/external/webrtc/webrtc/base/ |
winfirewall_unittest.cc | 22 bool authorized; local 24 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized)); 28 EXPECT_TRUE(fw.QueryAuthorized("bogus.exe", &authorized)); 31 // about whether we're authorized. It will depend on the settings of the 35 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized));
|
winfirewall.h | 38 bool QueryAuthorized(const char* filename, bool* authorized) const; 39 bool QueryAuthorizedW(const wchar_t* filename, bool* authorized) const; 42 bool authorized, HRESULT* result); 44 bool authorized, HRESULT* result);
|
winfirewall.cc | 75 bool WinFirewall::QueryAuthorized(const char* filename, bool* authorized) 77 return QueryAuthorizedW(ToUtf16(filename).c_str(), authorized); 80 bool WinFirewall::QueryAuthorizedW(const wchar_t* filename, bool* authorized) 82 *authorized = false; 102 *authorized = (fwEnabled != VARIANT_FALSE); 105 // No entry in list of authorized apps 118 bool authorized, 121 ToUtf16(friendly_name).c_str(), authorized, result); 126 bool authorized, 143 hr = app->put_Enabled(authorized ? VARIANT_TRUE : VARIANT_FALSE) [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.h | 28 struct sta_info *sta, int authorized);
|
sta_info.c | 1146 int authorized) 1155 if (!!authorized == !!(sta->flags & WLAN_STA_AUTHORIZED) [all...] |
sta_info.h | 294 struct sta_info *sta, int authorized);
|
hostapd.h | 225 int authorized, const u8 *p2p_dev_addr);
|
ap_drv_ops.h | 30 struct sta_info *sta, int authorized);
|
ap_drv_ops.c | 240 struct sta_info *sta, int authorized) 242 if (authorized) {
|
ieee802_1x.c | 101 struct sta_info *sta, int authorized) 108 if (authorized) { 126 if (authorized) { [all...] |
/external/ImageMagick/MagickCore/ |
policy.c | 590 authorized; 604 authorized=MagickTrue; 608 while ((p != (PolicyInfo *) NULL) && (authorized != MagickFalse)) 615 authorized=MagickFalse; 618 authorized=MagickFalse; 621 authorized=MagickFalse; 626 return(authorized); 578 authorized; local [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.h | 75 void (*set_port_authorized)(void *ctx, void *sta_ctx, int authorized);
|
/external/iputils/ |
Makefile | 237 @if [ x"$(UNAME_N)" != x"pleiades" ]; then echo "Not authorized to advance snapshot"; exit 1; fi
|
/frameworks/base/core/java/android/net/ |
IConnectivityManager.aidl | 113 void setVpnPackageAuthorization(String packageName, int userId, boolean authorized);
|
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.h | 14 typedef enum { Unauthorized, Authorized } PortStatus; 240 * port_cb - Set port authorized/unauthorized callback (optional) 242 * @authorized: Whether the supplicant port is now in authorized state 244 void (*port_cb)(void *ctx, int authorized);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
notify.h | 89 const u8 *mac_addr, int authorized,
|
wpas_glue.c | 962 static void wpa_supplicant_port_cb(void *ctx, int authorized) 969 authorized ? "Authorized" : "Unauthorized"); 974 authorized ? "Authorized" : "Unauthorized"); 975 wpa_drv_set_supp_port(wpa_s, authorized); [all...] |
notify.c | 791 /* Notify listeners a new station has been authorized */ 819 const u8 *mac_addr, int authorized, 822 if (authorized)
|
driver_i.h | 364 int authorized) 368 authorized);
|
ibss_rsn.c | 361 struct ibss_rsn_peer *peer, int authorized) 365 if (authorized) {
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
verify.go | 52 return "x509: certificate is not authorized to sign other certificates" 56 return "x509: a root or intermediate certificate is not authorized to sign in this domain" 67 // HostnameError results when the set of authorized names doesn't match the
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
verify.go | 52 return "x509: certificate is not authorized to sign other certificates" 56 return "x509: a root or intermediate certificate is not authorized to sign in this domain" 67 // HostnameError results when the set of authorized names doesn't match the
|
/external/wpa_supplicant_8/src/drivers/ |
driver_bsd.c | 924 int authorized = -1; local 926 /* For now, only support setting Authorized flag */ 928 authorized = 1; 930 authorized = 0; 932 if (authorized < 0) 935 return bsd_send_mlme_param(priv, authorized ? [all...] |
driver_atheros.c | 411 atheros_set_sta_authorized(void *priv, const u8 *addr, int authorized) 417 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d", 418 __func__, ether_sprintf(addr), authorized); 420 if (authorized) 429 __func__, authorized ? "" : "un", MAC2STR(addr)); 440 /* For now, only support setting Authorized flag */ [all...] |
driver_nl80211_event.c | 283 struct nlattr *authorized, 405 if (authorized && nla_get_u8(authorized)) { 406 event.assoc_info.authorized = 1; 407 wpa_printf(MSG_DEBUG, "nl80211: connection authorized"); [all...] |