/external/wpa_supplicant_6/wpa_supplicant/ |
wps_supplicant.c | 147 if (ie == NULL && (ssid->proto & WPA_PROTO_WPA) && 171 if (wpa2 && !(ssid->proto & WPA_PROTO_RSN) && 172 (ssid->proto & WPA_PROTO_WPA) && 177 ssid->proto |= WPA_PROTO_RSN; 179 ssid->proto = WPA_PROTO_RSN; 314 ssid->proto = 0; 319 ssid->proto = 0; 324 ssid->proto = WPA_PROTO_WPA; 329 ssid->proto = WPA_PROTO_WPA; 334 ssid->proto = WPA_PROTO_RSN [all...] |
/hardware/ti/wlan/wl1271/CUDK/configurationutility/src/ |
wpa_core.c | 62 S32 proto; member in struct:__anon10219 114 pWpaCore->WpaSupplParams.proto = 0; /* key negotiation protocol - WPA is ok even though no security is used */ 193 pWpaCore->WpaSupplParams.proto = 0; 198 pWpaCore->WpaSupplParams.proto = 0; 203 pWpaCore->WpaSupplParams.proto = WPA_PROTO_WPA; 208 pWpaCore->WpaSupplParams.proto = WPA_PROTO_WPA; 213 pWpaCore->WpaSupplParams.proto = WPA_PROTO_RSN; 218 pWpaCore->WpaSupplParams.proto = WPA_PROTO_WPA; 223 pWpaCore->WpaSupplParams.proto = WPA_PROTO_RSN; 580 /* set proto of the new network block * [all...] |
/system/wlan/ti/wilink_6_1/CUDK/configurationutility/src/ |
wpa_core.c | 62 S32 proto; member in struct:__anon16940 114 pWpaCore->WpaSupplParams.proto = 0; /* key negotiation protocol - WPA is ok even though no security is used */ 193 pWpaCore->WpaSupplParams.proto = 0; 198 pWpaCore->WpaSupplParams.proto = 0; 203 pWpaCore->WpaSupplParams.proto = WPA_PROTO_WPA; 208 pWpaCore->WpaSupplParams.proto = WPA_PROTO_WPA; 213 pWpaCore->WpaSupplParams.proto = WPA_PROTO_RSN; 218 pWpaCore->WpaSupplParams.proto = WPA_PROTO_WPA; 223 pWpaCore->WpaSupplParams.proto = WPA_PROTO_RSN; 580 /* set proto of the new network block * [all...] |
/external/wpa_supplicant/wpa_gui-qt4/ |
networkconfig.cpp | 166 const char *key_mgmt = NULL, *proto = NULL, *pairwise = NULL; local 176 proto = "WPA"; 180 proto = "WPA"; 184 proto = "WPA2"; 188 proto = "WPA2"; 201 if (proto) 202 setNetworkParam(id, "proto", proto, false); 359 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d proto", network_id);
|
/external/ipsec-tools/src/libipsec/ |
pfkey.c | 882 pfkey_send_spdadd(so, src, prefs, dst, prefd, proto, policy, policylen, seq) 885 u_int prefs, prefd, proto; 893 src, prefs, dst, prefd, proto, 908 pfkey_send_spdadd2(so, src, prefs, dst, prefd, proto, ltime, vtime, 912 u_int prefs, prefd, proto; 921 src, prefs, dst, prefd, proto, 936 pfkey_send_spdupdate(so, src, prefs, dst, prefd, proto, policy, policylen, seq) 939 u_int prefs, prefd, proto; 947 src, prefs, dst, prefd, proto, 962 pfkey_send_spdupdate2(so, src, prefs, dst, prefd, proto, ltime, vtime [all...] |
/external/protobuf/ |
Makefile.am | 47 editors/proto.vim \ 63 examples/addressbook.proto \ 112 java/src/test/java/com/google/protobuf/multiple_files_test.proto \ 122 python/google/protobuf/internal/more_extensions.proto \ 123 python/google/protobuf/internal/more_messages.proto \
|
/external/qemu/hw/ |
bt-hid.c | 92 int proto; member in struct:bt_hid_device_s 116 s->proto = BT_HID_PROTO_REPORT; 315 *s->control->sdu_out(s->control, 1) = s->proto; 326 s->proto = parameter; 327 s->usbdev->handle_control(s->usbdev, SET_PROTOCOL, s->proto, 0, 0, 455 hid->proto = BT_HID_PROTO_REPORT;
|
/external/wpa_supplicant/ |
events.c | 267 while ((ssid->proto & WPA_PROTO_RSN) && bss->rsn_ie_len > 0) { 274 if (!(ie.proto & ssid->proto)) { 275 wpa_printf(MSG_DEBUG, " skip RSN IE - proto " 311 while ((ssid->proto & WPA_PROTO_WPA) && bss->wpa_ie_len > 0) { 318 if (!(ie.proto & ssid->proto)) { 319 wpa_printf(MSG_DEBUG, " skip WPA IE - proto " 347 wpa_printf(MSG_DEBUG, " skip - no WPA/RSN proto match");
|
config_ssid.h | 183 * proto - Bitfield of allowed protocols, WPA_PROTO_* 185 int proto; member in struct:wpa_ssid 765 * following network block options: proto=WPA, key_mgmt=WPA-NONE,
|
wpa.c | 255 * @proto: WPA/WPA2 version (WPA_PROTO_*) 258 static const char * wpa_key_mgmt_txt(int key_mgmt, int proto) 262 return proto == WPA_PROTO_RSN ? 265 return proto == WPA_PROTO_RSN ? 371 data->proto = WPA_PROTO_WPA; 481 data->proto = WPA_PROTO_RSN; 844 if (sm->proto == WPA_PROTO_RSN) 941 int ver, const u8 *dest, u16 proto, 964 wpa_sm_ether_send(sm, dest, proto, msg, msg_len); 1004 reply->type = sm->proto == WPA_PROTO_RSN [all...] |
/dalvik/vm/oo/ |
Class.h | 265 const DexProto* proto, const Method* method);
|
/external/bluetooth/bluez/lib/bluetooth/ |
sdp_lib.h | 231 * Set the access protocols of the record to those specified in proto 233 int sdp_set_access_protos(sdp_record_t *rec, const sdp_list_t *proto); 236 * Set the additional access protocols of the record to those specified in proto 238 int sdp_set_add_access_protos(sdp_record_t *rec, const sdp_list_t *proto); 243 int sdp_get_proto_port(const sdp_list_t *list, int proto); 248 sdp_data_t *sdp_get_proto_desc(sdp_list_t *list, int proto);
|
/external/bluetooth/bluez/serial/ |
proxy.c | 172 sdp_list_t *apseq, *aproto, *profiles, *proto[2], *root, *svclass_id; local 200 proto[0] = sdp_list_append(NULL, &l2cap); 201 apseq = sdp_list_append(NULL, proto[0]); 204 proto[1] = sdp_list_append(NULL, &rfcomm); 206 proto[1] = sdp_list_append(proto[1], ch); 207 apseq = sdp_list_append(apseq, proto[1]); 217 sdp_list_free(proto[0], NULL); 218 sdp_list_free(proto[1], NULL);
|
/external/chromium/net/socket/ |
ssl_client_socket_nss.h | 44 virtual NextProtoStatus GetNextProto(std::string* proto);
|
ssl_client_socket_win.h | 42 virtual NextProtoStatus GetNextProto(std::string* proto);
|
/external/expat/tests/benchmark/ |
benchmark.c | 8 #include <proto/expat.h>
|
/external/iproute2/include/linux/netfilter_ipv4/ |
ip_tables.h | 41 u_int16_t proto; member in struct:ipt_ip
|
/external/ipsec-tools/src/racoon/ |
admin.c | 543 admin2pfkey_proto(proto) 544 u_int proto; 546 switch (proto) { 555 "unsupported proto for admin: %d\n", proto);
|
policy.h | 92 u_int16_t proto; /* IPPROTO_ESP or IPPROTO_AH */ member in struct:secasindex
|
/external/protobuf/src/google/protobuf/compiler/python/ |
python_generator.h | 33 // Generates Python code for a given .proto file. 138 const DescriptorT& descriptor, DescriptorProtoT& proto) const;
|
/external/protobuf/src/google/protobuf/ |
descriptor_database_unittest.cc | 60 static void ExpectContainsType(const FileDescriptorProto& proto, 62 for (int i = 0; i < proto.message_type_size(); i++) { 63 if (proto.message_type(i).name() == type_name) return; 65 ADD_FAILURE() << "\"" << proto.name() 184 "name: \"foo.proto\" " 187 "name: \"bar.proto\" " 192 EXPECT_TRUE(database_->FindFileByName("foo.proto", &file)); 193 EXPECT_EQ("foo.proto", file.name()); 199 EXPECT_TRUE(database_->FindFileByName("bar.proto", &file)); 200 EXPECT_EQ("bar.proto", file.name()) [all...] |
/dalvik/vm/analysis/ |
Optimize.c | 762 DexProto proto; local 763 dexProtoSetFromMethodId(&proto, pDvmDex->pDexFile, pMethodId); 767 dexStringById(pDvmDex->pDexFile, pMethodId->nameIdx), &proto); 771 dexStringById(pDvmDex->pDexFile, pMethodId->nameIdx), &proto); 969 DexProto proto; local [all...] |
/external/kernel-headers/original/linux/netfilter_ipv4/ |
ip_conntrack.h | 19 /* insert conntrack proto private data here */ 27 /* insert expect proto private data here */ 104 union ip_conntrack_proto proto; member in struct:ip_conntrack 161 /* This is the original per-proto part, used to map the 265 extern void ip_conntrack_proto_put(struct ip_conntrack_protocol *proto);
|
/external/ppp/pppd/ |
utils.c | 487 u_short proto; local 492 GETSHORT(proto, p); 495 if (proto == protp->protocol) 505 if (proto == (protp->protocol & ~0x8000)) 515 printer(arg, "[proto=0x%x]", proto); 841 int proto; local 850 proto = (p[2] << 8) + p[3]; 851 if (debug <= 1 && unsuccess == 0 && proto == PPP_LCP
|
/external/v8/src/ |
array.js | 746 for (var proto = obj.__proto__; proto; proto = proto.__proto__) { 747 var indices = %GetArrayKeys(proto, length); 753 if (!obj.hasOwnProperty(i) && proto.hasOwnProperty(i)) { 754 obj[i] = proto[i]; 762 !obj.hasOwnProperty(index) && proto.hasOwnProperty(index)) { 763 obj[index] = proto[index]; 777 for (var proto = obj.__proto__; proto; proto = proto.__proto__) [all...] |