Searched defs:req (Results 201 - 225 of 426) sorted by relevance

1234567891011>>

/external/wpa_supplicant_8/hs20/client/
H A Dest.c335 X509_REQ *req = NULL; local
381 req = X509_REQ_new();
382 if (req == NULL)
398 res = X509_REQ_set_subject_name(req,
411 !X509_REQ_set_subject_name(req, subj))
417 if (!X509_REQ_set_pubkey(req, pkey))
444 if (!X509_REQ_add_extensions(req, exts))
449 if (!X509_REQ_sign(req, pkey, EVP_sha256()))
457 X509_REQ_print(out, req);
476 X509_REQ_print_fp(f, req);
618 char *buf, *resp, *req, *req2; local
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dbeacon.c334 const struct ieee80211_mgmt *req,
361 if (req)
362 os_memcpy(resp->da, req->sa, ETH_ALEN);
332 hostapd_gen_probe_resp(struct hostapd_data *hapd, struct sta_info *sta, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) argument
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_mschapv2.c101 struct wpabuf *req; local
114 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len,
116 if (req == NULL) {
123 ms = wpabuf_put(req, sizeof(*ms));
128 wpabuf_put_u8(req, CHALLENGE_LEN);
130 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
132 wpabuf_put(req, CHALLENGE_LEN);
135 wpabuf_put_data(req, sm->server_id, sm->server_id_len);
137 return req;
144 struct wpabuf *req; local
188 struct wpabuf *req; local
[all...]
H A Deap_server_tnc.c107 struct wpabuf *req; local
109 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, EAP_CODE_REQUEST,
111 if (req == NULL) {
118 wpabuf_put_u8(req, EAP_TNC_FLAGS_START | EAP_TNC_VERSION);
122 return req;
129 struct wpabuf *req; local
150 req = wpabuf_alloc(rlen);
151 if (req == NULL) {
157 wpabuf_put_data(req, start_buf, start_len);
160 rpos1 = wpabuf_put(req,
220 struct wpabuf *req; local
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dpeerkey.c981 struct wpa_eapol_key *req; local
1050 sizeof(*req) + kde_len, &rlen,
1051 (void *) &req);
1057 req->type = EAPOL_KEY_TYPE_RSN;
1060 WPA_PUT_BE16(req->key_info, key_info);
1061 WPA_PUT_BE16(req->key_length, 0);
1062 os_memcpy(req->replay_counter, sm->request_counter,
1073 os_memcpy(req->key_nonce, peerkey->inonce, WPA_NONCE_LEN);
1075 req->key_nonce, WPA_NONCE_LEN);
1077 WPA_PUT_BE16(req
[all...]
/external/wpa_supplicant_8/src/wps/
H A Dwps_upnp_ssdp.c877 struct ifreq req; local
878 os_memset(&req, 0, sizeof(req));
879 os_strlcpy(req.ifr_name, forced_ifname, sizeof(req.ifr_name));
880 if (setsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, &req,
881 sizeof(req)) < 0) {
/external/wpa_supplicant_8/wpa_supplicant/
H A Dgas_query.c42 struct wpabuf *req; member in struct:gas_query_pending
133 wpabuf_free(query->req);
257 struct wpabuf *req)
264 (unsigned int) wpabuf_len(req), query->freq, prot);
266 u8 *categ = wpabuf_mhead_u8(req);
276 wpabuf_head(req), wpabuf_len(req),
287 struct wpabuf *req; local
289 req = gas_build_comeback_req(query->dialog_token);
290 if (req
256 gas_query_tx(struct gas_query *gas, struct gas_query_pending *query, struct wpabuf *req) argument
650 gas_query_req(struct gas_query *gas, const u8 *dst, int freq, struct wpabuf *req, void (*cb)(void *ctx, const u8 *dst, u8 dialog_token, enum gas_query_result result, const struct wpabuf *adv_proto, const struct wpabuf *resp, u16 status_code), void *ctx) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dbeacon.c334 const struct ieee80211_mgmt *req,
361 if (req)
362 os_memcpy(resp->da, req->sa, ETH_ALEN);
332 hostapd_gen_probe_resp(struct hostapd_data *hapd, struct sta_info *sta, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_mschapv2.c101 struct wpabuf *req; local
114 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len,
116 if (req == NULL) {
123 ms = wpabuf_put(req, sizeof(*ms));
128 wpabuf_put_u8(req, CHALLENGE_LEN);
130 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN);
132 wpabuf_put(req, CHALLENGE_LEN);
135 wpabuf_put_data(req, sm->server_id, sm->server_id_len);
137 return req;
144 struct wpabuf *req; local
188 struct wpabuf *req; local
[all...]
H A Deap_server_tnc.c107 struct wpabuf *req; local
109 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, EAP_CODE_REQUEST,
111 if (req == NULL) {
118 wpabuf_put_u8(req, EAP_TNC_FLAGS_START | EAP_TNC_VERSION);
122 return req;
129 struct wpabuf *req; local
150 req = wpabuf_alloc(rlen);
151 if (req == NULL) {
157 wpabuf_put_data(req, start_buf, start_len);
160 rpos1 = wpabuf_put(req,
220 struct wpabuf *req; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dpeerkey.c981 struct wpa_eapol_key *req; local
1050 sizeof(*req) + kde_len, &rlen,
1051 (void *) &req);
1057 req->type = EAPOL_KEY_TYPE_RSN;
1060 WPA_PUT_BE16(req->key_info, key_info);
1061 WPA_PUT_BE16(req->key_length, 0);
1062 os_memcpy(req->replay_counter, sm->request_counter,
1073 os_memcpy(req->key_nonce, peerkey->inonce, WPA_NONCE_LEN);
1075 req->key_nonce, WPA_NONCE_LEN);
1077 WPA_PUT_BE16(req
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/wps/
H A Dwps_upnp_ssdp.c877 struct ifreq req; local
878 os_memset(&req, 0, sizeof(req));
879 os_strlcpy(req.ifr_name, forced_ifname, sizeof(req.ifr_name));
880 if (setsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, &req,
881 sizeof(req)) < 0) {
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Dorg.eclipse.equinox.p2.director_2.0.3.R36x_v20101117-1018.jar ... .eclipse.equinox.p2.metadata.IRequirement req public void " href="/5.1.0_r1/s? ...
/external/apache-http/src/org/apache/http/impl/client/
H A DAbstractHttpClient.java606 * @param req the request that will be executed
610 protected HttpParams determineParams(HttpRequest req) { argument
612 (null, getParams(), req.getParams(), null);
/external/bluetooth/bluedroid/btif/src/
H A Dbtif_av.c434 btif_av_sink_config_req_t req; local
436 memcpy(&req, p_data, sizeof(req));
438 BTIF_TRACE_WARNING("BTIF_AV_SINK_CONFIG_REQ_EVT %d %d", req.sample_rate,
439 req.channel_count);
442 req.sample_rate, req.channel_count);
/external/chromium_org/chrome/browser/safe_browsing/
H A Dclient_side_detection_host.cc707 const ResourceRequestDetails* req = content::Details<ResourceRequestDetails>( local
709 if (req && browse_info_.get() &&
710 should_extract_malware_features_ && req->url.is_valid()) {
711 UpdateIPUrlMap(req->socket_address.host() /* ip */,
712 req->url.spec() /* url */,
713 req->method,
714 req->referrer,
715 req->resource_type);
/external/chromium_org/net/cert/
H A Dmulti_threaded_cert_verifier.cc533 void MultiThreadedCertVerifier::CancelRequest(RequestHandle req) { argument
535 CertVerifierRequest* request = reinterpret_cast<CertVerifierRequest*>(req);
/external/chromium_org/net/ssl/
H A Dchannel_id_service.cc545 void ChannelIDService::CancelRequest(ChannelIDServiceRequest* req) { argument
547 req->Cancel();
/external/chromium_org/third_party/WebKit/Source/core/loader/
H A DDocumentLoader.cpp76 DocumentLoader::DocumentLoader(LocalFrame* frame, const ResourceRequest& req, const SubstituteData& substituteData) argument
79 , m_originalRequest(req)
81 , m_request(req)
/external/chromium_org/third_party/boringssl/src/crypto/x509/
H A Dx_all.c215 X509_REQ *d2i_X509_REQ_fp(FILE *fp, X509_REQ **req) argument
217 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_REQ), fp, req);
220 int i2d_X509_REQ_fp(FILE *fp, X509_REQ *req) argument
222 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_REQ), fp, req);
226 X509_REQ *d2i_X509_REQ_bio(BIO *bp, X509_REQ **req) argument
228 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_REQ), bp, req);
231 int i2d_X509_REQ_bio(BIO *bp, X509_REQ *req) argument
233 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_REQ), bp, req);
/external/chromium_org/third_party/libXNVCtrl/
H A DNVCtrl.c157 xnvCtrlQueryExtensionReq *req; local
165 GetReq (nvCtrlQueryExtension, req);
166 req->reqType = info->codes->major_opcode;
167 req->nvReqType = X_nvCtrlQueryExtension;
187 xnvCtrlIsNvReq *req; local
196 GetReq (nvCtrlIsNv, req);
197 req->reqType = info->codes->major_opcode;
198 req->nvReqType = X_nvCtrlIsNv;
199 req->screen = screen;
219 xnvCtrlQueryTargetCountReq *req; local
252 xnvCtrlSetAttributeReq *req; local
291 xnvCtrlSetAttributeAndGetStatusReq *req; local
345 xnvCtrlQueryAttributeReq *req; local
396 xnvCtrlQueryAttributeReq *req; local
436 xnvCtrlQueryStringAttributeReq *req; local
504 xnvCtrlSetStringAttributeReq *req; local
563 xnvCtrlQueryValidAttributeValuesReq *req; local
608 xnvCtrlQueryValidAttributeValuesReq *req; local
651 xnvCtrlQueryValidAttributeValuesReq *req; local
752 xnvCtrlQueryAttributePermissionsReq *req; local
837 xnvCtrlSetGvoColorConversionReq *req; local
881 xnvCtrlQueryGvoColorConversionReq *req; local
920 xnvCtrlSelectTargetNotifyReq *req; local
949 xnvCtrlSelectNotifyReq *req; local
980 xnvCtrlQueryBinaryDataReq *req; local
1050 xnvCtrlStringOperationReq *req; local
[all...]
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/
H A Dstunport.cc439 void UDPPort::OnSendPacket(const void* data, size_t size, StunRequest* req) { argument
440 StunBindingRequest* sreq = static_cast<StunBindingRequest*>(req);
/external/dnsmasq/src/
H A Ddhcp.c308 struct arpreq req; local
311 *((struct sockaddr_in *)&req.arp_pa) = dest;
312 req.arp_ha.sa_family = mess->htype;
313 memcpy(req.arp_ha.sa_data, mess->chaddr, mess->hlen);
314 strncpy(req.arp_dev, ifr.ifr_name, 16);
315 req.arp_flags = ATF_COM;
316 ioctl(daemon->dhcpfd, SIOCSARP, &req);
333 struct arpreq req; local
336 *((struct sockaddr_in *)&req.arp_pa) = dest;
337 req
[all...]
/external/iproute2/ip/
H A Dipl2tp.c99 } req; local
101 memset(&req, 0, sizeof(req));
102 req.n.nlmsg_type = genl_family;
103 req.n.nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK;
104 req.n.nlmsg_len = NLMSG_LENGTH(GENL_HDRLEN);
105 req.g.cmd = L2TP_CMD_TUNNEL_CREATE;
106 req.g.version = L2TP_GENL_VERSION;
108 addattr32(&req.n, 1024, L2TP_ATTR_CONN_ID, p->tunnel_id);
109 addattr32(&req
132 } req; local
155 } req; local
197 } req; local
374 } req; local
417 } req; local
761 } req; local
[all...]
H A Diplink.c166 } req; local
169 memset(&req, 0, sizeof(req));
171 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg));
172 req.n.nlmsg_flags = NLM_F_REQUEST|NLM_F_ACK;
173 req.n.nlmsg_type = RTM_NEWLINK;
174 req.i.ifi_family = AF_UNSPEC;
176 rtnl_send(&rth, &req.n, req.n.nlmsg_len);
195 struct iplink_req *req)
194 iplink_parse_vf(int vf, int *argcp, char ***argvp, struct iplink_req *req) argument
273 iplink_parse(int argc, char **argv, struct iplink_req *req, char **name, char **type, char **link, char **dev, int *group) argument
473 struct iplink_req req; local
[all...]

Completed in 455 milliseconds

1234567891011>>