Searched refs:authorized (Results 1 - 25 of 64) sorted by relevance

123

/external/webrtc/webrtc/base/
H A Dwinfirewall_unittest.cc22 bool authorized; local
24 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized));
28 EXPECT_TRUE(fw.QueryAuthorized("bogus.exe", &authorized));
31 // about whether we're authorized. It will depend on the settings of the
35 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized));
H A Dwinfirewall.h38 bool QueryAuthorized(const char* filename, bool* authorized) const;
39 bool QueryAuthorizedW(const wchar_t* filename, bool* authorized) const;
42 bool authorized, HRESULT* result);
44 bool authorized, HRESULT* result);
H A Dwinfirewall.cc75 bool WinFirewall::QueryAuthorized(const char* filename, bool* authorized)
77 return QueryAuthorizedW(ToUtf16(filename).c_str(), authorized);
80 bool WinFirewall::QueryAuthorizedW(const wchar_t* filename, bool* authorized)
82 *authorized = false;
102 *authorized = (fwEnabled != VARIANT_FALSE);
105 // No entry in list of authorized apps
118 bool authorized,
121 ToUtf16(friendly_name).c_str(), authorized, result);
126 bool authorized,
143 hr = app->put_Enabled(authorized
116 AddApplication(const char* filename, const char* friendly_name, bool authorized, HRESULT* result) argument
124 AddApplicationW(const wchar_t* filename, const wchar_t* friendly_name, bool authorized, HRESULT* result) argument
[all...]
/external/autotest/client/site_tests/network_3GRebootStress/
H A Dnetwork_3GRebootStress.py65 def SetAuthorized(self, authorized):
66 logging.debug('Setting authorized to %d' % authorized)
67 authorized_path = '%s/authorized' % self.usb_device_path
69 authorized_file.write('%d' % authorized)
/external/chromium-trace/catapult/third_party/gsutil/gslib/commands/
H A Dstat.py142 sys.stderr.write('You aren\'t authorized to read %s - skipping' %
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dieee802_1x.h28 struct sta_info *sta, int authorized);
H A Dsta_info.c1109 int authorized)
1118 if (!!authorized == !!(sta->flags & WLAN_STA_AUTHORIZED))
1121 if (authorized)
1143 sta->addr, authorized, dev_addr);
1145 if (authorized) {
1176 if (authorized)
1108 ap_sta_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
H A Dsta_info.h264 struct sta_info *sta, int authorized);
/external/wpa_supplicant_8/src/ap/
H A Dieee802_1x.h28 struct sta_info *sta, int authorized);
H A Dsta_info.c1109 int authorized)
1118 if (!!authorized == !!(sta->flags & WLAN_STA_AUTHORIZED))
1121 if (authorized)
1143 sta->addr, authorized, dev_addr);
1145 if (authorized) {
1176 if (authorized)
1108 ap_sta_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
H A Dsta_info.h264 struct sta_info *sta, int authorized);
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dieee802_1x.h28 struct sta_info *sta, int authorized);
H A Dsta_info.c1109 int authorized)
1118 if (!!authorized == !!(sta->flags & WLAN_STA_AUTHORIZED))
1121 if (authorized)
1143 sta->addr, authorized, dev_addr);
1145 if (authorized) {
1176 if (authorized)
1108 ap_sta_set_authorized(struct hostapd_data *hapd, struct sta_info *sta, int authorized) argument
H A Dsta_info.h264 struct sta_info *sta, int authorized);
/external/wpa_supplicant_8/hostapd/src/eapol_auth/
H A Deapol_auth_sm.h75 void (*set_port_authorized)(void *ctx, void *sta_ctx, int authorized);
/external/wpa_supplicant_8/src/eapol_auth/
H A Deapol_auth_sm.h75 void (*set_port_authorized)(void *ctx, void *sta_ctx, int authorized);
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_auth/
H A Deapol_auth_sm.h75 void (*set_port_authorized)(void *ctx, void *sta_ctx, int authorized);
/external/iputils/
H A DMakefile237 @if [ x"$(UNAME_N)" != x"pleiades" ]; then echo "Not authorized to advance snapshot"; exit 1; fi
/external/jetty/src/java/org/eclipse/jetty/security/
H A DSecurityHandler.java513 boolean authorized=checkWebResourcePermissions(pathInContext, baseRequest, base_response, constraintInfo, userAuth.getUserIdentity());
514 if (!authorized)
/external/wpa_supplicant_8/hostapd/src/eapol_supp/
H A Deapol_supp_sm.h240 * port_cb - Set port authorized/unauthorized callback (optional)
242 * @authorized: Whether the supplicant port is now in authorized state
244 void (*port_cb)(void *ctx, int authorized);
/external/wpa_supplicant_8/src/eapol_supp/
H A Deapol_supp_sm.h240 * port_cb - Set port authorized/unauthorized callback (optional)
242 * @authorized: Whether the supplicant port is now in authorized state
244 void (*port_cb)(void *ctx, int authorized);
/external/wpa_supplicant_8/wpa_supplicant/
H A Dnotify.h87 const u8 *mac_addr, int authorized,
H A Dwpas_glue.c886 static void wpa_supplicant_port_cb(void *ctx, int authorized) argument
893 authorized ? "Authorized" : "Unauthorized");
898 authorized ? "Authorized" : "Unauthorized");
899 wpa_drv_set_supp_port(wpa_s, authorized);
H A Dnotify.c723 /* Notify listeners a new station has been authorized */
747 const u8 *mac_addr, int authorized,
750 if (authorized)
746 wpas_notify_sta_authorized(struct wpa_supplicant *wpa_s, const u8 *mac_addr, int authorized, const u8 *p2p_dev_addr) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eapol_supp/
H A Deapol_supp_sm.h240 * port_cb - Set port authorized/unauthorized callback (optional)
242 * @authorized: Whether the supplicant port is now in authorized state
244 void (*port_cb)(void *ctx, int authorized);

Completed in 648 milliseconds

123