HomeSort by relevance Sort by last modified time
    Searched full:resp (Results 1 - 25 of 348) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/qemu/hw/
goldfish_mmc.c 76 uint32_t resp[4]; member in struct:goldfish_mmc_state
94 QFIELD_INT32(resp[0]),
95 QFIELD_INT32(resp[1]),
96 QFIELD_INT32(resp[2]),
97 QFIELD_INT32(resp[3]),
223 s->resp[0] = 0;
224 s->resp[1] = 0;
225 s->resp[2] = 0;
226 s->resp[3] = 0;
244 s->resp[3] = 0x400E0032
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sake.c 154 struct wpabuf *resp; local
174 resp = eap_sake_build_msg(data, eap_get_id(reqData),
177 if (resp == NULL)
181 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID,
186 return resp;
198 struct wpabuf *resp; local
255 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen,
257 if (resp == NULL)
261 eap_sake_add_attr(resp, EAP_SAKE_AT_RAND_P,
266 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID
299 struct wpabuf *resp; local
372 struct wpabuf *resp; local
    [all...]
eap_gtc.c 55 struct wpabuf *resp; local
78 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC,
80 return resp;
110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
112 if (resp == NULL)
115 wpabuf_put_data(resp, "RESPONSE=", 9);
116 wpabuf_put_data(resp, identity, identity_len);
117 wpabuf_put_u8(resp, '\0');
119 wpabuf_put_data(resp, password, password_len);
121 wpabuf_head_u8(resp) + sizeof(struct eap_hdr)
    [all...]
eap_gpsk.c 265 struct wpabuf *resp; local
285 resp = eap_gpsk_send_gpsk_2(data, eap_get_id(reqData),
287 if (resp == NULL)
292 return resp;
301 struct wpabuf *resp; local
313 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len,
315 if (resp == NULL)
318 wpabuf_put_u8(resp, EAP_GPSK_OPCODE_GPSK_2);
319 start = wpabuf_put(resp, 0);
323 wpabuf_put_be16(resp, data->id_peer_len)
556 struct wpabuf *resp; local
599 struct wpabuf *resp; local
636 struct wpabuf *resp; local
    [all...]
eap_md5.c 39 struct wpabuf *resp; local
82 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, 1 + CHAP_MD5_LEN,
84 if (resp == NULL)
91 wpabuf_put_u8(resp, CHAP_MD5_LEN);
93 id = eap_get_id(resp);
94 rpos = wpabuf_put(resp, CHAP_MD5_LEN);
98 return resp;
eap_tnc.c 92 struct wpabuf *resp; local
114 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen,
116 if (resp == NULL)
119 wpabuf_put_u8(resp, flags); /* Flags */
121 wpabuf_put_be32(resp, wpabuf_len(data->out_buf));
123 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used,
145 return resp;
207 struct wpabuf *resp; local
359 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1,
361 if (resp == NULL
    [all...]
eap_pax.c 103 struct wpabuf *resp; local
106 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX,
108 if (resp == NULL)
111 pax = wpabuf_put(resp, sizeof(*pax));
118 return resp;
127 struct wpabuf *resp; local
198 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen);
199 if (resp == NULL)
202 wpabuf_put_be16(resp, EAP_PAX_RAND_LEN);
203 wpabuf_put_data(resp, data->rand.r.y, EAP_PAX_RAND_LEN)
243 struct wpabuf *resp; local
335 struct wpabuf *resp; local
    [all...]
eap_otp.c 38 struct wpabuf *resp; local
72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
74 if (resp == NULL)
76 wpabuf_put_data(resp, password, password_len);
85 return resp;
eap_leap.c 69 struct wpabuf *resp; local
114 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP,
117 if (resp == NULL)
119 wpabuf_put_u8(resp, LEAP_VERSION);
120 wpabuf_put_u8(resp, 0); /* unused */
121 wpabuf_put_u8(resp, LEAP_RESPONSE_LEN);
122 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN);
130 wpabuf_put_data(resp, identity, identity_len);
134 return resp;
143 struct wpabuf *resp; local
    [all...]
  /external/bluetooth/bluez/tools/
hciattach_tialt.c 67 command_complete_t resp; local
69 FAILIF(read_hci_event(fd, (unsigned char *)&resp, sizeof(resp)) < 0,
73 FAILIF(resp.uart_prefix != HCI_EVENT_PKT,
75 resp.uart_prefix);
77 FAILIF(resp.hci_hdr.evt != EVT_CMD_COMPLETE, /* event must be event-complete */
79 "but 0x%02x!\n", resp.hci_hdr.evt);
81 FAILIF(resp.hci_hdr.plen < 4, /* plen >= 4 for EVT_CMD_COMPLETE */
83 resp.hci_hdr.plen);
86 FAILIF(resp.cmd_complete.opcode != (uint16_t)opcode
196 unsigned char resp[100]; \/* Response *\/ local
    [all...]
  /system/core/fastboot/
engine.c 76 int (*func)(Action *a, int status, char *resp);
84 static int cb_default(Action *a, int status, char *resp)
87 fprintf(stderr,"FAILED (%s)\n", resp);
168 static int cb_check(Action *a, int status, char *resp, int invert)
176 fprintf(stderr,"FAILED (%s)\n", resp);
180 yes = match(resp, value, count);
191 fprintf(stderr,"Device %s is '%s'.\n", a->cmd + 7, resp);
201 static int cb_require(Action *a, int status, char *resp)
203 return cb_check(a, status, resp, 0);
206 static int cb_reject(Action *a, int status, char *resp)
277 char resp[FB_RESPONSE_SZ+1]; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_pax.c 192 struct eap_pax_hdr *resp; local
198 if (pos == NULL || len < sizeof(*resp)) {
204 resp = (struct eap_pax_hdr *) pos;
209 resp->op_code, resp->flags, resp->mac_id, resp->dh_group_id,
210 resp->public_key_id);
212 (u8 *) (resp + 1), len - sizeof(*resp) - EAP_PAX_ICV_LEN)
292 struct eap_pax_hdr *resp; local
460 struct eap_pax_hdr *resp; local
    [all...]
  /external/wpa_supplicant/
eap_pax.c 113 struct eap_pax_hdr *resp; local
115 resp = os_malloc(resp_len);
116 if (resp == NULL)
118 resp->code = EAP_CODE_RESPONSE;
119 resp->identifier = req->identifier;
120 resp->length = host_to_be16(resp_len);
121 resp->type = EAP_TYPE_PAX;
122 resp->op_code = op_code;
123 resp->flags = 0;
124 resp->mac_id = req->mac_id
137 struct eap_pax_hdr *resp; local
260 struct eap_pax_hdr *resp; local
356 u8 *resp, icvbuf[EAP_PAX_ICV_LEN]; local
    [all...]
eap_gtc.c 56 struct eap_hdr *resp; local
80 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC,
83 return (u8 *) resp;
113 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, respDataLen,
115 if (resp == NULL)
126 (u8 *) (resp + 1) + 1, plen);
133 return (u8 *) resp;
eap_peap.c 208 struct eap_hdr *resp; local
214 resp = os_malloc(sizeof(struct eap_hdr) + 2 + data->ssl.tls_out_limit);
215 if (resp == NULL)
218 resp->code = EAP_CODE_RESPONSE;
219 resp->identifier = id;
221 pos = (u8 *) (resp + 1);
231 os_free(resp);
236 resp->length = host_to_be16(*out_len);
237 *out_data = (u8 *) resp;
243 u8 **resp, size_t *resp_len
400 u8 *resp = NULL; local
666 u8 flags, *resp, id; local
    [all...]
  /external/libffi/testsuite/libffi.call/
cls_double.c 10 static void cls_ret_double_fn(ffi_cif* cif __UNUSED__, void* resp, void** args,
13 *(double *)resp = *(double *)args[0];
16 *(double *)resp);
cls_float.c 10 static void cls_ret_float_fn(ffi_cif* cif __UNUSED__, void* resp, void** args,
13 *(float *)resp = *(float *)args[0];
16 *(float *)resp);
cls_schar.c 12 static void cls_ret_schar_fn(ffi_cif* cif __UNUSED__, void* resp, void** args,
15 *(ffi_arg*)resp = *(signed char *)args[0];
17 (int)*(ffi_arg *)(resp));
cls_sint.c 10 static void cls_ret_sint_fn(ffi_cif* cif __UNUSED__, void* resp, void** args,
13 *(ffi_arg*)resp = *(signed int *)args[0];
15 (int)*(ffi_arg *)(resp));
cls_sshort.c 10 static void cls_ret_sshort_fn(ffi_cif* cif __UNUSED__, void* resp, void** args,
13 *(ffi_arg*)resp = *(signed short *)args[0];
15 (int)*(ffi_arg *)(resp));
cls_uchar.c 10 static void cls_ret_uchar_fn(ffi_cif* cif __UNUSED__, void* resp, void** args,
13 *(ffi_arg*)resp = *(unsigned char *)args[0];
15 (int)*(ffi_arg *)(resp));
cls_uint.c 10 static void cls_ret_uint_fn(ffi_cif* cif __UNUSED__, void* resp, void** args,
13 *(ffi_arg *)resp = *(unsigned int *)args[0];
16 (int)*(ffi_arg *)(resp));
cls_ulonglong.c 10 static void cls_ret_ulonglong_fn(ffi_cif* cif __UNUSED__, void* resp,
13 *(unsigned long long *)resp= *(unsigned long long *)args[0];
16 *(unsigned long long *)(resp));
cls_ushort.c 10 static void cls_ret_ushort_fn(ffi_cif* cif __UNUSED__, void* resp, void** args,
13 *(ffi_arg*)resp = *(unsigned short *)args[0];
16 (int)*(ffi_arg *)(resp));
  /external/dropbear/
svr-authpam.c 55 struct pam_response* resp = NULL; local
113 * free the pam_response and its resp element - ie we _must_ malloc
115 resp = (struct pam_response*) m_malloc(sizeof(struct pam_response));
116 memset(resp, 0, sizeof(struct pam_response));
118 resp->resp = m_strdup(userDatap->passwd);
120 (*respp) = resp;
139 * free the pam_response and its resp element - ie we _must_ malloc
141 resp = (struct pam_response*) m_malloc(sizeof(struct pam_response));
142 memset(resp, 0, sizeof(struct pam_response))
    [all...]

Completed in 113 milliseconds

1 2 3 4 5 6 7 8 91011>>