| /lib/lwip/lwip/src/apps/http/ |
| A D | http_client.c | 172 req = NULL; in httpc_free_state() 291 (req->hdr_content_len != req->rx_content_len)) { in httpc_tcp_recv() 298 return httpc_close(req, result, req->rx_status, ERR_OK); in httpc_tcp_recv() 323 …err = req->conn_settings->headers_done_fn(req, req->callback_arg, req->rx_hdrs, total_header_len, … in httpc_tcp_recv() 344 return req->recv_fn(req->callback_arg, pcb, p, r); in httpc_tcp_recv() 404 r = altcp_write(req->pcb, req->request->payload, req->request->len - 1, TCP_WRITE_FLAG_COPY); in httpc_tcp_connected() 429 err = altcp_connect(req->pcb, &req->remote_addr, req->remote_port, httpc_tcp_connected); in httpc_get_internal_addr() 481 err = httpc_get_internal_addr(req, &req->remote_addr); in httpc_get_internal_dns() 557 req->server_name = (char*)(req + 1); in httpc_init_connection_common() 561 req->uri = req->server_name + server_name_len + 1; in httpc_init_connection_common() [all …]
|
| A D | httpd.c | 251 struct pbuf *req; member 503 if (hs->req) { in http_state_eof() 504 pbuf_free(hs->req); in http_state_eof() 505 hs->req = NULL; in http_state_eof() 2007 if (hs->req == NULL) { 2009 hs->req = p; 2012 pbuf_cat(hs->req, p); 2018 if (hs->req->next != NULL) { 2132 clen = pbuf_clen(hs->req); 2594 pbuf_free(hs->req); [all …]
|
| /lib/crypto/ |
| A D | public_key.c | 232 struct akcipher_request *req; in software_key_eds_op() local 252 req = akcipher_request_alloc(tfm, GFP_KERNEL); in software_key_eds_op() 253 if (!req) in software_key_eds_op() 286 ret = crypto_akcipher_encrypt(req); in software_key_eds_op() 289 ret = crypto_akcipher_decrypt(req); in software_key_eds_op() 292 ret = crypto_akcipher_sign(req); in software_key_eds_op() 300 ret = req->dst_len; in software_key_eds_op() 305 akcipher_request_free(req); in software_key_eds_op() 320 struct akcipher_request *req; in public_key_verify_signature() local 344 if (!req) in public_key_verify_signature() [all …]
|
| A D | asymmetric_type.c | 72 char *req, *p; in find_asymmetric_key() local 86 p = req = kmalloc(2 + 1 + len * 2 + 1, GFP_KERNEL); in find_asymmetric_key() 87 if (!req) in find_asymmetric_key() 101 pr_debug("Look up: \"%s\"\n", req); in find_asymmetric_key() 104 &key_type_asymmetric, req, true); in find_asymmetric_key() 106 pr_debug("Request for key '%s' err %ld\n", req, PTR_ERR(ref)); in find_asymmetric_key() 107 kfree(req); in find_asymmetric_key()
|
| /lib/mbedtls/external/mbedtls/tests/data_files/ |
| A D | Makefile | 206 $(OPENSSL) x509 -req -in test-ca2.req.sha256 -extfile $< \ 418 cli2.req.sha256: cli2.key 422 all_final += server1.req.sha1 423 cli2.crt: cli2.req.sha256 1424 parse_input/server1.req.sha1 server1.req.sha1: server1.key 1428 parse_input/server1.req.md5 server1.req.md5: server1.key 1430 all_final += server1.req.md5 1432 parse_input/server1.req.sha224 server1.req.sha224: server1.key 1436 parse_input/server1.req.sha256 server1.req.sha256: server1.key 1444 parse_input/server1.req.sha384 server1.req.sha384: server1.key [all …]
|
| A D | server1_csr.opensslconf | 1 [ req ]
|
| A D | authorityKeyId_subjectKeyId.conf | 1 [req]
|
| A D | test-ca.opensslconf | 1 [req]
|
| A D | Readme-x509.txt | 74 .req*: CSR, not certificate
|
| /lib/mbedtls/external/mbedtls/programs/x509/ |
| A D | cert_req.c | 110 int write_certificate_request(mbedtls_x509write_csr *req, const char *output_file, in write_certificate_request() argument 120 if ((ret = mbedtls_x509write_csr_pem(req, output_buf, 4096, f_rng, p_rng)) < 0) { in write_certificate_request() 148 mbedtls_x509write_csr req; in main() local 160 mbedtls_x509write_csr_init(&req); in main() 387 mbedtls_x509write_csr_set_md_alg(&req, opt.md_alg); in main() 391 ret = mbedtls_x509write_csr_set_key_usage(&req, opt.key_usage); in main() 401 ret = mbedtls_x509write_csr_set_ns_cert_type(&req, opt.ns_cert_type); in main() 411 ret = mbedtls_x509write_csr_set_subject_alternative_name(&req, opt.san_list); in main() 463 mbedtls_x509write_csr_set_key(&req, &key); in main() 473 if ((ret = write_certificate_request(&req, opt.output_file, in main() [all …]
|
| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_x509write.function | 148 mbedtls_x509write_csr req; 204 mbedtls_x509write_csr_init(&req); 211 mbedtls_x509write_csr_set_md_alg(&req, md_type); 212 mbedtls_x509write_csr_set_key(&req, &key); 227 ret = mbedtls_x509write_csr_pem(&req, buf, sizeof(buf), 275 mbedtls_x509write_csr_free(&req); 288 mbedtls_x509write_csr req; 295 mbedtls_x509write_csr_init(&req); 311 mbedtls_x509write_csr_set_md_alg(&req, md_type); 312 mbedtls_x509write_csr_set_key(&req, &key); [all …]
|
| A D | test_suite_x509write.data | 3 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha1":MBEDTLS_MD_SHA1:0:0:0:0:0 7 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha224":MBEDTLS_MD_SHA224:0:0:0:0:0 11 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha256":MBEDTLS_MD_SHA256:0:0:0:0:0 15 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha384":MBEDTLS_MD_SHA384:0:0:0:0:0 19 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha512":MBEDTLS_MD_SHA512:0:0:0:0:0 23 x509_csr_check:"data_files/server1.key":"data_files/server1.req.md5":MBEDTLS_MD_MD5:0:0:0:0:0 35 x509_csr_check:"data_files/server1.key":"data_files/server1.req.key_usage_empty":MBEDTLS_MD_SHA1:0:… 39 x509_csr_check:"data_files/server1.key":"data_files/server1.req.cert_type":MBEDTLS_MD_SHA1:0:0:MBED… 43 x509_csr_check:"data_files/server1.key":"data_files/server1.req.cert_type_empty":MBEDTLS_MD_SHA1:0:… 51 x509_csr_check:"data_files/server5.key":"data_files/server5.req.ku.sha1":MBEDTLS_MD_SHA1:MBEDTLS_X5… [all …]
|
| A D | test_suite_x509parse.data | 323 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.md5":"CSR version \: 1\nsubject name \… 327 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.sha1":"CSR version \: 1\nsubject name … 331 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.sha224":"CSR version \: 1\nsubject name… 335 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.sha256":"CSR version \: 1\nsubject name… 339 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.sha384":"CSR version \: 1\nsubject name… 343 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.sha512":"CSR version \: 1\nsubject name… 347 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.commas.sha256":"CSR version \: 1\nsubje… 351 mbedtls_x509_csr_info:"data_files/parse_input/server5.req.sha1":"CSR version \: 1\nsubject name … 355 mbedtls_x509_csr_info:"data_files/parse_input/server5.req.sha224":"CSR version \: 1\nsubject name… 359 mbedtls_x509_csr_info:"data_files/parse_input/server5.req.sha256":"CSR version \: 1\nsubject name… [all …]
|
| /lib/mbedtls/external/mbedtls/tests/data_files/dir-maxpath/ |
| A D | long.sh | 15 $OPENSSL req -new -x509 -subj "/C=UK/O=mbed TLS/CN=CA00" $OPT \ 28 $OPENSSL req -new -subj "/C=UK/O=mbed TLS/CN=CA${ME}" \ 30 $OPENSSL x509 -req -CA ${UP}.crt -CAkey ${UP}.key -set_serial 1 $OPT \
|
| /lib/mbedtls/external/mbedtls/scripts/ |
| A D | min_requirements.py | 31 def adjust_requirement(self, req: str) -> str: 35 split_req = req.split(';', 1) 63 for req in self.requirements: 64 out.write(req + '\n')
|
| /lib/lwip/lwip/src/apps/mdns/ |
| A D | mdns.c | 1874 if (req && req->only_ptr) { in mdns_handle_response() 1877 req = NULL; in mdns_handle_response() 1879 if (!req) { in mdns_handle_response() 1883 if (req && req->result_fn) { in mdns_handle_response() 1888 if (req->only_ptr) { in mdns_handle_response() 1921 req->result_fn(&ans, (const char *)&data + off, len, flags, req->arg); in mdns_handle_response() 2644 struct mdns_request *req; in mdns_search_stop() local 2647 if (req && req->result_fn) { in mdns_search_stop() 2648 req->result_fn = NULL; in mdns_search_stop() 2672 struct mdns_request *req; in mdns_search_service() local [all …]
|
| A D | mdns_out.c | 556 struct mdns_request *req = msg->query; in mdns_add_query_question_to_outpacket() local 559 mdns_build_request_domain(&dom, req, req->name[0]); in mdns_add_query_question_to_outpacket() 561 res = mdns_add_question(outpkt, &dom, req->qtype, DNS_RRCLASS_IN, 0); in mdns_add_query_question_to_outpacket() 1143 mdns_send_request(struct mdns_request *req, struct netif *netif, const ip_addr_t *destination) in mdns_send_request() argument 1149 outmsg.query = req; in mdns_send_request()
|
| /lib/lwip/lwip/src/apps/smtp/ |
| A D | smtp.c | 697 struct smtp_send_request *req = (struct smtp_send_request*)arg; in smtp_send_mail_int() local 703 if (req->static_data) { in smtp_send_mail_int() 704 err = smtp_send_mail_static(req->from, req->to, req->subject, req->body, in smtp_send_mail_int() 705 req->callback_fn, req->callback_arg); in smtp_send_mail_int() 707 err = smtp_send_mail(req->from, req->to, req->subject, req->body, in smtp_send_mail_int() 708 req->callback_fn, req->callback_arg); in smtp_send_mail_int() 710 if ((err != ERR_OK) && (req->callback_fn != NULL)) { in smtp_send_mail_int() 711 req->callback_fn(req->callback_arg, SMTP_RESULT_ERR_UNKNOWN, 0, err); in smtp_send_mail_int()
|
| /lib/lwip/lwip/contrib/apps/LwipMibCompiler/Mibs/IANA/ |
| A D | IANATn3270eTC-MIB | 273 0 x'03' - actlu req 274 0 x'04' - bind req 275 0 x'05' - clear req 276 0 x'06' - dactlu req 277 0 x'07' - warm actpu req 278 0 x'08' - sdt req 279 0 x'09' - unbind req 285 0 x'0F' - client connect req 286 0 x'10' - client disconnect req
|
| /lib/lwip/lwip/src/core/ |
| A D | dns.c | 1401 struct dns_req_entry *req; in dns_enqueue() local 1472 req = NULL; in dns_enqueue() 1475 req = &dns_requests[r]; in dns_enqueue() 1479 if (req == NULL) { in dns_enqueue() 1484 req->dns_table_idx = i; in dns_enqueue() 1487 req = &dns_requests[i]; in dns_enqueue() 1497 LWIP_DNS_SET_ADDRTYPE(req->reqaddrtype, dns_addrtype); in dns_enqueue() 1498 req->found = found; in dns_enqueue() 1499 req->arg = callback_arg; in dns_enqueue() 1509 req->found = NULL; in dns_enqueue()
|
| /lib/lwip/lwip/src/apps/sntp/ |
| A D | sntp.c | 341 sntp_initialize_request(struct sntp_msg *req) in sntp_initialize_request() argument 343 memset(req, 0, SNTP_MSG_LEN); in sntp_initialize_request() 344 req->li_vn_mode = SNTP_LI_NO_WARNING | SNTP_VERSION | SNTP_MODE_CLIENT; in sntp_initialize_request() 359 req->transmit_timestamp[0] = sec; in sntp_initialize_request() 360 req->transmit_timestamp[1] = frac; in sntp_initialize_request()
|
| /lib/lwip/lwip/src/include/lwip/apps/ |
| A D | mdns_out.h | 129 err_t mdns_send_request(struct mdns_request *req, struct netif *netif, const ip_addr_t *destination…
|
| /lib/mbedtls/external/mbedtls/docs/architecture/psa-migration/ |
| A D | psa-limitations.md | 291 server9.req.sha1 295 server9.req.sha224 299 server9.req.sha256 303 server9.req.sha384 307 server9.req.sha512
|