/external/wpa_supplicant_8/hostapd/ |
H A D | ctrl_iface.c | 404 struct wpabuf *req, *sel; local 445 sel = wpabuf_alloc(len); 446 if (sel == NULL) { 450 if (hexstr2bin(pos2, wpabuf_put(sel, len), len) < 0) { 452 wpabuf_free(sel); 457 ret = hostapd_wps_nfc_report_handover(hapd, req, sel); 464 wpabuf_free(sel);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wps_hostapd.c | 1805 const struct wpabuf *sel) 1803 hostapd_wps_nfc_report_handover(struct hostapd_data *hapd, const struct wpabuf *req, const struct wpabuf *sel) argument
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p.h | 1986 int sel; member in struct:p2p_nfc_params
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wps_hostapd.c | 1805 const struct wpabuf *sel) 1803 hostapd_wps_nfc_report_handover(struct hostapd_data *hapd, const struct wpabuf *req, const struct wpabuf *sel) argument
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p.h | 1986 int sel; member in struct:p2p_nfc_params
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ap.c | 958 const struct wpabuf *sel) 965 return hostapd_wps_nfc_report_handover(hapd, req, sel); 956 wpas_ap_wps_nfc_report_handover(struct wpa_supplicant *wpa_s, const struct wpabuf *req, const struct wpabuf *sel) argument
|
H A D | ctrl_iface.c | 1109 struct wpabuf *req, *sel; local 1173 sel = wpabuf_alloc(len); 1174 if (sel == NULL) { 1179 if (hexstr2bin(pos2, wpabuf_put(sel, len), len) < 0) { 1182 wpabuf_free(sel); 1187 role, type, (int) wpabuf_len(req), (int) wpabuf_len(sel)); 1190 ret = wpas_wps_nfc_report_handover(wpa_s, req, sel); 1194 ret = wpas_ap_wps_nfc_report_handover(wpa_s, req, sel); 1196 ret = wpas_er_wps_nfc_report_handover(wpa_s, req, sel); 1201 ret = wpas_p2p_nfc_report_handover(wpa_s, 1, req, sel, [all...] |
H A D | p2p_supplicant.c | 7554 int sel, int tag, int forced_freq) 7562 params.sel = sel; 7729 const struct wpabuf *sel, int forced_freq) 7742 wpabuf_head(sel), wpabuf_len(sel)); 7745 tmp = ndef_parse_p2p(init ? sel : req); 7552 wpas_p2p_nfc_connection_handover(struct wpa_supplicant *wpa_s, const struct wpabuf *data, int sel, int tag, int forced_freq) argument 7727 wpas_p2p_nfc_report_handover(struct wpa_supplicant *wpa_s, int init, const struct wpabuf *req, const struct wpabuf *sel, int forced_freq) argument
|
H A D | wpa_supplicant.c | 967 int sel, proto; local 1050 sel = ie.group_cipher & ssid->group_cipher; 1051 wpa_s->group_cipher = wpa_pick_group_cipher(sel); 1060 sel = ie.pairwise_cipher & ssid->pairwise_cipher; 1061 wpa_s->pairwise_cipher = wpa_pick_pairwise_cipher(sel, 1); 1070 sel = ie.key_mgmt & ssid->key_mgmt; 1073 sel &= ~(WPA_KEY_MGMT_SAE | WPA_KEY_MGMT_FT_SAE); 1077 } else if (sel & WPA_KEY_MGMT_FT_IEEE8021X) { 1080 } else if (sel & WPA_KEY_MGMT_FT_PSK) { 1085 } else if (sel [all...] |
H A D | wps_supplicant.c | 2575 const struct wpabuf *sel) 2579 wpa_hexdump_buf_key(MSG_DEBUG, "WPS: Carrier record in select", sel); 2580 return wpas_wps_nfc_rx_handover_sel(wpa_s, sel); 2586 const struct wpabuf *sel) 2573 wpas_wps_nfc_report_handover(struct wpa_supplicant *wpa_s, const struct wpabuf *req, const struct wpabuf *sel) argument 2584 wpas_er_wps_nfc_report_handover(struct wpa_supplicant *wpa_s, const struct wpabuf *req, const struct wpabuf *sel) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wps_hostapd.c | 1805 const struct wpabuf *sel) 1803 hostapd_wps_nfc_report_handover(struct hostapd_data *hapd, const struct wpabuf *req, const struct wpabuf *sel) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p.h | 1986 int sel; member in struct:p2p_nfc_params
|
/external/wpa_supplicant_8/wpa_supplicant/wpa_gui-qt4/ |
H A D | addinterface.cpp | 182 void AddInterface::interfaceSelected(QTreeWidgetItem *sel) argument 184 if (!sel) 199 sel->text(1).toAscii().constData(), 201 sel->text(0).toAscii().constData(), 230 if (!addRegistryInterface(sel->text(1))) { 237 wpagui->selectAdapter(sel->text(1));
|
H A D | networkconfig.cpp | 62 void NetworkConfig::paramsFromScanResults(QTreeWidgetItem *sel) argument 67 setWindowTitle(sel->text(0)); 68 ssidEdit->setText(sel->text(0)); 70 QString flags = sel->text(4); 104 bssid = sel->text(1); 108 void NetworkConfig::authChanged(int sel) argument 110 encrSelect->setEnabled(sel != AUTH_NONE_OPEN && sel != AUTH_NONE_WEP && 111 sel != AUTH_NONE_WEP_SHARED); 112 pskEdit->setEnabled(sel 142 eapChanged(int sel) argument [all...] |
H A D | scanresults.cpp | 131 void ScanResults::bssSelected(QTreeWidgetItem *sel) argument 137 nc->paramsFromScanResults(sel);
|
H A D | wpagui.cpp | 970 void WpaGui::selectNetwork( const QString &sel ) 972 QString cmd(sel); 987 void WpaGui::enableNetwork(const QString &sel) argument 989 QString cmd(sel); 1006 void WpaGui::disableNetwork(const QString &sel) argument 1008 QString cmd(sel); 1025 void WpaGui::editNetwork(const QString &sel) argument 1027 QString cmd(sel); 1058 QString sel(networkSelect->currentText()); 1059 editNetwork(sel); 1096 removeNetwork(const QString &sel) argument 1162 getNetworkDisabled(const QString &sel) argument [all...] |
/external/valgrind/main/none/tests/ |
H A D | nestedfns.c | 12 static void call_func(void (*sel)(void)) argument 14 sel();
|
/external/valgrind/main/VEX/priv/ |
H A D | guest_mips_helpers.c | 413 #define ASM_VOLATILE_CASE(rd, sel) \ 415 asm volatile ("mfc0 %0, $" #rd ", "#sel"\n\t" :"=r" (x) ); \ 418 UInt mips32_dirtyhelper_mfc0(UInt rd, UInt sel) argument 422 switch (sel) { 745 #define ASM_VOLATILE_CASE(rd, sel) \ 747 asm volatile ("dmfc0 %0, $" #rd ", "#sel"\n\t" :"=r" (x) ); \ 750 ULong mips64_dirtyhelper_dmfc0 ( UInt rd, UInt sel ) 754 switch (sel) { 1075 #define ASM_VOLATILE_CASE(rd, sel) \ 1076 case rd: asm volatile ("dmfc0 %0, $" #rd ", "#sel"\ [all...] |
H A D | guest_mips_toIR.c | 11689 trap_code, imm, instr_index, p, msb, lsb, size, rot, sel; local 11843 sel = get_sel(cins); 13093 DIP("mfc0 r%d, r%d, %d", rt, rd, sel); 13095 IRExpr** args = mkIRExprVec_3 (IRExpr_BBPTR(), mkU32(rd), mkU32(sel)); 13105 DIP("dmfc0 r%d, r%d, %d", rt, rd, sel); 13107 IRExpr** args = mkIRExprVec_3 (IRExpr_BBPTR(), mkU64(rd), mkU64(sel)); 16063 DIP("sync 0x%x", sel);
|
/external/srec/tools/thirdparty/OpenFst/fst/lib/ |
H A D | randgen.h | 108 RandGenOptions(const S &sel, int len = INT_MAX, size_t n = 1) argument 109 : arc_selector(sel), max_length(len), npath(n),
|
/external/skia/samplecode/ |
H A D | SampleFilterFuzz.cpp | 74 int sel; local 76 if (return_large) sel = R(6); else sel = R(4); 77 if (!return_undef && sel == 0) sel = 1; 81 switch (sel) {
|
H A D | SampleFuzz.cpp | 60 int sel; local 63 sel = R(6); 65 sel = R(4); 68 if (return_undef == false && sel == 0) { 69 sel = 1; 76 switch (sel) { 101 int sel; 103 if (quick == true) sel = 0; else sel = R(6); 105 switch (sel) { [all...] |
/external/skia/experimental/Networking/ |
H A D | SkSockets.cpp | 274 int sel = select(fSockfd + 1, &workingSet, NULL, NULL, &timeout); local 275 if (sel < 0) { 279 if (sel == 0) //select() timed out
|
/external/robolectric/lib/main/ |
H A D | android.jar | META-INF/ META-INF/MANIFEST.MF com/ com/android/ com/android/internal/ com/android/internal/util/ ... |
/external/qemu/disas/ |
H A D | mips.c | 153 #define OP_MASK_SEL 0x7 /* The sel field of mfcZ and mtcZ. */ 354 "H" 3 bit sel field for (d)mtc* and (d)mfc* (OP_*_SEL) 359 "+D" Combined destination register ("G") and sel ("H") for CP0 ops, 2784 unsigned int sel; 3466 unsigned int sel) 3471 if (names[i].cp0reg == cp0reg && names[i].sel == sel) 3553 unsigned int cp0reg, sel; 3556 sel = (l >> OP_SH_SEL) & OP_MASK_SEL; 3558 /* CP0 register including 'sel' cod 2782 unsigned int sel; member in struct:mips_cp0sel_name 3460 lookup_mips_cp0sel_name(const struct mips_cp0sel_name *names, unsigned int len, unsigned int cp0reg, unsigned int sel) argument 3549 unsigned int cp0reg, sel; local 3564 (*info->fprintf_func) (info->stream, "$%d,%d", cp0reg, sel); local 3592 unsigned int cp0reg, sel; local 3607 (*info->fprintf_func) (info->stream, "$%d,%d", cp0reg, sel); local [all...] |