/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_aka.c | 899 const struct wpabuf *req, 904 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, 906 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); 898 eap_aka_verify_mac(struct eap_aka_data *data, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
|
H A D | eap_server_pwd.c | 425 struct wpabuf *req; local 436 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PWD, 438 if (req == NULL) { 444 wpabuf_put_u8(req, EAP_PWD_OPCODE_ID_EXCH); 447 wpabuf_put_u8(req, EAP_PWD_OPCODE_COMMIT_EXCH); 450 wpabuf_put_u8(req, EAP_PWD_OPCODE_CONFIRM_EXCH); 454 wpabuf_free(req); 457 return req; 513 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PWD, 517 if (req [all...] |
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_group.c | 897 struct wpabuf *req; local 916 req = p2p_build_go_disc_req(); 917 if (req == NULL) 927 wpabuf_head(req), wpabuf_len(req), 200) < 0) 932 wpabuf_free(req);
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_upnp.c | 887 struct ifreq req; local 900 os_strlcpy(req.ifr_name, net_if, sizeof(req.ifr_name)); 901 if (ioctl(sock, SIOCGIFADDR, &req) < 0) { 906 addr = (void *) &req.ifr_addr; 912 os_strlcpy(req.ifr_name, net_if, sizeof(req.ifr_name)); 913 if (ioctl(sock, SIOCGIFHWADDR, &req) < 0) { 918 os_memcpy(mac, req.ifr_addr.sa_data, 6);
|
H A D | wps_upnp_web.c | 311 } req; local 330 req = GET_DEVICE_XML_FILE; 344 req = GET_SCPD_XML_FILE; 393 switch (req) { 685 static void web_connection_send_reply(struct http_request *req, argument 714 http_request_deinit(req); 787 http_request_send_and_deinit(req, buf); 791 static const char * web_get_action(struct http_request *req, argument 801 b = http_request_get_hdr_line(req, "SOAPAction:"); 850 struct http_request *req, 848 web_connection_parse_post(struct upnp_wps_device_sm *sm, struct sockaddr_in *cli, struct http_request *req, const char *filename) argument 913 web_connection_parse_subscribe(struct upnp_wps_device_sm *sm, struct http_request *req, const char *filename) argument 1133 web_connection_parse_unsubscribe(struct upnp_wps_device_sm *sm, struct http_request *req, const char *filename) argument 1253 web_connection_unimplemented(struct http_request *req) argument 1269 web_connection_check_data(void *ctx, struct http_request *req) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument 173 if (mac == NULL || wpabuf_len(req) < EAP_SIM_MAC_LEN || 174 mac < wpabuf_head_u8(req) || 175 mac > wpabuf_head_u8(req) + wpabuf_len(req) - EAP_SIM_MAC_LEN) 178 tmp = os_malloc(wpabuf_len(req)); 183 len[0] = wpabuf_len(req); 188 os_memcpy(tmp, wpabuf_head(req), wpabuf_len(req)); 189 os_memset(tmp + (mac - wpabuf_head_u8(req)), 360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_mschapv2.c | 233 * @req: Pointer to EAP-MSCHAPv2 header from the request 241 struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, 252 if (req_len < sizeof(*req) + 1) { 258 pos = (const u8 *) (req + 1); 260 len = req_len - sizeof(*req) - 1; 292 return eap_mschapv2_challenge_reply(sm, data, id, req->mschapv2_id, 338 * @req: Pointer to EAP-MSCHAPv2 header from the request 347 const struct eap_mschapv2_hdr *req, 355 len = req_len - sizeof(*req); 356 pos = (const u8 *) (req 239 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 344 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 503 eap_mschapv2_change_password( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id) argument 638 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument [all...] |
H A D | eap_peap.c | 455 * @req: EAP-TLV request to be processed. The caller must have validated that 467 const struct wpabuf *req, struct wpabuf **resp, 477 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, req, &left); 511 *resp = eap_tlv_build_nak(eap_get_id(req), 582 eap_get_id(req), resp_status); 592 struct wpabuf *req, 595 struct eap_hdr *hdr = wpabuf_mhead(req); 614 if (eap_tlv_process(sm, data, &iret, req, resp, 635 req, &eleft); 712 &iret, req); 465 eap_tlv_process(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct wpabuf *req, struct wpabuf **resp, int force_failure) argument 589 eap_peap_phase2_request(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, struct wpabuf *req, struct wpabuf **resp) argument 734 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument 964 const struct eap_hdr *req; local [all...] |
H A D | eap_sim.c | 163 char req[200], *pos, *end; local 167 pos = req; 168 end = pos + sizeof(req); 176 eap_sm_request_sim(sm, req); 1029 const struct eap_hdr *req; local 1049 req = wpabuf_head(reqData); 1050 id = req->identifier; 1051 len = be_to_host16(req->length);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_aka.c | 899 const struct wpabuf *req, 904 return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra, 906 return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len); 898 eap_aka_verify_mac(struct eap_aka_data *data, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument
|
H A D | eap_server_pwd.c | 425 struct wpabuf *req; local 436 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PWD, 438 if (req == NULL) { 444 wpabuf_put_u8(req, EAP_PWD_OPCODE_ID_EXCH); 447 wpabuf_put_u8(req, EAP_PWD_OPCODE_COMMIT_EXCH); 450 wpabuf_put_u8(req, EAP_PWD_OPCODE_CONFIRM_EXCH); 454 wpabuf_free(req); 457 return req; 513 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PWD, 517 if (req [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_group.c | 897 struct wpabuf *req; local 916 req = p2p_build_go_disc_req(); 917 if (req == NULL) 927 wpabuf_head(req), wpabuf_len(req), 200) < 0) 932 wpabuf_free(req);
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_upnp.c | 887 struct ifreq req; local 900 os_strlcpy(req.ifr_name, net_if, sizeof(req.ifr_name)); 901 if (ioctl(sock, SIOCGIFADDR, &req) < 0) { 906 addr = (void *) &req.ifr_addr; 912 os_strlcpy(req.ifr_name, net_if, sizeof(req.ifr_name)); 913 if (ioctl(sock, SIOCGIFHWADDR, &req) < 0) { 918 os_memcpy(mac, req.ifr_addr.sa_data, 6);
|
H A D | wps_upnp_web.c | 311 } req; local 330 req = GET_DEVICE_XML_FILE; 344 req = GET_SCPD_XML_FILE; 393 switch (req) { 685 static void web_connection_send_reply(struct http_request *req, argument 714 http_request_deinit(req); 787 http_request_send_and_deinit(req, buf); 791 static const char * web_get_action(struct http_request *req, argument 801 b = http_request_get_hdr_line(req, "SOAPAction:"); 850 struct http_request *req, 848 web_connection_parse_post(struct upnp_wps_device_sm *sm, struct sockaddr_in *cli, struct http_request *req, const char *filename) argument 913 web_connection_parse_subscribe(struct upnp_wps_device_sm *sm, struct http_request *req, const char *filename) argument 1133 web_connection_parse_unsubscribe(struct upnp_wps_device_sm *sm, struct http_request *req, const char *filename) argument 1253 web_connection_unimplemented(struct http_request *req) argument 1269 web_connection_check_data(void *ctx, struct http_request *req) argument [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | javax.servlet_2.5.0.v200910301333.jar | META-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ... |
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_core.c | 1198 btif_storage_req_t req; local 1206 memset(&(req.read_req.bd_addr), 0, sizeof(bt_bdaddr_t)); 1207 req.read_req.type = type; 1211 (char*)&req, sizeof(btif_storage_req_t), NULL); 1227 btif_storage_req_t req; local 1318 memset(&(req.write_req.bd_addr), 0, sizeof(bt_bdaddr_t)); 1319 memcpy(&(req.write_req.prop), property, sizeof(bt_property_t)); 1323 (char*)&req, 1344 btif_storage_req_t req; local 1349 memcpy(&(req 1368 btif_storage_req_t req; local 1394 btif_storage_req_t req; local [all...] |
/external/chromium_org/google_apis/gaia/ |
H A D | oauth2_token_service.cc | 624 const RequestImpl* req = requests[i].get(); local 625 if (req) { 628 req->GetAccountId(), req->GetConsumerId(),
|
/external/chromium_org/net/dns/ |
H A D | host_resolver_impl_unittest.cc | 486 Request* req = new Request( local 488 requests_.push_back(req); 489 return req; 546 Request* req = CreateRequest("just.testing", 80); local 547 EXPECT_EQ(ERR_IO_PENDING, req->Resolve()); 548 EXPECT_EQ(OK, req->WaitForResult()); 550 EXPECT_TRUE(req->HasOneAddress("192.168.1.42", 80)); 559 Request* req = CreateRequest("just.testing", 80); local 560 EXPECT_EQ(ERR_IO_PENDING, req->Resolve()); 561 EXPECT_EQ(ERR_NAME_NOT_RESOLVED, req 571 Request* req = CreateRequest("just.testing", 80); local 613 Request* req = CreateRequest("127.1.2.3", 5555); local 628 Request* req = CreateRequest("2001:db8::1", 5555); local 641 Request* req = CreateRequest(std::string(), 5555); local 656 Request* req = CreateRequest(std::string(i, '.'), 5555); local 670 Request* req = CreateRequest(std::string(4097, 'a'), 5555); local 897 Request* req = CreateRequest("host1", 70); local 917 Request* req = CreateRequest("host1", 70); local 1310 Request* req = CreateRequest(info, DEFAULT_PRIORITY); local 1653 Request* req = CreateRequest("ok_1", 80); local 1707 Request* req = CreateRequest("ok_last", 80); local 1746 Request* req = CreateRequest(info, DEFAULT_PRIORITY); local [all...] |
/external/chromium_org/net/ocsp/ |
H A D | nss_ocsp.cc | 654 OCSPRequestSession* req = ocsp_session->CreateRequest(http_protocol_variant, local 659 if (req) { 660 req->AddRef(); // Release in OCSPFree(). 663 *pRequest = req; 672 OCSPRequestSession* req = reinterpret_cast<OCSPRequestSession*>(request); local 674 req->SetPostData(http_data, http_data_len, http_content_type); 683 OCSPRequestSession* req = reinterpret_cast<OCSPRequestSession*>(request); local 685 req->AddHeader(http_header_name, http_header_value); 689 // Sets response of |req| in the output parameters. 693 SECStatus OCSPSetResponse(OCSPRequestSession* req, argument 742 OCSPRequestSession* req = reinterpret_cast<OCSPRequestSession*>(request); local 850 OCSPRequestSession* req = reinterpret_cast<OCSPRequestSession*>(request); local [all...] |
/external/chromium_org/ppapi/native_client/tools/browser_tester/browserdata/ |
H A D | nacltest.js | 101 function handleRPCResponse(name, req) { 102 if (req.status == 200) { 103 if (req.responseText == 'Die, please') { 106 } else if (req.responseText != 'OK') { 108 req.responseText + '\' - If you are running this test ' + 113 handleRPCFailure(name, req.status.toString()); 136 var req = new XMLHttpRequest(); 139 req.onreadystatechange = function() { 140 if (req.readyState == XMLHttpRequest.DONE) { 141 handleRPCResponse(name, req); [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | relayport.cc | 80 void OnSendPacket(const void* data, size_t size, StunRequest* req); 432 StunRequest* req) { 431 OnSendPacket(const void* data, size_t size, StunRequest* req) argument
|
H A D | turnport.cc | 725 void TurnPort::SendRequest(StunRequest* req, int delay) { argument 726 request_manager_.SendDelayed(req, delay);
|
H A D | turnserver.cc | 121 void SendBadRequestResponse(const TurnMessage* req); 122 void SendErrorResponse(const TurnMessage* req, int code, 186 static bool InitResponse(const StunMessage* req, StunMessage* resp) { argument 187 int resp_type = (req) ? GetStunSuccessResponseType(req->type()) : -1; 191 resp->SetTransactionID(req->transaction_id()); 195 static bool InitErrorResponse(const StunMessage* req, int code, argument 197 int resp_type = (req) ? GetStunErrorResponseType(req->type()) : -1; 201 resp->SetTransactionID(req 439 HandleBindingRequest(Connection* conn, const StunMessage* req) argument 541 SendErrorResponse(Connection* conn, const StunMessage* req, int code, const std::string& reason) argument 952 SendBadRequestResponse(const TurnMessage* req) argument 956 SendErrorResponse(const TurnMessage* req, int code, const std::string& reason) argument [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/winsys/svga/drm/ |
H A D | vmwgfx_drm.h | 200 * @req: Input data as described above. 207 struct drm_vmw_surface_create_req req; member in union:drm_vmw_surface_create_arg 228 * @req: Input data as described above. 235 struct drm_vmw_surface_arg req; member in union:drm_vmw_surface_reference_arg 376 * @req: Input data as described above. 383 struct drm_vmw_alloc_dmabuf_req req; member in union:drm_vmw_alloc_dmabuf_arg
|
/external/chromium_org/third_party/mesa/src/src/glx/ |
H A D | indirect_vertex_array.c | 695 unsigned req; local 698 for (req = 2; req <= total_requests; req++) { 711 __glXSendLargeChunk(gc, req, total_requests, gc->pc, pc - gc->pc); 799 unsigned req; local 810 req = 2; 847 __glXSendLargeChunk(gc, req, total_requests, gc->pc, pc - gc->pc); 849 req++; 857 assert((total_requests == 0) || ((req [all...] |