Home
last modified time | relevance | path

Searched refs:req (Results 1 – 24 of 24) sorted by relevance

/openthread-latest/src/posix/platform/
Dnetif.cpp440 } req; in UpdateUnicastLinux() local
442 memset(&req, 0, sizeof(req)); in UpdateUnicastLinux()
444 req.nh.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg)); in UpdateUnicastLinux()
445 req.nh.nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK | (aIsAdded ? (NLM_F_CREATE | NLM_F_EXCL) : 0); in UpdateUnicastLinux()
446 req.nh.nlmsg_type = aIsAdded ? RTM_NEWADDR : RTM_DELADDR; in UpdateUnicastLinux()
447 req.nh.nlmsg_pid = 0; in UpdateUnicastLinux()
448 req.nh.nlmsg_seq = ++sNetlinkSequence; in UpdateUnicastLinux()
450 req.ifa.ifa_family = AF_INET6; in UpdateUnicastLinux()
451 req.ifa.ifa_prefixlen = aAddressInfo.mPrefixLength; in UpdateUnicastLinux()
452 req.ifa.ifa_flags = IFA_F_NODAD; in UpdateUnicastLinux()
[all …]
Dspi_interface.cpp202 struct gpiohandle_request req; in SetupGpioHandle() local
205 assert(strlen(aLabel) < sizeof(req.consumer_label)); in SetupGpioHandle()
207 req.flags = aHandleFlags; in SetupGpioHandle()
208 req.lines = 1; in SetupGpioHandle()
209 req.lineoffsets[0] = aLine; in SetupGpioHandle()
210 req.default_values[0] = 1; in SetupGpioHandle()
212 snprintf(req.consumer_label, sizeof(req.consumer_label), "%s", aLabel); in SetupGpioHandle()
214 VerifyOrDie((ret = ioctl(aFd, GPIO_GET_LINEHANDLE_IOCTL, &req)) != -1, OT_EXIT_ERROR_ERRNO); in SetupGpioHandle()
216 return req.fd; in SetupGpioHandle()
225 struct gpioevent_request req; in SetupGpioEvent() local
[all …]
Dinfra_if.cpp675 struct gaicb *req = (struct gaicb *)sv.sival_ptr; in DiscoverNat64PrefixDone() local
676 struct addrinfo *res = (struct addrinfo *)req->ar_result; in DiscoverNat64PrefixDone()
680 VerifyOrExit((char *)req->ar_name == kWellKnownIpv4OnlyName); in DiscoverNat64PrefixDone()
747 freeaddrinfo((struct addrinfo *)req->ar_request); in DiscoverNat64PrefixDone()
748 free(req); in DiscoverNat64PrefixDone()
/openthread-latest/third_party/mbedtls/repo/tests/data_files/
DMakefile51 test-ca.req.sha256: $(test_ca_key_file_rsa)
53 all_intermediate += test-ca.req.sha256
55 parse_input/test-ca.crt test-ca.crt: $(test_ca_key_file_rsa) test-ca.req.sha256
56 …$(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=N…
74 test-ca-sha1.crt: $(test_ca_key_file_rsa) test-ca.req.sha256
75 …$(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=N…
82 test-ca-sha256.crt: $(test_ca_key_file_rsa) test-ca.req.sha256
83 …$(MBEDTLS_CERT_WRITE) is_ca=1 serial=3 request_file=test-ca.req.sha256 selfsign=1 issuer_name="C=N…
91 …$(OPENSSL) req -x509 -new -nodes -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pwd_rsa)" -s…
95 …$(OPENSSL) req -x509 -new -nodes -key $(test_ca_key_file_rsa) -passin "pass:$(test_ca_pwd_rsa)" -s…
[all …]
Dserver1_csr.opensslconf1 [ req ]
DauthorityKeyId_subjectKeyId.conf1 [req]
Dtest-ca.opensslconf1 [req]
DReadme-x509.txt74 .req*: CSR, not certificate
/openthread-latest/third_party/mbedtls/repo/programs/x509/
Dcert_req.c110 int write_certificate_request(mbedtls_x509write_csr *req, const char *output_file, in write_certificate_request() argument
120 if ((ret = mbedtls_x509write_csr_pem(req, output_buf, 4096, f_rng, p_rng)) < 0) { in write_certificate_request()
148 mbedtls_x509write_csr req; in main() local
160 mbedtls_x509write_csr_init(&req); in main()
387 mbedtls_x509write_csr_set_md_alg(&req, opt.md_alg); in main()
391 ret = mbedtls_x509write_csr_set_key_usage(&req, opt.key_usage); in main()
401 ret = mbedtls_x509write_csr_set_ns_cert_type(&req, opt.ns_cert_type); in main()
411 ret = mbedtls_x509write_csr_set_subject_alternative_name(&req, opt.san_list); in main()
442 if ((ret = mbedtls_x509write_csr_set_subject_name(&req, opt.subject_name)) != 0) { in main()
463 mbedtls_x509write_csr_set_key(&req, &key); in main()
[all …]
/openthread-latest/third_party/tcplp/bsdtcp/
Dtcp_fastopen.c718 error = sysctl_handle_int(oidp, &new, 0, req);
719 if (error == 0 && req->newptr) {
746 error = sysctl_handle_int(oidp, &new, 0, req);
747 if (error == 0 && req->newptr) {
773 error = sysctl_handle_int(oidp, &new, 0, req);
774 if (error == 0 && req->newptr) {
811 if (req->oldptr != NULL || req->oldlen != 0)
813 if (req->newptr == NULL)
815 if (req->newlen != sizeof(newkey))
817 error = SYSCTL_IN(req, newkey, sizeof(newkey));
[all …]
/openthread-latest/third_party/mbedtls/repo/tests/data_files/dir-maxpath/
Dlong.sh15 $OPENSSL req -new -x509 -subj "/C=UK/O=mbed TLS/CN=CA00" $OPT \
28 $OPENSSL req -new -subj "/C=UK/O=mbed TLS/CN=CA${ME}" \
30 $OPENSSL x509 -req -CA ${UP}.crt -CAkey ${UP}.key -set_serial 1 $OPT \
/openthread-latest/third_party/mbedtls/repo/scripts/
Dmin_requirements.py31 def adjust_requirement(self, req: str) -> str:
35 split_req = req.split(';', 1)
63 for req in self.requirements:
64 out.write(req + '\n')
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_x509write.function148 mbedtls_x509write_csr req;
204 mbedtls_x509write_csr_init(&req);
211 mbedtls_x509write_csr_set_md_alg(&req, md_type);
212 mbedtls_x509write_csr_set_key(&req, &key);
213 TEST_ASSERT(mbedtls_x509write_csr_set_subject_name(&req, subject_name) == 0);
215 TEST_ASSERT(mbedtls_x509write_csr_set_key_usage(&req, key_usage) == 0);
218 TEST_ASSERT(mbedtls_x509write_csr_set_ns_cert_type(&req, cert_type) == 0);
221 TEST_ASSERT(csr_set_extended_key_usage(&req, MBEDTLS_OID_SERVER_AUTH,
224 TEST_ASSERT(mbedtls_x509write_csr_set_subject_alternative_name(&req, san_list) == 0);
227 ret = mbedtls_x509write_csr_pem(&req, buf, sizeof(buf),
[all …]
Dtest_suite_x509write.data3 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha1":MBEDTLS_MD_SHA1:0:0:0:0:0
7 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha224":MBEDTLS_MD_SHA224:0:0:0:0:0
11 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha256":MBEDTLS_MD_SHA256:0:0:0:0:0
15 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha384":MBEDTLS_MD_SHA384:0:0:0:0:0
19 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha512":MBEDTLS_MD_SHA512:0:0:0:0:0
23 x509_csr_check:"data_files/server1.key":"data_files/server1.req.md5":MBEDTLS_MD_MD5:0:0:0:0:0
27 x509_csr_check:"data_files/server1.key":"data_files/server1.req.key_usage":MBEDTLS_MD_SHA1:MBEDTLS_…
35 x509_csr_check:"data_files/server1.key":"data_files/server1.req.key_usage_empty":MBEDTLS_MD_SHA1:0:…
39 x509_csr_check:"data_files/server1.key":"data_files/server1.req.cert_type":MBEDTLS_MD_SHA1:0:0:MBED…
43 x509_csr_check:"data_files/server1.key":"data_files/server1.req.cert_type_empty":MBEDTLS_MD_SHA1:0:…
[all …]
Dtest_suite_x509parse.data323 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.md5":"CSR version \: 1\nsubject name \…
327 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.sha1":"CSR version \: 1\nsubject name …
331 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.sha224":"CSR version \: 1\nsubject name…
335 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.sha256":"CSR version \: 1\nsubject name…
339 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.sha384":"CSR version \: 1\nsubject name…
343 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.sha512":"CSR version \: 1\nsubject name…
347 mbedtls_x509_csr_info:"data_files/parse_input/server1.req.commas.sha256":"CSR version \: 1\nsubje…
351 mbedtls_x509_csr_info:"data_files/parse_input/server5.req.sha1":"CSR version \: 1\nsubject name …
355 mbedtls_x509_csr_info:"data_files/parse_input/server5.req.sha224":"CSR version \: 1\nsubject name…
359 mbedtls_x509_csr_info:"data_files/parse_input/server5.req.sha256":"CSR version \: 1\nsubject name…
[all …]
/openthread-latest/tools/tcat_ble_client/auth-generate/
Dcreate-cert-ca.sh46 openssl req -new -key "ca/${NAME}_key.pem" -out "${NAME}.csr" \
52 -extensions "${NAME}" -req -in "${NAME}.csr" \
Dcreate-cert-tcat-commissioner.sh52 openssl req -new -key "keys/${NAME}_key.pem" -out "${NAME}.csr" -subj \
59 "${NAME}" -req -in "${NAME}.csr" -out "output/${NAME}/commissioner_cert.pem" \
Dcreate-cert-tcat-device.sh57 openssl req -new -key "keys/${NAME}_key.pem" -out "${NAME}.csr" -subj \
64 "${NAME}" -req -in "${NAME}.csr" -out "output/${NAME}/device_cert.pem" \
/openthread-latest/tools/tcat_ble_client/
DGENERATING_CERTIFICATES.md41 openssl req -new -sha256 -key ca_key.pem -out ca.csr
47 openssl req -x509 -sha256 -days 365 -key ca_key.pem -in ca.csr -out ca_cert.pem
67 openssl req -new -sha256 -key commissioner_key.pem -out commissioner.csr -config commissioner.cnf
73 openssl x509 -req -in commissioner.csr -CA ca_cert.pem -CAkey ca_key.pem -out commissioner_cert.pem…
93 [ req ]
/openthread-latest/tools/harness-automation/autothreadharness/
Dopen_thread_controller.py191 def _req(self, req): argument
202 logger.debug('DUT> %s', req)
210 self._sendline(req)
211 self._expect(req)
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/
Dpsa-limitations.md291 server9.req.sha1
295 server9.req.sha224
299 server9.req.sha256
303 server9.req.sha384
307 server9.req.sha512
/openthread-latest/src/posix/
DREADME.md107 nrfutil pkg generate --hw-version 52 --sd-req=0x00 \
/openthread-latest/src/cli/
DREADME_COAPS.md80 > openssl req -x509 -new -key ec_private.pem -out x509_cert.pem -days 30
DREADME.md161 …ure the response status for DUA.req with meshLocalIid in payload. Without meshLocalIid, simply res…
228 Configure the response status for the next MLR.req.