/external/qemu/hw/ |
goldfish_mmc.c | 76 uint32_t resp[4]; member in struct:goldfish_mmc_state 94 QFIELD_INT32(resp[0]), 95 QFIELD_INT32(resp[1]), 96 QFIELD_INT32(resp[2]), 97 QFIELD_INT32(resp[3]), 223 s->resp[0] = 0; 224 s->resp[1] = 0; 225 s->resp[2] = 0; 226 s->resp[3] = 0; 244 s->resp[3] = 0x400E0032 [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sake.c | 154 struct wpabuf *resp; local 174 resp = eap_sake_build_msg(data, eap_get_id(reqData), 177 if (resp == NULL) 181 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, 186 return resp; 198 struct wpabuf *resp; local 255 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen, 257 if (resp == NULL) 261 eap_sake_add_attr(resp, EAP_SAKE_AT_RAND_P, 266 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID 299 struct wpabuf *resp; local 372 struct wpabuf *resp; local [all...] |
eap_gtc.c | 55 struct wpabuf *resp; local 78 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, 80 return resp; 110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 112 if (resp == NULL) 115 wpabuf_put_data(resp, "RESPONSE=", 9); 116 wpabuf_put_data(resp, identity, identity_len); 117 wpabuf_put_u8(resp, '\0'); 119 wpabuf_put_data(resp, password, password_len); 121 wpabuf_head_u8(resp) + sizeof(struct eap_hdr) [all...] |
eap_gpsk.c | 265 struct wpabuf *resp; local 285 resp = eap_gpsk_send_gpsk_2(data, eap_get_id(reqData), 287 if (resp == NULL) 292 return resp; 301 struct wpabuf *resp; local 313 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, 315 if (resp == NULL) 318 wpabuf_put_u8(resp, EAP_GPSK_OPCODE_GPSK_2); 319 start = wpabuf_put(resp, 0); 323 wpabuf_put_be16(resp, data->id_peer_len) 556 struct wpabuf *resp; local 599 struct wpabuf *resp; local 636 struct wpabuf *resp; local [all...] |
eap_md5.c | 39 struct wpabuf *resp; local 82 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, 1 + CHAP_MD5_LEN, 84 if (resp == NULL) 91 wpabuf_put_u8(resp, CHAP_MD5_LEN); 93 id = eap_get_id(resp); 94 rpos = wpabuf_put(resp, CHAP_MD5_LEN); 98 return resp;
|
eap_tnc.c | 92 struct wpabuf *resp; local 114 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, 116 if (resp == NULL) 119 wpabuf_put_u8(resp, flags); /* Flags */ 121 wpabuf_put_be32(resp, wpabuf_len(data->out_buf)); 123 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used, 145 return resp; 207 struct wpabuf *resp; local 359 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, 361 if (resp == NULL [all...] |
eap_pax.c | 103 struct wpabuf *resp; local 106 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, 108 if (resp == NULL) 111 pax = wpabuf_put(resp, sizeof(*pax)); 118 return resp; 127 struct wpabuf *resp; local 198 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); 199 if (resp == NULL) 202 wpabuf_put_be16(resp, EAP_PAX_RAND_LEN); 203 wpabuf_put_data(resp, data->rand.r.y, EAP_PAX_RAND_LEN) 243 struct wpabuf *resp; local 335 struct wpabuf *resp; local [all...] |
eap_otp.c | 38 struct wpabuf *resp; local 72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 74 if (resp == NULL) 76 wpabuf_put_data(resp, password, password_len); 85 return resp;
|
eap_leap.c | 69 struct wpabuf *resp; local 114 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, 117 if (resp == NULL) 119 wpabuf_put_u8(resp, LEAP_VERSION); 120 wpabuf_put_u8(resp, 0); /* unused */ 121 wpabuf_put_u8(resp, LEAP_RESPONSE_LEN); 122 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); 130 wpabuf_put_data(resp, identity, identity_len); 134 return resp; 143 struct wpabuf *resp; local [all...] |
/external/bluetooth/bluez/tools/ |
hciattach_tialt.c | 67 command_complete_t resp; local 69 FAILIF(read_hci_event(fd, (unsigned char *)&resp, sizeof(resp)) < 0, 73 FAILIF(resp.uart_prefix != HCI_EVENT_PKT, 75 resp.uart_prefix); 77 FAILIF(resp.hci_hdr.evt != EVT_CMD_COMPLETE, /* event must be event-complete */ 79 "but 0x%02x!\n", resp.hci_hdr.evt); 81 FAILIF(resp.hci_hdr.plen < 4, /* plen >= 4 for EVT_CMD_COMPLETE */ 83 resp.hci_hdr.plen); 86 FAILIF(resp.cmd_complete.opcode != (uint16_t)opcode 196 unsigned char resp[100]; \/* Response *\/ local [all...] |
/system/core/fastboot/ |
engine.c | 76 int (*func)(Action *a, int status, char *resp); 84 static int cb_default(Action *a, int status, char *resp) 87 fprintf(stderr,"FAILED (%s)\n", resp); 168 static int cb_check(Action *a, int status, char *resp, int invert) 176 fprintf(stderr,"FAILED (%s)\n", resp); 180 yes = match(resp, value, count); 191 fprintf(stderr,"Device %s is '%s'.\n", a->cmd + 7, resp); 201 static int cb_require(Action *a, int status, char *resp) 203 return cb_check(a, status, resp, 0); 206 static int cb_reject(Action *a, int status, char *resp) 277 char resp[FB_RESPONSE_SZ+1]; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_pax.c | 192 struct eap_pax_hdr *resp; local 198 if (pos == NULL || len < sizeof(*resp)) { 204 resp = (struct eap_pax_hdr *) pos; 209 resp->op_code, resp->flags, resp->mac_id, resp->dh_group_id, 210 resp->public_key_id); 212 (u8 *) (resp + 1), len - sizeof(*resp) - EAP_PAX_ICV_LEN) 292 struct eap_pax_hdr *resp; local 460 struct eap_pax_hdr *resp; local [all...] |
/external/wpa_supplicant/ |
eap_pax.c | 113 struct eap_pax_hdr *resp; local 115 resp = os_malloc(resp_len); 116 if (resp == NULL) 118 resp->code = EAP_CODE_RESPONSE; 119 resp->identifier = req->identifier; 120 resp->length = host_to_be16(resp_len); 121 resp->type = EAP_TYPE_PAX; 122 resp->op_code = op_code; 123 resp->flags = 0; 124 resp->mac_id = req->mac_id 137 struct eap_pax_hdr *resp; local 260 struct eap_pax_hdr *resp; local 356 u8 *resp, icvbuf[EAP_PAX_ICV_LEN]; local [all...] |
eap_gtc.c | 56 struct eap_hdr *resp; local 80 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, 83 return (u8 *) resp; 113 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, respDataLen, 115 if (resp == NULL) 126 (u8 *) (resp + 1) + 1, plen); 133 return (u8 *) resp;
|
eap_peap.c | 208 struct eap_hdr *resp; local 214 resp = os_malloc(sizeof(struct eap_hdr) + 2 + data->ssl.tls_out_limit); 215 if (resp == NULL) 218 resp->code = EAP_CODE_RESPONSE; 219 resp->identifier = id; 221 pos = (u8 *) (resp + 1); 231 os_free(resp); 236 resp->length = host_to_be16(*out_len); 237 *out_data = (u8 *) resp; 243 u8 **resp, size_t *resp_len 400 u8 *resp = NULL; local 666 u8 flags, *resp, id; local [all...] |
/external/libffi/testsuite/libffi.call/ |
cls_double.c | 10 static void cls_ret_double_fn(ffi_cif* cif __UNUSED__, void* resp, void** args, 13 *(double *)resp = *(double *)args[0]; 16 *(double *)resp);
|
cls_float.c | 10 static void cls_ret_float_fn(ffi_cif* cif __UNUSED__, void* resp, void** args, 13 *(float *)resp = *(float *)args[0]; 16 *(float *)resp);
|
cls_schar.c | 12 static void cls_ret_schar_fn(ffi_cif* cif __UNUSED__, void* resp, void** args, 15 *(ffi_arg*)resp = *(signed char *)args[0]; 17 (int)*(ffi_arg *)(resp));
|
cls_sint.c | 10 static void cls_ret_sint_fn(ffi_cif* cif __UNUSED__, void* resp, void** args, 13 *(ffi_arg*)resp = *(signed int *)args[0]; 15 (int)*(ffi_arg *)(resp));
|
cls_sshort.c | 10 static void cls_ret_sshort_fn(ffi_cif* cif __UNUSED__, void* resp, void** args, 13 *(ffi_arg*)resp = *(signed short *)args[0]; 15 (int)*(ffi_arg *)(resp));
|
cls_uchar.c | 10 static void cls_ret_uchar_fn(ffi_cif* cif __UNUSED__, void* resp, void** args, 13 *(ffi_arg*)resp = *(unsigned char *)args[0]; 15 (int)*(ffi_arg *)(resp));
|
cls_uint.c | 10 static void cls_ret_uint_fn(ffi_cif* cif __UNUSED__, void* resp, void** args, 13 *(ffi_arg *)resp = *(unsigned int *)args[0]; 16 (int)*(ffi_arg *)(resp));
|
cls_ulonglong.c | 10 static void cls_ret_ulonglong_fn(ffi_cif* cif __UNUSED__, void* resp, 13 *(unsigned long long *)resp= *(unsigned long long *)args[0]; 16 *(unsigned long long *)(resp));
|
cls_ushort.c | 10 static void cls_ret_ushort_fn(ffi_cif* cif __UNUSED__, void* resp, void** args, 13 *(ffi_arg*)resp = *(unsigned short *)args[0]; 16 (int)*(ffi_arg *)(resp));
|
/external/dropbear/ |
svr-authpam.c | 55 struct pam_response* resp = NULL; local 113 * free the pam_response and its resp element - ie we _must_ malloc 115 resp = (struct pam_response*) m_malloc(sizeof(struct pam_response)); 116 memset(resp, 0, sizeof(struct pam_response)); 118 resp->resp = m_strdup(userDatap->passwd); 120 (*respp) = resp; 139 * free the pam_response and its resp element - ie we _must_ malloc 141 resp = (struct pam_response*) m_malloc(sizeof(struct pam_response)); 142 memset(resp, 0, sizeof(struct pam_response)) [all...] |