/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | gas_serv.c | 960 struct anqp_query_info *qi, int prot) 995 di->prot = prot; 1010 if (prot) 1020 const u8 *data, size_t len, int prot) 1070 if (prot) 1123 gas_serv_req_local_processing(hapd, sa, dialog_token, &qi, prot); 1129 const u8 *data, size_t len, int prot) 1203 if (prot) 1217 int prot; local 958 gas_serv_req_local_processing(struct hostapd_data *hapd, const u8 *sa, u8 dialog_token, struct anqp_query_info *qi, int prot) argument 1018 gas_serv_rx_gas_initial_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot) argument 1127 gas_serv_rx_gas_comeback_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot) argument [all...] |
H A D | gas_serv.h | 51 int prot; /* whether Protected Dual of Public Action frame is used */ member in struct:gas_dialog_info
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211.c | 3536 unsigned int prot = 0; local 3539 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS; 3541 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2; 3543 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P; 3545 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING; 3547 return prot;
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 615 u8 *prot, size_t *prot_len) 639 pos = prot; 663 *prot_len = pos - prot; 669 const u8 *prot, size_t prot_len, 692 if (eap_eke_mac(sess->mac, sess->ki, prot + block_size, 695 if (os_memcmp_const(icv, prot + prot_len - icv_len, icv_len) != 0) { 706 os_memcpy(data, prot + block_size, *data_len); 707 if (aes_128_cbc_decrypt(sess->ke, prot, data, *data_len) < 0) { 613 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument 668 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument
|
H A D | eap_eke_common.h | 107 u8 *prot, size_t *prot_len); 109 const u8 *prot, size_t prot_len,
|
/external/wpa_supplicant_8/src/ap/ |
H A D | gas_serv.c | 960 struct anqp_query_info *qi, int prot) 995 di->prot = prot; 1010 if (prot) 1020 const u8 *data, size_t len, int prot) 1070 if (prot) 1123 gas_serv_req_local_processing(hapd, sa, dialog_token, &qi, prot); 1129 const u8 *data, size_t len, int prot) 1203 if (prot) 1217 int prot; local 958 gas_serv_req_local_processing(struct hostapd_data *hapd, const u8 *sa, u8 dialog_token, struct anqp_query_info *qi, int prot) argument 1018 gas_serv_rx_gas_initial_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot) argument 1127 gas_serv_rx_gas_comeback_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot) argument [all...] |
H A D | gas_serv.h | 51 int prot; /* whether Protected Dual of Public Action frame is used */ member in struct:gas_dialog_info
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211.c | 3536 unsigned int prot = 0; local 3539 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS; 3541 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2; 3543 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P; 3545 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING; 3547 return prot;
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_eke_common.c | 615 u8 *prot, size_t *prot_len) 639 pos = prot; 663 *prot_len = pos - prot; 669 const u8 *prot, size_t prot_len, 692 if (eap_eke_mac(sess->mac, sess->ki, prot + block_size, 695 if (os_memcmp_const(icv, prot + prot_len - icv_len, icv_len) != 0) { 706 os_memcpy(data, prot + block_size, *data_len); 707 if (aes_128_cbc_decrypt(sess->ke, prot, data, *data_len) < 0) { 613 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument 668 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument
|
H A D | eap_eke_common.h | 107 u8 *prot, size_t *prot_len); 109 const u8 *prot, size_t prot_len,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | gas_query.c | 260 int res, prot = pmf_in_use(gas->wpa_s, query->addr); local 263 "freq=%d prot=%d", MAC2STR(query->addr), 264 (unsigned int) wpabuf_len(req), query->freq, prot); 265 if (prot) { 444 int prot, pmf; local 449 prot = categ == WLAN_ACTION_PROTECTED_DUAL; 451 if (prot && !pmf) { 455 if (!prot && pmf) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | gas_serv.c | 960 struct anqp_query_info *qi, int prot) 995 di->prot = prot; 1010 if (prot) 1020 const u8 *data, size_t len, int prot) 1070 if (prot) 1123 gas_serv_req_local_processing(hapd, sa, dialog_token, &qi, prot); 1129 const u8 *data, size_t len, int prot) 1203 if (prot) 1217 int prot; local 958 gas_serv_req_local_processing(struct hostapd_data *hapd, const u8 *sa, u8 dialog_token, struct anqp_query_info *qi, int prot) argument 1018 gas_serv_rx_gas_initial_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot) argument 1127 gas_serv_rx_gas_comeback_req(struct hostapd_data *hapd, const u8 *sa, const u8 *data, size_t len, int prot) argument [all...] |
H A D | gas_serv.h | 51 int prot; /* whether Protected Dual of Public Action frame is used */ member in struct:gas_dialog_info
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_nl80211.c | 3536 unsigned int prot = 0; local 3539 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS; 3541 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_WPS2; 3543 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_P2P; 3545 prot |= WPA_DRIVER_PROBE_RESP_OFFLOAD_INTERWORKING; 3547 return prot;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_eke_common.c | 615 u8 *prot, size_t *prot_len) 639 pos = prot; 663 *prot_len = pos - prot; 669 const u8 *prot, size_t prot_len, 692 if (eap_eke_mac(sess->mac, sess->ki, prot + block_size, 695 if (os_memcmp_const(icv, prot + prot_len - icv_len, icv_len) != 0) { 706 os_memcpy(data, prot + block_size, *data_len); 707 if (aes_128_cbc_decrypt(sess->ke, prot, data, *data_len) < 0) { 613 eap_eke_prot(struct eap_eke_session *sess, const u8 *data, size_t data_len, u8 *prot, size_t *prot_len) argument 668 eap_eke_decrypt_prot(struct eap_eke_session *sess, const u8 *prot, size_t prot_len, u8 *data, size_t *data_len) argument
|
H A D | eap_eke_common.h | 107 u8 *prot, size_t *prot_len); 109 const u8 *prot, size_t prot_len,
|
/external/valgrind/main/coregrind/m_aspacemgr/ |
H A D | aspacemgr-common.c | 150 SysRes VG_(am_do_mmap_NO_NOTIFY)( Addr start, SizeT length, UInt prot, argument 158 prot, flags, fd, offset); 164 prot, flags, fd, offset / 4096); 169 prot, flags, fd, offset); 175 prot, flags, fd, offset & 0xffffffff, offset >> 32); 181 prot, flags, (UInt)fd, offset); 189 SysRes local_do_mprotect_NO_NOTIFY(Addr start, SizeT length, UInt prot) argument 191 return VG_(do_syscall3)(__NR_mprotect, (UWord)start, length, prot );
|
H A D | aspacemgr-linux.c | 362 void (*record_mapping)( Addr addr, SizeT len, UInt prot, 890 static void sync_check_mapping_callback ( Addr addr, SizeT len, UInt prot, argument 989 if (sloppyXcheck && (prot & VKI_PROT_EXEC) != 0) { 994 && seg_prot == prot 1017 prot & VKI_PROT_READ ? 'r' : '-', 1018 prot & VKI_PROT_WRITE ? 'w' : '-', 1019 prot & VKI_PROT_EXEC ? 'x' : '-', 1298 least the "prot" protection permissions by examining the underlying 1302 Bool is_valid_for( Bool client, Addr start, SizeT len, UInt prot, Bool freeOk ) argument 1312 needR = toBool(prot 1561 read_maps_callback( Addr addr, SizeT len, UInt prot, ULong dev, ULong ino, Off64T offset, const HChar* filename ) argument 2040 am_notify_client_mmap( Addr a, SizeT len, UInt prot, UInt flags, Int fd, Off64T offset ) argument 2228 am_mmap_file_fixed_client( Addr start, SizeT length, UInt prot, Int fd, Off64T offset ) argument 2234 am_mmap_named_file_fixed_client( Addr start, SizeT length, UInt prot, Int fd, Off64T offset, const HChar *name ) argument 2530 am_mmap_file_float_valgrind_flags( SizeT length, UInt prot, UInt flags, Int fd, Off64T offset ) argument 2613 am_mmap_file_float_valgrind( SizeT length, UInt prot, Int fd, Off64T offset ) argument 2621 am_shared_mmap_file_float_valgrind( SizeT length, UInt prot, Int fd, Off64T offset ) argument 2853 UInt prot; local 3235 parse_procselfmaps( void (*record_mapping)( Addr addr, SizeT len, UInt prot, ULong dev, ULong ino, Off64T offset, const HChar* filename ), void (*record_gap)( Addr addr, SizeT len ) ) argument 3246 UInt prot; local 3444 parse_procselfmaps( void (*record_mapping)( Addr addr, SizeT len, UInt prot, ULong dev, ULong ino, Off64T offset, const HChar* filename ), void (*record_gap)( Addr addr, SizeT len ) ) argument 3503 add_mapping_callback(Addr addr, SizeT len, UInt prot, ULong dev, ULong ino, Off64T offset, const HChar *filename) argument [all...] |
/external/valgrind/main/coregrind/m_debuginfo/ |
H A D | debuginfo.c | 953 void VG_(di_notify_mprotect)( Addr a, SizeT len, UInt prot ) 955 Bool exe_ok = toBool(prot & VKI_PROT_EXEC); 957 exe_ok = exe_ok || toBool(prot & VKI_PROT_READ); 969 void VG_(di_notify_vm_protect)( Addr a, SizeT len, UInt prot ) 978 Bool r_ok = toBool(prot & VKI_PROT_READ); 979 Bool w_ok = toBool(prot & VKI_PROT_WRITE); 980 Bool x_ok = toBool(prot & VKI_PROT_EXEC);
|
/external/valgrind/main/coregrind/m_syswrap/ |
H A D | priv_syswrap-generic.h | 71 ML_(notify_core_and_tool_of_mmap) ( Addr a, SizeT len, UInt prot, 76 ML_(notify_core_and_tool_of_mprotect) ( Addr a, SizeT len, Int prot );
|
H A D | syswrap-amd64-linux.c | 648 unsigned long, prot, unsigned long, flags,
|
H A D | syswrap-arm-linux.c | 375 unsigned long, prot, unsigned long, flags,
|
H A D | syswrap-arm64-linux.c | 454 //ZZ unsigned long, prot, unsigned long, flags, 479 unsigned long, prot, unsigned long, flags,
|
H A D | syswrap-darwin.c | 672 cs->prot, VKI_MAP_PRIVATE, 0, cs->offset); 681 " added region 0x%010lx..0x%010lx prot %u at %s (%s)\n", 682 cs->start, cs->end + 1, (UInt)cs->prot, where, when); 3574 Addr,start, vki_size_t,length, int,prot, int,flags, int,fd, 3584 Addr,start, vki_size_t,length, int,prot, int,flags, int,fd, 5422 PRINT("vm_protect(%s, at %#llx, size %lld, set_max %d, prot %d)", 5453 UInt prot = MACH_ARG(vm_protect.new_protection); local 5457 //VG_(mprotect_max_range)(start, end-start, prot); 5459 ML_(notify_core_and_tool_of_mprotect)(start, end-start, prot); 5460 VG_(di_notify_vm_protect)(start, end-start, prot); 5842 UInt prot = reply->cur_protection & reply->max_protection; local 6146 UInt prot = MACH_ARG(mach_vm_protect.new_protection); local [all...] |
H A D | syswrap-generic.c | 145 static void notify_core_of_mmap(Addr a, SizeT len, UInt prot, argument 155 d = VG_(am_notify_client_mmap)( a, len, prot, flags, fd, offset ); 162 static void notify_tool_of_mmap(Addr a, SizeT len, UInt prot, ULong di_handle) argument 171 rr = toBool(prot & VKI_PROT_READ); 172 ww = toBool(prot & VKI_PROT_WRITE); 173 xx = toBool(prot & VKI_PROT_EXEC); 196 ML_(notify_core_and_tool_of_mmap) ( Addr a, SizeT len, UInt prot, argument 202 notify_core_of_mmap(a, len, prot, flags, fd, offset); 203 notify_tool_of_mmap(a, len, prot, 0/*di_handle*/); 221 ML_(notify_core_and_tool_of_mprotect) ( Addr a, SizeT len, Int prot ) 1875 UInt prot = VKI_PROT_READ|VKI_PROT_WRITE; local 3652 Int prot = ARG3; local [all...] |