/external/webrtc/webrtc/base/ |
H A D | winfirewall_unittest.cc | 22 bool authorized; local 24 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized)); 28 EXPECT_TRUE(fw.QueryAuthorized("bogus.exe", &authorized)); 31 // about whether we're authorized. It will depend on the settings of the 35 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized));
|
H A D | winfirewall.h | 38 bool QueryAuthorized(const char* filename, bool* authorized) const; 39 bool QueryAuthorizedW(const wchar_t* filename, bool* authorized) const; 42 bool authorized, HRESULT* result); 44 bool authorized, HRESULT* result);
|
H A D | winfirewall.cc | 75 bool WinFirewall::QueryAuthorized(const char* filename, bool* authorized) 77 return QueryAuthorizedW(ToUtf16(filename).c_str(), authorized); 80 bool WinFirewall::QueryAuthorizedW(const wchar_t* filename, bool* authorized) 82 *authorized = false; 102 *authorized = (fwEnabled != VARIANT_FALSE); 105 // No entry in list of authorized apps 118 bool authorized, 121 ToUtf16(friendly_name).c_str(), authorized, result); 126 bool authorized, 143 hr = app->put_Enabled(authorized 116 AddApplication(const char* filename, const char* friendly_name, bool authorized, HRESULT* result) argument 124 AddApplicationW(const wchar_t* filename, const wchar_t* friendly_name, bool authorized, HRESULT* result) argument [all...] |
/external/autotest/client/site_tests/network_3GRebootStress/ |
H A D | network_3GRebootStress.py | 65 def SetAuthorized(self, authorized): 66 logging.debug('Setting authorized to %d' % authorized) 67 authorized_path = '%s/authorized' % self.usb_device_path 69 authorized_file.write('%d' % authorized)
|
/external/chromium-trace/catapult/third_party/gsutil/gslib/commands/ |
H A D | stat.py | 142 sys.stderr.write('You aren\'t authorized to read %s - skipping' %
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_1x.h | 28 struct sta_info *sta, int authorized);
|
H A D | sta_info.c | 1109 int authorized) 1118 if (!!authorized == !!(sta->flags & WLAN_STA_AUTHORIZED)) 1121 if (authorized) 1143 sta->addr, authorized, dev_addr); 1145 if (authorized) { 1176 if (authorized) 1108 ap_sta_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
|
H A D | sta_info.h | 264 struct sta_info *sta, int authorized);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_1x.h | 28 struct sta_info *sta, int authorized);
|
H A D | sta_info.c | 1109 int authorized) 1118 if (!!authorized == !!(sta->flags & WLAN_STA_AUTHORIZED)) 1121 if (authorized) 1143 sta->addr, authorized, dev_addr); 1145 if (authorized) { 1176 if (authorized) 1108 ap_sta_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
|
H A D | sta_info.h | 264 struct sta_info *sta, int authorized);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_1x.h | 28 struct sta_info *sta, int authorized);
|
H A D | sta_info.c | 1109 int authorized) 1118 if (!!authorized == !!(sta->flags & WLAN_STA_AUTHORIZED)) 1121 if (authorized) 1143 sta->addr, authorized, dev_addr); 1145 if (authorized) { 1176 if (authorized) 1108 ap_sta_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
|
H A D | sta_info.h | 264 struct sta_info *sta, int authorized);
|
/external/wpa_supplicant_8/hostapd/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 75 void (*set_port_authorized)(void *ctx, void *sta_ctx, int authorized);
|
/external/wpa_supplicant_8/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 75 void (*set_port_authorized)(void *ctx, void *sta_ctx, int authorized);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 75 void (*set_port_authorized)(void *ctx, void *sta_ctx, int authorized);
|
/external/iputils/ |
H A D | Makefile | 237 @if [ x"$(UNAME_N)" != x"pleiades" ]; then echo "Not authorized to advance snapshot"; exit 1; fi
|
/external/jetty/src/java/org/eclipse/jetty/security/ |
H A D | SecurityHandler.java | 513 boolean authorized=checkWebResourcePermissions(pathInContext, baseRequest, base_response, constraintInfo, userAuth.getUserIdentity()); 514 if (!authorized)
|
/external/wpa_supplicant_8/hostapd/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 240 * port_cb - Set port authorized/unauthorized callback (optional) 242 * @authorized: Whether the supplicant port is now in authorized state 244 void (*port_cb)(void *ctx, int authorized);
|
/external/wpa_supplicant_8/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 240 * port_cb - Set port authorized/unauthorized callback (optional) 242 * @authorized: Whether the supplicant port is now in authorized state 244 void (*port_cb)(void *ctx, int authorized);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | notify.h | 87 const u8 *mac_addr, int authorized,
|
H A D | wpas_glue.c | 886 static void wpa_supplicant_port_cb(void *ctx, int authorized) argument 893 authorized ? "Authorized" : "Unauthorized"); 898 authorized ? "Authorized" : "Unauthorized"); 899 wpa_drv_set_supp_port(wpa_s, authorized);
|
H A D | notify.c | 723 /* Notify listeners a new station has been authorized */ 747 const u8 *mac_addr, int authorized, 750 if (authorized) 746 wpas_notify_sta_authorized(struct wpa_supplicant *wpa_s, const u8 *mac_addr, int authorized, const u8 *p2p_dev_addr) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_supp/ |
H A D | eapol_supp_sm.h | 240 * port_cb - Set port authorized/unauthorized callback (optional) 242 * @authorized: Whether the supplicant port is now in authorized state 244 void (*port_cb)(void *ctx, int authorized);
|