HomeSort by relevance Sort by last modified time
    Searched refs:authorized (Results 1 - 25 of 40) sorted by null

1 2

  /external/webrtc/webrtc/base/
winfirewall_unittest.cc 22 bool authorized; local
24 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized));
28 EXPECT_TRUE(fw.QueryAuthorized("bogus.exe", &authorized));
31 // about whether we're authorized. It will depend on the settings of the
35 EXPECT_FALSE(fw.QueryAuthorized("bogus.exe", &authorized));
winfirewall.h 38 bool QueryAuthorized(const char* filename, bool* authorized) const;
39 bool QueryAuthorizedW(const wchar_t* filename, bool* authorized) const;
42 bool authorized, HRESULT* result);
44 bool authorized, HRESULT* result);
winfirewall.cc 75 bool WinFirewall::QueryAuthorized(const char* filename, bool* authorized)
77 return QueryAuthorizedW(ToUtf16(filename).c_str(), authorized);
80 bool WinFirewall::QueryAuthorizedW(const wchar_t* filename, bool* authorized)
82 *authorized = false;
102 *authorized = (fwEnabled != VARIANT_FALSE);
105 // No entry in list of authorized apps
118 bool authorized,
121 ToUtf16(friendly_name).c_str(), authorized, result);
126 bool authorized,
143 hr = app->put_Enabled(authorized ? VARIANT_TRUE : VARIANT_FALSE)
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_1x.h 28 struct sta_info *sta, int authorized);
sta_info.c 1146 int authorized)
1155 if (!!authorized == !!(sta->flags & WLAN_STA_AUTHORIZED)
    [all...]
sta_info.h 294 struct sta_info *sta, int authorized);
hostapd.h 225 int authorized, const u8 *p2p_dev_addr);
ap_drv_ops.h 30 struct sta_info *sta, int authorized);
ap_drv_ops.c 240 struct sta_info *sta, int authorized)
242 if (authorized) {
ieee802_1x.c 101 struct sta_info *sta, int authorized)
108 if (authorized) {
126 if (authorized) {
    [all...]
  /external/ImageMagick/MagickCore/
policy.c 590 authorized;
604 authorized=MagickTrue;
608 while ((p != (PolicyInfo *) NULL) && (authorized != MagickFalse))
615 authorized=MagickFalse;
618 authorized=MagickFalse;
621 authorized=MagickFalse;
626 return(authorized);
578 authorized; local
    [all...]
  /external/wpa_supplicant_8/src/eapol_auth/
eapol_auth_sm.h 75 void (*set_port_authorized)(void *ctx, void *sta_ctx, int authorized);
  /external/iputils/
Makefile 237 @if [ x"$(UNAME_N)" != x"pleiades" ]; then echo "Not authorized to advance snapshot"; exit 1; fi
  /frameworks/base/core/java/android/net/
IConnectivityManager.aidl 113 void setVpnPackageAuthorization(String packageName, int userId, boolean authorized);
  /external/wpa_supplicant_8/src/eapol_supp/
eapol_supp_sm.h 14 typedef enum { Unauthorized, Authorized } PortStatus;
240 * port_cb - Set port authorized/unauthorized callback (optional)
242 * @authorized: Whether the supplicant port is now in authorized state
244 void (*port_cb)(void *ctx, int authorized);
  /external/wpa_supplicant_8/wpa_supplicant/
notify.h 89 const u8 *mac_addr, int authorized,
wpas_glue.c 962 static void wpa_supplicant_port_cb(void *ctx, int authorized)
969 authorized ? "Authorized" : "Unauthorized");
974 authorized ? "Authorized" : "Unauthorized");
975 wpa_drv_set_supp_port(wpa_s, authorized);
    [all...]
notify.c 791 /* Notify listeners a new station has been authorized */
819 const u8 *mac_addr, int authorized,
822 if (authorized)
driver_i.h 364 int authorized)
368 authorized);
ibss_rsn.c 361 struct ibss_rsn_peer *peer, int authorized)
365 if (authorized) {
  /prebuilts/go/darwin-x86/src/crypto/x509/
verify.go 52 return "x509: certificate is not authorized to sign other certificates"
56 return "x509: a root or intermediate certificate is not authorized to sign in this domain"
67 // HostnameError results when the set of authorized names doesn't match the
  /prebuilts/go/linux-x86/src/crypto/x509/
verify.go 52 return "x509: certificate is not authorized to sign other certificates"
56 return "x509: a root or intermediate certificate is not authorized to sign in this domain"
67 // HostnameError results when the set of authorized names doesn't match the
  /external/wpa_supplicant_8/src/drivers/
driver_bsd.c 924 int authorized = -1; local
926 /* For now, only support setting Authorized flag */
928 authorized = 1;
930 authorized = 0;
932 if (authorized < 0)
935 return bsd_send_mlme_param(priv, authorized ?
    [all...]
driver_atheros.c 411 atheros_set_sta_authorized(void *priv, const u8 *addr, int authorized)
417 wpa_printf(MSG_DEBUG, "%s: addr=%s authorized=%d",
418 __func__, ether_sprintf(addr), authorized);
420 if (authorized)
429 __func__, authorized ? "" : "un", MAC2STR(addr));
440 /* For now, only support setting Authorized flag */
    [all...]
driver_nl80211_event.c 283 struct nlattr *authorized,
405 if (authorized && nla_get_u8(authorized)) {
406 event.assoc_info.authorized = 1;
407 wpa_printf(MSG_DEBUG, "nl80211: connection authorized");
    [all...]

Completed in 615 milliseconds

1 2