/external/libffi/testsuite/libffi.call/ |
cls_ulonglong.c | 10 static void cls_ret_ulonglong_fn(ffi_cif* cif __UNUSED__, void* resp, 13 *(unsigned long long *)resp= *(unsigned long long *)args[0]; 16 *(unsigned long long *)(resp));
|
cls_ushort.c | 10 static void cls_ret_ushort_fn(ffi_cif* cif __UNUSED__, void* resp, void** args, 13 *(ffi_arg*)resp = *(unsigned short *)args[0]; 16 (int)*(ffi_arg *)(resp));
|
closure_fn0.c | 16 closure_test_fn0(ffi_cif* cif __UNUSED__, void* resp, void** args, 19 *(ffi_arg*)resp = 40 (int)(long)userdata, (int)*(ffi_arg *)resp);
|
closure_fn1.c | 13 static void closure_test_fn1(ffi_cif* cif __UNUSED__, void* resp, void** args, 16 *(ffi_arg*)resp = 35 (int)(long)userdata, (int)*(ffi_arg *)resp);
|
closure_fn2.c | 12 static void closure_test_fn2(ffi_cif* cif __UNUSED__, void* resp, void** args, 15 *(ffi_arg*)resp = 34 (int)*(ffi_arg *)resp);
|
closure_fn3.c | 12 static void closure_test_fn3(ffi_cif* cif __UNUSED__, void* resp, void** args, 15 *(ffi_arg*)resp = 34 (int)*(ffi_arg *)resp);
|
closure_fn4.c | 14 closure_test_fn0(ffi_cif* cif __UNUSED__, void* resp, void** args, 17 *(ffi_arg*)resp = 47 (int)(long)userdata, (int)*(ffi_arg *)resp);
|
closure_fn5.c | 13 closure_test_fn5(ffi_cif* cif __UNUSED__, void* resp, void** args, 16 *(ffi_arg*)resp = 46 (int)(long)userdata, (int)*(ffi_arg *)resp);
|
closure_fn6.c | 12 closure_test_fn0(ffi_cif* cif __UNUSED__, void* resp, void** args, 15 *(ffi_arg*)resp = 39 (int)(long)userdata, (int)*(ffi_arg *)resp);
|
closure_stdcall.c | 11 closure_test_stdcall(ffi_cif* cif __UNUSED__, void* resp, void** args, 14 *(ffi_arg*)resp = 22 (int)*(ffi_arg *)resp);
|
/external/wpa_supplicant_8/src/wps/ |
http_server.h | 16 void http_request_send(struct http_request *req, struct wpabuf *resp); 18 struct wpabuf *resp);
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
wps-ap-cli | 21 read -p "Do you want to use this PIN (y/n)? " resp 22 case "$resp" in
|
/hardware/samsung_slsi/exynos5/libsecurepath/ |
content_protect.cpp | 109 if ((RSP_ID(CMD_WV_DRM_ENABLE_PATH_PROTECTION) != tci->resp.id)) { 110 LOG_E("Trustlet did not send a response: %d", tci->resp.id); 117 if (tci->resp.return_code != RET_TL_WV_DRM_OK) { 118 LOG_E("Trustlet did not send a valid return code: %d", tci->resp.return_code); 173 if ((RSP_ID(CMD_WV_DRM_DISABLE_PATH_PROTECTION) != tci->resp.id)) { 174 LOG_E("Trustlet did not send a response: %d", tci->resp.id); 181 if (tci->resp.return_code != RET_TL_WV_DRM_OK) { 182 LOG_E("Trustlet did not send a valid return code: %d", tci->resp.return_code);
|
tlwvdrm_api.h | 68 tci_resp_t resp; /**< Response message structure */ member in union:__anon34130::__anon34131
|
/external/chromium_org/net/dns/ |
dns_response_unittest.cc | 207 DnsResponse resp; local 208 memcpy(resp.io_buffer()->data(), response_data, sizeof(response_data)); 211 EXPECT_FALSE(resp.InitParse(query->io_buffer()->size() - 1, *query)); 212 EXPECT_FALSE(resp.IsValid()); 216 EXPECT_FALSE(resp.InitParse(sizeof(response_data), *other_query)); 217 EXPECT_FALSE(resp.IsValid()); 222 EXPECT_FALSE(resp.InitParse(sizeof(response_data), *wrong_query)); 223 EXPECT_FALSE(resp.IsValid()); 226 EXPECT_TRUE(resp.InitParse(sizeof(response_data), *query)); 227 EXPECT_TRUE(resp.IsValid()) 249 DnsResponse resp; local 300 DnsResponse resp; local 358 DnsResponse resp; local 389 DnsResponse resp; local [all...] |
/external/dropbear/ |
svr-authpam.c | 55 struct pam_response* resp = NULL; local 113 * free the pam_response and its resp element - ie we _must_ malloc 115 resp = (struct pam_response*) m_malloc(sizeof(struct pam_response)); 116 memset(resp, 0, sizeof(struct pam_response)); 118 resp->resp = m_strdup(userDatap->passwd); 120 (*respp) = resp; 139 * free the pam_response and its resp element - ie we _must_ malloc 141 resp = (struct pam_response*) m_malloc(sizeof(struct pam_response)); 142 memset(resp, 0, sizeof(struct pam_response)) [all...] |
/external/libffi/testsuite/libffi.special/ |
unwindtest.cc | 11 closure_test_fn(ffi_cif* cif __UNUSED__, void* resp __UNUSED__, 19 void closure_test_fn1(ffi_cif* cif __UNUSED__, void* resp, 22 *(ffi_arg*)resp = 41 (int)(long)userdata, (int)*(ffi_arg*)resp); 43 throw (int)*(ffi_arg*)resp;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pax.c | 187 struct eap_pax_hdr *resp; local 193 if (pos == NULL || len < sizeof(*resp)) { 199 resp = (struct eap_pax_hdr *) pos; 204 resp->op_code, resp->flags, resp->mac_id, resp->dh_group_id, 205 resp->public_key_id); 207 (u8 *) (resp + 1), len - sizeof(*resp) - EAP_PAX_ICV_LEN) 287 struct eap_pax_hdr *resp; local 455 struct eap_pax_hdr *resp; local [all...] |
/frameworks/av/media/libmedia/ |
IEffectClient.cpp | 123 char *resp = NULL; local 125 resp = (char *)malloc(replySize); 126 data.read(resp, replySize); 128 commandExecuted(cmdCode, cmdSize, cmd, replySize, resp); 132 if (resp) { 133 free(resp);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 149 struct wpabuf *resp; local 169 resp = eap_sake_build_msg(data, eap_get_id(reqData), 172 if (resp == NULL) 176 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, 181 return resp; 193 struct wpabuf *resp; local 250 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen, 252 if (resp == NULL) 256 eap_sake_add_attr(resp, EAP_SAKE_AT_RAND_P, 261 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID 294 struct wpabuf *resp; local 367 struct wpabuf *resp; local [all...] |
eap_ttls.c | 188 static int eap_ttls_avp_encapsulate(struct wpabuf **resp, u32 avp_code, 194 msg = wpabuf_alloc(sizeof(struct ttls_avp) + wpabuf_len(*resp) + 4); 196 wpabuf_free(*resp); 197 *resp = NULL; 202 pos = eap_ttls_avp_hdr(avp, avp_code, 0, mandatory, wpabuf_len(*resp)); 203 os_memcpy(pos, wpabuf_head(*resp), wpabuf_len(*resp)); 204 pos += wpabuf_len(*resp); 206 wpabuf_free(*resp); 208 *resp = msg 1160 struct wpabuf *resp = NULL; local 1233 struct wpabuf *resp; local 1473 struct wpabuf *resp; local [all...] |
/external/openssh/ |
auth-chall.c | 83 char *resp[1], *name, *info, **prompts; local 91 resp[0] = (char *)response; 92 switch (device->respond(authctxt->kbdintctxt, 1, resp)) { 101 device->respond(authctxt->kbdintctxt, 0, resp) == 0)
|
/external/chromium_org/net/spdy/ |
spdy_proxy_client_socket_unittest.cc | 475 scoped_ptr<SpdyFrame> resp(ConstructConnectReplyFrame()); 477 CreateMockRead(*resp, 1, ASYNC), 496 scoped_ptr<SpdyFrame> resp(ConstructConnectAuthReplyFrame()); 498 CreateMockRead(*resp, 1, ASYNC), 519 scoped_ptr<SpdyFrame> resp(ConstructConnectReplyFrame()); 521 CreateMockRead(*resp, 1, ASYNC), 539 scoped_ptr<SpdyFrame> resp(ConstructConnectRedirectReplyFrame()); 541 CreateMockRead(*resp, 1, ASYNC), 568 scoped_ptr<SpdyFrame> resp(ConstructConnectReplyFrame()); 590 scoped_ptr<SpdyFrame> resp(ConstructConnectReplyFrame()) [all...] |
/external/elfutils/lib/ |
crc32_file.c | 56 crc32_file (int fd, uint32_t *resp) 84 *resp = crc32 (crc, mapped, st.st_size); 104 *resp = crc;
|
/external/robolectric/src/test/java/com/xtremelabs/robolectric/shadows/ |
AndroidHttpClientTest.java | 38 HttpResponse resp = client.execute(new HttpGet("/foo")); local 39 assertThat(resp.getStatusLine().getStatusCode(), is(200)); 40 assertThat(Strings.fromStream(resp.getEntity().getContent()), equalTo("foo"));
|