/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_cp.c | 95 static int changed_cipher(struct ieee802_1x_cp_sm *sm) 97 return sm->confidentiality_offset != sm->cipher_offset || 98 sm->current_cipher_suite != sm->cipher_suite; 102 static int changed_connect(struct ieee802_1x_cp_sm *sm) 104 return sm->connect != SECURE || sm->chgd_server || changed_cipher(sm); 112 sm->controlled_port_enabled = FALSE 437 struct ieee802_1x_cp_sm *sm; local 506 struct ieee802_1x_cp_sm *sm = eloop_ctx; local 534 struct ieee802_1x_cp_sm *sm = cp_ctx; local 545 struct ieee802_1x_cp_sm *sm = (struct ieee802_1x_cp_sm *)cp_ctx; local 556 struct ieee802_1x_cp_sm *sm = cp_ctx; local 567 struct ieee802_1x_cp_sm *sm = cp_ctx; local 578 struct ieee802_1x_cp_sm *sm = cp_ctx; local 589 struct ieee802_1x_cp_sm *sm = cp_ctx; local 599 struct ieee802_1x_cp_sm *sm = cp_ctx; local 609 struct ieee802_1x_cp_sm *sm = cp_ctx; local 619 struct ieee802_1x_cp_sm *sm = cp_ctx; local 630 struct ieee802_1x_cp_sm *sm = cp_ctx; local 640 struct ieee802_1x_cp_sm *sm = cp_ctx; local 650 struct ieee802_1x_cp_sm *sm = cp_ctx; local 660 struct ieee802_1x_cp_sm *sm = cp_ctx; local 670 struct ieee802_1x_cp_sm *sm = cp_ctx; local 680 struct ieee802_1x_cp_sm *sm = cp_ctx; local 699 struct ieee802_1x_cp_sm *sm = cp_ctx; local 708 struct ieee802_1x_cp_sm *sm = eloop_ctx; local 717 struct ieee802_1x_cp_sm *sm = eloop_ctx; local [all...] |
/external/libcxx/test/std/re/re.submatch/re.submatch.members/ |
length.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 SM sm = SM(); local 26 assert(sm.length() == 0); 28 sm.first = s; 29 sm.second = s + 3; 30 sm.matched = true; 31 assert(sm.length() == 3); 35 typedef std::sub_match<const CharT*> SM; 36 SM sm = SM(); local [all...] |
compare_string_type.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 typedef SM::string_type string; 26 SM sm = SM(); local 27 assert(sm.compare(string()) == 0); 29 sm.first = s; 30 sm.second = s + 3; 31 sm.matched = true; 32 assert(sm.compare(string()) > 0) 39 SM sm = SM(); local [all...] |
compare_value_type_ptr.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 SM sm = SM(); local 26 assert(sm.compare("") == 0); 28 sm.first = s; 29 sm.second = s + 3; 30 sm.matched = true; 31 assert(sm.compare("") > 0); 32 assert(sm.compare("123") == 0) 37 SM sm = SM(); local [all...] |
operator_string.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 SM sm = SM(); local 26 SM::string_type str = sm; 29 sm.first = s; 30 sm.second = s + 3; 31 sm.matched = true; 32 str = sm; 38 SM sm = SM(); local [all...] |
str.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 SM sm = SM(); local 26 SM::string_type str = sm.str(); 29 sm.first = s; 30 sm.second = s + 3; 31 sm.matched = true; 32 str = sm.str() 38 SM sm = SM(); local [all...] |
default.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 SM sm; local 26 assert(sm.matched == false); 30 typedef std::sub_match<const CharT*> SM; 31 SM sm; local 32 assert(sm.matched == false);
|
compare_sub_match.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 SM sm = SM(); local 26 SM sm2 = SM(); 27 assert(sm.compare(sm2) == 0); 29 sm.first = s; 30 sm.second = s + 3; 31 sm.matched = true 41 SM sm = SM(); local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server.c | 30 static int eap_sm_calculateTimeout(struct eap_sm *sm, int retransCount, 33 static void eap_sm_parseEapResp(struct eap_sm *sm, const struct wpabuf *resp); 35 static struct wpabuf * eap_sm_buildSuccess(struct eap_sm *sm, u8 id); 36 static struct wpabuf * eap_sm_buildFailure(struct eap_sm *sm, u8 id); 37 static int eap_sm_nextId(struct eap_sm *sm, int id); 38 static void eap_sm_Policy_update(struct eap_sm *sm, const u8 *nak_list, 40 static EapType eap_sm_Policy_getNextMethod(struct eap_sm *sm, int *vendor); 41 static int eap_sm_Policy_getDecision(struct eap_sm *sm); 42 static Boolean eap_sm_Policy_doPickUp(struct eap_sm *sm, EapType method); 45 static int eap_get_erp_send_reauth_start(struct eap_sm *sm) 1839 struct eap_sm *sm; local [all...] |
/external/skia/tests/ |
SkSharedMutexTest.cpp | 14 SkSharedMutex sm; local 15 sm.acquire(); 16 sm.assertHeld(); 17 sm.release(); 18 sm.acquireShared(); 19 sm.assertHeldShared(); 20 sm.releaseShared(); 24 SkSharedMutex sm; local 34 sm.acquireShared(); 35 sm.assertHeldShared() [all...] |
/external/skqp/tests/ |
SkSharedMutexTest.cpp | 14 SkSharedMutex sm; local 15 sm.acquire(); 16 sm.assertHeld(); 17 sm.release(); 18 sm.acquireShared(); 19 sm.assertHeldShared(); 20 sm.releaseShared(); 24 SkSharedMutex sm; local 34 sm.acquireShared(); 35 sm.assertHeldShared() [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 152 static void eapol_sm_txLogoff(struct eapol_sm *sm); 153 static void eapol_sm_txStart(struct eapol_sm *sm); 154 static void eapol_sm_processKey(struct eapol_sm *sm); 155 static void eapol_sm_getSuppRsp(struct eapol_sm *sm); 156 static void eapol_sm_txSuppRsp(struct eapol_sm *sm); 157 static void eapol_sm_abortSupp(struct eapol_sm *sm); 158 static void eapol_sm_abort_cached(struct eapol_sm *sm); 160 static void eapol_sm_set_port_authorized(struct eapol_sm *sm); 161 static void eapol_sm_set_port_unauthorized(struct eapol_sm *sm); 168 struct eapol_sm *sm = timeout_ctx local 1832 struct eapol_sm *sm = ctx; local 1839 struct eapol_sm *sm = ctx; local 1849 struct eapol_sm *sm = ctx; local 1881 struct eapol_sm *sm = ctx; local 1921 struct eapol_sm *sm = ctx; local 1935 struct eapol_sm *sm = ctx; local 1951 struct eapol_sm *sm = ctx; local 1962 struct eapol_sm *sm = ctx; local 1975 struct eapol_sm *sm = ctx; local 1992 struct eapol_sm *sm = ctx; local 2006 struct eapol_sm *sm = ctx; local 2016 struct eapol_sm *sm = ctx; local 2025 struct eapol_sm *sm = ctx; local 2036 struct eapol_sm *sm = ctx; local 2047 struct eapol_sm *sm = ctx; local 2058 struct eapol_sm *sm = ctx; local 2099 struct eapol_sm *sm; local 2194 struct eapol_sm *sm = ctx; local [all...] |
eapol_supp_sm.h | 312 void eapol_sm_deinit(struct eapol_sm *sm); 313 void eapol_sm_step(struct eapol_sm *sm); 314 int eapol_sm_get_status(struct eapol_sm *sm, char *buf, size_t buflen, 316 int eapol_sm_get_mib(struct eapol_sm *sm, char *buf, size_t buflen); 317 void eapol_sm_configure(struct eapol_sm *sm, int heldPeriod, int authPeriod, 319 int eapol_sm_rx_eapol(struct eapol_sm *sm, const u8 *src, const u8 *buf, 321 void eapol_sm_notify_tx_eapol_key(struct eapol_sm *sm); 322 void eapol_sm_notify_portEnabled(struct eapol_sm *sm, Boolean enabled); 323 void eapol_sm_notify_portValid(struct eapol_sm *sm, Boolean valid); 324 void eapol_sm_notify_eap_success(struct eapol_sm *sm, Boolean success) [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.c | 23 #define STATE_MACHINE_ADDR sm->addr 30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1) 32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0) 35 #define txCannedFail() eapol_auth_tx_canned_eap(sm, 0) 36 #define txCannedSuccess() eapol_auth_tx_canned_eap(sm, 1) 37 #define txReq() eapol_auth_tx_req(sm) 777 struct eapol_state_machine *sm; local 986 struct eapol_state_machine *sm = eloop_ctx; local 1031 struct eapol_state_machine *sm = ctx; local 1044 struct eapol_state_machine *sm = ctx; local 1052 struct eapol_state_machine *sm = ctx; local 1059 struct eapol_state_machine *sm = ctx; local 1067 struct eapol_state_machine *sm = ctx; local 1074 struct eapol_state_machine *sm = ctx; local [all...] |
eapol_auth_dump.c | 121 int eapol_auth_dump_state(struct eapol_state_machine *sm, char *buf, 132 sm->aWhile, sm->quietWhile, sm->reAuthWhen); 158 _SB(sm->authAbort), 159 _SB(sm->authFail), 160 port_state_txt(sm->authPortStatus), 161 _SB(sm->authStart), 162 _SB(sm->authTimeout), 163 _SB(sm->authSuccess) [all...] |
/external/libhevc/encoder/ |
var_q_operator.c | 67 norm_a = norm32(a.sm); /* norm32 defined in ia_basic_ops32.h */ 68 norm_b = norm32(b.sm); 73 a.sm = shl32_sat(a.sm, norm_a); 74 b.sm = shl32_sat(b.sm, norm_b); 76 c->sm = mult32(a.sm, b.sm); /* mult32 defined in ia_basic_ops40.h */ 86 c->sm = div32(a.sm, b.sm, &qoutient_q_format); /* div32 defined in ia_basic_ops32.h * [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 40 * @sm: Pointer to WPA state machine data from wpa_sm_init() 50 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, 55 size_t mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); 59 MAC2STR(dest), ver, (int) mic_len, sm->key_mgmt); 60 if (is_zero_ether_addr(dest) && is_zero_ether_addr(sm->bssid)) { 65 if (wpa_sm_get_bssid(sm, sm->bssid) < 0) { 66 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, 70 dest = sm->bssid 696 struct wpa_sm *sm = eloop_ctx; local 751 struct wpa_sm *sm = eloop_ctx; local 2568 struct wpa_sm *sm = ctx; local 2617 struct wpa_sm *sm; local [all...] |
preauth.h | 16 void pmksa_candidate_free(struct wpa_sm *sm); 17 int rsn_preauth_init(struct wpa_sm *sm, const u8 *dst, 19 void rsn_preauth_deinit(struct wpa_sm *sm); 20 int rsn_preauth_scan_results(struct wpa_sm *sm); 21 void rsn_preauth_scan_result(struct wpa_sm *sm, const u8 *bssid, 23 void pmksa_candidate_add(struct wpa_sm *sm, const u8 *bssid, 25 void rsn_preauth_candidate_process(struct wpa_sm *sm); 26 int rsn_preauth_get_status(struct wpa_sm *sm, char *buf, size_t buflen, 28 int rsn_preauth_in_progress(struct wpa_sm *sm); 32 static inline void pmksa_candidate_free(struct wpa_sm *sm) [all...] |
preauth.c | 35 * @sm: Pointer to WPA state machine data from wpa_sm_init() 37 void pmksa_candidate_free(struct wpa_sm *sm) 41 if (sm == NULL) 44 dl_list_for_each_safe(entry, n, &sm->pmksa_candidates, 55 struct wpa_sm *sm = ctx; local 60 if (sm->preauth_eapol == NULL || 61 is_zero_ether_addr(sm->preauth_bssid) || 62 os_memcmp(sm->preauth_bssid, src_addr, ETH_ALEN) != 0) { 69 eapol_sm_rx_eapol(sm->preauth_eapol, src_addr, buf, len); 77 struct wpa_sm *sm = ctx local 121 struct wpa_sm *sm = eloop_ctx; local 133 struct wpa_sm *sm = ctx; local [all...] |
wpa_i.h | 178 static inline void wpa_sm_set_state(struct wpa_sm *sm, enum wpa_states state) 180 WPA_ASSERT(sm->ctx->set_state); 181 sm->ctx->set_state(sm->ctx->ctx, state); 184 static inline enum wpa_states wpa_sm_get_state(struct wpa_sm *sm) 186 WPA_ASSERT(sm->ctx->get_state); 187 return sm->ctx->get_state(sm->ctx->ctx); 190 static inline void wpa_sm_deauthenticate(struct wpa_sm *sm, int reason_code) 192 WPA_ASSERT(sm->ctx->deauthenticate) [all...] |
wpa_ft.c | 24 int wpa_derive_ptk_ft(struct wpa_sm *sm, const unsigned char *src_addr, 29 int use_sha384 = wpa_key_mgmt_sha384(sm->key_mgmt); 31 if (sm->xxkey_len == 0) { 37 sm->pmk_r0_len = use_sha384 ? SHA384_MAC_LEN : PMK_LEN; 38 if (wpa_derive_pmk_r0(sm->xxkey, sm->xxkey_len, sm->ssid, 39 sm->ssid_len, sm->mobility_domain, 40 sm->r0kh_id, sm->r0kh_id_len, sm->own_addr [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap.c | 39 static Boolean eap_sm_allowMethod(struct eap_sm *sm, int vendor, 41 static struct wpabuf * eap_sm_buildNak(struct eap_sm *sm, int id); 42 static void eap_sm_processIdentity(struct eap_sm *sm, 44 static void eap_sm_processNotify(struct eap_sm *sm, const struct wpabuf *req); 46 static void eap_sm_parseEapReq(struct eap_sm *sm, const struct wpabuf *req); 51 static void eap_sm_request(struct eap_sm *sm, enum wpa_ctrl_req_type field, 56 static Boolean eapol_get_bool(struct eap_sm *sm, enum eapol_bool_var var) 58 return sm->eapol_cb->get_bool(sm->eapol_ctx, var); 62 static void eapol_set_bool(struct eap_sm *sm, enum eapol_bool_var var 2063 struct eap_sm *sm = ctx; local 2139 struct eap_sm *sm; local [all...] |
eap_proxy.h | 28 int eap_proxy_key_available(struct eap_proxy_sm *sm); 30 const u8 * eap_proxy_get_eapKeyData(struct eap_proxy_sm *sm, size_t *len); 32 struct wpabuf * eap_proxy_get_eapRespData(struct eap_proxy_sm *sm); 34 int eap_proxy_sm_step(struct eap_proxy_sm *sm, struct eap_sm *eap_sm); 40 int eap_proxy_sm_get_status(struct eap_proxy_sm *sm, char *buf, size_t buflen, 46 int eap_proxy_notify_config(struct eap_proxy_sm *sm, 49 u8 * eap_proxy_get_eap_session_id(struct eap_proxy_sm *sm, size_t *len); 51 u8 * eap_proxy_get_emsk(struct eap_proxy_sm *sm, size_t *len); 53 void eap_proxy_sm_abort(struct eap_proxy_sm *sm);
|
eap_proxy_dummy.c | 27 int eap_proxy_key_available(struct eap_proxy_sm *sm) 33 const u8 * eap_proxy_get_eapKeyData(struct eap_proxy_sm *sm, size_t *len) 39 struct wpabuf * eap_proxy_get_eapRespData(struct eap_proxy_sm *sm) 45 int eap_proxy_sm_step(struct eap_proxy_sm *sm, struct eap_sm *eap_sm) 59 int eap_proxy_sm_get_status(struct eap_proxy_sm *sm, char *buf, size_t buflen, 73 int eap_proxy_notify_config(struct eap_proxy_sm *sm, 80 u8 * eap_proxy_get_eap_session_id(struct eap_proxy_sm *sm, size_t *len) 86 u8 * eap_proxy_get_emsk(struct eap_proxy_sm *sm, size_t *len) 92 void eap_proxy_sm_abort(struct eap_proxy_sm *sm)
|
/external/wpa_supplicant_8/src/utils/ |
state_machine.h | 33 static void sm_ ## machine ## _ ## state ## _Enter(STATE_MACHINE_DATA *sm, \ 47 if (!global || sm->machine ## _state != machine ## _ ## state) { \ 48 sm->changed = TRUE; \ 52 sm->machine ## _state = machine ## _ ## state; 66 if (!global || sm->data ## _ ## state != machine ## _ ## _state) { \ 67 sm->changed = TRUE; \ 71 sm->data ## _ ## state = machine ## _ ## _state; 84 if (!global || sm->data ## _ ## state != machine ## _ ## _state) { \ 85 sm->changed = TRUE; \ 90 sm->data ## _ ## state = machine ## _ ## _state [all...] |