/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_vendor_test.c | 75 struct wpabuf *resp; local 125 resp = eap_msg_alloc(EAP_VENDOR_ID, EAP_VENDOR_TYPE, 1, 127 if (resp == NULL) 131 wpabuf_put_u8(resp, 2); 136 wpabuf_put_u8(resp, 4); 142 return resp;
|
eap_tls.c | 85 struct wpabuf *resp, u8 id) 106 if (resp) { 111 return resp; 149 struct wpabuf *resp; local 166 resp = NULL; 168 pos, left, &resp); 171 return eap_tls_failure(sm, data, ret, res, resp, id); 178 wpabuf_free(resp); 182 return resp;
|
eap_fast.c | 406 struct wpabuf **resp) 422 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1); 442 hdr, resp)) 458 *resp = data->phase2_method->process(sm, data->phase2_priv, &iret, 460 if (*resp == NULL || 472 if (*resp == NULL && config && 477 } else if (*resp == NULL) 549 struct wpabuf *resp = NULL; local 571 if (eap_fast_phase2_request(sm, data, ret, hdr, &resp)) { 577 return eap_fast_tlv_eap_payload(resp); 743 struct wpabuf *resp; local 1147 struct wpabuf *resp = NULL, *tmp; local 1496 struct wpabuf *resp; local [all...] |
eap_psk.c | 93 struct wpabuf *resp; local 139 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, 142 if (resp == NULL) 144 hdr2 = wpabuf_put(resp, sizeof(*hdr2)); 148 wpabuf_put_data(resp, data->id_p, data->id_p_len); 153 wpabuf_free(resp); 165 wpabuf_free(resp); 177 return resp; 187 struct wpabuf *resp; local 320 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen 380 struct wpabuf *resp = NULL; local [all...] |
eap_mschapv2.c | 156 struct wpabuf *resp; local 173 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, 175 if (resp == NULL) 178 ms = wpabuf_put(resp, sizeof(*ms)); 192 wpabuf_put_u8(resp, sizeof(*r)); /* Value-Size */ 195 r = wpabuf_put(resp, sizeof(*r)); 203 wpabuf_free(resp); 221 wpabuf_put_data(resp, identity, identity_len); 224 return resp; 343 struct wpabuf *resp; local 500 struct wpabuf *resp; local 631 struct wpabuf *resp; local [all...] |
/sdk/ddms/libs/ddmlib/src/com/android/ddmlib/ |
AdbHelper.java | 94 AdbResponse resp = readAdbResponse(adbChan, false); local 95 if (!resp.okay) 134 AdbResponse resp = readAdbResponse(adbChan, false /* readDiagString */); local 135 if (!resp.okay) 136 throw new IOException("connection request rejected: " + resp.message); //$NON-NLS-1$ 203 AdbResponse resp = new AdbResponse(); local 207 return resp; 209 resp.ioSuccess = true; 212 resp.okay = true; 215 resp.okay = false 281 AdbResponse resp = readAdbResponse(adbChan, false \/* readDiagString *\/); local 369 AdbResponse resp = readAdbResponse(adbChan, false \/* readDiagString *\/); local 450 AdbResponse resp = readAdbResponse(adbChan, false \/* readDiagString *\/); local 511 AdbResponse resp = readAdbResponse(adbChan, false \/* readDiagString *\/); local 549 AdbResponse resp = readAdbResponse(adbChan, false \/* readDiagString *\/); local 724 AdbResponse resp = readAdbResponse(adbChan, false \/* readDiagString *\/); local [all...] |
/external/libffi/testsuite/libffi.call/ |
closure_stdcall.c | 11 closure_test_stdcall(ffi_cif* cif __UNUSED__, void* resp, void** args, 14 *(ffi_arg*)resp = 22 (int)*(ffi_arg *)resp);
|
/external/wpa_supplicant/ |
eap_otp.c | 41 struct eap_hdr *resp; local 78 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, respDataLen, 81 if (resp == NULL) 92 return (u8 *) resp;
|
pcsc_funcs.c | 707 unsigned char resp[3]; local 734 len = sizeof(resp); 735 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); 743 wpa_printf(MSG_WARNING, "SCARD: unexpected resp len " 748 if (resp[0] == 0x98 && resp[1] == 0x04) { 755 if (resp[0] == 0x6e) { 760 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[0] != 0x61) 919 unsigned char resp[3]; local 1047 unsigned char resp[3], buf[12 + 3 + 2]; local 1147 unsigned char resp[3], buf[64], *pos, *end; local [all...] |
eap_sake.c | 162 u8 *resp, *rpos; local 184 resp = eap_sake_build_msg(data, &rpos, hdr->identifier, respDataLen, 186 if (resp == NULL) 197 return resp; 209 u8 *resp, *rpos; local 265 resp = eap_sake_build_msg(data, &rpos, hdr->identifier, respDataLen, 267 if (resp == NULL) 290 resp, *respDataLen, rpos, rpos)) { 292 os_free(resp); 298 return resp; 311 u8 *resp, *rpos; local 384 u8 *resp; local [all...] |
eap_tls.c | 82 struct eap_method_ret *ret, int res, u8 *resp, 104 if (resp) { 109 return resp; 148 u8 flags, *resp, id; local 165 resp = NULL; 167 left, &resp, respDataLen); 170 return eap_tls_failure(sm, data, ret, res, resp, id, 182 return resp;
|
eap_leap.c | 71 struct eap_hdr *resp; local 118 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, respDataLen, 121 if (resp == NULL) 135 return (u8 *) resp; 145 struct eap_hdr *resp; local 165 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, respDataLen, 168 if (resp == NULL) 176 os_free(resp); 188 return (u8 *) resp; 197 const struct eap_hdr *resp; local [all...] |
eap_ttls.c | 230 struct eap_hdr *resp; local 234 resp = os_malloc(sizeof(struct eap_hdr) + 2 + data->ssl.tls_out_limit); 235 if (resp == NULL) 238 resp->code = EAP_CODE_RESPONSE; 239 resp->identifier = id; 241 pos = (u8 *) (resp + 1); 251 os_free(resp); 256 resp->length = host_to_be16(*out_len); 257 *out_data = (u8 *) resp; 299 static int eap_ttls_avp_encapsulate(u8 **resp, size_t *resp_len, u32 avp_code 1082 u8 *resp = NULL, *mschapv2 = NULL, *eapdata = NULL; local 1498 u8 flags, *resp, id; local [all...] |
eap_md5.c | 42 struct eap_hdr *resp; local 89 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, respDataLen, 92 if (resp == NULL) 101 addr[0] = &resp->identifier; 110 return (u8 *) resp;
|
eap_psk.c | 89 u8 *resp, *buf, *pos; local 136 resp = os_malloc(*respDataLen); 137 if (resp == NULL) 139 hdr2 = (struct eap_psk_hdr_2 *) resp; 152 os_free(resp); 172 return resp; 183 u8 *resp, *buf, *rpchannel, nonce[16], *decrypted; local 300 resp = os_malloc(*respDataLen + 1); 301 if (resp == NULL) { 305 hdr4 = (struct eap_psk_hdr_4 *) resp; 362 u8 *resp = NULL; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
pcsc_funcs.c | 707 unsigned char resp[3]; local 734 len = sizeof(resp); 735 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); 743 wpa_printf(MSG_WARNING, "SCARD: unexpected resp len " 748 if (resp[0] == 0x98 && resp[1] == 0x04) { 755 if (resp[0] == 0x6e) { 760 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[0] != 0x61) 919 unsigned char resp[3]; local 1047 unsigned char resp[3], buf[12 + 3 + 2]; local 1147 unsigned char resp[3], buf[64], *pos, *end; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_mschapv2.c | 249 struct eap_mschapv2_hdr *resp; local 260 resp = (struct eap_mschapv2_hdr *) pos; 262 resp->op_code != MSCHAPV2_OP_RESPONSE) { 264 "ignore op %d", resp->op_code); 269 resp->op_code != MSCHAPV2_OP_SUCCESS && 270 resp->op_code != MSCHAPV2_OP_FAILURE) { 272 "Failure - ignore op %d", resp->op_code); 277 resp->op_code != MSCHAPV2_OP_FAILURE) { 279 "- ignore op %d", resp->op_code); 291 struct eap_mschapv2_hdr *resp; local 429 struct eap_mschapv2_hdr *resp; local 456 struct eap_mschapv2_hdr *resp; local [all...] |
/external/libffi/testsuite/libffi.special/ |
unwindtest.cc | 11 closure_test_fn(ffi_cif* cif __UNUSED__, void* resp __UNUSED__, 19 void closure_test_fn1(ffi_cif* cif __UNUSED__, void* resp, 22 *(ffi_arg*)resp = 41 (int)(long)userdata, (int)*(ffi_arg*)resp); 43 throw (int)*(ffi_arg*)resp;
|
/development/samples/SampleSyncAdapter/src/com/example/android/samplesync/client/ |
NetworkUtilities.java | 118 final HttpResponse resp; local 136 resp = mHttpClient.execute(post); 137 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_OK) { 145 Log.v(TAG, "Error authenticating" + resp.getStatusLine()); 234 final HttpResponse resp = mHttpClient.execute(post); local 235 final String response = EntityUtils.toString(resp.getEntity()); 237 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_OK) { 247 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_UNAUTHORIZED) { 253 + resp.getStatusLine()); 283 final HttpResponse resp = mHttpClient.execute(post) local [all...] |
/dalvik/libcore/security/src/main/java/org/apache/harmony/security/x509/tsp/ |
TimeStampResp.java | 89 TimeStampResp resp = (TimeStampResp) object; 91 values[0] = resp.status; 92 values[1] = resp.timeStampToken;
|
/external/v8/test/mjsunit/ |
debug-evaluate-bool-constructor.js | 52 var resp = dcp.processDebugJSONRequest(request);
53 var response = JSON.parse(resp);
54 assertTrue(response.success, 'Command failed: ' + resp);
|
/external/opencore/android/ |
android_surface_output.cpp | 227 CommandResponse resp(status,cmdid,aContext); 228 QueueCommandResponse(resp); 251 CommandResponse resp(status,cmdid,aContext); 252 QueueCommandResponse(resp); 285 CommandResponse resp(status,cmdid,aContext); 286 QueueCommandResponse(resp); 294 CommandResponse resp(PVMFSuccess,cmdid,aContext); 295 QueueCommandResponse(resp); 324 CommandResponse resp(status,cmdid,aContext); 325 QueueCommandResponse(resp); [all...] |
/external/proguard/examples/annotations/lib/ |
annotations.pro | 46 # resp. all public, implementations or extensions of the annotated class as 61 # @KeepPublicProtectedClassMembers specify to keep all, all public, resp. 78 # @KeepPublicProtectedClassMemberNames specify to keep all, all public, resp. 94 # @KeepGettersSetters and @KeepPublicGettersSetters specify to keep all, resp.
|
/hardware/ti/wlan/wl1271/CUDK/os/linux/src/ |
ipc_wpa.c | 130 S8 Resp[IPC_WPA_RESP_MAX_LEN]; 134 ret = wpa_ctrl_request(pIpcWpa->pWpaCtrl, (char*)cmd, os_strlen(cmd), (char*)Resp, (size_t*)&RespLen, NULL); 148 Resp[RespLen] = '\0'; 149 os_error_printf(CU_MSG_INFO2, (PS8)"%s", Resp);
|
/system/wlan/ti/wilink_6_1/CUDK/os/linux/src/ |
ipc_wpa.c | 130 S8 Resp[IPC_WPA_RESP_MAX_LEN]; 134 ret = wpa_ctrl_request(pIpcWpa->pWpaCtrl, (char*)cmd, os_strlen(cmd), (char*)Resp, (size_t*)&RespLen, NULL); 148 Resp[RespLen] = '\0'; 149 os_error_printf(CU_MSG_INFO2, (PS8)"%s", Resp);
|