/external/openssl/android.testssl/ |
H A D | Uss.cnf | 9 [ req ]
|
/external/valgrind/main/coregrind/m_debuginfo/ |
H A D | image.c | 215 static Frame* do_transaction ( Int sd, Frame* req ) 218 req->data[0], req->data[1], req->data[2], req->data[3]); 229 write_UInt_le(&wr_first8[4], req->n_data); 232 adler = VG_(adler32)(adler, req->data, req->n_data); 237 vg_assert(req->n_data >= 4); // else ill formed -- no KIND field 238 r = my_write(sd, req 469 Frame* req local 667 Frame* req = mk_Frame_noargs("VERS"); local 1003 Frame* req = mk_Frame_noargs("CRC3"); local [all...] |
/external/wpa_supplicant_8/hs20/server/ca/ |
H A D | setup.sh | 26 $OPENSSL req -config openssl.cnf.tmp -batch -new -newkey rsa:4096 -keyout rootCA/private/cakey.pem -out rootCA/careq.pem || fail "Failed to generate Root CA private key" 45 $OPENSSL req -config openssl.cnf.tmp -batch -new -newkey rsa:2048 -keyout demoCA/private/cakey.pem -out demoCA/careq.pem || fail "Failed to generate Intermediate CA private key" 60 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out ocsp.csr -keyout ocsp.key -extensions v3_OCSP 68 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out server-revoked.csr -keyout server-revoked.key 77 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out server-client.csr -keyout server-client.key 85 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -out user.csr -keyout user.key 102 echo $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -sha256 -new -newkey rsa:2048 -nodes -out server.csr -keyout server.key -reqexts v3_osu_server 103 $OPENSSL req -config $PWD/openssl.cnf.tmp -batch -sha256 -new -newkey rsa:2048 -nodes -out server.csr -keyout server.key -reqexts v3_osu_server || fail "Failed to generate server request"
|
/external/chromium_org/third_party/libjpeg_turbo/simd/ |
H A D | jsimd_arm_neon.S | 201 DCT_TABLE .req r0 202 COEF_BLOCK .req r1 203 OUTPUT_BUF .req r2 204 OUTPUT_COL .req r3 205 TMP1 .req r0 206 TMP2 .req r1 207 TMP3 .req r2 208 TMP4 .req ip 210 ROW0L .req d16 211 ROW0R .req d1 [all...] |
/external/chromium_org/chrome/common/extensions/docs/examples/extensions/news/javascript/ |
H A D | options.js | 49 var req = new XMLHttpRequest(); 50 req.onload = handleResponse; 51 req.onerror = handleError; 52 req.open('GET', DEFAULT_NEWS_URL, true); 53 req.send(null); 63 var doc = req.responseXML;
|
/external/chromium_org/net/data/ssl/scripts/ |
H A D | generate-multi-root-test-chains.sh | 43 try openssl req \ 52 -req -days 3650 \ 63 try openssl req \ 72 -req -days 3650 \ 83 try openssl req \ 94 try openssl req \ 137 try openssl req \
|
/external/chromium_org/third_party/mesa/src/src/glx/ |
H A D | packsingle.h | 46 ** to req->reqType with the proper code (our extension code). 56 xGLXSingleReq *req 70 GetReqExtra(GLXSingle,bytes,req); \ 71 req->reqType = gc->majorOpcode; \ 72 req->glxCode = opcode; \ 73 req->contextTag = gc->currentContextTag; \ 74 pc = ((GLubyte *)(req) + sz_xGLXSingleReq)
|
/external/mesa3d/src/glx/ |
H A D | packsingle.h | 46 ** to req->reqType with the proper code (our extension code). 56 xGLXSingleReq *req 70 GetReqExtra(GLXSingle,bytes,req); \ 71 req->reqType = gc->majorOpcode; \ 72 req->glxCode = opcode; \ 73 req->contextTag = gc->currentContextTag; \ 74 pc = ((GLubyte *)(req) + sz_xGLXSingleReq)
|
/external/openssl/crypto/ocsp/ |
H A D | ocsp_srv.c | 72 int OCSP_request_onereq_count(OCSP_REQUEST *req) argument 74 return sk_OCSP_ONEREQ_num(req->tbsRequest->requestList); 77 OCSP_ONEREQ *OCSP_request_onereq_get0(OCSP_REQUEST *req, int i) argument 79 return sk_OCSP_ONEREQ_value(req->tbsRequest->requestList, i); 99 int OCSP_request_is_signed(OCSP_REQUEST *req) argument 101 if(req->optionalSignature) return 1;
|
H A D | ocsp.h | 411 OCSP_RESPONSE *OCSP_sendreq_bio(BIO *b, char *path, OCSP_REQUEST *req); 412 OCSP_REQ_CTX *OCSP_sendreq_new(BIO *io, char *path, OCSP_REQUEST *req, 416 int OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, OCSP_REQUEST *req); 427 OCSP_ONEREQ *OCSP_request_add0_id(OCSP_REQUEST *req, OCSP_CERTID *cid); 429 int OCSP_request_add1_nonce(OCSP_REQUEST *req, unsigned char *val, int len); 431 int OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *bs); 432 int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req); 434 int OCSP_request_set1_name(OCSP_REQUEST *req, X509_NAME *nm); 435 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert); 437 int OCSP_request_sign(OCSP_REQUEST *req, [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.equinox.p2.director_2.0.3.R36x_v20101117-1018.jar | ... .eclipse.equinox.p2.metadata.IRequirement req public void " href="/5.1.0_r1/s? ... |
/external/chromium_org/third_party/usrsctp/usrsctplib/netinet/ |
H A D | sctp_sysctl.c | 228 sctp_sysctl_copy_out_local_addresses(struct sctp_inpcb *inp, struct sctp_tcb *stcb, struct sysctl_req *req) argument 385 error = SYSCTL_OUT(req, &xladdr, sizeof(struct xsctp_laddr)); 405 error = SYSCTL_OUT(req, &xladdr, sizeof(struct xsctp_laddr)); 418 error = SYSCTL_OUT(req, &xladdr, sizeof(struct xsctp_laddr)); 463 if (req->oldptr == USER_ADDR_NULL) { 465 if (req->oldptr == NULL) { 488 req->oldidx = (n + n / 8); 490 req->dataidx = (n + n / 8); 495 if (req->newptr != USER_ADDR_NULL) { 497 if (req [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_ikev2.c | 136 struct wpabuf *req; local 171 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen, 173 if (req == NULL) 176 wpabuf_put_u8(req, flags); /* Flags */ 178 wpabuf_put_be32(req, wpabuf_len(data->out_buf)); 180 wpabuf_put_data(req, wpabuf_head_u8(data->out_buf) + data->out_used, 185 const u8 *msg = wpabuf_head(req); 186 size_t len = wpabuf_len(req); 190 msg, len, wpabuf_put(req, icv_len)); 208 return req; [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_ikev2.c | 136 struct wpabuf *req; local 171 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen, 173 if (req == NULL) 176 wpabuf_put_u8(req, flags); /* Flags */ 178 wpabuf_put_be32(req, wpabuf_len(data->out_buf)); 180 wpabuf_put_data(req, wpabuf_head_u8(data->out_buf) + data->out_used, 185 const u8 *msg = wpabuf_head(req); 186 size_t len = wpabuf_len(req); 190 msg, len, wpabuf_put(req, icv_len)); 208 return req; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ikev2.c | 136 struct wpabuf *req; local 171 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen, 173 if (req == NULL) 176 wpabuf_put_u8(req, flags); /* Flags */ 178 wpabuf_put_be32(req, wpabuf_len(data->out_buf)); 180 wpabuf_put_data(req, wpabuf_head_u8(data->out_buf) + data->out_used, 185 const u8 *msg = wpabuf_head(req); 186 size_t len = wpabuf_len(req); 190 msg, len, wpabuf_put(req, icv_len)); 208 return req; [all...] |
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/test/ |
H A D | test_msgutil.py | 83 req = mock.MockRequest(connection=mock.MockConn(''.join(read_data))) 84 req.ws_version = common.VERSION_HYBI_LATEST 87 req.ws_extension_processors = [] 90 _install_extension_processor(processor, req, stream_options) 94 _install_extension_processor(processor, req, stream_options) 98 _install_extension_processor(processor, req, stream_options) 100 req.ws_stream = Stream(req, stream_options) 101 return req 125 req [all...] |
/external/valgrind/main/auxprogs/ |
H A D | valgrind-di-server.c | 668 Frame* req = NULL; /* the request frame that we receive */ local 689 assert(req == NULL); 690 req = calloc(sizeof(Frame), 1); 691 req->n_data = rd_len; 692 req->data = calloc(rd_len, 1); 694 Int r = my_read(sd, req->data, req->n_data); 697 //printf("SERVER: recv %c%c%c%c\n", req->data[0], req->data[1], req 961 struct timespec req; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument 173 if (mac == NULL || wpabuf_len(req) < EAP_SIM_MAC_LEN || 174 mac < wpabuf_head_u8(req) || 175 mac > wpabuf_head_u8(req) + wpabuf_len(req) - EAP_SIM_MAC_LEN) 178 tmp = os_malloc(wpabuf_len(req)); 183 len[0] = wpabuf_len(req); 188 os_memcpy(tmp, wpabuf_head(req), wpabuf_len(req)); 189 os_memset(tmp + (mac - wpabuf_head_u8(req)), 360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.c | 165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument 173 if (mac == NULL || wpabuf_len(req) < EAP_SIM_MAC_LEN || 174 mac < wpabuf_head_u8(req) || 175 mac > wpabuf_head_u8(req) + wpabuf_len(req) - EAP_SIM_MAC_LEN) 178 tmp = os_malloc(wpabuf_len(req)); 183 len[0] = wpabuf_len(req); 188 os_memcpy(tmp, wpabuf_head(req), wpabuf_len(req)); 189 os_memset(tmp + (mac - wpabuf_head_u8(req)), 360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 165 int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req, argument 173 if (mac == NULL || wpabuf_len(req) < EAP_SIM_MAC_LEN || 174 mac < wpabuf_head_u8(req) || 175 mac > wpabuf_head_u8(req) + wpabuf_len(req) - EAP_SIM_MAC_LEN) 178 tmp = os_malloc(wpabuf_len(req)); 183 len[0] = wpabuf_len(req); 188 os_memcpy(tmp, wpabuf_head(req), wpabuf_len(req)); 189 os_memset(tmp + (mac - wpabuf_head_u8(req)), 360 eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req, const u8 *mac, const u8 *extra, size_t extra_len) argument [all...] |
/external/chromium_org/net/dns/ |
H A D | host_resolver_impl.cc | 1247 Request* req = *it; local 1248 if (req->was_canceled()) 1250 DCHECK_EQ(this, req->job()); 1251 LogCancelRequest(req->source_net_log(), req->request_net_log(), 1252 req->info()); 1275 void AddRequest(scoped_ptr<Request> req) { argument 1276 DCHECK_EQ(key_.hostname, req->info().hostname()); 1278 req->set_job(this); 1279 priority_tracker_.Add(req 1305 CancelRequest(Request* req) argument 1696 Request* req = *it; local 1976 Request* req = reinterpret_cast<Request*>(req_handle); local [all...] |
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_er.c | 223 struct wpabuf *req; local 245 req = wpabuf_alloc(os_strlen(ap->event_sub_url) + 1000); 246 if (req == NULL) { 251 wpabuf_printf(req, 259 wpabuf_head(req), wpabuf_len(req)); 261 ap->http = http_client_addr(&dst, req, 1000, 264 wpabuf_free(req); 428 struct wpabuf *req; local 449 req 709 wps_er_http_resp_not_found(struct http_request *req) argument 728 wps_er_http_resp_ok(struct http_request *req) argument 1152 wps_er_http_event(struct wps_er *er, struct http_request *req, unsigned int ap_id) argument 1188 wps_er_http_notify(struct wps_er *er, struct http_request *req) argument 1214 wps_er_http_req(void *ctx, struct http_request *req) argument [all...] |
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_er.c | 223 struct wpabuf *req; local 245 req = wpabuf_alloc(os_strlen(ap->event_sub_url) + 1000); 246 if (req == NULL) { 251 wpabuf_printf(req, 259 wpabuf_head(req), wpabuf_len(req)); 261 ap->http = http_client_addr(&dst, req, 1000, 264 wpabuf_free(req); 428 struct wpabuf *req; local 449 req 709 wps_er_http_resp_not_found(struct http_request *req) argument 728 wps_er_http_resp_ok(struct http_request *req) argument 1152 wps_er_http_event(struct wps_er *er, struct http_request *req, unsigned int ap_id) argument 1188 wps_er_http_notify(struct wps_er *er, struct http_request *req) argument 1214 wps_er_http_req(void *ctx, struct http_request *req) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_er.c | 223 struct wpabuf *req; local 245 req = wpabuf_alloc(os_strlen(ap->event_sub_url) + 1000); 246 if (req == NULL) { 251 wpabuf_printf(req, 259 wpabuf_head(req), wpabuf_len(req)); 261 ap->http = http_client_addr(&dst, req, 1000, 264 wpabuf_free(req); 428 struct wpabuf *req; local 449 req 709 wps_er_http_resp_not_found(struct http_request *req) argument 728 wps_er_http_resp_ok(struct http_request *req) argument 1152 wps_er_http_event(struct wps_er *er, struct http_request *req, unsigned int ap_id) argument 1188 wps_er_http_notify(struct wps_er *er, struct http_request *req) argument 1214 wps_er_http_req(void *ctx, struct http_request *req) argument [all...] |
/external/openssl/include/openssl/ |
H A D | ocsp.h | 411 OCSP_RESPONSE *OCSP_sendreq_bio(BIO *b, char *path, OCSP_REQUEST *req); 412 OCSP_REQ_CTX *OCSP_sendreq_new(BIO *io, char *path, OCSP_REQUEST *req, 416 int OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, OCSP_REQUEST *req); 427 OCSP_ONEREQ *OCSP_request_add0_id(OCSP_REQUEST *req, OCSP_CERTID *cid); 429 int OCSP_request_add1_nonce(OCSP_REQUEST *req, unsigned char *val, int len); 431 int OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *bs); 432 int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req); 434 int OCSP_request_set1_name(OCSP_REQUEST *req, X509_NAME *nm); 435 int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert); 437 int OCSP_request_sign(OCSP_REQUEST *req, [all...] |