/external/webrtc/src/system_wrappers/source/ |
H A D | thread_posix.cc | 177 const int policy = SCHED_RR; local 179 const int policy = SCHED_FIFO; local 202 const int minPrio = sched_get_priority_min(policy); 203 const int maxPrio = sched_get_priority_max(policy); 227 result = pthread_setschedparam(_thread, policy, ¶m);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_11.c | 169 int policy, def_klen; local 171 policy = sta->ssid_probe->security_policy; 174 policy = sta->ssid->security_policy; 177 privacy = policy != SECURITY_PLAINTEXT; 178 if (policy == SECURITY_IEEE_802_1X && def_klen == 0)
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211.c | 2326 static struct nla_policy policy[NL80211_STA_INFO_MAX + 1] = { local 2343 tb[NL80211_ATTR_STA_INFO], policy)) 12527 wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed); 12531 "nl80211: Ignore roaming policy change since driver does not provide command for setting it");
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 746 /* TODO: What policy should be applied to detect duplicated SCI 3117 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy, argument 3136 kay->policy = policy; 3158 if (policy == DO_NOT_SECURE) { 3191 if (policy == DO_NOT_SECURE) {
|
H A D | ieee802_1x_kay.h | 146 enum macsec_policy policy; member in struct:ieee802_1x_kay 158 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | browser.c | 100 gchar *mime, WebKitWebPolicyDecision *policy, 106 webkit_web_policy_decision_download(policy); 187 g_signal_connect(G_OBJECT(view), "mime-type-policy-decision-requested", 98 view_cb_mime_type_policy_decision( WebKitWebView *view, WebKitWebFrame *frame, WebKitNetworkRequest *req, gchar *mime, WebKitWebPolicyDecision *policy, struct browser_context *ctx) argument
|
/external/wpa_supplicant_8/hs20/server/ca/ |
H A D | setup.sh | 104 $OPENSSL ca -config $PWD/openssl.cnf.tmp -batch -md sha256 -in server.csr -out server.pem -key $PASS -days 730 -extensions ext_server -policy policy_osu_server || fail "Failed to sign server certificate"
|
/external/wpa_supplicant_8/hs20/server/ |
H A D | spp_server.c | 744 xml_node_t *spp_node, *policy; local 749 "requires policy remediation", NULL); 754 policy = build_policy(ctx, user, realm, dmacc); 755 if (!policy) { 771 if (add_update_node(ctx, spp_node, ns, buf, policy) < 0) { 773 xml_node_free(ctx->xml, policy); 778 "policy update (sub rem)", policy); 779 xml_node_free(ctx->xml, policy); 919 else if (type && strcmp(type, "policy") 934 xml_node_t *policy, *node; local 990 xml_node_t *policy; local [all...] |
/external/wpa_supplicant_8/hs20/server/www/ |
H A D | users.php | 72 if ($cmd == 'subrem-add-policy' && $id > 0) { 73 $db->exec("UPDATE users SET remediation='policy' WHERE rowid=$id"); 87 if ($cmd == "policy" && $id > 0 && isset($_GET["policy"])) { 88 $policy = $_GET["policy"]; variable 89 if ($policy == "no-policy" || 90 is_readable("$osu_root/spp/policy/$policy [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_11.c | 169 int policy, def_klen; local 171 policy = sta->ssid_probe->security_policy; 174 policy = sta->ssid->security_policy; 177 privacy = policy != SECURITY_PLAINTEXT; 178 if (policy == SECURITY_IEEE_802_1X && def_klen == 0)
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211.c | 2326 static struct nla_policy policy[NL80211_STA_INFO_MAX + 1] = { local 2343 tb[NL80211_ATTR_STA_INFO], policy)) 12527 wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed); 12531 "nl80211: Ignore roaming policy change since driver does not provide command for setting it");
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay.c | 746 /* TODO: What policy should be applied to detect duplicated SCI 3117 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy, argument 3136 kay->policy = policy; 3158 if (policy == DO_NOT_SECURE) { 3191 if (policy == DO_NOT_SECURE) {
|
H A D | ieee802_1x_kay.h | 146 enum macsec_policy policy; member in struct:ieee802_1x_kay 158 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
|
/external/wpa_supplicant_8/src/utils/ |
H A D | browser.c | 100 gchar *mime, WebKitWebPolicyDecision *policy, 106 webkit_web_policy_decision_download(policy); 187 g_signal_connect(G_OBJECT(view), "mime-type-policy-decision-requested", 98 view_cb_mime_type_policy_decision( WebKitWebView *view, WebKitWebFrame *frame, WebKitNetworkRequest *req, gchar *mime, WebKitWebPolicyDecision *policy, struct browser_context *ctx) argument
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus-wpa_supplicant.conf | 5 <policy user="root"> 16 </policy> 17 <policy context="default"> 26 </policy>
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_11.c | 169 int policy, def_klen; local 171 policy = sta->ssid_probe->security_policy; 174 policy = sta->ssid->security_policy; 177 privacy = policy != SECURITY_PLAINTEXT; 178 if (policy == SECURITY_IEEE_802_1X && def_klen == 0)
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_nl80211.c | 2326 static struct nla_policy policy[NL80211_STA_INFO_MAX + 1] = { local 2343 tb[NL80211_ATTR_STA_INFO], policy)) 12527 wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed); 12531 "nl80211: Ignore roaming policy change since driver does not provide command for setting it");
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.c | 746 /* TODO: What policy should be applied to detect duplicated SCI 3117 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy, argument 3136 kay->policy = policy; 3158 if (policy == DO_NOT_SECURE) { 3191 if (policy == DO_NOT_SECURE) {
|
H A D | ieee802_1x_kay.h | 146 enum macsec_policy policy; member in struct:ieee802_1x_kay 158 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | browser.c | 100 gchar *mime, WebKitWebPolicyDecision *policy, 106 webkit_web_policy_decision_download(policy); 187 g_signal_connect(G_OBJECT(view), "mime-type-policy-decision-requested", 98 view_cb_mime_type_policy_decision( WebKitWebView *view, WebKitWebFrame *frame, WebKitNetworkRequest *req, gchar *mime, WebKitWebPolicyDecision *policy, struct browser_context *ctx) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_kay.c | 189 enum macsec_policy policy; local 196 policy = ssid->macsec_policy == 1 ? SHOULD_SECURE : DO_NOT_SECURE; 226 res = ieee802_1x_kay_init(kay_ctx, policy, wpa_s->ifname, 314 if (!wpa_s->kay || wpa_s->kay->policy == DO_NOT_SECURE)
|
/external/valgrind/main/coregrind/m_syswrap/ |
H A D | syswrap-darwin.c | 1559 PRE_REG_READ3(int,"__mac_syscall", char *,"policy", 1563 // GrP fixme check policy? 5107 int policy; member in struct:__anon32617 5115 name_for_port(MACH_REMOTE), req->policy, req->value);
|
H A D | syswrap-linux.c | 1851 unsigned long, policy, unsigned long *, nodemask, 1862 int, policy, unsigned long *, nodemask, 1872 int *, policy, unsigned long *, nodemask, 1876 PRE_MEM_WRITE( "get_mempolicy(policy)", ARG1, sizeof(Int) ); 2690 vki_pid_t, pid, int, policy, struct sched_param *, p); 2706 PRE_REG_READ1(long, "sched_get_priority_max", int, policy); 2712 PRE_REG_READ1(long, "sched_get_priority_min", int, policy);
|
/external/valgrind/main/memcheck/tests/x86-linux/ |
H A D | scalar.stderr.exp | 1851 Syscall param sched_setscheduler(policy) contains uninitialised byte(s) 1877 Syscall param sched_get_priority_max(policy) contains uninitialised byte(s) 1884 Syscall param sched_get_priority_min(policy) contains uninitialised byte(s)
|
/external/srtp/include/ |
H A D | ekt.h | 87 * is passed into libsrtp to indicate what policy should be in effect 127 ekt_alloc(ekt_stream_t *stream_data, ekt_policy_t policy);
|