HomeSort by relevance Sort by last modified time
    Searched full:resp (Results 26 - 50 of 348) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_vendor_test.c 75 struct wpabuf *resp; local
125 resp = eap_msg_alloc(EAP_VENDOR_ID, EAP_VENDOR_TYPE, 1,
127 if (resp == NULL)
131 wpabuf_put_u8(resp, 2);
136 wpabuf_put_u8(resp, 4);
142 return resp;
eap_tls.c 85 struct wpabuf *resp, u8 id)
106 if (resp) {
111 return resp;
149 struct wpabuf *resp; local
166 resp = NULL;
168 pos, left, &resp);
171 return eap_tls_failure(sm, data, ret, res, resp, id);
178 wpabuf_free(resp);
182 return resp;
eap_fast.c 406 struct wpabuf **resp)
422 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1);
442 hdr, resp))
458 *resp = data->phase2_method->process(sm, data->phase2_priv, &iret,
460 if (*resp == NULL ||
472 if (*resp == NULL && config &&
477 } else if (*resp == NULL)
549 struct wpabuf *resp = NULL; local
571 if (eap_fast_phase2_request(sm, data, ret, hdr, &resp)) {
577 return eap_fast_tlv_eap_payload(resp);
743 struct wpabuf *resp; local
1147 struct wpabuf *resp = NULL, *tmp; local
1496 struct wpabuf *resp; local
    [all...]
eap_psk.c 93 struct wpabuf *resp; local
139 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK,
142 if (resp == NULL)
144 hdr2 = wpabuf_put(resp, sizeof(*hdr2));
148 wpabuf_put_data(resp, data->id_p, data->id_p_len);
153 wpabuf_free(resp);
165 wpabuf_free(resp);
177 return resp;
187 struct wpabuf *resp; local
320 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen
380 struct wpabuf *resp = NULL; local
    [all...]
eap_mschapv2.c 156 struct wpabuf *resp; local
173 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len,
175 if (resp == NULL)
178 ms = wpabuf_put(resp, sizeof(*ms));
192 wpabuf_put_u8(resp, sizeof(*r)); /* Value-Size */
195 r = wpabuf_put(resp, sizeof(*r));
203 wpabuf_free(resp);
221 wpabuf_put_data(resp, identity, identity_len);
224 return resp;
343 struct wpabuf *resp; local
500 struct wpabuf *resp; local
631 struct wpabuf *resp; local
    [all...]
  /sdk/ddms/libs/ddmlib/src/com/android/ddmlib/
AdbHelper.java 94 AdbResponse resp = readAdbResponse(adbChan, false); local
95 if (!resp.okay)
134 AdbResponse resp = readAdbResponse(adbChan, false /* readDiagString */); local
135 if (!resp.okay)
136 throw new IOException("connection request rejected: " + resp.message); //$NON-NLS-1$
203 AdbResponse resp = new AdbResponse(); local
207 return resp;
209 resp.ioSuccess = true;
212 resp.okay = true;
215 resp.okay = false
281 AdbResponse resp = readAdbResponse(adbChan, false \/* readDiagString *\/); local
369 AdbResponse resp = readAdbResponse(adbChan, false \/* readDiagString *\/); local
450 AdbResponse resp = readAdbResponse(adbChan, false \/* readDiagString *\/); local
511 AdbResponse resp = readAdbResponse(adbChan, false \/* readDiagString *\/); local
549 AdbResponse resp = readAdbResponse(adbChan, false \/* readDiagString *\/); local
724 AdbResponse resp = readAdbResponse(adbChan, false \/* readDiagString *\/); local
    [all...]
  /external/libffi/testsuite/libffi.call/
closure_stdcall.c 11 closure_test_stdcall(ffi_cif* cif __UNUSED__, void* resp, void** args,
14 *(ffi_arg*)resp =
22 (int)*(ffi_arg *)resp);
  /external/wpa_supplicant/
eap_otp.c 41 struct eap_hdr *resp; local
78 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, respDataLen,
81 if (resp == NULL)
92 return (u8 *) resp;
pcsc_funcs.c 707 unsigned char resp[3]; local
734 len = sizeof(resp);
735 ret = scard_transmit(scard, cmd, cmdlen, resp, &len);
743 wpa_printf(MSG_WARNING, "SCARD: unexpected resp len "
748 if (resp[0] == 0x98 && resp[1] == 0x04) {
755 if (resp[0] == 0x6e) {
760 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[0] != 0x61)
919 unsigned char resp[3]; local
1047 unsigned char resp[3], buf[12 + 3 + 2]; local
1147 unsigned char resp[3], buf[64], *pos, *end; local
    [all...]
eap_sake.c 162 u8 *resp, *rpos; local
184 resp = eap_sake_build_msg(data, &rpos, hdr->identifier, respDataLen,
186 if (resp == NULL)
197 return resp;
209 u8 *resp, *rpos; local
265 resp = eap_sake_build_msg(data, &rpos, hdr->identifier, respDataLen,
267 if (resp == NULL)
290 resp, *respDataLen, rpos, rpos)) {
292 os_free(resp);
298 return resp;
311 u8 *resp, *rpos; local
384 u8 *resp; local
    [all...]
eap_tls.c 82 struct eap_method_ret *ret, int res, u8 *resp,
104 if (resp) {
109 return resp;
148 u8 flags, *resp, id; local
165 resp = NULL;
167 left, &resp, respDataLen);
170 return eap_tls_failure(sm, data, ret, res, resp, id,
182 return resp;
eap_leap.c 71 struct eap_hdr *resp; local
118 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, respDataLen,
121 if (resp == NULL)
135 return (u8 *) resp;
145 struct eap_hdr *resp; local
165 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, respDataLen,
168 if (resp == NULL)
176 os_free(resp);
188 return (u8 *) resp;
197 const struct eap_hdr *resp; local
    [all...]
eap_ttls.c 230 struct eap_hdr *resp; local
234 resp = os_malloc(sizeof(struct eap_hdr) + 2 + data->ssl.tls_out_limit);
235 if (resp == NULL)
238 resp->code = EAP_CODE_RESPONSE;
239 resp->identifier = id;
241 pos = (u8 *) (resp + 1);
251 os_free(resp);
256 resp->length = host_to_be16(*out_len);
257 *out_data = (u8 *) resp;
299 static int eap_ttls_avp_encapsulate(u8 **resp, size_t *resp_len, u32 avp_code
1082 u8 *resp = NULL, *mschapv2 = NULL, *eapdata = NULL; local
1498 u8 flags, *resp, id; local
    [all...]
eap_md5.c 42 struct eap_hdr *resp; local
89 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, respDataLen,
92 if (resp == NULL)
101 addr[0] = &resp->identifier;
110 return (u8 *) resp;
eap_psk.c 89 u8 *resp, *buf, *pos; local
136 resp = os_malloc(*respDataLen);
137 if (resp == NULL)
139 hdr2 = (struct eap_psk_hdr_2 *) resp;
152 os_free(resp);
172 return resp;
183 u8 *resp, *buf, *rpchannel, nonce[16], *decrypted; local
300 resp = os_malloc(*respDataLen + 1);
301 if (resp == NULL) {
305 hdr4 = (struct eap_psk_hdr_4 *) resp;
362 u8 *resp = NULL; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/utils/
pcsc_funcs.c 707 unsigned char resp[3]; local
734 len = sizeof(resp);
735 ret = scard_transmit(scard, cmd, cmdlen, resp, &len);
743 wpa_printf(MSG_WARNING, "SCARD: unexpected resp len "
748 if (resp[0] == 0x98 && resp[1] == 0x04) {
755 if (resp[0] == 0x6e) {
760 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[0] != 0x61)
919 unsigned char resp[3]; local
1047 unsigned char resp[3], buf[12 + 3 + 2]; local
1147 unsigned char resp[3], buf[64], *pos, *end; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_mschapv2.c 249 struct eap_mschapv2_hdr *resp; local
260 resp = (struct eap_mschapv2_hdr *) pos;
262 resp->op_code != MSCHAPV2_OP_RESPONSE) {
264 "ignore op %d", resp->op_code);
269 resp->op_code != MSCHAPV2_OP_SUCCESS &&
270 resp->op_code != MSCHAPV2_OP_FAILURE) {
272 "Failure - ignore op %d", resp->op_code);
277 resp->op_code != MSCHAPV2_OP_FAILURE) {
279 "- ignore op %d", resp->op_code);
291 struct eap_mschapv2_hdr *resp; local
429 struct eap_mschapv2_hdr *resp; local
456 struct eap_mschapv2_hdr *resp; local
    [all...]
  /external/libffi/testsuite/libffi.special/
unwindtest.cc 11 closure_test_fn(ffi_cif* cif __UNUSED__, void* resp __UNUSED__,
19 void closure_test_fn1(ffi_cif* cif __UNUSED__, void* resp,
22 *(ffi_arg*)resp =
41 (int)(long)userdata, (int)*(ffi_arg*)resp);
43 throw (int)*(ffi_arg*)resp;
  /development/samples/SampleSyncAdapter/src/com/example/android/samplesync/client/
NetworkUtilities.java 118 final HttpResponse resp; local
136 resp = mHttpClient.execute(post);
137 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_OK) {
145 Log.v(TAG, "Error authenticating" + resp.getStatusLine());
234 final HttpResponse resp = mHttpClient.execute(post); local
235 final String response = EntityUtils.toString(resp.getEntity());
237 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_OK) {
247 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_UNAUTHORIZED) {
253 + resp.getStatusLine());
283 final HttpResponse resp = mHttpClient.execute(post) local
    [all...]
  /dalvik/libcore/security/src/main/java/org/apache/harmony/security/x509/tsp/
TimeStampResp.java 89 TimeStampResp resp = (TimeStampResp) object;
91 values[0] = resp.status;
92 values[1] = resp.timeStampToken;
  /external/v8/test/mjsunit/
debug-evaluate-bool-constructor.js 52 var resp = dcp.processDebugJSONRequest(request);
53 var response = JSON.parse(resp);
54 assertTrue(response.success, 'Command failed: ' + resp);
  /external/opencore/android/
android_surface_output.cpp 227 CommandResponse resp(status,cmdid,aContext);
228 QueueCommandResponse(resp);
251 CommandResponse resp(status,cmdid,aContext);
252 QueueCommandResponse(resp);
285 CommandResponse resp(status,cmdid,aContext);
286 QueueCommandResponse(resp);
294 CommandResponse resp(PVMFSuccess,cmdid,aContext);
295 QueueCommandResponse(resp);
324 CommandResponse resp(status,cmdid,aContext);
325 QueueCommandResponse(resp);
    [all...]
  /external/proguard/examples/annotations/lib/
annotations.pro 46 # resp. all public, implementations or extensions of the annotated class as
61 # @KeepPublicProtectedClassMembers specify to keep all, all public, resp.
78 # @KeepPublicProtectedClassMemberNames specify to keep all, all public, resp.
94 # @KeepGettersSetters and @KeepPublicGettersSetters specify to keep all, resp.
  /hardware/ti/wlan/wl1271/CUDK/os/linux/src/
ipc_wpa.c 130 S8 Resp[IPC_WPA_RESP_MAX_LEN];
134 ret = wpa_ctrl_request(pIpcWpa->pWpaCtrl, (char*)cmd, os_strlen(cmd), (char*)Resp, (size_t*)&RespLen, NULL);
148 Resp[RespLen] = '\0';
149 os_error_printf(CU_MSG_INFO2, (PS8)"%s", Resp);
  /system/wlan/ti/wilink_6_1/CUDK/os/linux/src/
ipc_wpa.c 130 S8 Resp[IPC_WPA_RESP_MAX_LEN];
134 ret = wpa_ctrl_request(pIpcWpa->pWpaCtrl, (char*)cmd, os_strlen(cmd), (char*)Resp, (size_t*)&RespLen, NULL);
148 Resp[RespLen] = '\0';
149 os_error_printf(CU_MSG_INFO2, (PS8)"%s", Resp);

Completed in 130 milliseconds

12 3 4 5 6 7 8 91011>>