/external/wpa_supplicant_8/hs20/client/ |
H A D | est.c | 335 X509_REQ *req = NULL; local 381 req = X509_REQ_new(); 382 if (req == NULL) 398 res = X509_REQ_set_subject_name(req, 411 !X509_REQ_set_subject_name(req, subj)) 417 if (!X509_REQ_set_pubkey(req, pkey)) 444 if (!X509_REQ_add_extensions(req, exts)) 449 if (!X509_REQ_sign(req, pkey, EVP_sha256())) 457 X509_REQ_print(out, req); 476 X509_REQ_print_fp(f, req); 618 char *buf, *resp, *req, *req2; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | beacon.c | 334 const struct ieee80211_mgmt *req, 361 if (req) 362 os_memcpy(resp->da, req->sa, ETH_ALEN); 332 hostapd_gen_probe_resp(struct hostapd_data *hapd, struct sta_info *sta, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) argument
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_mschapv2.c | 101 struct wpabuf *req; local 114 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, 116 if (req == NULL) { 123 ms = wpabuf_put(req, sizeof(*ms)); 128 wpabuf_put_u8(req, CHALLENGE_LEN); 130 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); 132 wpabuf_put(req, CHALLENGE_LEN); 135 wpabuf_put_data(req, sm->server_id, sm->server_id_len); 137 return req; 144 struct wpabuf *req; local 188 struct wpabuf *req; local [all...] |
H A D | eap_server_tnc.c | 107 struct wpabuf *req; local 109 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, EAP_CODE_REQUEST, 111 if (req == NULL) { 118 wpabuf_put_u8(req, EAP_TNC_FLAGS_START | EAP_TNC_VERSION); 122 return req; 129 struct wpabuf *req; local 150 req = wpabuf_alloc(rlen); 151 if (req == NULL) { 157 wpabuf_put_data(req, start_buf, start_len); 160 rpos1 = wpabuf_put(req, 220 struct wpabuf *req; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | peerkey.c | 981 struct wpa_eapol_key *req; local 1050 sizeof(*req) + kde_len, &rlen, 1051 (void *) &req); 1057 req->type = EAPOL_KEY_TYPE_RSN; 1060 WPA_PUT_BE16(req->key_info, key_info); 1061 WPA_PUT_BE16(req->key_length, 0); 1062 os_memcpy(req->replay_counter, sm->request_counter, 1073 os_memcpy(req->key_nonce, peerkey->inonce, WPA_NONCE_LEN); 1075 req->key_nonce, WPA_NONCE_LEN); 1077 WPA_PUT_BE16(req [all...] |
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_upnp_ssdp.c | 877 struct ifreq req; local 878 os_memset(&req, 0, sizeof(req)); 879 os_strlcpy(req.ifr_name, forced_ifname, sizeof(req.ifr_name)); 880 if (setsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, &req, 881 sizeof(req)) < 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | gas_query.c | 42 struct wpabuf *req; member in struct:gas_query_pending 133 wpabuf_free(query->req); 257 struct wpabuf *req) 264 (unsigned int) wpabuf_len(req), query->freq, prot); 266 u8 *categ = wpabuf_mhead_u8(req); 276 wpabuf_head(req), wpabuf_len(req), 287 struct wpabuf *req; local 289 req = gas_build_comeback_req(query->dialog_token); 290 if (req 256 gas_query_tx(struct gas_query *gas, struct gas_query_pending *query, struct wpabuf *req) argument 650 gas_query_req(struct gas_query *gas, const u8 *dst, int freq, struct wpabuf *req, void (*cb)(void *ctx, const u8 *dst, u8 dialog_token, enum gas_query_result result, const struct wpabuf *adv_proto, const struct wpabuf *resp, u16 status_code), void *ctx) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | beacon.c | 334 const struct ieee80211_mgmt *req, 361 if (req) 362 os_memcpy(resp->da, req->sa, ETH_ALEN); 332 hostapd_gen_probe_resp(struct hostapd_data *hapd, struct sta_info *sta, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_mschapv2.c | 101 struct wpabuf *req; local 114 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, 116 if (req == NULL) { 123 ms = wpabuf_put(req, sizeof(*ms)); 128 wpabuf_put_u8(req, CHALLENGE_LEN); 130 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); 132 wpabuf_put(req, CHALLENGE_LEN); 135 wpabuf_put_data(req, sm->server_id, sm->server_id_len); 137 return req; 144 struct wpabuf *req; local 188 struct wpabuf *req; local [all...] |
H A D | eap_server_tnc.c | 107 struct wpabuf *req; local 109 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, EAP_CODE_REQUEST, 111 if (req == NULL) { 118 wpabuf_put_u8(req, EAP_TNC_FLAGS_START | EAP_TNC_VERSION); 122 return req; 129 struct wpabuf *req; local 150 req = wpabuf_alloc(rlen); 151 if (req == NULL) { 157 wpabuf_put_data(req, start_buf, start_len); 160 rpos1 = wpabuf_put(req, 220 struct wpabuf *req; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | peerkey.c | 981 struct wpa_eapol_key *req; local 1050 sizeof(*req) + kde_len, &rlen, 1051 (void *) &req); 1057 req->type = EAPOL_KEY_TYPE_RSN; 1060 WPA_PUT_BE16(req->key_info, key_info); 1061 WPA_PUT_BE16(req->key_length, 0); 1062 os_memcpy(req->replay_counter, sm->request_counter, 1073 os_memcpy(req->key_nonce, peerkey->inonce, WPA_NONCE_LEN); 1075 req->key_nonce, WPA_NONCE_LEN); 1077 WPA_PUT_BE16(req [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_upnp_ssdp.c | 877 struct ifreq req; local 878 os_memset(&req, 0, sizeof(req)); 879 os_strlcpy(req.ifr_name, forced_ifname, sizeof(req.ifr_name)); 880 if (setsockopt(sd, SOL_SOCKET, SO_BINDTODEVICE, &req, 881 sizeof(req)) < 0) {
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.equinox.p2.director_2.0.3.R36x_v20101117-1018.jar | ... .eclipse.equinox.p2.metadata.IRequirement req public void " href="/5.1.0_r1/s? ... |
/external/apache-http/src/org/apache/http/impl/client/ |
H A D | AbstractHttpClient.java | 606 * @param req the request that will be executed 610 protected HttpParams determineParams(HttpRequest req) { argument 612 (null, getParams(), req.getParams(), null);
|
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_av.c | 434 btif_av_sink_config_req_t req; local 436 memcpy(&req, p_data, sizeof(req)); 438 BTIF_TRACE_WARNING("BTIF_AV_SINK_CONFIG_REQ_EVT %d %d", req.sample_rate, 439 req.channel_count); 442 req.sample_rate, req.channel_count);
|
/external/chromium_org/chrome/browser/safe_browsing/ |
H A D | client_side_detection_host.cc | 707 const ResourceRequestDetails* req = content::Details<ResourceRequestDetails>( local 709 if (req && browse_info_.get() && 710 should_extract_malware_features_ && req->url.is_valid()) { 711 UpdateIPUrlMap(req->socket_address.host() /* ip */, 712 req->url.spec() /* url */, 713 req->method, 714 req->referrer, 715 req->resource_type);
|
/external/chromium_org/net/cert/ |
H A D | multi_threaded_cert_verifier.cc | 533 void MultiThreadedCertVerifier::CancelRequest(RequestHandle req) { argument 535 CertVerifierRequest* request = reinterpret_cast<CertVerifierRequest*>(req);
|
/external/chromium_org/net/ssl/ |
H A D | channel_id_service.cc | 545 void ChannelIDService::CancelRequest(ChannelIDServiceRequest* req) { argument 547 req->Cancel();
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
H A D | DocumentLoader.cpp | 76 DocumentLoader::DocumentLoader(LocalFrame* frame, const ResourceRequest& req, const SubstituteData& substituteData) argument 79 , m_originalRequest(req) 81 , m_request(req)
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
H A D | x_all.c | 215 X509_REQ *d2i_X509_REQ_fp(FILE *fp, X509_REQ **req) argument 217 return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_REQ), fp, req); 220 int i2d_X509_REQ_fp(FILE *fp, X509_REQ *req) argument 222 return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_REQ), fp, req); 226 X509_REQ *d2i_X509_REQ_bio(BIO *bp, X509_REQ **req) argument 228 return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_REQ), bp, req); 231 int i2d_X509_REQ_bio(BIO *bp, X509_REQ *req) argument 233 return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_REQ), bp, req);
|
/external/chromium_org/third_party/libXNVCtrl/ |
H A D | NVCtrl.c | 157 xnvCtrlQueryExtensionReq *req; local 165 GetReq (nvCtrlQueryExtension, req); 166 req->reqType = info->codes->major_opcode; 167 req->nvReqType = X_nvCtrlQueryExtension; 187 xnvCtrlIsNvReq *req; local 196 GetReq (nvCtrlIsNv, req); 197 req->reqType = info->codes->major_opcode; 198 req->nvReqType = X_nvCtrlIsNv; 199 req->screen = screen; 219 xnvCtrlQueryTargetCountReq *req; local 252 xnvCtrlSetAttributeReq *req; local 291 xnvCtrlSetAttributeAndGetStatusReq *req; local 345 xnvCtrlQueryAttributeReq *req; local 396 xnvCtrlQueryAttributeReq *req; local 436 xnvCtrlQueryStringAttributeReq *req; local 504 xnvCtrlSetStringAttributeReq *req; local 563 xnvCtrlQueryValidAttributeValuesReq *req; local 608 xnvCtrlQueryValidAttributeValuesReq *req; local 651 xnvCtrlQueryValidAttributeValuesReq *req; local 752 xnvCtrlQueryAttributePermissionsReq *req; local 837 xnvCtrlSetGvoColorConversionReq *req; local 881 xnvCtrlQueryGvoColorConversionReq *req; local 920 xnvCtrlSelectTargetNotifyReq *req; local 949 xnvCtrlSelectNotifyReq *req; local 980 xnvCtrlQueryBinaryDataReq *req; local 1050 xnvCtrlStringOperationReq *req; local [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | stunport.cc | 439 void UDPPort::OnSendPacket(const void* data, size_t size, StunRequest* req) { argument 440 StunBindingRequest* sreq = static_cast<StunBindingRequest*>(req);
|
/external/dnsmasq/src/ |
H A D | dhcp.c | 308 struct arpreq req; local 311 *((struct sockaddr_in *)&req.arp_pa) = dest; 312 req.arp_ha.sa_family = mess->htype; 313 memcpy(req.arp_ha.sa_data, mess->chaddr, mess->hlen); 314 strncpy(req.arp_dev, ifr.ifr_name, 16); 315 req.arp_flags = ATF_COM; 316 ioctl(daemon->dhcpfd, SIOCSARP, &req); 333 struct arpreq req; local 336 *((struct sockaddr_in *)&req.arp_pa) = dest; 337 req [all...] |
/external/iproute2/ip/ |
H A D | ipl2tp.c | 99 } req; local 101 memset(&req, 0, sizeof(req)); 102 req.n.nlmsg_type = genl_family; 103 req.n.nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK; 104 req.n.nlmsg_len = NLMSG_LENGTH(GENL_HDRLEN); 105 req.g.cmd = L2TP_CMD_TUNNEL_CREATE; 106 req.g.version = L2TP_GENL_VERSION; 108 addattr32(&req.n, 1024, L2TP_ATTR_CONN_ID, p->tunnel_id); 109 addattr32(&req 132 } req; local 155 } req; local 197 } req; local 374 } req; local 417 } req; local 761 } req; local [all...] |
H A D | iplink.c | 166 } req; local 169 memset(&req, 0, sizeof(req)); 171 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)); 172 req.n.nlmsg_flags = NLM_F_REQUEST|NLM_F_ACK; 173 req.n.nlmsg_type = RTM_NEWLINK; 174 req.i.ifi_family = AF_UNSPEC; 176 rtnl_send(&rth, &req.n, req.n.nlmsg_len); 195 struct iplink_req *req) 194 iplink_parse_vf(int vf, int *argcp, char ***argvp, struct iplink_req *req) argument 273 iplink_parse(int argc, char **argv, struct iplink_req *req, char **name, char **type, char **link, char **dev, int *group) argument 473 struct iplink_req req; local [all...] |