Searched refs:request (Results 1 - 25 of 2314) sorted by last modified time

1234567891011>>

/external/wpa_supplicant_8/hostapd/src/ap/
H A Dgas_serv.c688 unsigned int request,
696 if (request & (ANQP_REQ_NAI_REALM | ANQP_REQ_NAI_HOME_REALM))
698 if (request & ANQP_REQ_ICON_REQUEST)
705 if (request & ANQP_REQ_CAPABILITY_LIST)
707 if (request & ANQP_REQ_VENUE_NAME)
709 if (request & ANQP_REQ_NETWORK_AUTH_TYPE)
711 if (request & ANQP_REQ_ROAMING_CONSORTIUM)
713 if (request & ANQP_REQ_IP_ADDR_TYPE_AVAILABILITY)
715 if (request & (ANQP_REQ_NAI_REALM | ANQP_REQ_NAI_HOME_REALM))
717 request
687 gas_serv_build_gas_resp_payload(struct hostapd_data *hapd, unsigned int request, const u8 *home_realm, size_t home_realm_len, const u8 *icon_name, size_t icon_name_len) argument
746 unsigned int request; member in struct:anqp_query_info
[all...]
/external/wpa_supplicant_8/hostapd/src/radius/
H A Dradius_server.c699 struct radius_msg *request)
704 struct radius_hdr *hdr = radius_msg_get_hdr(request);
799 if (radius_msg_copy_attr(msg, request, RADIUS_ATTR_PROXY_STATE) < 0) {
832 struct radius_msg *request)
836 struct radius_hdr *hdr = radius_msg_get_hdr(request);
842 if (radius_msg_get_attr_ptr(request, RADIUS_ATTR_USER_PASSWORD, &pw,
860 request, tmp.password, tmp.password_len,
880 if (radius_msg_copy_attr(msg, request, RADIUS_ATTR_PROXY_STATE) < 0) {
911 struct radius_msg *request,
919 struct radius_hdr *hdr = radius_msg_get_hdr(request);
696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument
829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument
909 radius_server_reject(struct radius_server_data *data, struct radius_client *client, struct radius_msg *request, struct sockaddr *from, socklen_t fromlen, const char *from_addr, int from_port) argument
[all...]
/external/wpa_supplicant_8/hostapd/
H A Dwps-ap-nfc.py66 if "FAIL" in wpas.request("WPS_NFC_TAG_READ " + str(message).encode("hex")):
75 ret = wpas.request("WPS_NFC_CONFIG_TOKEN NDEF")
85 ret = wpas.request("WPS_NFC_TOKEN NDEF")
95 ret = wpas.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR")
105 return wpas.request("NFC_REPORT_HANDOVER RESP WPS " +
116 # override to avoid parser error in request/response.pretty() in nfcpy
118 def _process_request(self, request):
119 summary("received handover request {}".format(request.type))
121 if not request
[all...]
/external/wpa_supplicant_8/hs20/server/www/
H A Dest.php131 error_log("EST: simpleenroll - Failed to parse certificate request");
132 die("Failed to parse certificate request");
135 /* FIX: validate request and add HS 2.0 extensions to cert */
/external/wpa_supplicant_8/src/ap/
H A Dgas_serv.c688 unsigned int request,
696 if (request & (ANQP_REQ_NAI_REALM | ANQP_REQ_NAI_HOME_REALM))
698 if (request & ANQP_REQ_ICON_REQUEST)
705 if (request & ANQP_REQ_CAPABILITY_LIST)
707 if (request & ANQP_REQ_VENUE_NAME)
709 if (request & ANQP_REQ_NETWORK_AUTH_TYPE)
711 if (request & ANQP_REQ_ROAMING_CONSORTIUM)
713 if (request & ANQP_REQ_IP_ADDR_TYPE_AVAILABILITY)
715 if (request & (ANQP_REQ_NAI_REALM | ANQP_REQ_NAI_HOME_REALM))
717 request
687 gas_serv_build_gas_resp_payload(struct hostapd_data *hapd, unsigned int request, const u8 *home_realm, size_t home_realm_len, const u8 *icon_name, size_t icon_name_len) argument
746 unsigned int request; member in struct:anqp_query_info
[all...]
/external/wpa_supplicant_8/src/radius/
H A Dradius_server.c699 struct radius_msg *request)
704 struct radius_hdr *hdr = radius_msg_get_hdr(request);
799 if (radius_msg_copy_attr(msg, request, RADIUS_ATTR_PROXY_STATE) < 0) {
832 struct radius_msg *request)
836 struct radius_hdr *hdr = radius_msg_get_hdr(request);
842 if (radius_msg_get_attr_ptr(request, RADIUS_ATTR_USER_PASSWORD, &pw,
860 request, tmp.password, tmp.password_len,
880 if (radius_msg_copy_attr(msg, request, RADIUS_ATTR_PROXY_STATE) < 0) {
911 struct radius_msg *request,
919 struct radius_hdr *hdr = radius_msg_get_hdr(request);
696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument
829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument
909 radius_server_reject(struct radius_server_data *data, struct radius_client *client, struct radius_msg *request, struct sockaddr *from, socklen_t fromlen, const char *from_addr, int from_port) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/dbus/
H A Ddbus_new.c83 /* probe request owner disconnected */
480 * request.
999 * @dev_addr - who sent the request or responded to our request.
1000 * @request - Will be 1 if request, 0 for response.
1017 const u8 *dev_addr, int request,
1037 if (request || !status) {
1039 _signal = request ?
1043 _signal = request
1016 wpas_dbus_signal_p2p_provision_discovery(struct wpa_supplicant *wpa_s, const u8 *dev_addr, int request, enum p2p_prov_disc_status status, u16 config_methods, unsigned int generated_pin) argument
[all...]
H A Ddbus_new.h182 const u8 *dev_addr, int request,
371 const u8 *dev_addr, int request,
370 wpas_dbus_signal_p2p_provision_discovery(struct wpa_supplicant *wpa_s, const u8 *dev_addr, int request, enum p2p_prov_disc_status status, u16 config_methods, unsigned int generated_pin) argument
/external/wpa_supplicant_8/wpa_supplicant/examples/
H A Dp2p-nfc.py85 if "FAIL" in wpas.request(cmd):
94 res = wpas.request("NFC_GET_HANDOVER_REQ NDEF P2P-CR").rstrip()
103 res = wpas.request("NFC_GET_HANDOVER_REQ NDEF WPS-CR").rstrip()
114 res = wpas.request("NFC_GET_HANDOVER_SEL NDEF P2P-CR-TAG").rstrip()
116 res = wpas.request("NFC_GET_HANDOVER_SEL NDEF P2P-CR").rstrip()
126 res = wpas.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR");
140 return wpas.request(cmd)
150 return wpas.request(cmd)
161 summary("Could not get handover request carrier record from wpa_supplicant")
163 print "Handover request carrie
[all...]
H A Dwps-nfc.py70 if "FAIL" in wpas.request("WPS_NFC_TAG_READ " + str(message).encode("hex")):
79 ret = wpas.request("WPS_NFC_CONFIG_TOKEN NDEF " + id)
81 ret = wpas.request("WPS_NFC_CONFIG_TOKEN NDEF")
91 ret = wpas.request("WPS_ER_NFC_CONFIG_TOKEN NDEF " + uuid)
101 ret = wpas.request("WPS_NFC_TOKEN NDEF")
110 ret = wpas.request("NFC_GET_HANDOVER_REQ NDEF WPS-CR")
121 res = wpas.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR").rstrip()
123 res = wpas.request("NFC_GET_HANDOVER_SEL NDEF WPS-CR " + uuid).rstrip()
133 return wpas.request("NFC_REPORT_HANDOVER " + type + " WPS " +
145 # override to avoid parser error in request/respons
[all...]
/external/wpa_supplicant_8/wpa_supplicant/
H A Dnotify.c495 * @dev_addr: Who sent the request or responded to our request.
496 * @request: Will be 1 if request, 0 for response.
507 const u8 *dev_addr, int request,
512 wpas_dbus_signal_p2p_provision_discovery(wpa_s, dev_addr, request,
506 wpas_notify_p2p_provision_discovery(struct wpa_supplicant *wpa_s, const u8 *dev_addr, int request, enum p2p_prov_disc_status status, u16 config_methods, unsigned int generated_pin) argument
H A Dnotify.h108 const u8 *dev_addr, int request,
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dgas_serv.c688 unsigned int request,
696 if (request & (ANQP_REQ_NAI_REALM | ANQP_REQ_NAI_HOME_REALM))
698 if (request & ANQP_REQ_ICON_REQUEST)
705 if (request & ANQP_REQ_CAPABILITY_LIST)
707 if (request & ANQP_REQ_VENUE_NAME)
709 if (request & ANQP_REQ_NETWORK_AUTH_TYPE)
711 if (request & ANQP_REQ_ROAMING_CONSORTIUM)
713 if (request & ANQP_REQ_IP_ADDR_TYPE_AVAILABILITY)
715 if (request & (ANQP_REQ_NAI_REALM | ANQP_REQ_NAI_HOME_REALM))
717 request
687 gas_serv_build_gas_resp_payload(struct hostapd_data *hapd, unsigned int request, const u8 *home_realm, size_t home_realm_len, const u8 *icon_name, size_t icon_name_len) argument
746 unsigned int request; member in struct:anqp_query_info
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/radius/
H A Dradius_server.c699 struct radius_msg *request)
704 struct radius_hdr *hdr = radius_msg_get_hdr(request);
799 if (radius_msg_copy_attr(msg, request, RADIUS_ATTR_PROXY_STATE) < 0) {
832 struct radius_msg *request)
836 struct radius_hdr *hdr = radius_msg_get_hdr(request);
842 if (radius_msg_get_attr_ptr(request, RADIUS_ATTR_USER_PASSWORD, &pw,
860 request, tmp.password, tmp.password_len,
880 if (radius_msg_copy_attr(msg, request, RADIUS_ATTR_PROXY_STATE) < 0) {
911 struct radius_msg *request,
919 struct radius_hdr *hdr = radius_msg_get_hdr(request);
696 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument
829 radius_server_macacl(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument
909 radius_server_reject(struct radius_server_data *data, struct radius_client *client, struct radius_msg *request, struct sockaddr *from, socklen_t fromlen, const char *from_addr, int from_port) argument
[all...]
/external/valgrind/main/coregrind/
H A Dm_libcproc.c577 Int VG_(ptrace) ( Int request, Int pid, void *addr, void *data ) argument
580 res = VG_(do_syscall4)(__NR_ptrace, request, pid, (UWord)addr, (UWord)data);
H A Dpub_core_libcproc.h80 extern Int VG_(ptrace)( Int request, Int pid, void *addr, void *data );
/external/valgrind/main/coregrind/m_syswrap/
H A Dpriv_syswrap-generic.h85 /* PRE and POST for unknown ioctls based on ioctl request encoding */
87 void ML_(PRE_unknown_ioctl)(ThreadId tid, UWord request, UWord arg);
89 void ML_(POST_unknown_ioctl)(ThreadId tid, UInt res, UWord request, UWord arg);
H A Dsyswrap-amd64-linux.c558 long, request, long, pid, long, addr, long, data);
H A Dsyswrap-arm-linux.c631 long, request, long, pid, long, addr, long, data);
H A Dsyswrap-darwin.c737 switch (ARG2 /* request */) {
745 unsigned int, fd, unsigned int, request);
750 unsigned int, fd, unsigned int, request, unsigned long, arg);
753 switch (ARG2 /* request */) {
932 switch (ARG2 /* request */) {
2677 char *,"path", unsigned int,"request",
3310 int,"request", vki_pid_t,"pid",
3905 // We have to record the fact that there is an asynchronous read request
H A Dsyswrap-generic.c1210 /* request is too large -- the resvn would fall below 1 page,
1846 increase the request size by VKI_SHMLBA - VKI_PAGE_SIZE and
2135 /* Our request was bounced, so we'd better fail. */
2155 /* Our request was bounced, so we'd better fail. */
3407 void ML_(PRE_unknown_ioctl)(ThreadId tid, UWord request, UWord arg) argument
3418 UInt dir = _VKI_IOC_DIR(request);
3419 UInt size = _VKI_IOC_SIZE(request);
3430 //VG_(message)(Vg_UserMsg, "UNKNOWN ioctl %#lx\n", request);
3436 " with no size/direction hints\n", request);
3442 //VG_(message)(Vg_UserMsg, "UNKNOWN ioctl %#lx\n", request);
3451 POST_unknown_ioctl(ThreadId tid, UInt res, UWord request, UWord arg) argument
[all...]
H A Dsyswrap-linux.c3872 switch (ARG1 /* request */) {
4019 switch (ARG1 /* request */) {
5281 PRE_MEM_READ("ioctl(DRM_WAIT_VBLANK).request.type", (Addr)&data->request.type, sizeof(data->request.type));
5282 PRE_MEM_READ("ioctl(DRM_WAIT_VBLANK).request.sequence", (Addr)&data->request.sequence, sizeof(data->request.sequence));
5283 /* XXX: It seems request.signal isn't used */
5534 switch (ARG2 /* request */) {
[all...]
H A Dsyswrap-mips64-linux.c431 PRE_REG_READ4(int, "ptrace", long, request, long, pid, long, addr,
H A Dsyswrap-s390x-linux.c359 long, request, long, pid, long, addr, long, data);
H A Dsyswrap-x86-linux.c1101 long, request, long, pid, long, addr, long, data);

Completed in 222 milliseconds

1234567891011>>