HomeSort by relevance Sort by last modified time
    Searched defs:resp (Results 1 - 25 of 143) sorted by null

1 2 3 4 5 6

  /external/wpa_supplicant/
eap_otp.c 41 struct eap_hdr *resp; local
78 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, respDataLen,
81 if (resp == NULL)
92 return (u8 *) resp;
eap_gtc.c 56 struct eap_hdr *resp; local
80 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC,
83 return (u8 *) resp;
113 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, respDataLen,
115 if (resp == NULL)
126 (u8 *) (resp + 1) + 1, plen);
133 return (u8 *) resp;
eap_md5.c 42 struct eap_hdr *resp; local
89 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, respDataLen,
92 if (resp == NULL)
101 addr[0] = &resp->identifier;
110 return (u8 *) resp;
eap_tls.c 82 struct eap_method_ret *ret, int res, u8 *resp,
104 if (resp) {
109 return resp;
148 u8 flags, *resp, id; local
165 resp = NULL;
167 left, &resp, respDataLen);
170 return eap_tls_failure(sm, data, ret, res, resp, id,
182 return resp;
eap_vendor_test.c 75 struct eap_hdr *resp; local
128 resp = eap_msg_alloc(EAP_VENDOR_ID, EAP_VENDOR_TYPE, respDataLen, 1,
130 if (resp == NULL)
145 return (u8 *) resp;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_md5.c 39 struct wpabuf *resp; local
82 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, 1 + CHAP_MD5_LEN,
84 if (resp == NULL)
91 wpabuf_put_u8(resp, CHAP_MD5_LEN);
93 id = eap_get_id(resp);
94 rpos = wpabuf_put(resp, CHAP_MD5_LEN);
98 return resp;
eap_otp.c 38 struct wpabuf *resp; local
72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
74 if (resp == NULL)
76 wpabuf_put_data(resp, password, password_len);
85 return resp;
eap_gtc.c 55 struct wpabuf *resp; local
78 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC,
80 return resp;
110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
112 if (resp == NULL)
115 wpabuf_put_data(resp, "RESPONSE=", 9);
116 wpabuf_put_data(resp, identity, identity_len);
117 wpabuf_put_u8(resp, '\0');
119 wpabuf_put_data(resp, password, password_len);
121 wpabuf_head_u8(resp) + sizeof(struct eap_hdr)
    [all...]
eap_tls.c 85 struct wpabuf *resp, u8 id)
106 if (resp) {
111 return resp;
149 struct wpabuf *resp; local
166 resp = NULL;
168 pos, left, &resp);
171 return eap_tls_failure(sm, data, ret, res, resp, id);
178 wpabuf_free(resp);
182 return resp;
eap_vendor_test.c 75 struct wpabuf *resp; local
125 resp = eap_msg_alloc(EAP_VENDOR_ID, EAP_VENDOR_TYPE, 1,
127 if (resp == NULL)
131 wpabuf_put_u8(resp, 2);
136 wpabuf_put_u8(resp, 4);
142 return resp;
  /external/wpa_supplicant_8/src/eap_peer/
eap_md5.c 39 struct wpabuf *resp; local
82 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, 1 + CHAP_MD5_LEN,
84 if (resp == NULL)
91 wpabuf_put_u8(resp, CHAP_MD5_LEN);
93 id = eap_get_id(resp);
94 rpos = wpabuf_put(resp, CHAP_MD5_LEN);
98 return resp;
eap_otp.c 38 struct wpabuf *resp; local
72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
74 if (resp == NULL)
76 wpabuf_put_data(resp, password, password_len);
85 return resp;
eap_gtc.c 55 struct wpabuf *resp; local
78 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC,
80 return resp;
110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
112 if (resp == NULL)
115 wpabuf_put_data(resp, "RESPONSE=", 9);
116 wpabuf_put_data(resp, identity, identity_len);
117 wpabuf_put_u8(resp, '\0');
119 wpabuf_put_data(resp, password, password_len);
121 wpabuf_head_u8(resp) + sizeof(struct eap_hdr)
    [all...]
eap_tls.c 85 struct wpabuf *resp, u8 id)
106 if (resp) {
111 return resp;
149 struct wpabuf *resp; local
166 resp = NULL;
168 pos, left, &resp);
171 return eap_tls_failure(sm, data, ret, res, resp, id);
178 wpabuf_free(resp);
182 return resp;
eap_vendor_test.c 75 struct wpabuf *resp; local
125 resp = eap_msg_alloc(EAP_VENDOR_ID, EAP_VENDOR_TYPE, 1,
127 if (resp == NULL)
131 wpabuf_put_u8(resp, 2);
136 wpabuf_put_u8(resp, 4);
142 return resp;
  /external/dropbear/
svr-authpam.c 55 struct pam_response* resp = NULL; local
113 * free the pam_response and its resp element - ie we _must_ malloc
115 resp = (struct pam_response*) m_malloc(sizeof(struct pam_response));
116 memset(resp, 0, sizeof(struct pam_response));
118 resp->resp = m_strdup(userDatap->passwd);
120 (*respp) = resp;
139 * free the pam_response and its resp element - ie we _must_ malloc
141 resp = (struct pam_response*) m_malloc(sizeof(struct pam_response));
142 memset(resp, 0, sizeof(struct pam_response))
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_dev_disc.c 150 struct wpabuf *resp; local
152 resp = p2p_build_dev_disc_resp(dialog_token, status);
153 if (resp == NULL)
164 wpabuf_head(resp), wpabuf_len(resp), 200) < 0) {
169 wpabuf_free(resp);
p2p_pd.c 104 struct wpabuf *resp; local
153 resp = p2p_build_prov_disc_resp(p2p, msg.dialog_token,
155 if (resp == NULL) {
170 wpabuf_free(resp);
177 wpabuf_head(resp), wpabuf_len(resp), 200) < 0) {
182 wpabuf_free(resp);
p2p_invitation.c 109 struct wpabuf *resp = NULL; local
240 resp = p2p_build_invitation_resp(p2p, dev, msg.dialog_token, status,
243 if (resp == NULL)
280 wpabuf_head(resp), wpabuf_len(resp), 200) < 0) {
286 wpabuf_free(resp);
  /frameworks/base/media/libmedia/
IEffectClient.cpp 123 char *resp = NULL; local
125 resp = (char *)malloc(replySize);
126 data.read(resp, replySize);
128 commandExecuted(cmdCode, cmdSize, cmd, replySize, resp);
132 if (resp) {
133 free(resp);
  /frameworks/base/telephony/tests/telephonytests/src/com/android/internal/telephony/mockril/
MockRilTest.java 161 Msg resp = Msg.recv(mMockRilChannel); local
162 //resp.printHeader("testGetRadioState");
164 assertTrue(String.format("expected cmd == 1 was %d", resp.getCmd()),
165 resp.getCmd() == 1);
166 assertTrue(String.format("expected token == 9876 was %d", resp.getToken()),
167 resp.getToken() == 9876);
168 assertTrue(String.format("expected status == 0 was %d", resp.getStatus()),
169 resp.getStatus() == 0);
171 RilCtrlCmds.CtrlRspRadioState rsp = resp.getDataAs(RilCtrlCmds.CtrlRspRadioState.class);
195 Msg resp = Msg.recv(mMockRilChannel) local
218 Msg resp = Msg.recv(mMockRilChannel); local
251 Msg resp = Msg.recv(mMockRilChannel); local
    [all...]
  /external/bluetooth/bluez/tools/
hciattach_qualcomm.c 71 command_complete_t resp; local
81 n = read_hci_event(fd, (unsigned char *)&resp, sizeof(resp));
85 FAILIF(resp.hci_hdr.evt != EVT_CMD_COMPLETE,
87 "but 0x%02x!\n", resp.hci_hdr.evt);
89 FAILIF(resp.hci_hdr.plen < 4, /* plen >= 4 for EVT_CMD_COMPLETE */
91 resp.hci_hdr.plen);
94 FAILIF(resp.cmd_complete.opcode != 0,
96 resp.cmd_complete.opcode);
98 return resp.status == 0 ? 0 : -1
171 unsigned char resp[100]; \/* Response *\/ local
    [all...]
hciattach_tialt.c 67 command_complete_t resp; local
69 FAILIF(read_hci_event(fd, (unsigned char *)&resp, sizeof(resp)) < 0,
73 FAILIF(resp.uart_prefix != HCI_EVENT_PKT,
75 resp.uart_prefix);
77 FAILIF(resp.hci_hdr.evt != EVT_CMD_COMPLETE, /* event must be event-complete */
79 "but 0x%02x!\n", resp.hci_hdr.evt);
81 FAILIF(resp.hci_hdr.plen < 4, /* plen >= 4 for EVT_CMD_COMPLETE */
83 resp.hci_hdr.plen);
86 FAILIF(resp.cmd_complete.opcode != (uint16_t)opcode
196 unsigned char resp[100]; \/* Response *\/ local
    [all...]
  /external/openssl/crypto/bn/
bn_div.c 186 BN_ULONG *resp,*wnump; local
266 resp= &(res->d[loop-1]);
278 *resp=1;
283 * the resp pointer */
287 resp--;
289 for (i=0; i<loop-1; i++, wnump--, resp--)
400 *resp = q;
431 BN_ULONG *resp,*wnump; local
504 resp= &(res->d[loop-1]);
510 * the resp pointer *
    [all...]
  /external/qemu/android/protocol/
core-commands-proxy.c 88 * resp - Upon success contains command response header.
95 _coreCmdProxy_get_response(UICmdRespHeader* resp, void** resp_data)
100 status = syncsocket_read(_coreCmdProxy.sync_reader, resp,
104 if (status > 0 && resp->resp_data_size) {
105 *resp_data = malloc(resp->resp_data_size);
110 resp->resp_data_size,
111 core_connection_get_timeout(resp->resp_data_size));
150 UICmdRespHeader resp; local
158 status = _coreCmdProxy_get_response(&resp, &tmp);
162 return resp.result
169 UICmdRespHeader resp; local
214 UICmdRespHeader resp; local
261 UICmdRespHeader resp; local
298 UICmdRespHeader resp; local
    [all...]

Completed in 248 milliseconds

1 2 3 4 5 6