Searched defs:ver (Results 76 - 100 of 125) sorted by relevance

12345

/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dwpa_common.c52 * @ver: Key descriptor version (WPA_KEY_INFO_TYPE_*)
67 int wpa_eapol_key_mic(const u8 *key, size_t key_len, int akmp, int ver, argument
72 switch (ver) {
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_hostap.c145 int ver; local
166 ver = fc & WLAN_FC_PVER;
171 if (ver == 1 || ver == 2) {
172 handle_tx_callback(drv, buf, data_len, ver == 2 ? 1 : 0);
174 } else if (ver != 0) {
175 printf("unknown protocol version %d\n", ver);
H A Ddriver_nl80211.c3430 u32 ver; local
3503 ver = 0;
3505 ver |= NL80211_WPA_VERSION_1;
3507 ver |= NL80211_WPA_VERSION_2;
3508 if (ver &&
3509 nla_put_u32(msg, NL80211_ATTR_WPA_VERSIONS, ver))
4732 enum nl80211_wpa_versions ver = 0; local
4735 ver |= NL80211_WPA_VERSION_1;
4737 ver |= NL80211_WPA_VERSION_2;
4739 wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver);
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Dtncc.c1171 static struct wpabuf * tncc_build_soh(int ver) argument
1199 wpabuf_put_be16(buf, ver); /* Inner Type */
1202 if (ver == 2) {
1284 struct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len) argument
/external/fio/
H A Dstat.c847 struct group_run_stats *rs, int ver)
856 log_info("%d;%s;%s;%d;%d", ver, fio_version_string,
863 if (ver == 4)
846 show_thread_status_terse_v3_v4(struct thread_stat *ts, struct group_run_stats *rs, int ver) argument
/external/icu/icu4c/source/tools/genrb/
H A Dparse.cpp877 char ver[40]; local
880 if (length >= UPRV_LENGTHOF(ver))
882 length = UPRV_LENGTHOF(ver) - 1;
885 sr->fString.extract(0, length, ver, UPRV_LENGTHOF(ver), US_INV);
886 u_versionFromString(version, ver);
/external/pdfium/core/src/fxge/win32/
H A Dfx_win32_device.cpp462 OSVERSIONINFO ver; local
463 ver.dwOSVersionInfoSize = sizeof(ver);
464 GetVersionEx(&ver);
465 pPlatformData->m_bHalfTone = ver.dwMajorVersion >= 5;
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_1x.c344 int ver, val; local
346 ver = wpa_auth_sta_wpa_version(sta->wpa_sm);
348 suite = wpa_cipher_to_suite(ver, val);
681 u8 ver = 1; /* Release 2 */ local
684 &ver, 1)) {
H A Dwpa_auth.c982 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK; local
988 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
998 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
1008 ver != WPA_KEY_INFO_TYPE_AKM_DEFINED) {
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa.c35 * @ver: Version field from Key Info
44 int ver, const u8 *dest, u16 proto,
68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len,
72 ver, sm->key_mgmt);
101 int key_info, ver; local
106 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED;
109 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC;
111 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES;
113 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4;
132 key_info = WPA_KEY_INFO_REQUEST | ver;
43 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument
336 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument
444 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1143 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument
1186 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1366 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument
1453 wpa_supplicant_send_2_of_2(struct wpa_sm *sm, const struct wpa_eapol_key *key, int ver, u16 key_info) argument
1495 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument
1566 wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_eapol_key_192 *key, u16 ver, const u8 *buf, size_t len) argument
1621 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument
1767 u16 key_info, ver; local
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dieee802_1x.c344 int ver, val; local
346 ver = wpa_auth_sta_wpa_version(sta->wpa_sm);
348 suite = wpa_cipher_to_suite(ver, val);
681 u8 ver = 1; /* Release 2 */ local
684 &ver, 1)) {
H A Dwpa_auth.c982 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK; local
988 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
998 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
1008 ver != WPA_KEY_INFO_TYPE_AKM_DEFINED) {
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa.c35 * @ver: Version field from Key Info
44 int ver, const u8 *dest, u16 proto,
68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len,
72 ver, sm->key_mgmt);
101 int key_info, ver; local
106 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED;
109 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC;
111 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES;
113 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4;
132 key_info = WPA_KEY_INFO_REQUEST | ver;
43 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument
336 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument
444 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1143 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument
1186 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1366 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument
1453 wpa_supplicant_send_2_of_2(struct wpa_sm *sm, const struct wpa_eapol_key *key, int ver, u16 key_info) argument
1495 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument
1566 wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_eapol_key_192 *key, u16 ver, const u8 *buf, size_t len) argument
1621 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument
1767 u16 key_info, ver; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_1x.c344 int ver, val; local
346 ver = wpa_auth_sta_wpa_version(sta->wpa_sm);
348 suite = wpa_cipher_to_suite(ver, val);
681 u8 ver = 1; /* Release 2 */ local
684 &ver, 1)) {
H A Dwpa_auth.c982 u16 ver = key_info & WPA_KEY_INFO_TYPE_MASK; local
988 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
998 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
1008 ver != WPA_KEY_INFO_TYPE_AKM_DEFINED) {
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.c35 * @ver: Version field from Key Info
44 int ver, const u8 *dest, u16 proto,
68 wpa_eapol_key_mic(kck, kck_len, sm->key_mgmt, ver, msg, msg_len,
72 ver, sm->key_mgmt);
101 int key_info, ver; local
106 ver = WPA_KEY_INFO_TYPE_AKM_DEFINED;
109 ver = WPA_KEY_INFO_TYPE_AES_128_CMAC;
111 ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES;
113 ver = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4;
132 key_info = WPA_KEY_INFO_REQUEST | ver;
43 wpa_eapol_key_send(struct wpa_sm *sm, const u8 *kck, size_t kck_len, int ver, const u8 *dest, u16 proto, u8 *msg, size_t msg_len, u8 *key_mic) argument
336 wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, int ver, const u8 *nonce, const u8 *wpa_ie, size_t wpa_ie_len, struct wpa_ptk *ptk) argument
444 wpa_supplicant_process_1_of_4(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1143 wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst, const struct wpa_eapol_key *key, u16 ver, u16 key_info, struct wpa_ptk *ptk) argument
1186 wpa_supplicant_process_3_of_4(struct wpa_sm *sm, const struct wpa_eapol_key *key, u16 ver, const u8 *key_data, size_t key_data_len) argument
1366 wpa_supplicant_process_1_of_2_wpa(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 key_info, u16 ver, struct wpa_gtk_data *gd) argument
1453 wpa_supplicant_send_2_of_2(struct wpa_sm *sm, const struct wpa_eapol_key *key, int ver, u16 key_info) argument
1495 wpa_supplicant_process_1_of_2(struct wpa_sm *sm, const unsigned char *src_addr, const struct wpa_eapol_key *key, const u8 *key_data, size_t key_data_len, u16 ver) argument
1566 wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm, struct wpa_eapol_key_192 *key, u16 ver, const u8 *buf, size_t len) argument
1621 wpa_supplicant_decrypt_key_data(struct wpa_sm *sm, struct wpa_eapol_key *key, u16 ver, u8 *key_data, size_t *key_data_len) argument
1767 u16 key_info, ver; local
[all...]
/external/robolectric/v1/lib/main/
H A Dhttpcore-4.0.1.jar ... io.IOException org.apache.http.ProtocolVersion ver org.apache.http.HttpEntity entity org. ...
/external/icu/icu4c/source/common/
H A Duresbund.cpp3001 ures_getVersionByKey(const UResourceBundle* res, const char *key, UVersionInfo ver, UErrorCode *status) { argument
3006 u_versionFromUString(ver, str);
/external/javasqlite/src/main/native/
H A Dsqlite_jni.c55 int ver; /* version code */ member in struct:__anon7541
615 if (h->ver >= 0x020506 && cols[ncol]) {
650 if (h->ver >= 0x020506 && cols[ncol]) {
1111 h->ver = 0;
1254 h->ver = ((maj & 0xFF) << 16) | ((min & 0xFF) << 8) | (lev & 0xFF);
1467 } else if (h->ver >= 0x020500 && *p == 'Q') {
3154 v->hh.ver = h->ver;
3360 v->hh.ver = h->ver;
[all...]
/external/kernel-headers/original/uapi/drm/
H A Damdgpu_drm.h564 uint32_t ver; member in struct:drm_amdgpu_info_firmware
/external/kernel-headers/original/uapi/linux/
H A Dnvme.h54 __u32 ver; member in struct:nvme_id_ctrl
/external/libdrm/include/drm/
H A Damdgpu_drm.h564 uint32_t ver; member in struct:drm_amdgpu_info_firmware
/external/valgrind/coregrind/m_debuginfo/
H A Dreaddwarf.c847 UShort ver; local
863 ver = ML_(cur_step_UShort)(&p);
996 p = ML_(cur_plus)(p, (ver == 2) ? addr_size
1070 UShort ver; local
1105 ver = ML_(cur_read_UShort)( ML_(cur_plus)(block_img, blklen_len) );
1106 if ( ver != 2 && ver != 3 && ver != 4 ) {
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_nl80211.c3430 u32 ver; local
3503 ver = 0;
3505 ver |= NL80211_WPA_VERSION_1;
3507 ver |= NL80211_WPA_VERSION_2;
3508 if (ver &&
3509 nla_put_u32(msg, NL80211_ATTR_WPA_VERSIONS, ver))
4732 enum nl80211_wpa_versions ver = 0; local
4735 ver |= NL80211_WPA_VERSION_1;
4737 ver |= NL80211_WPA_VERSION_2;
4739 wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver);
[all...]
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_nl80211.c3430 u32 ver; local
3503 ver = 0;
3505 ver |= NL80211_WPA_VERSION_1;
3507 ver |= NL80211_WPA_VERSION_2;
3508 if (ver &&
3509 nla_put_u32(msg, NL80211_ATTR_WPA_VERSIONS, ver))
4732 enum nl80211_wpa_versions ver = 0; local
4735 ver |= NL80211_WPA_VERSION_1;
4737 ver |= NL80211_WPA_VERSION_2;
4739 wpa_printf(MSG_DEBUG, " * WPA Versions 0x%x", ver);
[all...]

Completed in 795 milliseconds

12345