Home
Sort by
last modified time
|
relevance
|
path
Repository(s)
applications
arkcompiler
base
build
commonlibrary
developtools
device
docs
domains
drivers
foundation
ide
interface
kernel
napi_generator
productdefine
test
third_party
vendor
select all
invert selection
clear
Full Search
Search through all text tokens(words,strings,identifiers,numbers) in index.
Definition
Only finds symbol definitions(where e.g a variable(function,...) is defined).
Symbol
Only finds symbol(e.g. methods classes,function,variables).
File Path
Path of the source file(use "/").If you want just exact path,enclose it in "".Source files end with: .jar/.bz2/.a/.h/.java...
History
History log comments.
Type
Any
Bzip(2)
C
Clojure
C#
C++
ELF
Erlang
Image file
Fortran
Golang
GZIP
Haskell
Jar
Java
Java class
JavaScript
Lisp
Lua
Pascal
Perl
PHP
Plain Text
PL/SQL
Python
Rust
Scala
Shell script
SQL
Tar
Tcl
Troff
UUEncoded
Visual Basic
XML
Zip
Type of analyzer used to filter file types include with selected(e.g. just C sources).
Help
Searched
refs:PTK_valid
(Results
1 - 6
of
6
) sorted by relevance
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H
A
D
wpa_auth_i.h
66
bool
PTK_valid
;
member
H
A
D
wpa_auth.c
841
sm->
PTK_valid
= 0;
in wpa_request_new_ptk()
1021
sm->
PTK_valid
= true;
in wpa_try_alt_snonce()
1290
!sm->
PTK_valid
) {
in wpa_receive()
1299
|| !sm->
PTK_valid
) {
in wpa_receive()
1336
if (sm->
PTK_valid
&& !sm->update_snonce) {
in wpa_receive()
1696
if (!sm->
PTK_valid
|| !mic_len) {
in __wpa_send_eapol()
1804
sm->
PTK_valid
= false;
in wpa_remove_ptk()
1945
sm->
PTK_valid
= false;
in wpa_auth_sm_event()
2020
sm->
PTK_valid
= false;
in SM_STATE()
2399
sm->
PTK_valid
in fils_auth_pmk_to_ptk()
[all...]
H
A
D
wpa_auth_ft.c
3213
sm->
PTK_valid
= true;
in wpa_ft_process_auth_req()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H
A
D
wpa_auth_i.h
64
Boolean
PTK_valid
;
member
H
A
D
wpa_auth.c
764
sm->
PTK_valid
= 0;
in wpa_request_new_ptk()
944
sm->
PTK_valid
= TRUE;
in wpa_try_alt_snonce()
1210
!sm->
PTK_valid
) {
in wpa_receive()
1220
|| !sm->
PTK_valid
) {
in wpa_receive()
1258
if (sm->
PTK_valid
&& !sm->update_snonce) {
in wpa_receive()
1617
if (!sm->
PTK_valid
|| !mic_len) {
in __wpa_send_eapol()
1722
sm->
PTK_valid
= FALSE;
in wpa_remove_ptk()
1841
sm->
PTK_valid
= FALSE;
in wpa_auth_sm_event()
1916
sm->
PTK_valid
= FALSE;
in SM_STATE()
2275
sm->
PTK_valid
in fils_auth_pmk_to_ptk()
[all...]
H
A
D
wpa_auth_ft.c
3017
sm->
PTK_valid
= TRUE;
in wpa_ft_process_auth_req()
Completed in 25 milliseconds