Searched defs:policy (Results 1 - 25 of 820) sorted by last modified time

1234567891011>>

/external/webrtc/src/system_wrappers/source/
H A Dthread_posix.cc177 const int policy = SCHED_RR; local
179 const int policy = SCHED_FIFO; local
202 const int minPrio = sched_get_priority_min(policy);
203 const int maxPrio = sched_get_priority_max(policy);
227 result = pthread_setschedparam(_thread, policy, &param);
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_11.c169 int policy, def_klen; local
171 policy = sta->ssid_probe->security_policy;
174 policy = sta->ssid->security_policy;
177 privacy = policy != SECURITY_PLAINTEXT;
178 if (policy == SECURITY_IEEE_802_1X && def_klen == 0)
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_nl80211.c2326 static struct nla_policy policy[NL80211_STA_INFO_MAX + 1] = { local
2343 tb[NL80211_ATTR_STA_INFO], policy))
12527 wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed);
12531 "nl80211: Ignore roaming policy change since driver does not provide command for setting it");
/external/wpa_supplicant_8/hostapd/src/pae/
H A Dieee802_1x_kay.c746 /* TODO: What policy should be applied to detect duplicated SCI
3117 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy, argument
3136 kay->policy = policy;
3158 if (policy == DO_NOT_SECURE) {
3191 if (policy == DO_NOT_SECURE) {
H A Dieee802_1x_kay.h146 enum macsec_policy policy; member in struct:ieee802_1x_kay
158 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dbrowser.c100 gchar *mime, WebKitWebPolicyDecision *policy,
106 webkit_web_policy_decision_download(policy);
187 g_signal_connect(G_OBJECT(view), "mime-type-policy-decision-requested",
98 view_cb_mime_type_policy_decision( WebKitWebView *view, WebKitWebFrame *frame, WebKitNetworkRequest *req, gchar *mime, WebKitWebPolicyDecision *policy, struct browser_context *ctx) argument
/external/wpa_supplicant_8/hs20/server/
H A Dspp_server.c744 xml_node_t *spp_node, *policy; local
749 "requires policy remediation", NULL);
754 policy = build_policy(ctx, user, realm, dmacc);
755 if (!policy) {
771 if (add_update_node(ctx, spp_node, ns, buf, policy) < 0) {
773 xml_node_free(ctx->xml, policy);
778 "policy update (sub rem)", policy);
779 xml_node_free(ctx->xml, policy);
919 else if (type && strcmp(type, "policy")
934 xml_node_t *policy, *node; local
990 xml_node_t *policy; local
[all...]
/external/wpa_supplicant_8/hs20/server/www/
H A Dusers.php72 if ($cmd == 'subrem-add-policy' && $id > 0) {
73 $db->exec("UPDATE users SET remediation='policy' WHERE rowid=$id");
87 if ($cmd == "policy" && $id > 0 && isset($_GET["policy"])) {
88 $policy = $_GET["policy"]; variable
89 if ($policy == "no-policy" ||
90 is_readable("$osu_root/spp/policy/$policy
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dieee802_11.c169 int policy, def_klen; local
171 policy = sta->ssid_probe->security_policy;
174 policy = sta->ssid->security_policy;
177 privacy = policy != SECURITY_PLAINTEXT;
178 if (policy == SECURITY_IEEE_802_1X && def_klen == 0)
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_nl80211.c2326 static struct nla_policy policy[NL80211_STA_INFO_MAX + 1] = { local
2343 tb[NL80211_ATTR_STA_INFO], policy))
12527 wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed);
12531 "nl80211: Ignore roaming policy change since driver does not provide command for setting it");
/external/wpa_supplicant_8/src/pae/
H A Dieee802_1x_kay.c746 /* TODO: What policy should be applied to detect duplicated SCI
3117 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy, argument
3136 kay->policy = policy;
3158 if (policy == DO_NOT_SECURE) {
3191 if (policy == DO_NOT_SECURE) {
H A Dieee802_1x_kay.h146 enum macsec_policy policy; member in struct:ieee802_1x_kay
158 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
/external/wpa_supplicant_8/src/utils/
H A Dbrowser.c100 gchar *mime, WebKitWebPolicyDecision *policy,
106 webkit_web_policy_decision_download(policy);
187 g_signal_connect(G_OBJECT(view), "mime-type-policy-decision-requested",
98 view_cb_mime_type_policy_decision( WebKitWebView *view, WebKitWebFrame *frame, WebKitNetworkRequest *req, gchar *mime, WebKitWebPolicyDecision *policy, struct browser_context *ctx) argument
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_11.c169 int policy, def_klen; local
171 policy = sta->ssid_probe->security_policy;
174 policy = sta->ssid->security_policy;
177 privacy = policy != SECURITY_PLAINTEXT;
178 if (policy == SECURITY_IEEE_802_1X && def_klen == 0)
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_nl80211.c2326 static struct nla_policy policy[NL80211_STA_INFO_MAX + 1] = { local
2343 tb[NL80211_ATTR_STA_INFO], policy))
12527 wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed);
12531 "nl80211: Ignore roaming policy change since driver does not provide command for setting it");
/external/wpa_supplicant_8/wpa_supplicant/src/pae/
H A Dieee802_1x_kay.c746 /* TODO: What policy should be applied to detect duplicated SCI
3117 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy, argument
3136 kay->policy = policy;
3158 if (policy == DO_NOT_SECURE) {
3191 if (policy == DO_NOT_SECURE) {
H A Dieee802_1x_kay.h146 enum macsec_policy policy; member in struct:ieee802_1x_kay
158 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
/external/wpa_supplicant_8/wpa_supplicant/src/utils/
H A Dbrowser.c100 gchar *mime, WebKitWebPolicyDecision *policy,
106 webkit_web_policy_decision_download(policy);
187 g_signal_connect(G_OBJECT(view), "mime-type-policy-decision-requested",
98 view_cb_mime_type_policy_decision( WebKitWebView *view, WebKitWebFrame *frame, WebKitNetworkRequest *req, gchar *mime, WebKitWebPolicyDecision *policy, struct browser_context *ctx) argument
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpas_kay.c189 enum macsec_policy policy; local
196 policy = ssid->macsec_policy == 1 ? SHOULD_SECURE : DO_NOT_SECURE;
226 res = ieee802_1x_kay_init(kay_ctx, policy, wpa_s->ifname,
314 if (!wpa_s->kay || wpa_s->kay->policy == DO_NOT_SECURE)
/external/valgrind/main/coregrind/m_syswrap/
H A Dsyswrap-darwin.c1559 PRE_REG_READ3(int,"__mac_syscall", char *,"policy",
1563 // GrP fixme check policy?
5107 int policy; member in struct:__anon32617
5115 name_for_port(MACH_REMOTE), req->policy, req->value);
/external/srtp/srtp/
H A Dekt.c123 ekt_alloc(ekt_stream_t *stream_data, ekt_policy_t policy) { argument
126 * if the policy pointer is NULL, then EKT is not in use
129 if (!policy) {
141 ekt_stream_init_from_policy(ekt_stream_t stream_data, ekt_policy_t policy) { argument
267 * if there is no EKT policy, then the other inputs are unaffected
H A Dsrtp.c1211 const srtp_policy_t *policy) {
1216 if ((session == NULL) || (policy == NULL) || (policy->key == NULL))
1220 status = srtp_stream_alloc(&tmp, policy);
1226 status = srtp_stream_init(tmp, policy);
1237 * if the template stream has already been set, then the policy is
1240 switch (policy->ssrc.type) {
1270 const srtp_policy_t *policy) { /* SRTP policy (list) */
1285 * loop over elements in the policy lis
1210 srtp_add_stream(srtp_t session, const srtp_policy_t *policy) argument
1269 srtp_create(srtp_t *session, const srtp_policy_t *policy) argument
1882 crypto_policy_set_from_profile_for_rtp(crypto_policy_t *policy, srtp_profile_t profile) argument
1911 crypto_policy_set_from_profile_for_rtcp(crypto_policy_t *policy, srtp_profile_t profile) argument
[all...]
/external/srtp/test/
H A Ddtls_srtp_driver.c124 srtp_policy_t policy; local
178 policy.key = key;
180 /* initialize SRTP policy from profile */
181 err = crypto_policy_set_from_profile_for_rtp(&policy.rtp, profile);
183 err = crypto_policy_set_from_profile_for_rtcp(&policy.rtcp, profile);
185 policy.ssrc.type = ssrc_any_inbound;
186 policy.ekt = NULL;
187 policy.window_size = 128;
188 policy.allow_repeat_tx = 0;
189 policy
[all...]
H A Drtp.c150 rtp_sender_init_srtp(rtp_sender_t sender, const srtp_policy_t *policy) { argument
151 return srtp_create(&sender->srtp_ctx, policy);
155 rtp_receiver_init_srtp(rtp_receiver_t sender, const srtp_policy_t *policy) { argument
156 return srtp_create(&sender->srtp_ctx, policy);
H A Drtpw.c145 srtp_policy_t policy; local
305 /* set up the srtp policy and master key */
308 * create policy structure, using the default mechanisms but
314 crypto_policy_set_rtp_default(&policy.rtp);
315 crypto_policy_set_rtcp_default(&policy.rtcp);
318 crypto_policy_set_aes_cm_128_null_auth(&policy.rtp);
319 crypto_policy_set_rtcp_default(&policy.rtcp);
322 crypto_policy_set_null_cipher_hmac_sha1_80(&policy.rtp);
323 crypto_policy_set_rtcp_default(&policy.rtcp);
329 policy
[all...]

Completed in 279 milliseconds

1234567891011>>