/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211.c | 1186 static struct nla_policy policy[NL80211_STA_INFO_MAX + 1] = { local 1204 tb[NL80211_ATTR_STA_INFO], policy)) 7848 wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed); 7852 "nl80211: Ignore roaming policy change since driver does not provide command for setting it");
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay.c | 747 /* TODO: What policy should be applied to detect duplicated SCI 3127 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy, argument 3146 kay->policy = policy; 3168 if (policy == DO_NOT_SECURE) { 3201 if (policy == DO_NOT_SECURE) {
|
H A D | ieee802_1x_kay.h | 146 enum macsec_policy policy; member in struct:ieee802_1x_kay 158 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | browser.c | 100 gchar *mime, WebKitWebPolicyDecision *policy, 106 webkit_web_policy_decision_download(policy); 187 g_signal_connect(G_OBJECT(view), "mime-type-policy-decision-requested", 98 view_cb_mime_type_policy_decision( WebKitWebView *view, WebKitWebFrame *frame, WebKitNetworkRequest *req, gchar *mime, WebKitWebPolicyDecision *policy, struct browser_context *ctx) argument
|
/external/wpa_supplicant_8/hs20/server/ |
H A D | spp_server.c | 766 xml_node_t *spp_node, *policy; local 771 "requires policy remediation", NULL); 776 policy = build_policy(ctx, user, realm, dmacc); 777 if (!policy) { 793 if (add_update_node(ctx, spp_node, ns, buf, policy) < 0) { 795 xml_node_free(ctx->xml, policy); 800 "policy update (sub rem)", policy); 801 xml_node_free(ctx->xml, policy); 941 else if (type && strcmp(type, "policy") 956 xml_node_t *policy, *node; local 1012 xml_node_t *policy; local [all...] |
/external/wpa_supplicant_8/hs20/server/www/ |
H A D | users.php | 72 if ($cmd == 'subrem-add-policy' && $id > 0) { 73 $db->exec("UPDATE users SET remediation='policy' WHERE rowid=$id"); 87 if ($cmd == "policy" && $id > 0 && isset($_GET["policy"])) { 88 $policy = $_GET["policy"]; variable 89 if ($policy == "no-policy" || 90 is_readable("$osu_root/spp/policy/$policy [all...] |
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211.c | 1186 static struct nla_policy policy[NL80211_STA_INFO_MAX + 1] = { local 1204 tb[NL80211_ATTR_STA_INFO], policy)) 7848 wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed); 7852 "nl80211: Ignore roaming policy change since driver does not provide command for setting it");
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_kay.c | 747 /* TODO: What policy should be applied to detect duplicated SCI 3127 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy, argument 3146 kay->policy = policy; 3168 if (policy == DO_NOT_SECURE) { 3201 if (policy == DO_NOT_SECURE) {
|
H A D | ieee802_1x_kay.h | 146 enum macsec_policy policy; member in struct:ieee802_1x_kay 158 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
|
/external/wpa_supplicant_8/src/utils/ |
H A D | browser.c | 100 gchar *mime, WebKitWebPolicyDecision *policy, 106 webkit_web_policy_decision_download(policy); 187 g_signal_connect(G_OBJECT(view), "mime-type-policy-decision-requested", 98 view_cb_mime_type_policy_decision( WebKitWebView *view, WebKitWebFrame *frame, WebKitNetworkRequest *req, gchar *mime, WebKitWebPolicyDecision *policy, struct browser_context *ctx) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_nl80211.c | 1186 static struct nla_policy policy[NL80211_STA_INFO_MAX + 1] = { local 1204 tb[NL80211_ATTR_STA_INFO], policy)) 7848 wpa_printf(MSG_DEBUG, "nl80211: Roaming policy: allowed=%d", allowed); 7852 "nl80211: Ignore roaming policy change since driver does not provide command for setting it");
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_kay.c | 747 /* TODO: What policy should be applied to detect duplicated SCI 3127 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy, argument 3146 kay->policy = policy; 3168 if (policy == DO_NOT_SECURE) { 3201 if (policy == DO_NOT_SECURE) {
|
H A D | ieee802_1x_kay.h | 146 enum macsec_policy policy; member in struct:ieee802_1x_kay 158 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | browser.c | 100 gchar *mime, WebKitWebPolicyDecision *policy, 106 webkit_web_policy_decision_download(policy); 187 g_signal_connect(G_OBJECT(view), "mime-type-policy-decision-requested", 98 view_cb_mime_type_policy_decision( WebKitWebView *view, WebKitWebFrame *frame, WebKitNetworkRequest *req, gchar *mime, WebKitWebPolicyDecision *policy, struct browser_context *ctx) argument
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpas_kay.c | 189 enum macsec_policy policy; local 196 policy = ssid->macsec_policy == 1 ? SHOULD_SECURE : DO_NOT_SECURE; 226 res = ieee802_1x_kay_init(kay_ctx, policy, wpa_s->ifname, 314 if (!wpa_s->kay || wpa_s->kay->policy == DO_NOT_SECURE)
|
/external/webrtc/src/system_wrappers/source/ |
H A D | thread_posix.cc | 177 const int policy = SCHED_RR; local 179 const int policy = SCHED_FIFO; local 202 const int minPrio = sched_get_priority_min(policy); 203 const int maxPrio = sched_get_priority_max(policy); 227 result = pthread_setschedparam(_thread, policy, ¶m);
|
/external/vogar/lib/ |
H A D | gson-1.7.1.jar | ... util.Collection) com.google.gson.RecursiveFieldNamingPolicy policy
com.google.gson.RecursiveFieldNamingPolicy[] arr$
int ... |
/external/valgrind/coregrind/m_syswrap/ |
H A D | syswrap-darwin.c | 2062 PRE_REG_READ3(int,"__mac_syscall", char *,"policy", 2066 // GrP fixme check policy? 5712 int policy; member in struct:__anon16082 5720 name_for_port(MACH_REMOTE), req->policy, req->value); 9133 "scope:0x%lx, action:0x%lx, policy:0x%lx, policy_subtype:0x%lx,"
|
/external/v8/src/compiler/ |
H A D | instruction.h | 123 explicit UnallocatedOperand(ExtendedPolicy policy) argument 126 value_ |= ExtendedPolicyField::encode(policy); 130 UnallocatedOperand(BasicPolicy policy, int index) argument 132 DCHECK(policy == FIXED_SLOT); 133 value_ |= BasicPolicyField::encode(policy); 138 UnallocatedOperand(ExtendedPolicy policy, int index) argument 140 DCHECK(policy == FIXED_REGISTER || policy == FIXED_DOUBLE_REGISTER); 142 value_ |= ExtendedPolicyField::encode(policy); 147 UnallocatedOperand(ExtendedPolicy policy, Lifetim argument [all...] |
/external/v8/src/ |
H A D | lithium.h | 104 explicit LUnallocated(ExtendedPolicy policy) : LOperand(UNALLOCATED, 0) { argument 106 value_ |= ExtendedPolicyField::encode(policy); 110 LUnallocated(BasicPolicy policy, int index) : LOperand(UNALLOCATED, 0) { argument 111 DCHECK(policy == FIXED_SLOT); 112 value_ |= BasicPolicyField::encode(policy); 117 LUnallocated(ExtendedPolicy policy, int index) : LOperand(UNALLOCATED, 0) { argument 118 DCHECK(policy == FIXED_REGISTER || policy == FIXED_DOUBLE_REGISTER); 120 value_ |= ExtendedPolicyField::encode(policy); 125 LUnallocated(ExtendedPolicy policy, Lifetim argument [all...] |
H A D | splay-tree.h | 23 // The tree is also parameterized by an allocation policy 24 // (Allocator). The policy is used for allocating lists in the C free 50 INLINE(void operator delete(void* p, AllocationPolicy policy)) { argument
|
/external/srtp/srtp/ |
H A D | ekt.c | 123 ekt_alloc(ekt_stream_t *stream_data, ekt_policy_t policy) { argument 126 * if the policy pointer is NULL, then EKT is not in use 129 if (!policy) { 141 ekt_stream_init_from_policy(ekt_stream_t stream_data, ekt_policy_t policy) { argument 267 * if there is no EKT policy, then the other inputs are unaffected
|
H A D | srtp.c | 1211 const srtp_policy_t *policy) { 1216 if ((session == NULL) || (policy == NULL) || (policy->key == NULL)) 1220 status = srtp_stream_alloc(&tmp, policy); 1226 status = srtp_stream_init(tmp, policy); 1237 * if the template stream has already been set, then the policy is 1240 switch (policy->ssrc.type) { 1270 const srtp_policy_t *policy) { /* SRTP policy (list) */ 1285 * loop over elements in the policy lis 1210 srtp_add_stream(srtp_t session, const srtp_policy_t *policy) argument 1269 srtp_create(srtp_t *session, const srtp_policy_t *policy) argument 1882 crypto_policy_set_from_profile_for_rtp(crypto_policy_t *policy, srtp_profile_t profile) argument 1911 crypto_policy_set_from_profile_for_rtcp(crypto_policy_t *policy, srtp_profile_t profile) argument [all...] |
/external/srtp/test/ |
H A D | dtls_srtp_driver.c | 124 srtp_policy_t policy; local 178 policy.key = key; 180 /* initialize SRTP policy from profile */ 181 err = crypto_policy_set_from_profile_for_rtp(&policy.rtp, profile); 183 err = crypto_policy_set_from_profile_for_rtcp(&policy.rtcp, profile); 185 policy.ssrc.type = ssrc_any_inbound; 186 policy.ekt = NULL; 187 policy.window_size = 128; 188 policy.allow_repeat_tx = 0; 189 policy [all...] |
H A D | rtp.c | 150 rtp_sender_init_srtp(rtp_sender_t sender, const srtp_policy_t *policy) { argument 151 return srtp_create(&sender->srtp_ctx, policy); 155 rtp_receiver_init_srtp(rtp_receiver_t sender, const srtp_policy_t *policy) { argument 156 return srtp_create(&sender->srtp_ctx, policy);
|