/external/python/cpython3/Lib/test/ |
H A D | test_difflib.py | 10 sm = difflib.SequenceMatcher(None, 'b' * 100, 'a' + 'b' * 100) 11 self.assertAlmostEqual(sm.ratio(), 0.995, places=3) 12 self.assertEqual(list(sm.get_opcodes()), 15 self.assertEqual(sm.bpopular, set()) 16 sm = difflib.SequenceMatcher(None, 'b' * 100, 'b' * 50 + 'a' + 'b' * 50) 17 self.assertAlmostEqual(sm.ratio(), 0.995, places=3) 18 self.assertEqual(list(sm.get_opcodes()), 22 self.assertEqual(sm.bpopular, set()) 25 sm = difflib.SequenceMatcher(None, 'a' * 40 + 'c' + 'b' * 40, 'a' * 40 + 'b' * 40) 26 self.assertAlmostEqual(sm [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_tls_common.c | 35 static int eap_tls_check_blob(struct eap_sm *sm, const char **name, argument 43 blob = eap_get_config_blob(sm, *name + 7); 144 static int eap_tls_params_from_conf(struct eap_sm *sm, argument 150 if (sm->workaround && data->eap_type != EAP_TYPE_FAST) { 176 if (eap_tls_check_blob(sm, ¶ms->ca_cert, ¶ms->ca_cert_blob, 178 eap_tls_check_blob(sm, ¶ms->client_cert, 181 eap_tls_check_blob(sm, ¶ms->private_key, 184 eap_tls_check_blob(sm, ¶ms->dh_file, ¶ms->dh_blob, 192 sm->ext_cert_check = !!(params->flags & TLS_CONN_EXT_CERT_CHECK); 198 static int eap_tls_init_connection(struct eap_sm *sm, argument 260 eap_peer_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, struct eap_peer_config *config, u8 eap_type) argument 308 eap_peer_tls_ssl_deinit(struct eap_sm *sm, struct eap_ssl_data *data) argument 330 eap_peer_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, const char *label, size_t len) argument 362 eap_peer_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument 502 eap_tls_process_input(struct eap_sm *sm, struct eap_ssl_data *data, const struct wpabuf *in_data, struct wpabuf **out_data) argument 650 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument 756 eap_peer_tls_reauth_init(struct eap_sm *sm, struct eap_ssl_data *data) argument 773 eap_peer_tls_status(struct eap_sm *sm, struct eap_ssl_data *data, char *buf, size_t buflen, int verbose) argument 823 eap_peer_tls_process_init(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, struct eap_method_ret *ret, const struct wpabuf *reqData, size_t *len, u8 *flags) argument 949 eap_peer_tls_decrypt(struct eap_sm *sm, struct eap_ssl_data *data, const struct wpabuf *in_data, struct wpabuf **in_decrypted) argument 981 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_aka.c | 91 static void * eap_aka_init(struct eap_sm *sm) argument 94 const char *phase1 = eap_get_config_phase1(sm); 95 struct eap_peer_config *config = eap_get_config(sm); 111 data->use_pseudonym = !sm->init_phase2; 126 static void * eap_aka_prime_init(struct eap_sm *sm) argument 128 struct eap_aka_data *data = eap_aka_init(sm); 152 static void eap_aka_deinit(struct eap_sm *sm, void *priv) argument 167 static int eap_aka_ext_sim_req(struct eap_sm *sm, struct eap_aka_data *data) argument 180 eap_sm_request_sim(sm, req); 185 static int eap_aka_ext_sim_result(struct eap_sm *sm, struc argument 250 eap_aka_umts_auth(struct eap_sm *sm, struct eap_aka_data *data) argument 353 eap_aka_clear_identities(struct eap_sm *sm, struct eap_aka_data *data, int id) argument 379 eap_aka_learn_ids(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_attrs *attr) argument 610 eap_aka_response_identity(struct eap_sm *sm, struct eap_aka_data *data, u8 id, enum eap_sim_id_req id_req) argument 753 eap_aka_process_identity(struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 909 eap_aka_process_challenge(struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1160 eap_aka_process_notification( struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1196 eap_aka_process_reauthentication( struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1319 eap_aka_process(struct eap_sm *sm, void *priv, struct eap_method_ret *ret, const struct wpabuf *reqData) argument 1418 eap_aka_has_reauth_data(struct eap_sm *sm, void *priv) argument 1425 eap_aka_deinit_for_reauth(struct eap_sm *sm, void *priv) argument 1438 eap_aka_init_for_reauth(struct eap_sm *sm, void *priv) argument 1448 eap_aka_get_identity(struct eap_sm *sm, void *priv, size_t *len) argument 1467 eap_aka_isKeyAvailable(struct eap_sm *sm, void *priv) argument 1474 eap_aka_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 1492 eap_aka_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument 1514 eap_aka_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_proxy_qmi_oc.c | 102 static void eap_proxy_eapol_sm_set_bool(struct eap_proxy_sm *sm, 107 static Boolean eap_proxy_eapol_sm_get_bool(struct eap_proxy_sm *sm, 120 static int eap_proxy_is_state_changed(struct eap_proxy_sm *sm); 1022 struct eap_proxy_sm *sm = (struct eap_proxy_sm *)ind_cb_data; local 1027 wpa_printf(MSG_ERROR, "eap_proxy: Handle_qmi_eap_ind msgId =%d sm=%p\n", msg_id,sm); 1042 sm->srvc_result = EAP_PROXY_QMI_SRVC_FAILURE; 1046 (QMI_STATE_RESP_TIME_OUT != sm->qmi_state)) { 1047 sm->proxy_state = EAP_PROXY_AUTH_SUCCESS; 1048 sm 1443 eap_proxy_key_available(struct eap_proxy_sm *sm) argument 1449 eap_proxy_is_state_changed(struct eap_proxy_sm *sm) argument 1474 eap_proxy_get_eapKeyData(struct eap_proxy_sm *sm, size_t *len) argument 1574 eap_proxy_eapol_sm_set_bool(struct eap_proxy_sm *sm, enum eapol_bool_var var, Boolean value) argument 1581 eap_proxy_eapol_sm_get_bool(struct eap_proxy_sm *sm, enum eapol_bool_var var) argument 1588 eap_proxy_sm_step(struct eap_proxy_sm *sm, struct eap_sm *eap_sm) argument 1616 eap_proxy_get_eap_session_id(struct eap_proxy_sm *sm, size_t *len) argument 1623 eap_proxy_get_emsk(struct eap_proxy_sm *sm, size_t *len) argument 1630 eap_proxy_sm_abort(struct eap_proxy_sm *sm) argument 2129 eap_proxy_sm_get_status(struct eap_proxy_sm *sm, char *buf, size_t buflen, int verbose) argument [all...] |
H A D | eap_sake.c | 65 static void eap_sake_deinit(struct eap_sm *sm, void *priv); 68 static void * eap_sake_init(struct eap_sm *sm) argument 74 password = eap_get_config_password(sm, &password_len); 86 identity = eap_get_config_identity(sm, &identity_len); 90 eap_sake_deinit(sm, data); 105 static void eap_sake_deinit(struct eap_sm *sm, void *priv) argument 140 static struct wpabuf * eap_sake_process_identity(struct eap_sm *sm, argument 183 static struct wpabuf * eap_sake_process_challenge(struct eap_sm *sm, argument 281 static struct wpabuf * eap_sake_process_confirm(struct eap_sm *sm, argument 366 static struct wpabuf * eap_sake_process(struct eap_sm *sm, voi argument 436 eap_sake_isKeyAvailable(struct eap_sm *sm, void *priv) argument 443 eap_sake_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 460 eap_sake_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument 482 eap_sake_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_tls_common.c | 35 static int eap_tls_check_blob(struct eap_sm *sm, const char **name, argument 43 blob = eap_get_config_blob(sm, *name + 7); 144 static int eap_tls_params_from_conf(struct eap_sm *sm, argument 150 if (sm->workaround && data->eap_type != EAP_TYPE_FAST) { 176 if (eap_tls_check_blob(sm, ¶ms->ca_cert, ¶ms->ca_cert_blob, 178 eap_tls_check_blob(sm, ¶ms->client_cert, 181 eap_tls_check_blob(sm, ¶ms->private_key, 184 eap_tls_check_blob(sm, ¶ms->dh_file, ¶ms->dh_blob, 192 sm->ext_cert_check = !!(params->flags & TLS_CONN_EXT_CERT_CHECK); 198 static int eap_tls_init_connection(struct eap_sm *sm, argument 260 eap_peer_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, struct eap_peer_config *config, u8 eap_type) argument 308 eap_peer_tls_ssl_deinit(struct eap_sm *sm, struct eap_ssl_data *data) argument 330 eap_peer_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, const char *label, size_t len) argument 362 eap_peer_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument 502 eap_tls_process_input(struct eap_sm *sm, struct eap_ssl_data *data, const struct wpabuf *in_data, struct wpabuf **out_data) argument 650 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument 756 eap_peer_tls_reauth_init(struct eap_sm *sm, struct eap_ssl_data *data) argument 773 eap_peer_tls_status(struct eap_sm *sm, struct eap_ssl_data *data, char *buf, size_t buflen, int verbose) argument 823 eap_peer_tls_process_init(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, struct eap_method_ret *ret, const struct wpabuf *reqData, size_t *len, u8 *flags) argument 949 eap_peer_tls_decrypt(struct eap_sm *sm, struct eap_ssl_data *data, const struct wpabuf *in_data, struct wpabuf **in_decrypted) argument 981 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_aka.c | 91 static void * eap_aka_init(struct eap_sm *sm) argument 94 const char *phase1 = eap_get_config_phase1(sm); 95 struct eap_peer_config *config = eap_get_config(sm); 111 data->use_pseudonym = !sm->init_phase2; 126 static void * eap_aka_prime_init(struct eap_sm *sm) argument 128 struct eap_aka_data *data = eap_aka_init(sm); 152 static void eap_aka_deinit(struct eap_sm *sm, void *priv) argument 167 static int eap_aka_ext_sim_req(struct eap_sm *sm, struct eap_aka_data *data) argument 180 eap_sm_request_sim(sm, req); 185 static int eap_aka_ext_sim_result(struct eap_sm *sm, struc argument 250 eap_aka_umts_auth(struct eap_sm *sm, struct eap_aka_data *data) argument 353 eap_aka_clear_identities(struct eap_sm *sm, struct eap_aka_data *data, int id) argument 379 eap_aka_learn_ids(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_attrs *attr) argument 610 eap_aka_response_identity(struct eap_sm *sm, struct eap_aka_data *data, u8 id, enum eap_sim_id_req id_req) argument 753 eap_aka_process_identity(struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 909 eap_aka_process_challenge(struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1160 eap_aka_process_notification( struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1196 eap_aka_process_reauthentication( struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1319 eap_aka_process(struct eap_sm *sm, void *priv, struct eap_method_ret *ret, const struct wpabuf *reqData) argument 1418 eap_aka_has_reauth_data(struct eap_sm *sm, void *priv) argument 1425 eap_aka_deinit_for_reauth(struct eap_sm *sm, void *priv) argument 1438 eap_aka_init_for_reauth(struct eap_sm *sm, void *priv) argument 1448 eap_aka_get_identity(struct eap_sm *sm, void *priv, size_t *len) argument 1467 eap_aka_isKeyAvailable(struct eap_sm *sm, void *priv) argument 1474 eap_aka_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 1492 eap_aka_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument 1514 eap_aka_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_proxy_qmi_oc.c | 102 static void eap_proxy_eapol_sm_set_bool(struct eap_proxy_sm *sm, 107 static Boolean eap_proxy_eapol_sm_get_bool(struct eap_proxy_sm *sm, 120 static int eap_proxy_is_state_changed(struct eap_proxy_sm *sm); 1022 struct eap_proxy_sm *sm = (struct eap_proxy_sm *)ind_cb_data; local 1027 wpa_printf(MSG_ERROR, "eap_proxy: Handle_qmi_eap_ind msgId =%d sm=%p\n", msg_id,sm); 1042 sm->srvc_result = EAP_PROXY_QMI_SRVC_FAILURE; 1046 (QMI_STATE_RESP_TIME_OUT != sm->qmi_state)) { 1047 sm->proxy_state = EAP_PROXY_AUTH_SUCCESS; 1048 sm 1443 eap_proxy_key_available(struct eap_proxy_sm *sm) argument 1449 eap_proxy_is_state_changed(struct eap_proxy_sm *sm) argument 1474 eap_proxy_get_eapKeyData(struct eap_proxy_sm *sm, size_t *len) argument 1574 eap_proxy_eapol_sm_set_bool(struct eap_proxy_sm *sm, enum eapol_bool_var var, Boolean value) argument 1581 eap_proxy_eapol_sm_get_bool(struct eap_proxy_sm *sm, enum eapol_bool_var var) argument 1588 eap_proxy_sm_step(struct eap_proxy_sm *sm, struct eap_sm *eap_sm) argument 1616 eap_proxy_get_eap_session_id(struct eap_proxy_sm *sm, size_t *len) argument 1623 eap_proxy_get_emsk(struct eap_proxy_sm *sm, size_t *len) argument 1630 eap_proxy_sm_abort(struct eap_proxy_sm *sm) argument 2129 eap_proxy_sm_get_status(struct eap_proxy_sm *sm, char *buf, size_t buflen, int verbose) argument [all...] |
H A D | eap_sake.c | 65 static void eap_sake_deinit(struct eap_sm *sm, void *priv); 68 static void * eap_sake_init(struct eap_sm *sm) argument 74 password = eap_get_config_password(sm, &password_len); 86 identity = eap_get_config_identity(sm, &identity_len); 90 eap_sake_deinit(sm, data); 105 static void eap_sake_deinit(struct eap_sm *sm, void *priv) argument 140 static struct wpabuf * eap_sake_process_identity(struct eap_sm *sm, argument 183 static struct wpabuf * eap_sake_process_challenge(struct eap_sm *sm, argument 281 static struct wpabuf * eap_sake_process_confirm(struct eap_sm *sm, argument 366 static struct wpabuf * eap_sake_process(struct eap_sm *sm, voi argument 436 eap_sake_isKeyAvailable(struct eap_sm *sm, void *priv) argument 443 eap_sake_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 460 eap_sake_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument 482 eap_sake_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_tls_common.c | 35 static int eap_tls_check_blob(struct eap_sm *sm, const char **name, argument 43 blob = eap_get_config_blob(sm, *name + 7); 144 static int eap_tls_params_from_conf(struct eap_sm *sm, argument 150 if (sm->workaround && data->eap_type != EAP_TYPE_FAST) { 176 if (eap_tls_check_blob(sm, ¶ms->ca_cert, ¶ms->ca_cert_blob, 178 eap_tls_check_blob(sm, ¶ms->client_cert, 181 eap_tls_check_blob(sm, ¶ms->private_key, 184 eap_tls_check_blob(sm, ¶ms->dh_file, ¶ms->dh_blob, 192 sm->ext_cert_check = !!(params->flags & TLS_CONN_EXT_CERT_CHECK); 198 static int eap_tls_init_connection(struct eap_sm *sm, argument 260 eap_peer_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, struct eap_peer_config *config, u8 eap_type) argument 308 eap_peer_tls_ssl_deinit(struct eap_sm *sm, struct eap_ssl_data *data) argument 330 eap_peer_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, const char *label, size_t len) argument 362 eap_peer_tls_derive_session_id(struct eap_sm *sm, struct eap_ssl_data *data, u8 eap_type, size_t *len) argument 502 eap_tls_process_input(struct eap_sm *sm, struct eap_ssl_data *data, const struct wpabuf *in_data, struct wpabuf **out_data) argument 650 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument 756 eap_peer_tls_reauth_init(struct eap_sm *sm, struct eap_ssl_data *data) argument 773 eap_peer_tls_status(struct eap_sm *sm, struct eap_ssl_data *data, char *buf, size_t buflen, int verbose) argument 823 eap_peer_tls_process_init(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, struct eap_method_ret *ret, const struct wpabuf *reqData, size_t *len, u8 *flags) argument 949 eap_peer_tls_decrypt(struct eap_sm *sm, struct eap_ssl_data *data, const struct wpabuf *in_data, struct wpabuf **in_decrypted) argument 981 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
H A D | eap_aka.c | 91 static void * eap_aka_init(struct eap_sm *sm) argument 94 const char *phase1 = eap_get_config_phase1(sm); 95 struct eap_peer_config *config = eap_get_config(sm); 111 data->use_pseudonym = !sm->init_phase2; 126 static void * eap_aka_prime_init(struct eap_sm *sm) argument 128 struct eap_aka_data *data = eap_aka_init(sm); 152 static void eap_aka_deinit(struct eap_sm *sm, void *priv) argument 167 static int eap_aka_ext_sim_req(struct eap_sm *sm, struct eap_aka_data *data) argument 180 eap_sm_request_sim(sm, req); 185 static int eap_aka_ext_sim_result(struct eap_sm *sm, struc argument 250 eap_aka_umts_auth(struct eap_sm *sm, struct eap_aka_data *data) argument 353 eap_aka_clear_identities(struct eap_sm *sm, struct eap_aka_data *data, int id) argument 379 eap_aka_learn_ids(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_attrs *attr) argument 610 eap_aka_response_identity(struct eap_sm *sm, struct eap_aka_data *data, u8 id, enum eap_sim_id_req id_req) argument 753 eap_aka_process_identity(struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 909 eap_aka_process_challenge(struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1160 eap_aka_process_notification( struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1196 eap_aka_process_reauthentication( struct eap_sm *sm, struct eap_aka_data *data, u8 id, const struct wpabuf *reqData, struct eap_sim_attrs *attr) argument 1319 eap_aka_process(struct eap_sm *sm, void *priv, struct eap_method_ret *ret, const struct wpabuf *reqData) argument 1418 eap_aka_has_reauth_data(struct eap_sm *sm, void *priv) argument 1425 eap_aka_deinit_for_reauth(struct eap_sm *sm, void *priv) argument 1438 eap_aka_init_for_reauth(struct eap_sm *sm, void *priv) argument 1448 eap_aka_get_identity(struct eap_sm *sm, void *priv, size_t *len) argument 1467 eap_aka_isKeyAvailable(struct eap_sm *sm, void *priv) argument 1474 eap_aka_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 1492 eap_aka_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument 1514 eap_aka_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
H A D | eap_proxy_qmi_oc.c | 102 static void eap_proxy_eapol_sm_set_bool(struct eap_proxy_sm *sm, 107 static Boolean eap_proxy_eapol_sm_get_bool(struct eap_proxy_sm *sm, 120 static int eap_proxy_is_state_changed(struct eap_proxy_sm *sm); 1022 struct eap_proxy_sm *sm = (struct eap_proxy_sm *)ind_cb_data; local 1027 wpa_printf(MSG_ERROR, "eap_proxy: Handle_qmi_eap_ind msgId =%d sm=%p\n", msg_id,sm); 1042 sm->srvc_result = EAP_PROXY_QMI_SRVC_FAILURE; 1046 (QMI_STATE_RESP_TIME_OUT != sm->qmi_state)) { 1047 sm->proxy_state = EAP_PROXY_AUTH_SUCCESS; 1048 sm 1443 eap_proxy_key_available(struct eap_proxy_sm *sm) argument 1449 eap_proxy_is_state_changed(struct eap_proxy_sm *sm) argument 1474 eap_proxy_get_eapKeyData(struct eap_proxy_sm *sm, size_t *len) argument 1574 eap_proxy_eapol_sm_set_bool(struct eap_proxy_sm *sm, enum eapol_bool_var var, Boolean value) argument 1581 eap_proxy_eapol_sm_get_bool(struct eap_proxy_sm *sm, enum eapol_bool_var var) argument 1588 eap_proxy_sm_step(struct eap_proxy_sm *sm, struct eap_sm *eap_sm) argument 1616 eap_proxy_get_eap_session_id(struct eap_proxy_sm *sm, size_t *len) argument 1623 eap_proxy_get_emsk(struct eap_proxy_sm *sm, size_t *len) argument 1630 eap_proxy_sm_abort(struct eap_proxy_sm *sm) argument 2129 eap_proxy_sm_get_status(struct eap_proxy_sm *sm, char *buf, size_t buflen, int verbose) argument [all...] |
H A D | eap_sake.c | 65 static void eap_sake_deinit(struct eap_sm *sm, void *priv); 68 static void * eap_sake_init(struct eap_sm *sm) argument 74 password = eap_get_config_password(sm, &password_len); 86 identity = eap_get_config_identity(sm, &identity_len); 90 eap_sake_deinit(sm, data); 105 static void eap_sake_deinit(struct eap_sm *sm, void *priv) argument 140 static struct wpabuf * eap_sake_process_identity(struct eap_sm *sm, argument 183 static struct wpabuf * eap_sake_process_challenge(struct eap_sm *sm, argument 281 static struct wpabuf * eap_sake_process_confirm(struct eap_sm *sm, argument 366 static struct wpabuf * eap_sake_process(struct eap_sm *sm, voi argument 436 eap_sake_isKeyAvailable(struct eap_sm *sm, void *priv) argument 443 eap_sake_getKey(struct eap_sm *sm, void *priv, size_t *len) argument 460 eap_sake_get_session_id(struct eap_sm *sm, void *priv, size_t *len) argument 482 eap_sake_get_emsk(struct eap_sm *sm, void *priv, size_t *len) argument [all...] |
/external/linux-kselftest/tools/testing/selftests/zram/ |
H A D | zram01.sh | 63 for sm in $zram_sizes; do 64 local s=$(echo $sm | sed 's/M//')
|
/external/ltp/testcases/kernel/device-drivers/zram/ |
H A D | zram01.sh | 80 for sm in $zram_sizes; do 81 local s=$(echo $sm | sed 's/M//')
|
/external/syslinux/core/fs/pxe/ |
H A D | http_readdir.c | 389 const struct machine *sm; local 404 sm = &statemachine[state]; 406 if (lc == sm->xchar) 407 state = sm->st_xchar; 409 state = sm->st_left; 411 state = sm->st_right; 413 state = sm->st_space; 415 state = sm->st_other;
|
/external/autotest/client/common_lib/cros/ |
H A D | policy.py | 149 def push_policy_and_verify(policy_string, sm): 157 @param sm: a connected SessionManagerInterface. 163 sm.StorePolicy(dbus.ByteArray(policy_string), byte_arrays=True) 166 retrieved_policy = sm.RetrievePolicy(byte_arrays=True) 171 def get_policy(sm): 176 @param sm: a connected SessionManagerInterface. 180 return sm.RetrievePolicy(byte_arrays=True)
|
/external/tensorflow/tensorflow/python/training/ |
H A D | session_manager_test.py | 43 sm = session_manager.SessionManager( 45 sess = sm.prepare_session( 53 sm = session_manager.SessionManager( 55 sess = sm.prepare_session( 64 sm = session_manager.SessionManager( 66 sess = sm.prepare_session( 82 sm = session_manager.SessionManager( 85 sess = sm.prepare_session( 108 sess = sm.prepare_session( 119 sess = sm [all...] |
/external/python/cpython2/Objects/ |
H A D | funcobject.c | 770 sm_dealloc(staticmethod *sm) argument 772 _PyObject_GC_UNTRACK((PyObject *)sm); 773 Py_XDECREF(sm->sm_callable); 774 Py_TYPE(sm)->tp_free((PyObject *)sm); 778 sm_traverse(staticmethod *sm, visitproc visit, void *arg) argument 780 Py_VISIT(sm->sm_callable); 785 sm_clear(staticmethod *sm) argument 787 Py_CLEAR(sm->sm_callable); 794 staticmethod *sm local 808 staticmethod *sm = (staticmethod *)self; local 889 staticmethod *sm = (staticmethod *) local [all...] |
/external/tensorflow/tensorflow/python/kernel_tests/distributions/ |
H A D | special_math_test.py | 47 sm = special_math variable 152 actual = sm.log_ndtr(grid).eval() 179 actual = sm.ndtr(grid).eval() 209 _grid32 = GridSpec(min=-100., max=sm.LOGNDTR_FLOAT32_LOWER, shape=[100]) 210 _grid64 = GridSpec(min=-100., max=sm.LOGNDTR_FLOAT64_LOWER, shape=[100]) 222 min=sm.LOGNDTR_FLOAT32_LOWER, max=sm.LOGNDTR_FLOAT32_UPPER, shape=[100]) 224 min=sm.LOGNDTR_FLOAT64_LOWER, max=sm.LOGNDTR_FLOAT64_UPPER, shape=[100]) 233 min=sm [all...] |
/external/clang/test/OpenMP/ |
H A D | threadprivate_codegen.cpp | 136 // 8 caches created (for Static::s, gs1, gs3, arr_x, main::sm, ST<int>::st, 334 static Smain sm(gs1.a); 371 #pragma omp threadprivate(sm) 410 Res += sm.a;
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_cp.h | 20 void ieee802_1x_cp_sm_deinit(struct ieee802_1x_cp_sm *sm);
|
/external/wpa_supplicant_8/src/pae/ |
H A D | ieee802_1x_cp.h | 20 void ieee802_1x_cp_sm_deinit(struct ieee802_1x_cp_sm *sm);
|
/external/wpa_supplicant_8/wpa_supplicant/src/pae/ |
H A D | ieee802_1x_cp.h | 20 void ieee802_1x_cp_sm_deinit(struct ieee802_1x_cp_sm *sm);
|
/external/autotest/client/site_tests/login_OwnershipTaken/ |
H A D | login_OwnershipTaken.py | 62 sm = session_manager.connect(bus_loop) 63 retrieved_policy = sm.RetrievePolicy(byte_arrays=True)
|