/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | gas_serv.c | 688 unsigned int request, 696 if (request & (ANQP_REQ_NAI_REALM | ANQP_REQ_NAI_HOME_REALM)) 698 if (request & ANQP_REQ_ICON_REQUEST) 705 if (request & ANQP_REQ_CAPABILITY_LIST) 707 if (request & ANQP_REQ_VENUE_NAME) 709 if (request & ANQP_REQ_NETWORK_AUTH_TYPE) 711 if (request & ANQP_REQ_ROAMING_CONSORTIUM) 713 if (request & ANQP_REQ_IP_ADDR_TYPE_AVAILABILITY) 715 if (request & (ANQP_REQ_NAI_REALM | ANQP_REQ_NAI_HOME_REALM)) 717 request 687 gas_serv_build_gas_resp_payload(struct hostapd_data *hapd, unsigned int request, const u8 *home_realm, size_t home_realm_len, const u8 *icon_name, size_t icon_name_len) argument 746 unsigned int request; member in struct:anqp_query_info [all...] |
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_server.c | 699 struct radius_msg *request) 704 struct radius_hdr *hdr = radius_msg_get_hdr(request); 799 if (radius_msg_copy_attr(msg, request, RADIUS_ATTR_PROXY_STATE) < 0) { 832 struct radius_msg *request) 836 struct radius_hdr *hdr = radius_msg_get_hdr(request); 842 if (radius_msg_get_attr_ptr(request, RADIUS_ATTR_USER_PASSWORD, &pw, 860 request, tmp.password, tmp.password_len, 880 if (radius_msg_copy_attr(msg, request, RADIUS_ATTR_PROXY_STATE) < 0) { 911 struct radius_msg *request, 919 struct radius_hdr *hdr = radius_msg_get_hdr(request); 696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 909 radius_server_reject(struct radius_server_data *data, struct radius_client *client, struct radius_msg *request, struct sockaddr *from, socklen_t fromlen, const char *from_addr, int from_port) argument [all...] |
/external/wpa_supplicant_8/hostapd/ |
H A D | wps-ap-nfc.py | 66 if "FAIL" in wpas.request("WPS_NFC_TAG_READ " + str(message).encode("hex")): 75 ret = wpas.request("WPS_NFC_CONFIG_TOKEN NDEF") 85 ret = wpas.request("WPS_NFC_TOKEN NDEF") 95 ret = wpas.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR") 105 return wpas.request("NFC_REPORT_HANDOVER RESP WPS " + 116 # override to avoid parser error in request/response.pretty() in nfcpy 118 def _process_request(self, request): 119 summary("received handover request {}".format(request.type)) 121 if not request [all...] |
/external/wpa_supplicant_8/hs20/server/www/ |
H A D | est.php | 131 error_log("EST: simpleenroll - Failed to parse certificate request"); 132 die("Failed to parse certificate request"); 135 /* FIX: validate request and add HS 2.0 extensions to cert */
|
/external/wpa_supplicant_8/src/ap/ |
H A D | gas_serv.c | 688 unsigned int request, 696 if (request & (ANQP_REQ_NAI_REALM | ANQP_REQ_NAI_HOME_REALM)) 698 if (request & ANQP_REQ_ICON_REQUEST) 705 if (request & ANQP_REQ_CAPABILITY_LIST) 707 if (request & ANQP_REQ_VENUE_NAME) 709 if (request & ANQP_REQ_NETWORK_AUTH_TYPE) 711 if (request & ANQP_REQ_ROAMING_CONSORTIUM) 713 if (request & ANQP_REQ_IP_ADDR_TYPE_AVAILABILITY) 715 if (request & (ANQP_REQ_NAI_REALM | ANQP_REQ_NAI_HOME_REALM)) 717 request 687 gas_serv_build_gas_resp_payload(struct hostapd_data *hapd, unsigned int request, const u8 *home_realm, size_t home_realm_len, const u8 *icon_name, size_t icon_name_len) argument 746 unsigned int request; member in struct:anqp_query_info [all...] |
/external/wpa_supplicant_8/src/radius/ |
H A D | radius_server.c | 699 struct radius_msg *request) 704 struct radius_hdr *hdr = radius_msg_get_hdr(request); 799 if (radius_msg_copy_attr(msg, request, RADIUS_ATTR_PROXY_STATE) < 0) { 832 struct radius_msg *request) 836 struct radius_hdr *hdr = radius_msg_get_hdr(request); 842 if (radius_msg_get_attr_ptr(request, RADIUS_ATTR_USER_PASSWORD, &pw, 860 request, tmp.password, tmp.password_len, 880 if (radius_msg_copy_attr(msg, request, RADIUS_ATTR_PROXY_STATE) < 0) { 911 struct radius_msg *request, 919 struct radius_hdr *hdr = radius_msg_get_hdr(request); 696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 909 radius_server_reject(struct radius_server_data *data, struct radius_client *client, struct radius_msg *request, struct sockaddr *from, socklen_t fromlen, const char *from_addr, int from_port) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_new.c | 83 /* probe request owner disconnected */ 480 * request. 999 * @dev_addr - who sent the request or responded to our request. 1000 * @request - Will be 1 if request, 0 for response. 1017 const u8 *dev_addr, int request, 1037 if (request || !status) { 1039 _signal = request ? 1043 _signal = request 1016 wpas_dbus_signal_p2p_provision_discovery(struct wpa_supplicant *wpa_s, const u8 *dev_addr, int request, enum p2p_prov_disc_status status, u16 config_methods, unsigned int generated_pin) argument [all...] |
H A D | dbus_new.h | 182 const u8 *dev_addr, int request, 371 const u8 *dev_addr, int request, 370 wpas_dbus_signal_p2p_provision_discovery(struct wpa_supplicant *wpa_s, const u8 *dev_addr, int request, enum p2p_prov_disc_status status, u16 config_methods, unsigned int generated_pin) argument
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
H A D | p2p-nfc.py | 85 if "FAIL" in wpas.request(cmd): 94 res = wpas.request("NFC_GET_HANDOVER_REQ NDEF P2P-CR").rstrip() 103 res = wpas.request("NFC_GET_HANDOVER_REQ NDEF WPS-CR").rstrip() 114 res = wpas.request("NFC_GET_HANDOVER_SEL NDEF P2P-CR-TAG").rstrip() 116 res = wpas.request("NFC_GET_HANDOVER_SEL NDEF P2P-CR").rstrip() 126 res = wpas.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR"); 140 return wpas.request(cmd) 150 return wpas.request(cmd) 161 summary("Could not get handover request carrier record from wpa_supplicant") 163 print "Handover request carrie [all...] |
H A D | wps-nfc.py | 70 if "FAIL" in wpas.request("WPS_NFC_TAG_READ " + str(message).encode("hex")): 79 ret = wpas.request("WPS_NFC_CONFIG_TOKEN NDEF " + id) 81 ret = wpas.request("WPS_NFC_CONFIG_TOKEN NDEF") 91 ret = wpas.request("WPS_ER_NFC_CONFIG_TOKEN NDEF " + uuid) 101 ret = wpas.request("WPS_NFC_TOKEN NDEF") 110 ret = wpas.request("NFC_GET_HANDOVER_REQ NDEF WPS-CR") 121 res = wpas.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR").rstrip() 123 res = wpas.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR " + uuid).rstrip() 133 return wpas.request("NFC_REPORT_HANDOVER " + type + " WPS " + 145 # override to avoid parser error in request/respons [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | notify.c | 495 * @dev_addr: Who sent the request or responded to our request. 496 * @request: Will be 1 if request, 0 for response. 507 const u8 *dev_addr, int request, 512 wpas_dbus_signal_p2p_provision_discovery(wpa_s, dev_addr, request, 506 wpas_notify_p2p_provision_discovery(struct wpa_supplicant *wpa_s, const u8 *dev_addr, int request, enum p2p_prov_disc_status status, u16 config_methods, unsigned int generated_pin) argument
|
H A D | notify.h | 108 const u8 *dev_addr, int request,
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | gas_serv.c | 688 unsigned int request, 696 if (request & (ANQP_REQ_NAI_REALM | ANQP_REQ_NAI_HOME_REALM)) 698 if (request & ANQP_REQ_ICON_REQUEST) 705 if (request & ANQP_REQ_CAPABILITY_LIST) 707 if (request & ANQP_REQ_VENUE_NAME) 709 if (request & ANQP_REQ_NETWORK_AUTH_TYPE) 711 if (request & ANQP_REQ_ROAMING_CONSORTIUM) 713 if (request & ANQP_REQ_IP_ADDR_TYPE_AVAILABILITY) 715 if (request & (ANQP_REQ_NAI_REALM | ANQP_REQ_NAI_HOME_REALM)) 717 request 687 gas_serv_build_gas_resp_payload(struct hostapd_data *hapd, unsigned int request, const u8 *home_realm, size_t home_realm_len, const u8 *icon_name, size_t icon_name_len) argument 746 unsigned int request; member in struct:anqp_query_info [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/radius/ |
H A D | radius_server.c | 699 struct radius_msg *request) 704 struct radius_hdr *hdr = radius_msg_get_hdr(request); 799 if (radius_msg_copy_attr(msg, request, RADIUS_ATTR_PROXY_STATE) < 0) { 832 struct radius_msg *request) 836 struct radius_hdr *hdr = radius_msg_get_hdr(request); 842 if (radius_msg_get_attr_ptr(request, RADIUS_ATTR_USER_PASSWORD, &pw, 860 request, tmp.password, tmp.password_len, 880 if (radius_msg_copy_attr(msg, request, RADIUS_ATTR_PROXY_STATE) < 0) { 911 struct radius_msg *request, 919 struct radius_hdr *hdr = radius_msg_get_hdr(request); 696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 909 radius_server_reject(struct radius_server_data *data, struct radius_client *client, struct radius_msg *request, struct sockaddr *from, socklen_t fromlen, const char *from_addr, int from_port) argument [all...] |
/external/valgrind/main/coregrind/ |
H A D | m_libcproc.c | 577 Int VG_(ptrace) ( Int request, Int pid, void *addr, void *data ) argument 580 res = VG_(do_syscall4)(__NR_ptrace, request, pid, (UWord)addr, (UWord)data);
|
H A D | pub_core_libcproc.h | 80 extern Int VG_(ptrace)( Int request, Int pid, void *addr, void *data );
|
/external/valgrind/main/coregrind/m_syswrap/ |
H A D | priv_syswrap-generic.h | 85 /* PRE and POST for unknown ioctls based on ioctl request encoding */ 87 void ML_(PRE_unknown_ioctl)(ThreadId tid, UWord request, UWord arg); 89 void ML_(POST_unknown_ioctl)(ThreadId tid, UInt res, UWord request, UWord arg);
|
H A D | syswrap-amd64-linux.c | 558 long, request, long, pid, long, addr, long, data);
|
H A D | syswrap-arm-linux.c | 631 long, request, long, pid, long, addr, long, data);
|
H A D | syswrap-darwin.c | 737 switch (ARG2 /* request */) { 745 unsigned int, fd, unsigned int, request); 750 unsigned int, fd, unsigned int, request, unsigned long, arg); 753 switch (ARG2 /* request */) { 932 switch (ARG2 /* request */) { 2677 char *,"path", unsigned int,"request", 3310 int,"request", vki_pid_t,"pid", 3905 // We have to record the fact that there is an asynchronous read request
|
H A D | syswrap-generic.c | 1210 /* request is too large -- the resvn would fall below 1 page, 1846 increase the request size by VKI_SHMLBA - VKI_PAGE_SIZE and 2135 /* Our request was bounced, so we'd better fail. */ 2155 /* Our request was bounced, so we'd better fail. */ 3407 void ML_(PRE_unknown_ioctl)(ThreadId tid, UWord request, UWord arg) argument 3418 UInt dir = _VKI_IOC_DIR(request); 3419 UInt size = _VKI_IOC_SIZE(request); 3430 //VG_(message)(Vg_UserMsg, "UNKNOWN ioctl %#lx\n", request); 3436 " with no size/direction hints\n", request); 3442 //VG_(message)(Vg_UserMsg, "UNKNOWN ioctl %#lx\n", request); 3451 POST_unknown_ioctl(ThreadId tid, UInt res, UWord request, UWord arg) argument [all...] |
H A D | syswrap-linux.c | 3872 switch (ARG1 /* request */) { 4019 switch (ARG1 /* request */) { 5281 PRE_MEM_READ("ioctl(DRM_WAIT_VBLANK).request.type", (Addr)&data->request.type, sizeof(data->request.type)); 5282 PRE_MEM_READ("ioctl(DRM_WAIT_VBLANK).request.sequence", (Addr)&data->request.sequence, sizeof(data->request.sequence)); 5283 /* XXX: It seems request.signal isn't used */ 5534 switch (ARG2 /* request */) { [all...] |
H A D | syswrap-mips64-linux.c | 431 PRE_REG_READ4(int, "ptrace", long, request, long, pid, long, addr,
|
H A D | syswrap-s390x-linux.c | 359 long, request, long, pid, long, addr, long, data);
|
H A D | syswrap-x86-linux.c | 1101 long, request, long, pid, long, addr, long, data);
|