/external/wpa_supplicant_8/src/pae/ |
ieee802_1x_cp.c | 97 static int changed_cipher(struct ieee802_1x_cp_sm *sm) 99 return sm->confidentiality_offset != sm->cipher_offset || 100 sm->current_cipher_suite != sm->cipher_suite; 104 static int changed_connect(struct ieee802_1x_cp_sm *sm) 106 return sm->connect != SECURE || sm->chgd_server || changed_cipher(sm); 114 sm->controlled_port_enabled = FALSE 431 struct ieee802_1x_cp_sm *sm; local 502 struct ieee802_1x_cp_sm *sm = eloop_ctx; local 531 struct ieee802_1x_cp_sm *sm = cp_ctx; local 542 struct ieee802_1x_cp_sm *sm = (struct ieee802_1x_cp_sm *)cp_ctx; local 553 struct ieee802_1x_cp_sm *sm = cp_ctx; local 564 struct ieee802_1x_cp_sm *sm = cp_ctx; local 575 struct ieee802_1x_cp_sm *sm = cp_ctx; local 586 struct ieee802_1x_cp_sm *sm = cp_ctx; local 596 struct ieee802_1x_cp_sm *sm = cp_ctx; local 609 struct ieee802_1x_cp_sm *sm = cp_ctx; local 619 struct ieee802_1x_cp_sm *sm = cp_ctx; local 629 struct ieee802_1x_cp_sm *sm = cp_ctx; local 640 struct ieee802_1x_cp_sm *sm = cp_ctx; local 650 struct ieee802_1x_cp_sm *sm = cp_ctx; local 660 struct ieee802_1x_cp_sm *sm = cp_ctx; local 670 struct ieee802_1x_cp_sm *sm = cp_ctx; local 680 struct ieee802_1x_cp_sm *sm = cp_ctx; local 690 struct ieee802_1x_cp_sm *sm = cp_ctx; local 709 struct ieee802_1x_cp_sm *sm = cp_ctx; local 718 struct ieee802_1x_cp_sm *sm = eloop_ctx; local 727 struct ieee802_1x_cp_sm *sm = eloop_ctx; local [all...] |
/external/libcxx/test/std/re/re.submatch/re.submatch.members/ |
length.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 SM sm = SM(); local 26 assert(sm.length() == 0); 28 sm.first = s; 29 sm.second = s + 3; 30 sm.matched = true; 31 assert(sm.length() == 3); 35 typedef std::sub_match<const CharT*> SM; 36 SM sm = SM(); local [all...] |
compare_string_type.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 typedef SM::string_type string; 26 SM sm = SM(); local 27 assert(sm.compare(string()) == 0); 29 sm.first = s; 30 sm.second = s + 3; 31 sm.matched = true; 32 assert(sm.compare(string()) > 0) 39 SM sm = SM(); local [all...] |
compare_value_type_ptr.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 SM sm = SM(); local 26 assert(sm.compare("") == 0); 28 sm.first = s; 29 sm.second = s + 3; 30 sm.matched = true; 31 assert(sm.compare("") > 0); 32 assert(sm.compare("123") == 0) 37 SM sm = SM(); local [all...] |
operator_string.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 SM sm = SM(); local 26 SM::string_type str = sm; 29 sm.first = s; 30 sm.second = s + 3; 31 sm.matched = true; 32 str = sm; 38 SM sm = SM(); local [all...] |
str.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 SM sm = SM(); local 26 SM::string_type str = sm.str(); 29 sm.first = s; 30 sm.second = s + 3; 31 sm.matched = true; 32 str = sm.str() 38 SM sm = SM(); local [all...] |
default.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 SM sm; local 26 assert(sm.matched == false); 30 typedef std::sub_match<const CharT*> SM; 31 SM sm; local 32 assert(sm.matched == false);
|
/prebuilts/ndk/r16/sources/cxx-stl/llvm-libc++/test/std/re/re.submatch/re.submatch.members/ |
length.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 SM sm = SM(); local 26 assert(sm.length() == 0); 28 sm.first = s; 29 sm.second = s + 3; 30 sm.matched = true; 31 assert(sm.length() == 3); 35 typedef std::sub_match<const CharT*> SM; 36 SM sm = SM(); local [all...] |
compare_string_type.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 typedef SM::string_type string; 26 SM sm = SM(); local 27 assert(sm.compare(string()) == 0); 29 sm.first = s; 30 sm.second = s + 3; 31 sm.matched = true; 32 assert(sm.compare(string()) > 0) 39 SM sm = SM(); local [all...] |
compare_value_type_ptr.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 SM sm = SM(); local 26 assert(sm.compare("") == 0); 28 sm.first = s; 29 sm.second = s + 3; 30 sm.matched = true; 31 assert(sm.compare("") > 0); 32 assert(sm.compare("123") == 0) 37 SM sm = SM(); local [all...] |
operator_string.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 SM sm = SM(); local 26 SM::string_type str = sm; 29 sm.first = s; 30 sm.second = s + 3; 31 sm.matched = true; 32 str = sm; 38 SM sm = SM(); local [all...] |
str.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 SM sm = SM(); local 26 SM::string_type str = sm.str(); 29 sm.first = s; 30 sm.second = s + 3; 31 sm.matched = true; 32 str = sm.str() 38 SM sm = SM(); local [all...] |
default.pass.cpp | 24 typedef std::sub_match<const CharT*> SM; 25 SM sm; local 26 assert(sm.matched == false); 30 typedef std::sub_match<const CharT*> SM; 31 SM sm; local 32 assert(sm.matched == false);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server.c | 33 static int eap_sm_calculateTimeout(struct eap_sm *sm, int retransCount, 36 static void eap_sm_parseEapResp(struct eap_sm *sm, const struct wpabuf *resp); 38 static struct wpabuf * eap_sm_buildSuccess(struct eap_sm *sm, u8 id); 39 static struct wpabuf * eap_sm_buildFailure(struct eap_sm *sm, u8 id); 40 static int eap_sm_nextId(struct eap_sm *sm, int id); 41 static void eap_sm_Policy_update(struct eap_sm *sm, const u8 *nak_list, 43 static EapType eap_sm_Policy_getNextMethod(struct eap_sm *sm, int *vendor); 44 static int eap_sm_Policy_getDecision(struct eap_sm *sm); 45 static Boolean eap_sm_Policy_doPickUp(struct eap_sm *sm, EapType method); 48 static int eap_get_erp_send_reauth_start(struct eap_sm *sm) 1822 struct eap_sm *sm; local [all...] |
/external/skia/tests/ |
SkSharedMutexTest.cpp | 14 SkSharedMutex sm; local 15 sm.acquire(); 16 sm.assertHeld(); 17 sm.release(); 18 sm.acquireShared(); 19 sm.assertHeldShared(); 20 sm.releaseShared(); 24 SkSharedMutex sm; local 34 sm.acquireShared(); 35 sm.assertHeldShared() [all...] |
/external/skqp/tests/ |
SkSharedMutexTest.cpp | 14 SkSharedMutex sm; local 15 sm.acquire(); 16 sm.assertHeld(); 17 sm.release(); 18 sm.acquireShared(); 19 sm.assertHeldShared(); 20 sm.releaseShared(); 24 SkSharedMutex sm; local 34 sm.acquireShared(); 35 sm.assertHeldShared() [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 152 static void eapol_sm_txLogoff(struct eapol_sm *sm); 153 static void eapol_sm_txStart(struct eapol_sm *sm); 154 static void eapol_sm_processKey(struct eapol_sm *sm); 155 static void eapol_sm_getSuppRsp(struct eapol_sm *sm); 156 static void eapol_sm_txSuppRsp(struct eapol_sm *sm); 157 static void eapol_sm_abortSupp(struct eapol_sm *sm); 158 static void eapol_sm_abort_cached(struct eapol_sm *sm); 160 static void eapol_sm_set_port_authorized(struct eapol_sm *sm); 161 static void eapol_sm_set_port_unauthorized(struct eapol_sm *sm); 168 struct eapol_sm *sm = timeout_ctx local 1827 struct eapol_sm *sm = ctx; local 1834 struct eapol_sm *sm = ctx; local 1844 struct eapol_sm *sm = ctx; local 1876 struct eapol_sm *sm = ctx; local 1916 struct eapol_sm *sm = ctx; local 1930 struct eapol_sm *sm = ctx; local 1946 struct eapol_sm *sm = ctx; local 1957 struct eapol_sm *sm = ctx; local 1970 struct eapol_sm *sm = ctx; local 1987 struct eapol_sm *sm = ctx; local 2001 struct eapol_sm *sm = ctx; local 2011 struct eapol_sm *sm = ctx; local 2019 struct eapol_sm *sm = ctx; local 2029 struct eapol_sm *sm = ctx; local 2040 struct eapol_sm *sm = ctx; local 2051 struct eapol_sm *sm = ctx; local 2092 struct eapol_sm *sm; local 2187 struct eapol_sm *sm = ctx; local [all...] |
eapol_supp_sm.h | 312 void eapol_sm_deinit(struct eapol_sm *sm); 313 void eapol_sm_step(struct eapol_sm *sm); 314 int eapol_sm_get_status(struct eapol_sm *sm, char *buf, size_t buflen, 316 int eapol_sm_get_mib(struct eapol_sm *sm, char *buf, size_t buflen); 317 void eapol_sm_configure(struct eapol_sm *sm, int heldPeriod, int authPeriod, 319 int eapol_sm_rx_eapol(struct eapol_sm *sm, const u8 *src, const u8 *buf, 321 void eapol_sm_notify_tx_eapol_key(struct eapol_sm *sm); 322 void eapol_sm_notify_portEnabled(struct eapol_sm *sm, Boolean enabled); 323 void eapol_sm_notify_portValid(struct eapol_sm *sm, Boolean valid); 324 void eapol_sm_notify_eap_success(struct eapol_sm *sm, Boolean success) [all...] |
/external/wpa_supplicant_8/src/eapol_auth/ |
eapol_auth_sm.c | 23 #define STATE_MACHINE_ADDR sm->addr 30 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1) 32 sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0) 35 #define txCannedFail() eapol_auth_tx_canned_eap(sm, 0) 36 #define txCannedSuccess() eapol_auth_tx_canned_eap(sm, 1) 37 #define txReq() eapol_auth_tx_req(sm) 777 struct eapol_state_machine *sm; local 986 struct eapol_state_machine *sm = eloop_ctx; local 1031 struct eapol_state_machine *sm = ctx; local 1044 struct eapol_state_machine *sm = ctx; local 1052 struct eapol_state_machine *sm = ctx; local 1059 struct eapol_state_machine *sm = ctx; local 1067 struct eapol_state_machine *sm = ctx; local 1074 struct eapol_state_machine *sm = ctx; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.h | 16 void pmksa_candidate_free(struct wpa_sm *sm); 17 int rsn_preauth_init(struct wpa_sm *sm, const u8 *dst, 19 void rsn_preauth_deinit(struct wpa_sm *sm); 20 int rsn_preauth_scan_results(struct wpa_sm *sm); 21 void rsn_preauth_scan_result(struct wpa_sm *sm, const u8 *bssid, 23 void pmksa_candidate_add(struct wpa_sm *sm, const u8 *bssid, 25 void rsn_preauth_candidate_process(struct wpa_sm *sm); 26 int rsn_preauth_get_status(struct wpa_sm *sm, char *buf, size_t buflen, 28 int rsn_preauth_in_progress(struct wpa_sm *sm); 32 static inline void pmksa_candidate_free(struct wpa_sm *sm) [all...] |
wpa.c | 38 * @sm: Pointer to WPA state machine data from wpa_sm_init() 48 int wpa_eapol_key_send(struct wpa_sm *sm, struct wpa_ptk *ptk, 53 size_t mic_len = wpa_mic_len(sm->key_mgmt, sm->pmk_len); 57 MAC2STR(dest), ver, (int) mic_len, sm->key_mgmt); 58 if (is_zero_ether_addr(dest) && is_zero_ether_addr(sm->bssid)) { 63 if (wpa_sm_get_bssid(sm, sm->bssid) < 0) { 64 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, 68 dest = sm->bssid 639 struct wpa_sm *sm = eloop_ctx; local 692 struct wpa_sm *sm = eloop_ctx; local 2398 struct wpa_sm *sm = ctx; local 2446 struct wpa_sm *sm; local [all...] |
preauth.c | 35 * @sm: Pointer to WPA state machine data from wpa_sm_init() 37 void pmksa_candidate_free(struct wpa_sm *sm) 41 if (sm == NULL) 44 dl_list_for_each_safe(entry, n, &sm->pmksa_candidates, 55 struct wpa_sm *sm = ctx; local 60 if (sm->preauth_eapol == NULL || 61 is_zero_ether_addr(sm->preauth_bssid) || 62 os_memcmp(sm->preauth_bssid, src_addr, ETH_ALEN) != 0) { 69 eapol_sm_rx_eapol(sm->preauth_eapol, src_addr, buf, len); 77 struct wpa_sm *sm = ctx local 121 struct wpa_sm *sm = eloop_ctx; local 133 struct wpa_sm *sm = ctx; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap.c | 39 static Boolean eap_sm_allowMethod(struct eap_sm *sm, int vendor, 41 static struct wpabuf * eap_sm_buildNak(struct eap_sm *sm, int id); 42 static void eap_sm_processIdentity(struct eap_sm *sm, 44 static void eap_sm_processNotify(struct eap_sm *sm, const struct wpabuf *req); 46 static void eap_sm_parseEapReq(struct eap_sm *sm, const struct wpabuf *req); 51 static void eap_sm_request(struct eap_sm *sm, enum wpa_ctrl_req_type field, 56 static Boolean eapol_get_bool(struct eap_sm *sm, enum eapol_bool_var var) 58 return sm->eapol_cb->get_bool(sm->eapol_ctx, var); 62 static void eapol_set_bool(struct eap_sm *sm, enum eapol_bool_var var 2054 struct eap_sm *sm = ctx; local 2130 struct eap_sm *sm; local [all...] |
/frameworks/base/cmds/sm/ |
sm | 2 # Script to start "sm" on the device, which has a very rudimentary 6 export CLASSPATH=$base/framework/sm.jar 7 exec app_process $base/bin com.android.commands.sm.Sm "$@"
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.c | 33 #define STATE_MACHINE_ADDR sm->addr 37 static int wpa_sm_step(struct wpa_state_machine *sm); 41 static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk, 43 static struct wpabuf * fils_prepare_plainbuf(struct wpa_state_machine *sm, 49 static void wpa_request_new_ptk(struct wpa_state_machine *sm); 54 static int wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce, 63 static u8 * ieee80211w_kde_add(struct wpa_state_machine *sm, u8 *pos); 176 int (*cb)(struct wpa_state_machine *sm, void *ctx), 240 static int wpa_use_aes_cmac(struct wpa_state_machine *sm) 244 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt) 308 struct wpa_state_machine *sm = timeout_ctx; local 582 struct wpa_state_machine *sm; local 1354 struct wpa_state_machine *sm = timeout_ctx; local 3717 struct wpa_state_machine *sm = eloop_ctx; local [all...] |