
|
H A D | tls_internal.c | 116 void tls_connection_set_test_flags(struct tls_connection *conn, u32 flags) argument 119 tlsv1_server_set_test_flags(conn->server, flags); 233 conn->client, !(params->flags & TLS_CONN_DISABLE_TIME_CHECKS));
|
H A D | tls_nss.c | 73 PRIntn flags, PRIntervalTime timeout) 105 PRIntn flags, PRIntervalTime timeout) 128 PRIntn flags, PRNetAddr *addr, 137 PRIntn flags, const PRNetAddr *addr, 72 nss_io_recv(PRFileDesc *fd, void *buf, PRInt32 amount, PRIntn flags, PRIntervalTime timeout) argument 104 nss_io_send(PRFileDesc *fd, const void *buf, PRInt32 amount, PRIntn flags, PRIntervalTime timeout) argument 127 nss_io_recvfrom(PRFileDesc *fd, void *buf, PRInt32 amount, PRIntn flags, PRNetAddr *addr, PRIntervalTime timeout) argument 136 nss_io_sendto(PRFileDesc *fd, const void *buf, PRInt32 amount, PRIntn flags, const PRNetAddr *addr, PRIntervalTime timeout) argument
|
H A D | tls_openssl.c | 124 unsigned int flags; member in struct:tls_connection 435 rsa_meth->flags = RSA_METHOD_FLAG_NO_CHECK; 1438 if (!preverify_ok && (conn->flags & TLS_CONN_DISABLE_TIME_CHECKS) && 1750 int flags; local 1760 flags = X509_V_FLAG_CRL_CHECK; 1762 flags |= X509_V_FLAG_CRL_CHECK_ALL; 1763 X509_STORE_set_flags(cs, flags); 3035 return (conn->flags & TLS_CONN_REQUIRE_OCSP) ? 0 : 1; 3130 (conn->flags & TLS_CONN_REQUIRE_OCSP) ? "" : 3134 return (conn->flags [all...] |
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver.h | 76 * flag - Channel flags (HOSTAPD_CHAN_*) 166 unsigned int flags; /* HOSTAPD_MODE_FLAG_* */ member in struct:hostapd_hw_modes 194 * @flags: information flags about the BSS/IBSS (WPA_SCAN_*) 218 unsigned int flags; member in struct:wpa_scan_res 1023 unsigned int flags; member in struct:wpa_driver_capa 1081 unsigned long flags; member in struct:hostap_sta_driver_data 1100 u32 flags; /* bitmask of WPA_STA_* flags */ member in struct:hostapd_sta_add_params 1665 * flags [all...] |
H A D | driver_atheros.c | 1418 iwr.u.data.flags = IEEE80211_IOC_P2P_FETCH_FRAME; 1538 if (iwe->u.data.flags != 0) { 1540 drv, (int) iwe->u.data.flags, 1651 int encrypt, const u8 *own_addr, u32 flags) 1821 iwr.u.essid.flags = 1; /* SSID active */ 2014 iwr.u.data.flags = op; 2023 iwr.u.data.flags, errno, strerror(errno)); 1650 atheros_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len, int encrypt, const u8 *own_addr, u32 flags) argument
|
H A D | driver_bsd.c | 526 int encrypt, const u8 *own_addr, u32 flags) 1424 drv->capa.flags |= WPA_DRIVER_FLAGS_AP; 1444 drv->capa.flags |= WPA_DRIVER_FLAGS_AP; 525 bsd_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len, int encrypt, const u8 *own_addr, u32 flags) argument
|
H A D | driver_hostap.c | 284 u32 flags) 438 param->u.crypt.flags = set_tx ? HOSTAP_CRYPT_FLAG_SET_TX_KEY : 0; 552 iwr.u.essid.flags = 1; /* SSID active */ 1091 u16 *flags) 1105 *flags = 0; 282 hostap_send_eapol(void *priv, const u8 *addr, const u8 *data, size_t data_len, int encrypt, const u8 *own_addr, u32 flags) argument 1089 hostap_get_hw_feature_data(void *priv, u16 *num_modes, u16 *flags) argument
|
H A D | driver_hostap.h | 167 u32 flags; member in struct:prism2_hostapd_param::__anon33615::__anon33618
|
H A D | driver_macsec_qca.c | 122 capa->flags = WPA_DRIVER_FLAGS_WIRED; 127 static int macsec_qca_get_ifflags(const char *ifname, int *flags) argument 146 *flags = ifr.ifr_flags & 0xffff; 151 static int macsec_qca_set_ifflags(const char *ifname, int flags) argument 164 ifr.ifr_flags = flags & 0xffff; 307 int flags; local 331 if (macsec_qca_get_ifflags(ifname, &flags) == 0 && 332 !(flags & IFF_UP) && 333 macsec_qca_set_ifflags(ifname, flags | IFF_UP) == 0) { 349 } else if (macsec_qca_get_ifflags(ifname, &flags) < 385 int flags; local [all...] |