/external/vulkan-validation-layers/layers/ |
H A D | unique_objects.h | 96 bool ContainsExtStruct(const T *target, VkStructureType ext_type) { argument 102 if (ext_struct->sType == ext_type) {
|
/external/boringssl/src/crypto/x509v3/ |
H A D | v3_conf.c | 91 int ext_type; local 94 if ((ext_type = v3_check_generic(&value))) 95 return v3_generic_extension(name, value, crit, ext_type, ctx); 110 int ext_type; local 112 if ((ext_type = v3_check_generic(&value))) 114 value, crit, ext_type, ctx);
|
/external/boringssl/src/ssl/ |
H A D | handshake.cc | 244 const SSL_EXTENSION_TYPE *ext_type = NULL; local 247 ext_type = &ext_types[i]; 252 if (ext_type == NULL) { 262 if (*ext_type->out_present) { 268 *ext_type->out_present = 1; 269 *ext_type->out_data = data;
|
/external/mesa3d/src/gallium/state_trackers/clover/core/ |
H A D | module.hpp | 69 enum ext_type { enum in struct:clover::module::argument 84 enum ext_type ext_type, 88 ext_type(ext_type), semantic(semantic) { } 93 ext_type(zero_ext), semantic(general) { } 97 ext_type(zero_ext), semantic(general) { } 103 ext_type ext_type; member in struct:clover::module::argument 82 argument(enum type type, size_t size, size_t target_size, size_t target_align, enum ext_type ext_type, enum semantic semantic = general) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_none.c | 172 int ext_type, const u8 *data, 171 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
H A D | tls_internal.c | 700 int ext_type, const u8 *data, 705 return tlsv1_client_hello_ext(conn->client, ext_type, 699 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
H A D | tls_gnutls.c | 1527 int ext_type, const u8 *data, 1526 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
H A D | tls_openssl.c | 3967 int ext_type, const u8 *data, 3970 if (conn == NULL || conn->ssl == NULL || ext_type != 35) 3966 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_server_read.c | 129 u16 ext_type, ext_len; local 313 ext_type = WPA_GET_BE16(pos); 330 ext_type); 334 if (ext_type == TLS_EXT_SESSION_TICKET) { 342 } else if (ext_type == TLS_EXT_STATUS_REQUEST) { 344 } else if (ext_type == TLS_EXT_STATUS_REQUEST_V2) {
|
H A D | tlsv1_client.c | 677 * @ext_type: Extension type 682 int tlsv1_client_hello_ext(struct tlsv1_client *conn, int ext_type, argument 699 WPA_PUT_BE16(pos, ext_type); 706 if (ext_type == TLS_EXT_PAC_OPAQUE) {
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_none.c | 172 int ext_type, const u8 *data, 171 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
H A D | tls_internal.c | 700 int ext_type, const u8 *data, 705 return tlsv1_client_hello_ext(conn->client, ext_type, 699 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
H A D | tls_gnutls.c | 1527 int ext_type, const u8 *data, 1526 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
H A D | tls_openssl.c | 3967 int ext_type, const u8 *data, 3970 if (conn == NULL || conn->ssl == NULL || ext_type != 35) 3966 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_server_read.c | 129 u16 ext_type, ext_len; local 313 ext_type = WPA_GET_BE16(pos); 330 ext_type); 334 if (ext_type == TLS_EXT_SESSION_TICKET) { 342 } else if (ext_type == TLS_EXT_STATUS_REQUEST) { 344 } else if (ext_type == TLS_EXT_STATUS_REQUEST_V2) {
|
H A D | tlsv1_client.c | 677 * @ext_type: Extension type 682 int tlsv1_client_hello_ext(struct tlsv1_client *conn, int ext_type, argument 699 WPA_PUT_BE16(pos, ext_type); 706 if (ext_type == TLS_EXT_PAC_OPAQUE) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_none.c | 172 int ext_type, const u8 *data, 171 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
H A D | tls_internal.c | 700 int ext_type, const u8 *data, 705 return tlsv1_client_hello_ext(conn->client, ext_type, 699 tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
H A D | tls_gnutls.c | 1527 int ext_type, const u8 *data, 1526 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
H A D | tls_openssl.c | 3967 int ext_type, const u8 *data, 3970 if (conn == NULL || conn->ssl == NULL || ext_type != 35) 3966 tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn, int ext_type, const u8 *data, size_t data_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_server_read.c | 129 u16 ext_type, ext_len; local 313 ext_type = WPA_GET_BE16(pos); 330 ext_type); 334 if (ext_type == TLS_EXT_SESSION_TICKET) { 342 } else if (ext_type == TLS_EXT_STATUS_REQUEST) { 344 } else if (ext_type == TLS_EXT_STATUS_REQUEST_V2) {
|
H A D | tlsv1_client.c | 677 * @ext_type: Extension type 682 int tlsv1_client_hello_ext(struct tlsv1_client *conn, int ext_type, argument 699 WPA_PUT_BE16(pos, ext_type); 706 if (ext_type == TLS_EXT_PAC_OPAQUE) {
|
/external/e2fsprogs/misc/ |
H A D | mke2fs.c | 1237 const char *ext_type = 0; local 1250 ext_type = fs_type; 1252 ext_type = "ext2"; 1254 ext_type = "ext3"; 1256 ext_type = "ext4"; 1258 ext_type = strrchr(progname, '/'); 1259 if (ext_type) 1260 ext_type++; 1262 ext_type = progname; 1264 if (!strncmp(ext_type, "mkf [all...] |