/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/g++.old-deja/g++.pt/ |
H A D | derived1.C | 21 B<A>::Info ie; local 22 ie.a=1; 23 ie.b=2;
|
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/testsuite/g++.old-deja/g++.pt/ |
H A D | derived1.C | 21 B<A>::Info ie; local 22 ie.a=1; 23 ie.b=2;
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/wps/ |
H A D | wps.c | 266 struct wpabuf *ie; local 271 ie = wpabuf_alloc(100); 272 if (ie == NULL) 275 wpabuf_put_u8(ie, WLAN_EID_VENDOR_SPECIFIC); 276 len = wpabuf_put(ie, 1); 277 wpabuf_put_be32(ie, WPS_DEV_OUI_WFA); 279 if (wps_build_version(ie) || 280 wps_build_req_type(ie, req_type)) { 281 wpabuf_free(ie); 285 *len = wpabuf_len(ie) 299 struct wpabuf *ie; local 338 struct wpabuf *ie; local [all...] |
/netbsd-6-1-5-RELEASE/lib/libc/stdlib/ |
H A D | hcreate.c | 153 struct internal_entry *ie; local 167 ie = SLIST_FIRST(&table[idx]); 169 free(ie->ent.key); 170 free(ie); 189 struct internal_entry *ie; local 204 ie = SLIST_FIRST(chain); 205 while (ie != NULL) { 206 if (strcmp(ie->ent.key, item.key) == 0) 208 ie = SLIST_NEXT(ie, lin [all...] |
/netbsd-6-1-5-RELEASE/share/man/man4/man4.sun2/ |
H A D | Makefile | 4 MAN= autoconf.4 bwtwo.4 ec.4 ie.4 intro.4 kbd.4 leds.4 \
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/rsn_supp/ |
H A D | wpa_ie.c | 77 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu", 88 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version", 101 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much", 112 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 122 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)", 133 wpa_printf(MSG_DEBUG, "%s: ie count botch (key mgmt), " 143 wpa_printf(MSG_DEBUG, "%s: ie too short (for capabilities)", 155 wpa_printf(MSG_DEBUG, "%s: ie has %u trailing bytes - ignored", 404 * @ie: Pointer to parsed IE data 408 struct wpa_eapol_ie_parse *ie) 407 wpa_parse_generic(const u8 *pos, const u8 *end, struct wpa_eapol_ie_parse *ie) argument 511 wpa_supplicant_parse_ies(const u8 *buf, size_t len, struct wpa_eapol_ie_parse *ie) argument [all...] |
H A D | wpa.c | 362 struct wpa_eapol_ie_parse ie; local 377 os_memset(&ie, 0, sizeof(ie)); 385 wpa_supplicant_parse_ies(_buf, len, &ie); 386 if (ie.pmkid) { 388 "Authenticator", ie.pmkid, PMKID_LEN); 393 res = wpa_supplicant_get_pmk(sm, src_addr, ie.pmkid); 723 struct wpa_eapol_ie_parse *ie) 729 if (ie->igtk) { 732 if (ie 722 ieee80211w_set_keys(struct wpa_sm *sm, struct wpa_eapol_ie_parse *ie) argument 803 ft_validate_mdie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie, const u8 *assoc_resp_mdie) argument 834 ft_validate_ftie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie, const u8 *assoc_resp_ftie) argument 861 ft_validate_rsnie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument 895 wpa_supplicant_validate_ie_ft(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument 930 wpa_supplicant_validate_ie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument 1051 struct wpa_eapol_ie_parse ie; local 1160 struct wpa_eapol_ie_parse ie; local 2426 wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument 2460 wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument 2494 wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument [all...] |
/netbsd-6-1-5-RELEASE/share/man/man4/man4.acorn32/ |
H A D | Makefile | 3 MAN= asc.4 autoconf.4 cosc.4 csc.4 ie.4 intro.4 iomdkbc.4 \
|
/netbsd-6-1-5-RELEASE/share/man/man4/man4.mvme68k/ |
H A D | Makefile | 3 MAN= autoconf.4 clmpcc.4 clock.4 ie.4 intro.4 lpt.4 mainbus.4 \
|
/netbsd-6-1-5-RELEASE/share/man/man4/man4.sun3/ |
H A D | Makefile | 4 MAN= autoconf.4 bwtwo.4 cgtwo.4 cgfour.4 fd.4 intro.4 ie.4 kbd.4 leds.4 \
|
/netbsd-6-1-5-RELEASE/external/gpl3/binutils/dist/ld/testsuite/ld-cris/ |
H A D | tls-err-41.d | 2 #source: tls-ie-10.s --pic
|
H A D | tls-err-49.d | 2 #source: tls-ie-8.s --pic
|
H A D | tls-und-42.d | 1 #source: tls-ie-10.s --pic
|
H A D | tls-und-50.d | 1 #source: tls-ie-8.s --pic
|
H A D | tls-err-20x.d | 2 #source: tls-ie-9.s --pic 4 #source: tls-ie-10.s --pic
|
H A D | tls-global-74.d | 4 #source: tls-ie-10.s 6 #source: tls-ie-8.s
|
H A D | tls-err-77.d | 1 #source: tls-ie-8e.s
|
H A D | tls-gc-79.d | 3 #source: tls-ie-8e.s
|
/netbsd-6-1-5-RELEASE/usr.sbin/isdn/daicctl/ |
H A D | istat.c | 93 static void printIE(u_int8_t *ie); 168 printIE(ie) 169 u_int8_t *ie; 173 for (i = 0; i < ie[0]; i++) 174 printf(" %02X", ie[i+1]);
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/wpa_supplicant/ |
H A D | bss.c | 148 const struct wpa_scan_res *new, u32 ie) 155 switch (ie) { 157 old_ie = wpa_bss_get_vendor_ie(old, ie); 158 new_ie = wpa_scan_get_vendor_ie(new, ie); 162 old_ie_buff = wpa_bss_get_vendor_ie_multi(old, ie); 163 new_ie_buff = wpa_scan_get_vendor_ie_multi(new, ie); 169 old_ie = wpa_bss_get_ie(old, ie); 170 new_ie = wpa_scan_get_ie(new, ie); 490 const u8 * wpa_bss_get_ie(const struct wpa_bss *bss, u8 ie) argument 500 if (pos[0] == ie) 147 are_ies_equal(const struct wpa_bss *old, const struct wpa_scan_res *new, u32 ie) argument 563 const u8 *ie; local 584 const u8 *ie, *ie2; local [all...] |
H A D | scan.h | 30 const u8 * wpa_scan_get_ie(const struct wpa_scan_res *res, u8 ie);
|
H A D | events.c | 130 struct wpa_ie_data ie; local 134 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || 135 ie.pmkid == NULL) 138 for (i = 0; i < ie.num_pmkid; i++) { 140 ie.pmkid + i * PMKID_LEN, 300 struct wpa_ie_data ie; local 313 if (wpa_parse_wpa_ie(rsn_ie, 2 + rsn_ie[1], &ie)) { 317 if (!(ie.proto & ssid->proto)) { 323 if (!(ie.pairwise_cipher & ssid->pairwise_cipher)) { 329 if (!(ie 421 const u8 *ie; local 523 const u8 *ie; local 819 const u8 *ie; local [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/ap/ |
H A D | drv_callbacks.c | 37 const u8 *ie, size_t ielen) 59 ieee802_11_parse_elems(ie, ielen, &elems, 0); 61 ie = elems.wps_ie - 2; 65 ie = elems.rsn_ie - 2; 69 ie = elems.wpa_ie - 2; 73 ie = NULL; 90 if (ie == NULL || ielen == 0) { 102 if (hapd->conf->wps_state && ie[0] == 0xdd && ie[1] >= 4 && 103 os_memcmp(ie 36 hostapd_notif_assoc(struct hostapd_data *hapd, const u8 *addr, const u8 *ie, size_t ielen) argument 323 hostapd_probe_req_rx(struct hostapd_data *hapd, const u8 *sa, const u8 *ie, size_t ie_len) argument [all...] |
/netbsd-6-1-5-RELEASE/share/man/man4/man4.sparc/ |
H A D | Makefile | 6 cgsix.4 cgthree.4 cgtwo.4 clock.4 dbri.4 fd.4 ie.4 intro.4 kbd.4 \
|
/netbsd-6-1-5-RELEASE/sbin/ifconfig/ |
H A D | ieee80211.c | 876 printie(const char* tag, const uint8_t *ie, size_t ielen, int maxlen) argument 884 for (; ielen > 0; ie++, ielen--) { 887 printf("%02x", *ie); 906 * NB: The decoding routines assume a properly formatted ie 912 printwmeparam(const char *tag, const u_int8_t *ie, size_t ielen, int maxlen) argument 917 (const struct ieee80211_wme_param *) ie; 924 ie += offsetof(struct ieee80211_wme_param, params_acParams); 943 printwmeinfo(const char *tag, const u_int8_t *ie, size_t ielen, int maxlen) argument 948 (const struct ieee80211_wme_info *) ie; 995 printwpaie(const char *tag, const u_int8_t *ie, size_ argument 1081 printrsnie(const char *tag, const u_int8_t *ie, size_t ielen, int maxlen) argument 1166 printssid(const char *tag, const u_int8_t *ie, size_t ielen, int maxlen) argument 1174 printrates(const char *tag, const u_int8_t *ie, size_t ielen, int maxlen) argument 1191 printcountry(const char *tag, const u_int8_t *ie, size_t ielen, int maxlen) argument [all...] |