/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_mschapv2.c | 233 * @req: Pointer to EAP-MSCHAPv2 header from the request 241 struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, 252 if (req_len < sizeof(*req) + 1) { 258 pos = (const u8 *) (req + 1); 260 len = req_len - sizeof(*req) - 1; 292 return eap_mschapv2_challenge_reply(sm, data, id, req->mschapv2_id, 338 * @req: Pointer to EAP-MSCHAPv2 header from the request 347 const struct eap_mschapv2_hdr *req, 355 len = req_len - sizeof(*req); 356 pos = (const u8 *) (req 239 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 344 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 503 eap_mschapv2_change_password( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id) argument 638 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument [all...] |
H A D | eap_peap.c | 455 * @req: EAP-TLV request to be processed. The caller must have validated that 467 const struct wpabuf *req, struct wpabuf **resp, 477 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, req, &left); 511 *resp = eap_tlv_build_nak(eap_get_id(req), 582 eap_get_id(req), resp_status); 592 struct wpabuf *req, 595 struct eap_hdr *hdr = wpabuf_mhead(req); 614 if (eap_tlv_process(sm, data, &iret, req, resp, 635 req, &eleft); 712 &iret, req); 465 eap_tlv_process(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct wpabuf *req, struct wpabuf **resp, int force_failure) argument 589 eap_peap_phase2_request(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, struct wpabuf *req, struct wpabuf **resp) argument 734 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument 964 const struct eap_hdr *req; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_psk.c | 57 struct wpabuf *req; local 70 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, 73 if (req == NULL) { 80 psk = wpabuf_put(req, sizeof(*psk)); 83 wpabuf_put_data(req, sm->server_id, sm->server_id_len); 85 return req; 92 struct wpabuf *req; local 99 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, 101 if (req == NULL) { 108 psk = wpabuf_put(req, sizeo [all...] |
H A D | eap_server_gtc.c | 53 struct wpabuf *req; local 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, 62 if (req == NULL) { 69 wpabuf_put_data(req, msg, msg_len); 73 return req;
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_mschapv2.c | 233 * @req: Pointer to EAP-MSCHAPv2 header from the request 241 struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, 252 if (req_len < sizeof(*req) + 1) { 258 pos = (const u8 *) (req + 1); 260 len = req_len - sizeof(*req) - 1; 292 return eap_mschapv2_challenge_reply(sm, data, id, req->mschapv2_id, 338 * @req: Pointer to EAP-MSCHAPv2 header from the request 347 const struct eap_mschapv2_hdr *req, 355 len = req_len - sizeof(*req); 356 pos = (const u8 *) (req 239 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 344 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 503 eap_mschapv2_change_password( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id) argument 638 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument [all...] |
H A D | eap_peap.c | 455 * @req: EAP-TLV request to be processed. The caller must have validated that 467 const struct wpabuf *req, struct wpabuf **resp, 477 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, req, &left); 511 *resp = eap_tlv_build_nak(eap_get_id(req), 582 eap_get_id(req), resp_status); 592 struct wpabuf *req, 595 struct eap_hdr *hdr = wpabuf_mhead(req); 614 if (eap_tlv_process(sm, data, &iret, req, resp, 635 req, &eleft); 712 &iret, req); 465 eap_tlv_process(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct wpabuf *req, struct wpabuf **resp, int force_failure) argument 589 eap_peap_phase2_request(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, struct wpabuf *req, struct wpabuf **resp) argument 734 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument 964 const struct eap_hdr *req; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_psk.c | 57 struct wpabuf *req; local 70 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, 73 if (req == NULL) { 80 psk = wpabuf_put(req, sizeof(*psk)); 83 wpabuf_put_data(req, sm->server_id, sm->server_id_len); 85 return req; 92 struct wpabuf *req; local 99 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, 101 if (req == NULL) { 108 psk = wpabuf_put(req, sizeo [all...] |
H A D | eap_server_gtc.c | 53 struct wpabuf *req; local 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, 62 if (req == NULL) { 69 wpabuf_put_data(req, msg, msg_len); 73 return req;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_mschapv2.c | 233 * @req: Pointer to EAP-MSCHAPv2 header from the request 241 struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, 252 if (req_len < sizeof(*req) + 1) { 258 pos = (const u8 *) (req + 1); 260 len = req_len - sizeof(*req) - 1; 292 return eap_mschapv2_challenge_reply(sm, data, id, req->mschapv2_id, 338 * @req: Pointer to EAP-MSCHAPv2 header from the request 347 const struct eap_mschapv2_hdr *req, 355 len = req_len - sizeof(*req); 356 pos = (const u8 *) (req 239 eap_mschapv2_challenge( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 344 eap_mschapv2_success(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument 503 eap_mschapv2_change_password( struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, u8 id) argument 638 eap_mschapv2_failure(struct eap_sm *sm, struct eap_mschapv2_data *data, struct eap_method_ret *ret, const struct eap_mschapv2_hdr *req, size_t req_len, u8 id) argument [all...] |
H A D | eap_peap.c | 455 * @req: EAP-TLV request to be processed. The caller must have validated that 467 const struct wpabuf *req, struct wpabuf **resp, 477 pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TLV, req, &left); 511 *resp = eap_tlv_build_nak(eap_get_id(req), 582 eap_get_id(req), resp_status); 592 struct wpabuf *req, 595 struct eap_hdr *hdr = wpabuf_mhead(req); 614 if (eap_tlv_process(sm, data, &iret, req, resp, 635 req, &eleft); 712 &iret, req); 465 eap_tlv_process(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct wpabuf *req, struct wpabuf **resp, int force_failure) argument 589 eap_peap_phase2_request(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, struct wpabuf *req, struct wpabuf **resp) argument 734 eap_peap_decrypt(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct eap_hdr *req, const struct wpabuf *in_data, struct wpabuf **out_data) argument 964 const struct eap_hdr *req; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_psk.c | 57 struct wpabuf *req; local 70 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, 73 if (req == NULL) { 80 psk = wpabuf_put(req, sizeof(*psk)); 83 wpabuf_put_data(req, sm->server_id, sm->server_id_len); 85 return req; 92 struct wpabuf *req; local 99 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, 101 if (req == NULL) { 108 psk = wpabuf_put(req, sizeo [all...] |
H A D | eap_server_gtc.c | 53 struct wpabuf *req; local 60 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len, 62 if (req == NULL) { 69 wpabuf_put_data(req, msg, msg_len); 73 return req;
|
/external/chromium_org/chrome/common/extensions/docs/examples/extensions/news/javascript/ |
H A D | feed.js | 21 var req; variable 27 req = new XMLHttpRequest(); 28 req.onload = handleResponse; 29 req.onerror = handleError; 30 req.open('GET', feedUrl, true); 31 req.send(null); 57 var doc = req.responseXML;
|
/external/chromium_org/net/data/ssl/scripts/ |
H A D | generate-client-certificates.sh | 49 try openssl req \ 60 -req -days 3650 \ 71 try openssl req \ 90 try openssl req \ 111 try openssl req \
|
/external/chromium_org/v8/src/ |
H A D | hydrogen-representation-changes.cc | 75 Representation req = use_value->RequiredInputRepresentation(use_index); local 76 if (req.IsNone() || req.Equals(r)) continue; 87 if (change->from().Equals(req) && IsNonDeoptingIntToSmiChange(change)) { 93 InsertRepresentationChangeForUse(value, use_value, use_index, req);
|
/external/kernel-headers/original/uapi/drm/ |
H A D | vmwgfx_drm.h | 213 * @req: Input data as described above. 220 struct drm_vmw_surface_create_req req; member in union:drm_vmw_surface_create_arg 241 * @req: Input data as described above. 248 struct drm_vmw_surface_arg req; member in union:drm_vmw_surface_reference_arg 389 * @req: Input data as described above. 396 struct drm_vmw_alloc_dmabuf_req req; member in union:drm_vmw_alloc_dmabuf_arg 941 * @req: Input argument as described above. 948 struct drm_vmw_gb_surface_create_req req; member in union:drm_vmw_gb_surface_create_arg 983 * @req: Input data as described above at "struct drm_vmw_surface_arg" 990 struct drm_vmw_surface_arg req; member in union:drm_vmw_gb_surface_reference_arg [all...] |
/external/nist-sip/java/gov/nist/javax/sip/stack/ |
H A D | DefaultRouter.java | 135 * RouteHeader firstRoute = (RouteHeader) req.getHeader( RouteHeader.NAME ); 143 * nextHop = fixStrictRouting( req ); <--- Here, make the modifications as per RFC3261 151 * } else if ( req.getRequestURI().isSipURI() ) { 260 * request-URI added as last route header, new req-URI = top-route-URI 262 public void fixStrictRouting(SIPRequest req) { argument 264 RouteList routes = req.getRouteHeaders(); 271 addr.setAddess(req.getRequestURI()); // don't clone it 275 req.setRequestURI(firstUri); 277 sipStack.getStackLogger().logDebug("post: fixStrictRouting" + req);
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_client.c | 66 struct radius_msg *req, 241 static void radius_client_msg_free(struct radius_msg_list *req) argument 243 radius_msg_free(req->msg); 244 os_free(req); 267 struct radius_msg *req, 719 struct radius_msg_list *req, *prev_req; local 776 req = radius->msgs; 777 while (req) { 780 if ((req->msg_type == msg_type || 781 (req 264 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument [all...] |
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_client.c | 66 struct radius_msg *req, 241 static void radius_client_msg_free(struct radius_msg_list *req) argument 243 radius_msg_free(req->msg); 244 os_free(req); 267 struct radius_msg *req, 719 struct radius_msg_list *req, *prev_req; local 776 req = radius->msgs; 777 while (req) { 780 if ((req->msg_type == msg_type || 781 (req 264 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_client.c | 66 struct radius_msg *req, 241 static void radius_client_msg_free(struct radius_msg_list *req) argument 243 radius_msg_free(req->msg); 244 os_free(req); 267 struct radius_msg *req, 719 struct radius_msg_list *req, *prev_req; local 776 req = radius->msgs; 777 while (req) { 780 if ((req->msg_type == msg_type || 781 (req 264 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument [all...] |
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_core.c | 1198 btif_storage_req_t req; local 1206 memset(&(req.read_req.bd_addr), 0, sizeof(bt_bdaddr_t)); 1207 req.read_req.type = type; 1211 (char*)&req, sizeof(btif_storage_req_t), NULL); 1227 btif_storage_req_t req; local 1318 memset(&(req.write_req.bd_addr), 0, sizeof(bt_bdaddr_t)); 1319 memcpy(&(req.write_req.prop), property, sizeof(bt_property_t)); 1323 (char*)&req, 1344 btif_storage_req_t req; local 1349 memcpy(&(req 1368 btif_storage_req_t req; local 1394 btif_storage_req_t req; local [all...] |
/external/chromium_org/ppapi/native_client/tools/browser_tester/browserdata/ |
H A D | nacltest.js | 101 function handleRPCResponse(name, req) { 102 if (req.status == 200) { 103 if (req.responseText == 'Die, please') { 106 } else if (req.responseText != 'OK') { 108 req.responseText + '\' - If you are running this test ' + 113 handleRPCFailure(name, req.status.toString()); 136 var req = new XMLHttpRequest(); 139 req.onreadystatechange = function() { 140 if (req.readyState == XMLHttpRequest.DONE) { 141 handleRPCResponse(name, req); [all...] |
/external/chromium_org/third_party/freetype/include/freetype/internal/ |
H A D | ftobjs.h | 612 #define FT_REQUEST_WIDTH( req ) \ 613 ( (req)->horiResolution \ 614 ? (FT_Pos)( (req)->width * (req)->horiResolution + 36 ) / 72 \ 615 : (req)->width ) 617 #define FT_REQUEST_HEIGHT( req ) \ 618 ( (req)->vertResolution \ 619 ? (FT_Pos)( (req)->height * (req)->vertResolution + 36 ) / 72 \ 620 : (req) [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/state_trackers/egl/x11/ |
H A D | glxinit.c | 139 xGLXGenericGetStringReq *req; local 157 GetReq(GLXGenericGetString, req); 158 req->reqType = opcode; 159 req->glxCode = glxCode; 160 req->for_whom = for_whom; 161 req->name = name; 240 xGLXQueryVersionReq *req; local 245 GetReq(GLXQueryVersion, req); 246 req->reqType = opcode; 247 req [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/winsys/svga/drm/ |
H A D | vmwgfx_drm.h | 200 * @req: Input data as described above. 207 struct drm_vmw_surface_create_req req; member in union:drm_vmw_surface_create_arg 228 * @req: Input data as described above. 235 struct drm_vmw_surface_arg req; member in union:drm_vmw_surface_reference_arg 376 * @req: Input data as described above. 383 struct drm_vmw_alloc_dmabuf_req req; member in union:drm_vmw_alloc_dmabuf_arg
|