Home
last modified time | relevance | path

Searched refs:required_keys (Results 1 – 7 of 7) sorted by relevance

/external/toolchain-utils/crosperf/
Dresults_report_unittest.py273 required_keys = JSONResultsReportTest.REQUIRED_REPORT_KEYS
275 required_keys += JSONResultsReportTest.EXPERIMENT_REPORT_KEYS
276 return required_keys
279 required_keys = self._GetRequiredKeys(is_experiment)
281 for key in required_keys:
289 required_keys = self._GetRequiredKeys(is_experiment=True)
291 self.assertItemsEqual(result.iterkeys(), required_keys)
/external/wpa_supplicant_8/src/eapol_supp/
Deapol_supp_sm.c397 sm->conf.required_keys == 0) { in SM_STEP()
843 !(sm->conf.required_keys & EAPOL_REQUIRE_KEY_UNICAST)) && in eapol_sm_processKey()
845 !(sm->conf.required_keys & EAPOL_REQUIRE_KEY_BROADCAST))) in eapol_sm_processKey()
1545 sm->conf.required_keys = conf->required_keys; in eapol_sm_notify_config()
Deapol_supp_sm.h40 int required_keys; member
/external/wpa_supplicant_8/src/rsn_supp/
Dpreauth.c233 eapol_conf.required_keys = 0; in rsn_preauth_init()
/external/v8/tools/mb/
Dmb.py1025 def ReadInputJSON(self, required_keys): argument
1037 for k in required_keys:
/external/wpa_supplicant_8/wpa_supplicant/
Deapol_test.c643 eapol_conf.required_keys = 0; in test_eapol()
Dwpa_supplicant.c331 eapol_conf.required_keys = 0; in wpa_supplicant_initiate_eapol()
333 eapol_conf.required_keys |= EAPOL_REQUIRE_KEY_UNICAST; in wpa_supplicant_initiate_eapol()
336 eapol_conf.required_keys |= in wpa_supplicant_initiate_eapol()
341 eapol_conf.required_keys = 0; in wpa_supplicant_initiate_eapol()