/external/python/cpython2/Modules/_ctypes/libffi/testsuite/libffi.call/ |
cls_longdouble.c | 35 cls_ldouble_gn(ffi_cif* cif __UNUSED__, void* resp, 47 *(long double*)resp = cls_ldouble_fn(
|
/external/python/oauth2client/tests/ |
http_mock.py | 66 resp, content = http.request("http://examples.com") 92 resp, content = self._iterable.pop(0) 102 return httplib2.Response(resp), content
|
/external/selinux/python/sepolicy/sepolicy/ |
sedbus.py | 57 resp = dbus_proxy.setenforce(int(sys.argv[1])) 58 print(resp)
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_dev_disc.c | 140 struct wpabuf *resp; local 142 resp = p2p_build_dev_disc_resp(dialog_token, status); 143 if (resp == NULL) 153 wpabuf_head(resp), wpabuf_len(resp), 200) < 0) { 157 wpabuf_free(resp);
|
/external/f2fs-tools/tools/sg_write_buffer/ |
sg_cmds_extra.c | 137 void * resp, int alloc_len, bool noisy, int verbose) 163 set_scsi_pt_data_in(ptvp, (unsigned char *)resp, alloc_len); 187 hex2stderr((const uint8_t *)resp, (ret > 256 ? 256 : ret), 191 hex2stderr((const uint8_t *)resp, ret, 0); 201 sg_ll_get_lba_status(int sg_fd, uint64_t start_llba, void * resp, 204 return sg_ll_get_lba_status16(sg_fd, start_llba, /* rt = */ 0x0, resp, 213 void * resp, int alloc_len, bool noisy, 242 set_scsi_pt_data_in(ptvp, (unsigned char *)resp, alloc_len); 266 hex2stderr((const uint8_t *)resp, (ret > 256 ? 256 : ret), 270 hex2stderr((const uint8_t *)resp, ret, 0) [all...] |
sg_cmds_basic.c | 337 sg_ll_inquiry_com(int sg_fd, bool cmddt, bool evpd, int pg_op, void * resp, 360 if (resp && (mx_resp_len > 0)) { 361 up = (unsigned char *)resp; 377 set_scsi_pt_data_in(ptvp, (unsigned char *)resp, mx_resp_len); 411 memset((unsigned char *)resp + (mx_resp_len - resid), 0, resid); 420 sg_ll_inquiry(int sg_fd, bool cmddt, bool evpd, int pg_op, void * resp, 423 return sg_ll_inquiry_com(sg_fd, cmddt, evpd, pg_op, resp, mx_resp_len, 470 * where resp points. If the residual value equals mx_resp_len then no 473 sg_ll_inquiry_v2(int sg_fd, bool evpd, int pg_op, void * resp, 477 return sg_ll_inquiry_com(sg_fd, false, evpd, pg_op, resp, mx_resp_len [all...] |
/external/grpc-grpc/test/core/tsi/alts/handshaker/ |
alts_tsi_handshaker_test.cc | 116 grpc_gcp_handshaker_resp* resp = grpc_gcp_handshaker_resp_create(); local 117 GPR_ASSERT(grpc_gcp_handshaker_resp_set_code(resp, 0)); 124 resp, ALTS_TSI_HANDSHAKER_TEST_OUT_FRAME, 129 resp, ALTS_TSI_HANDSHAKER_TEST_OUT_FRAME, 132 resp, ALTS_TSI_HANDSHAKER_TEST_PEER_IDENTITY)); 134 resp, strlen(ALTS_TSI_HANDSHAKER_TEST_CONSUMED_BYTES))); 136 resp, ALTS_TSI_HANDSHAKER_TEST_KEY_DATA, 139 resp, ALTS_TSI_HANDSHAKER_TEST_MAX_RPC_VERSION_MAJOR, 146 resp, ALTS_TSI_HANDSHAKER_TEST_PEER_IDENTITY)); 148 resp, strlen(ALTS_TSI_HANDSHAKER_TEST_OUT_FRAME))) [all...] |
/external/tensorflow/tensorflow/contrib/bigtable/kernels/test_kernels/ |
bigtable_test_client_test.cc | 308 auto resp = table.SampleRows(status); local 310 EXPECT_EQ(3, resp.size()); 311 EXPECT_EQ("r1", string(resp[0].row_key)); 312 EXPECT_EQ(0, resp[0].offset_bytes); 313 EXPECT_EQ("r3", string(resp[1].row_key)); 314 EXPECT_EQ(100, resp[1].offset_bytes); 315 EXPECT_EQ("r5", string(resp[2].row_key)); 316 EXPECT_EQ(200, resp[2].offset_bytes); 327 auto resp = table.SampleRows(status); local 329 EXPECT_EQ(1, resp.size()) 344 auto resp = table.SampleRows(status); local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ikev2.c | 137 struct wpabuf *resp; local 174 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen, 176 if (resp == NULL) 179 wpabuf_put_u8(resp, flags); /* Flags */ 181 wpabuf_put_be32(resp, wpabuf_len(data->out_buf)); 183 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used, 188 const u8 *msg = wpabuf_head(resp); 189 size_t len = wpabuf_len(resp); 193 msg, len, wpabuf_put(resp, icv_len)); 240 return resp; [all...] |
eap_proxy_qmi_oc.c | 266 (event_resp_msg.resp.result != QMI_RESULT_SUCCESS_V01 && 267 event_resp_msg.resp.error != QMI_ERR_NO_EFFECT_V01)) { 271 event_resp_msg.resp.error); 302 event_resp_msg.resp.error); 305 (event_resp_msg.resp.result != QMI_RESULT_SUCCESS_V01 && 306 event_resp_msg.resp.error != QMI_ERR_NO_EFFECT_V01)) { 310 event_resp_msg.resp.error); 349 card_status_resp_msg.resp.result != QMI_RESULT_SUCCESS_V01) { 352 "resp_err = %d \n", qmi_err_code, card_status_resp_msg.resp.error); 358 (card_status_resp_msg.resp.result != QMI_RESULT_SUCCESS_V01)) 1498 struct wpabuf *resp; local 1658 struct eap_hdr *resp; local [all...] |
/external/wpa_supplicant_8/hs20/client/ |
oma_dm_client.c | 945 xml_node_t *resp; local 979 resp = xml_node_from_buf(ctx->xml, res); 981 if (resp == NULL) { 986 debug_dump_node(ctx, "OMA DM Package", resp); 988 return resp; 993 xml_node_t *resp, int msgid, 1010 name = xml_node_get_localname(ctx->xml, resp); 1016 hdr = get_node(ctx->xml, resp, "SyncHdr"); 1017 body = get_node(ctx->xml, resp, "SyncBody"); 1156 xml_node_t *syncml, *resp; local 1193 xml_node_t *syncml, *resp; local 1255 xml_node_t *syncml, *resp; local 1302 xml_node_t *syncml, *resp; local [all...] |
/external/guice/extensions/servlet/test/com/google/inject/servlet/ |
ServletTest.java | 201 ServletRequest req, ServletResponse resp, FilterChain chain) 207 assertSame(resp, servletRespProvider.get()); 208 assertSame(resp, respProvider.get()); 213 assertSame(resp, respProvider.get()); 272 public void doFilter(ServletRequest req, ServletResponse resp, FilterChain chain) 281 assertSame(resp, servletRespProvider.get()); 282 assertSame(resp, respProvider.get()); 284 assertEquals(resp, previousResp[0]); 290 new HttpServletResponseWrapper((HttpServletResponse) resp)); 293 assertSame(resp, respProvider.get()) [all...] |
/external/openssh/ |
serverloop.c | 639 struct sshbuf *resp = NULL; local 647 if ((resp = sshbuf_new()) == NULL || (sigbuf = sshbuf_new()) == NULL) 687 (r = sshbuf_put_string(resp, sig, slen)) != 0) { 694 *respp = resp; 695 resp = NULL; /* don't free it */ 699 sshbuf_free(resp); 711 struct sshbuf *resp = NULL; local 745 if ((resp = sshbuf_new()) == NULL) 748 (r = sshbuf_put_u32(resp, allocated_listen_port)) != 0) 796 success = server_input_hostkeys_prove(&resp); [all...] |
/external/tensorflow/tensorflow/python/client/ |
session_ref.cc | 134 RunStepResponse* resp = op.mutable_run_step_response(); local 168 NamedTensorProto* tproto = resp->add_tensor(); 174 *resp->mutable_metadata() = *run_metadata; 191 CreateSessionResponse* resp = op.mutable_create_session_response(); local 197 resp->set_session_handle(SessionToHandle(session)); 244 ListDevicesResponse* resp = op.mutable_list_devices_response(); local 249 *resp->mutable_local_device() = {response->begin(), response->end()}; 282 RunStepResponse* resp = op.mutable_run_step_response(); local 301 NamedTensorProto* tproto = resp->add_tensor(); 319 MakeCallableResponse* resp = op.mutable_make_callable_response() local 339 RunCallableResponse* resp = op.mutable_run_callable_response(); local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 217 const struct eap_psk_hdr_2 *resp; local 230 if (cpos == NULL || left < sizeof(*resp)) { 234 resp = (const struct eap_psk_hdr_2 *) cpos; 235 cpos = (const u8 *) (resp + 1); 236 left -= sizeof(*resp); 292 resp->rand_p, EAP_PSK_RAND_LEN); 293 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN); 315 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", resp->mac_p, EAP_PSK_MAC_LEN); 316 if (os_memcmp_const(mac, resp->mac_p, EAP_PSK_MAC_LEN) != 0) { 332 const struct eap_psk_hdr_4 *resp; local [all...] |
/external/grpc-grpc/src/ruby/spec/generic/ |
client_stub_spec.rb | 47 resp = op_view.execute 48 yield resp 168 @sent_msg, @resp = 'a_msg', 'a_reply' 174 th = run_request_response(@sent_msg, @resp, @pass) 177 expect(get_response(stub)).to eq(@resp) 184 th = run_request_response(@sent_msg, @resp, @pass, 188 expect(get_response(stub)).to eq(@resp) 220 th = run_request_response(@sent_msg, @resp, @pass) 225 expect(get_response(stub)).to eq(@resp) 232 th = run_request_response(@sent_msg, @resp, @fail [all...] |
/external/python/oauth2client/oauth2client/ |
client.py | 796 resp, content = http_request( 799 if resp.status == http_client.OK: 822 error_msg = 'Invalid response {0}.'.format(resp['status']) 834 raise HttpAccessTokenRefreshError(error_msg, status=resp.status) 863 resp, content = http_request(token_revoke_uri) 864 if resp.status == http_client.OK: 867 error_msg = 'Invalid response {0}.'.format(resp.status) 907 resp, content = http_request(token_info_uri) 909 if resp.status == http_client.OK: 913 error_msg = 'Invalid response {0}.'.format(resp.status [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_ocsp.c | 113 const u8 *resp, size_t len, 129 wpa_hexdump(MSG_MSGDUMP, "OCSP: SingleResponse", resp, len); 141 if (asn1_get_next(resp, len, &hdr) < 0 || 241 end = resp + len; 320 struct x509_certificate *issuer, const u8 *resp, 327 pos = resp; 328 end = resp + len; 355 const u8 *resp, size_t len) 371 wpa_hexdump(MSG_MSGDUMP, "OCSP: BasicOCSPResponse", resp, len); 384 if (asn1_get_next(resp, len, &hdr) < 0 | [all...] |
/external/grpc-grpc/test/cpp/end2end/ |
mock_test.cc | 176 grpc::string resp(""); 179 resp.append(request.message()); 181 response->set_message(resp); 264 EchoResponse resp; local 265 resp.set_message("hello world"); 268 .WillOnce(DoAll(SetArgPointee<2>(resp), Return(Status::OK))); 280 EchoResponse resp; local 281 resp.set_message("hello, world"); 288 .WillOnce(DoAll(SetArgPointee<1>(resp), Return(w)));
|
/external/libphonenumber/demo/src/com/google/phonenumbers/ |
PhoneNumberParserServlet.java | 64 public void doPost(HttpServletRequest req, HttpServletResponse resp) throws IOException { 104 resp.setContentType("text/html"); 105 resp.setCharacterEncoding(UTF_8.name()); 109 resp.sendRedirect(getPermaLinkURL(phoneNumber, defaultCountry, geocodingLocale, 112 resp.getWriter().println(getOutputForFile(defaultCountry, fileContents)); 119 public void doGet(HttpServletRequest req, HttpServletResponse resp) throws IOException { 135 resp.setContentType("text/html"); 136 resp.setCharacterEncoding(UTF_8.name()); 137 resp.getWriter().println(
|
/external/ltp/testcases/kernel/syscalls/fanotify/ |
fanotify03.c | 240 struct fanotify_response resp; local 242 resp.fd = event->fd; 243 resp.response = event_resp[test_num]; 244 SAFE_WRITE(1, fd_notify, &resp, 245 sizeof(resp));
|
/external/ppp/pppd/ |
session.c | 125 struct pam_response **resp, void *appdata_ptr) 137 reply[replies].resp = COPY_STRING(PAM_username); 138 /* PAM frees resp */ 142 reply[replies].resp = COPY_STRING(PAM_password); 143 /* PAM frees resp */ 150 reply[replies].resp = NULL; 158 *resp = reply;
|
/external/webrtc/webrtc/p2p/base/ |
turnserver.cc | 96 static bool InitResponse(const StunMessage* req, StunMessage* resp) { 100 resp->SetType(resp_type); 101 resp->SetTransactionID(req->transaction_id()); 106 const std::string& reason, StunMessage* resp) { 110 resp->SetType(resp_type); 111 resp->SetTransactionID(req->transaction_id()); 112 VERIFY(resp->AddAttribute(new cricket::StunErrorCodeAttribute( 455 TurnMessage resp; local 456 InitErrorResponse(req, code, reason, &resp); 457 LOG(LS_INFO) << "Sending error response, type=" << resp.type( 465 TurnMessage resp; local 477 TurnMessage resp; local [all...] |
/external/grpc-grpc/examples/ruby/route_guide/ |
route_guide_client.rb | 44 resp = stub.get_feature(pt) 45 if resp.name != '' 46 p "- found '#{resp.name}' at #{pt.inspect}" 105 resp = stub.record_route(reqs.each) 106 p "summary: #{resp.inspect}"
|
/external/libese/apps/boot/card/src/com/android/verifiedboot/storage/ |
BasicLock.java | 241 short resp = 0; local 243 resp = requiredLocks[l].get(temp, (short) 0); 245 if (resp != 0 || temp[0] != (byte) 0x0) {
|