/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 52 * @ver: Key descriptor version (WPA_KEY_INFO_TYPE_*) 67 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, argument 72 switch (ver) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_hostap.c | 145 int ver; local 166 ver = fc & WLAN_FC_PVER; 171 if (ver == 1 || ver == 2) { 172 handle_tx_callback(drv, buf, data_len, ver == 2 ? 1 : 0); 174 } else if (ver != 0) { 175 printf("unknown protocol version %d\n", ver);
|
H A D | driver_nl80211.c | 3430 u32 ver; local 3503 ver = 0; 3505 ver |= NL80211_WPA_VERSION_1; 3507 ver |= NL80211_WPA_VERSION_2; 3508 if (ver && 3509 nla_put_u32(msg, NL80211_ATTR_WPA_VERSIONS, ver)) 4732 enum nl80211_wpa_versions ver = 0; local 4735 ver |= NL80211_WPA_VERSION_1; 4737 ver |= NL80211_WPA_VERSION_2; 4739 wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | tncc.c | 1171 static struct wpabuf * tncc_build_soh(int ver) argument 1199 wpabuf_put_be16(buf, ver); /* Inner Type */ 1202 if (ver == 2) { 1284 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len) argument
|
/external/fio/ |
H A D | stat.c | 847 struct group_run_stats *rs, int ver) 856 log_info("%d;%s;%s;%d;%d", ver, fio_version_string, 863 if (ver == 4) 846 show_thread_status_terse_v3_v4(struct thread_stat *ts, struct group_run_stats *rs, int ver) argument
|
/external/icu/icu4c/source/tools/genrb/ |
H A D | parse.cpp | 877 char ver[40]; local 880 if (length >= UPRV_LENGTHOF(ver)) 882 length = UPRV_LENGTHOF(ver) - 1; 885 sr->fString.extract(0, length, ver, UPRV_LENGTHOF(ver), US_INV); 886 u_versionFromString(version, ver);
|
/external/pdfium/core/src/fxge/win32/ |
H A D | fx_win32_device.cpp | 462 OSVERSIONINFO ver; local 463 ver.dwOSVersionInfoSize = sizeof(ver); 464 GetVersionEx(&ver); 465 pPlatformData->m_bHalfTone = ver.dwMajorVersion >= 5;
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_1x.c | 344 int ver, val; local 346 ver = wpa_auth_sta_wpa_version(sta->wpa_sm); 348 suite = wpa_cipher_to_suite(ver, val); 681 u8 ver = 1; /* Release 2 */ local 684 &ver, 1)) {
|
H A D | wpa_auth.c | 982 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK; local 988 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) { 998 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) { 1008 ver != WPA_KEY_INFO_TYPE_AKM_DEFINED) {
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 35 * @ver: Version field from Key Info 44 int ver, const u8 *dest, u16 proto, 68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, 72 ver, sm->key_mgmt); 101 int key_info, ver; local 106 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED; 109 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC; 111 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES; 113 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4; 132 key_info = WPA_KEY_INFO_REQUEST | ver; 43 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument 336 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument 444 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1143 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument 1186 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1366 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument 1453 wpa_supplicant_send_2_of_2(struct wpa_sm *sm, const struct wpa_eapol_key *key, int ver, u16 key_info) argument 1495 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument 1566 wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_eapol_key_192 *key, u16 ver, const u8 *buf, size_t len) argument 1621 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument 1767 u16 key_info, ver; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_1x.c | 344 int ver, val; local 346 ver = wpa_auth_sta_wpa_version(sta->wpa_sm); 348 suite = wpa_cipher_to_suite(ver, val); 681 u8 ver = 1; /* Release 2 */ local 684 &ver, 1)) {
|
H A D | wpa_auth.c | 982 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK; local 988 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) { 998 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) { 1008 ver != WPA_KEY_INFO_TYPE_AKM_DEFINED) {
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa.c | 35 * @ver: Version field from Key Info 44 int ver, const u8 *dest, u16 proto, 68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, 72 ver, sm->key_mgmt); 101 int key_info, ver; local 106 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED; 109 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC; 111 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES; 113 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4; 132 key_info = WPA_KEY_INFO_REQUEST | ver; 43 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument 336 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument 444 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1143 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument 1186 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1366 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument 1453 wpa_supplicant_send_2_of_2(struct wpa_sm *sm, const struct wpa_eapol_key *key, int ver, u16 key_info) argument 1495 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument 1566 wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_eapol_key_192 *key, u16 ver, const u8 *buf, size_t len) argument 1621 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument 1767 u16 key_info, ver; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_1x.c | 344 int ver, val; local 346 ver = wpa_auth_sta_wpa_version(sta->wpa_sm); 348 suite = wpa_cipher_to_suite(ver, val); 681 u8 ver = 1; /* Release 2 */ local 684 &ver, 1)) {
|
H A D | wpa_auth.c | 982 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK; local 988 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) { 998 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) { 1008 ver != WPA_KEY_INFO_TYPE_AKM_DEFINED) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.c | 35 * @ver: Version field from Key Info 44 int ver, const u8 *dest, u16 proto, 68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len, 72 ver, sm->key_mgmt); 101 int key_info, ver; local 106 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED; 109 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC; 111 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES; 113 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4; 132 key_info = WPA_KEY_INFO_REQUEST | ver; 43 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument 336 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument 444 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1143 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument 1186 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument 1366 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument 1453 wpa_supplicant_send_2_of_2(struct wpa_sm *sm, const struct wpa_eapol_key *key, int ver, u16 key_info) argument 1495 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument 1566 wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_eapol_key_192 *key, u16 ver, const u8 *buf, size_t len) argument 1621 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument 1767 u16 key_info, ver; local [all...] |
/external/robolectric/v1/lib/main/ |
H A D | httpcore-4.0.1.jar | ... io.IOException org.apache.http.ProtocolVersion ver
org.apache.http.HttpEntity entity
org. ... |
/external/icu/icu4c/source/common/ |
H A D | uresbund.cpp | 3001 ures_getVersionByKey(const UResourceBundle* res, const char *key, UVersionInfo ver, UErrorCode *status) { argument 3006 u_versionFromUString(ver, str);
|
/external/javasqlite/src/main/native/ |
H A D | sqlite_jni.c | 55 int ver; /* version code */ member in struct:__anon7541 615 if (h->ver >= 0x020506 && cols[ncol]) { 650 if (h->ver >= 0x020506 && cols[ncol]) { 1111 h->ver = 0; 1254 h->ver = ((maj & 0xFF) << 16) | ((min & 0xFF) << 8) | (lev & 0xFF); 1467 } else if (h->ver >= 0x020500 && *p == 'Q') { 3154 v->hh.ver = h->ver; 3360 v->hh.ver = h->ver; [all...] |
/external/kernel-headers/original/uapi/drm/ |
H A D | amdgpu_drm.h | 564 uint32_t ver; member in struct:drm_amdgpu_info_firmware
|
/external/kernel-headers/original/uapi/linux/ |
H A D | nvme.h | 54 __u32 ver; member in struct:nvme_id_ctrl
|
/external/libdrm/include/drm/ |
H A D | amdgpu_drm.h | 564 uint32_t ver; member in struct:drm_amdgpu_info_firmware
|
/external/valgrind/coregrind/m_debuginfo/ |
H A D | readdwarf.c | 847 UShort ver; local 863 ver = ML_(cur_step_UShort)(&p); 996 p = ML_(cur_plus)(p, (ver == 2) ? addr_size 1070 UShort ver; local 1105 ver = ML_(cur_read_UShort)( ML_(cur_plus)(block_img, blklen_len) ); 1106 if ( ver != 2 && ver != 3 && ver != 4 ) {
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211.c | 3430 u32 ver; local 3503 ver = 0; 3505 ver |= NL80211_WPA_VERSION_1; 3507 ver |= NL80211_WPA_VERSION_2; 3508 if (ver && 3509 nla_put_u32(msg, NL80211_ATTR_WPA_VERSIONS, ver)) 4732 enum nl80211_wpa_versions ver = 0; local 4735 ver |= NL80211_WPA_VERSION_1; 4737 ver |= NL80211_WPA_VERSION_2; 4739 wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver); [all...] |
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211.c | 3430 u32 ver; local 3503 ver = 0; 3505 ver |= NL80211_WPA_VERSION_1; 3507 ver |= NL80211_WPA_VERSION_2; 3508 if (ver && 3509 nla_put_u32(msg, NL80211_ATTR_WPA_VERSIONS, ver)) 4732 enum nl80211_wpa_versions ver = 0; local 4735 ver |= NL80211_WPA_VERSION_1; 4737 ver |= NL80211_WPA_VERSION_2; 4739 wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver); [all...] |