Searched refs:req (Results 276 - 300 of 663) sorted by relevance

<<11121314151617181920>>

/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_mschapv2.c233 * @req: Pointer to EAP-MSCHAPv2 header from the request
241 struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req,
252 if (req_len < sizeof(*req) + 1) {
258 pos = (const u8 *) (req + 1);
260 len = req_len - sizeof(*req) - 1;
292 return eap_mschapv2_challenge_reply(sm, data, id, req->mschapv2_id,
338 * @req: Pointer to EAP-MSCHAPv2 header from the request
347 const struct eap_mschapv2_hdr *req,
355 len = req_len - sizeof(*req);
356 pos = (const u8 *) (req
239 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument
344 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument
503 eap_mschapv2_change_password( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id) argument
638 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument
[all...]
H A Deap_peap.c455 * @req: EAP-TLV request to be processed. The caller must have validated that
467 const struct wpabuf *req, struct wpabuf **resp,
477 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, req, &left);
511 *resp = eap_tlv_build_nak(eap_get_id(req),
582 eap_get_id(req), resp_status);
592 struct wpabuf *req,
595 struct eap_hdr *hdr = wpabuf_mhead(req);
614 if (eap_tlv_process(sm, data, &iret, req, resp,
635 req, &eleft);
712 &iret, req);
465 eap_tlv_process(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct wpabuf *req, struct wpabuf **resp, int force_failure) argument
589 eap_peap_phase2_request(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, struct wpabuf *req, struct wpabuf **resp) argument
734 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument
964 const struct eap_hdr *req; local
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_psk.c57 struct wpabuf *req; local
70 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK,
73 if (req == NULL) {
80 psk = wpabuf_put(req, sizeof(*psk));
83 wpabuf_put_data(req, sm->server_id, sm->server_id_len);
85 return req;
92 struct wpabuf *req; local
99 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK,
101 if (req == NULL) {
108 psk = wpabuf_put(req, sizeo
[all...]
H A Deap_server_gtc.c53 struct wpabuf *req; local
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
62 if (req == NULL) {
69 wpabuf_put_data(req, msg, msg_len);
73 return req;
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_mschapv2.c233 * @req: Pointer to EAP-MSCHAPv2 header from the request
241 struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req,
252 if (req_len < sizeof(*req) + 1) {
258 pos = (const u8 *) (req + 1);
260 len = req_len - sizeof(*req) - 1;
292 return eap_mschapv2_challenge_reply(sm, data, id, req->mschapv2_id,
338 * @req: Pointer to EAP-MSCHAPv2 header from the request
347 const struct eap_mschapv2_hdr *req,
355 len = req_len - sizeof(*req);
356 pos = (const u8 *) (req
239 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument
344 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument
503 eap_mschapv2_change_password( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id) argument
638 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument
[all...]
H A Deap_peap.c455 * @req: EAP-TLV request to be processed. The caller must have validated that
467 const struct wpabuf *req, struct wpabuf **resp,
477 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, req, &left);
511 *resp = eap_tlv_build_nak(eap_get_id(req),
582 eap_get_id(req), resp_status);
592 struct wpabuf *req,
595 struct eap_hdr *hdr = wpabuf_mhead(req);
614 if (eap_tlv_process(sm, data, &iret, req, resp,
635 req, &eleft);
712 &iret, req);
465 eap_tlv_process(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct wpabuf *req, struct wpabuf **resp, int force_failure) argument
589 eap_peap_phase2_request(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, struct wpabuf *req, struct wpabuf **resp) argument
734 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument
964 const struct eap_hdr *req; local
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_psk.c57 struct wpabuf *req; local
70 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK,
73 if (req == NULL) {
80 psk = wpabuf_put(req, sizeof(*psk));
83 wpabuf_put_data(req, sm->server_id, sm->server_id_len);
85 return req;
92 struct wpabuf *req; local
99 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK,
101 if (req == NULL) {
108 psk = wpabuf_put(req, sizeo
[all...]
H A Deap_server_gtc.c53 struct wpabuf *req; local
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
62 if (req == NULL) {
69 wpabuf_put_data(req, msg, msg_len);
73 return req;
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_mschapv2.c233 * @req: Pointer to EAP-MSCHAPv2 header from the request
241 struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req,
252 if (req_len < sizeof(*req) + 1) {
258 pos = (const u8 *) (req + 1);
260 len = req_len - sizeof(*req) - 1;
292 return eap_mschapv2_challenge_reply(sm, data, id, req->mschapv2_id,
338 * @req: Pointer to EAP-MSCHAPv2 header from the request
347 const struct eap_mschapv2_hdr *req,
355 len = req_len - sizeof(*req);
356 pos = (const u8 *) (req
239 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument
344 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument
503 eap_mschapv2_change_password( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id) argument
638 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument
[all...]
H A Deap_peap.c455 * @req: EAP-TLV request to be processed. The caller must have validated that
467 const struct wpabuf *req, struct wpabuf **resp,
477 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, req, &left);
511 *resp = eap_tlv_build_nak(eap_get_id(req),
582 eap_get_id(req), resp_status);
592 struct wpabuf *req,
595 struct eap_hdr *hdr = wpabuf_mhead(req);
614 if (eap_tlv_process(sm, data, &iret, req, resp,
635 req, &eleft);
712 &iret, req);
465 eap_tlv_process(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct wpabuf *req, struct wpabuf **resp, int force_failure) argument
589 eap_peap_phase2_request(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, struct wpabuf *req, struct wpabuf **resp) argument
734 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument
964 const struct eap_hdr *req; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_psk.c57 struct wpabuf *req; local
70 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK,
73 if (req == NULL) {
80 psk = wpabuf_put(req, sizeof(*psk));
83 wpabuf_put_data(req, sm->server_id, sm->server_id_len);
85 return req;
92 struct wpabuf *req; local
99 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK,
101 if (req == NULL) {
108 psk = wpabuf_put(req, sizeo
[all...]
H A Deap_server_gtc.c53 struct wpabuf *req; local
60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
62 if (req == NULL) {
69 wpabuf_put_data(req, msg, msg_len);
73 return req;
/external/chromium_org/chrome/common/extensions/docs/examples/extensions/news/javascript/
H A Dfeed.js21 var req; variable
27 req = new XMLHttpRequest();
28 req.onload = handleResponse;
29 req.onerror = handleError;
30 req.open('GET', feedUrl, true);
31 req.send(null);
57 var doc = req.responseXML;
/external/chromium_org/net/data/ssl/scripts/
H A Dgenerate-client-certificates.sh49 try openssl req \
60 -req -days 3650 \
71 try openssl req \
90 try openssl req \
111 try openssl req \
/external/chromium_org/v8/src/
H A Dhydrogen-representation-changes.cc75 Representation req = use_value->RequiredInputRepresentation(use_index); local
76 if (req.IsNone() || req.Equals(r)) continue;
87 if (change->from().Equals(req) && IsNonDeoptingIntToSmiChange(change)) {
93 InsertRepresentationChangeForUse(value, use_value, use_index, req);
/external/kernel-headers/original/uapi/drm/
H A Dvmwgfx_drm.h213 * @req: Input data as described above.
220 struct drm_vmw_surface_create_req req; member in union:drm_vmw_surface_create_arg
241 * @req: Input data as described above.
248 struct drm_vmw_surface_arg req; member in union:drm_vmw_surface_reference_arg
389 * @req: Input data as described above.
396 struct drm_vmw_alloc_dmabuf_req req; member in union:drm_vmw_alloc_dmabuf_arg
941 * @req: Input argument as described above.
948 struct drm_vmw_gb_surface_create_req req; member in union:drm_vmw_gb_surface_create_arg
983 * @req: Input data as described above at "struct drm_vmw_surface_arg"
990 struct drm_vmw_surface_arg req; member in union:drm_vmw_gb_surface_reference_arg
[all...]
/external/nist-sip/java/gov/nist/javax/sip/stack/
H A DDefaultRouter.java135 * RouteHeader firstRoute = (RouteHeader) req.getHeader( RouteHeader.NAME );
143 * nextHop = fixStrictRouting( req ); <--- Here, make the modifications as per RFC3261
151 * } else if ( req.getRequestURI().isSipURI() ) {
260 * request-URI added as last route header, new req-URI = top-route-URI
262 public void fixStrictRouting(SIPRequest req) { argument
264 RouteList routes = req.getRouteHeaders();
271 addr.setAddess(req.getRequestURI()); // don't clone it
275 req.setRequestURI(firstUri);
277 sipStack.getStackLogger().logDebug("post: fixStrictRouting" + req);
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius_client.c66 struct radius_msg *req,
241 static void radius_client_msg_free(struct radius_msg_list *req) argument
243 radius_msg_free(req->msg);
244 os_free(req);
267 struct radius_msg *req,
719 struct radius_msg_list *req, *prev_req; local
776 req = radius->msgs;
777 while (req) {
780 if ((req->msg_type == msg_type ||
781 (req
264 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument
[all...]
/external/wpa_supplicant_8/src/radius/
H A Dradius_client.c66 struct radius_msg *req,
241 static void radius_client_msg_free(struct radius_msg_list *req) argument
243 radius_msg_free(req->msg);
244 os_free(req);
267 struct radius_msg *req,
719 struct radius_msg_list *req, *prev_req; local
776 req = radius->msgs;
777 while (req) {
780 if ((req->msg_type == msg_type ||
781 (req
264 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius_client.c66 struct radius_msg *req,
241 static void radius_client_msg_free(struct radius_msg_list *req) argument
243 radius_msg_free(req->msg);
244 os_free(req);
267 struct radius_msg *req,
719 struct radius_msg_list *req, *prev_req; local
776 req = radius->msgs;
777 while (req) {
780 if ((req->msg_type == msg_type ||
781 (req
264 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument
[all...]
/external/bluetooth/bluedroid/btif/src/
H A Dbtif_core.c1198 btif_storage_req_t req; local
1206 memset(&(req.read_req.bd_addr), 0, sizeof(bt_bdaddr_t));
1207 req.read_req.type = type;
1211 (char*)&req, sizeof(btif_storage_req_t), NULL);
1227 btif_storage_req_t req; local
1318 memset(&(req.write_req.bd_addr), 0, sizeof(bt_bdaddr_t));
1319 memcpy(&(req.write_req.prop), property, sizeof(bt_property_t));
1323 (char*)&req,
1344 btif_storage_req_t req; local
1349 memcpy(&(req
1368 btif_storage_req_t req; local
1394 btif_storage_req_t req; local
[all...]
/external/chromium_org/ppapi/native_client/tools/browser_tester/browserdata/
H A Dnacltest.js101 function handleRPCResponse(name, req) {
102 if (req.status == 200) {
103 if (req.responseText == 'Die, please') {
106 } else if (req.responseText != 'OK') {
108 req.responseText + '\' - If you are running this test ' +
113 handleRPCFailure(name, req.status.toString());
136 var req = new XMLHttpRequest();
139 req.onreadystatechange = function() {
140 if (req.readyState == XMLHttpRequest.DONE) {
141 handleRPCResponse(name, req);
[all...]
/external/chromium_org/third_party/freetype/include/freetype/internal/
H A Dftobjs.h612 #define FT_REQUEST_WIDTH( req ) \
613 ( (req)->horiResolution \
614 ? (FT_Pos)( (req)->width * (req)->horiResolution + 36 ) / 72 \
615 : (req)->width )
617 #define FT_REQUEST_HEIGHT( req ) \
618 ( (req)->vertResolution \
619 ? (FT_Pos)( (req)->height * (req)->vertResolution + 36 ) / 72 \
620 : (req)
[all...]
/external/chromium_org/third_party/mesa/src/src/gallium/state_trackers/egl/x11/
H A Dglxinit.c139 xGLXGenericGetStringReq *req; local
157 GetReq(GLXGenericGetString, req);
158 req->reqType = opcode;
159 req->glxCode = glxCode;
160 req->for_whom = for_whom;
161 req->name = name;
240 xGLXQueryVersionReq *req; local
245 GetReq(GLXQueryVersion, req);
246 req->reqType = opcode;
247 req
[all...]
/external/chromium_org/third_party/mesa/src/src/gallium/winsys/svga/drm/
H A Dvmwgfx_drm.h200 * @req: Input data as described above.
207 struct drm_vmw_surface_create_req req; member in union:drm_vmw_surface_create_arg
228 * @req: Input data as described above.
235 struct drm_vmw_surface_arg req; member in union:drm_vmw_surface_reference_arg
376 * @req: Input data as described above.
383 struct drm_vmw_alloc_dmabuf_req req; member in union:drm_vmw_alloc_dmabuf_arg

Completed in 3060 milliseconds

<<11121314151617181920>>