/external/openssl/crypto/ocsp/ |
ocsp.h | 423 int OCSP_basic_add1_nonce(OCSP_BASICRESP *resp, unsigned char *val, int len); 425 int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req); 437 int OCSP_response_status(OCSP_RESPONSE *resp); 438 OCSP_BASICRESP *OCSP_response_get1_basic(OCSP_RESPONSE *resp); 476 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert);
|
/external/openssl/include/openssl/ |
ocsp.h | 423 int OCSP_basic_add1_nonce(OCSP_BASICRESP *resp, unsigned char *val, int len); 425 int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req); 437 int OCSP_response_status(OCSP_RESPONSE *resp); 438 OCSP_BASICRESP *OCSP_response_get1_basic(OCSP_RESPONSE *resp); 476 int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert);
|
/external/wpa_supplicant_8/src/p2p/ |
p2p.c | 2008 struct ieee80211_mgmt *resp; local 3734 struct wpabuf *resp; local 3762 struct wpabuf *resp; local [all...] |
/external/bluetooth/bluedroid/stack/bnep/ |
bnep_utils.c | 688 tBNEP_RESULT resp; local 712 resp = BNEP_CONN_FAILED_SRC_UUID; 716 resp = BNEP_CONN_FAILED_DST_UUID; 720 resp = BNEP_CONN_FAILED_UUID_SIZE; 725 resp = BNEP_CONN_FAILED; 748 (*bnep_cb.p_conn_state_cb) (p_bcb->handle, p_bcb->rem_bda, resp, TRUE); 760 (*bnep_cb.p_conn_state_cb) (p_bcb->handle, p_bcb->rem_bda, resp, FALSE); [all...] |
/external/dropbear/ |
scp.c | 1111 char ch, *cp, resp, rbuf[2048]; local 1113 if (atomicio(read, remin, &resp, sizeof(resp)) != sizeof(resp)) 1117 switch (resp) { 1121 *cp++ = resp; 1134 if (resp == 1)
|
/external/openssh/ |
scp.c | 1183 char ch, *cp, resp, rbuf[2048]; local 1185 if (atomicio(read, remin, &resp, sizeof(resp)) != sizeof(resp)) 1189 switch (resp) { 1193 *cp++ = resp; 1206 if (resp == 1)
|
/external/libmtp/src/ |
libusb-glue.c | [all...] |
/external/bluetooth/bluedroid/stack/include/ |
bnep_api.h | 292 ** resp - responce for the connection indication 299 BNEP_API extern tBNEP_RESULT BNEP_ConnectResp (UINT16 handle, tBNEP_RESULT resp);
|
/external/chromium_org/v8/test/mjsunit/ |
debug-return-value.js | 115 var resp = dcp.processDebugJSONRequest(request); 116 response = new ParsedResponse(resp);
|
debug-backtrace.js | 103 var resp = dcp.processDebugJSONRequest(json); 104 response = new ParsedResponse(resp); 248 resp = dcp.processDebugJSONRequest(json); 249 response = new ParsedResponse(resp);
|
/external/chromium_org/v8/test/webkit/fast/js/ |
regexp-unicode-handling.js | 31 var I3=/^\s*(fwd|re|aw|antw|antwort|wg|sv|ang|odp|betreff|betr|transf|reenv\.|reenv|in|res|resp|resp\.|enc|\u8f6c\u53d1|\u56DE\u590D|\u041F\u0435\u0440\u0435\u0441\u043B|\u041E\u0442\u0432\u0435\u0442):\s*(.*)$/i;
|
/external/iproute2/lib/ |
libnetlink.c | 126 char resp[1024]; local 133 status = recv(rth->fd, resp, sizeof(resp), MSG_DONTWAIT|MSG_PEEK); 140 for (h = (struct nlmsghdr *)resp; NLMSG_OK(h, status);
|
/external/libppp/src/ |
ether.c | 444 struct ng_mesg *resp; local 532 resp = (struct ng_mesg *)rbuf; 533 if (NgRecvMsg(dev->cs, resp, sizeof rbuf, NULL) <= 0) { 539 hlist = (const struct hooklist *)resp->data;
|
chap.c | 855 struct MSCHAPv2_resp *resp = (struct MSCHAPv2_resp *)(ans + 1); local 857 chap->challenge.peer[0] = sizeof resp->PeerChallenge; 858 memcpy(chap->challenge.peer + 1, resp->PeerChallenge, 859 sizeof resp->PeerChallenge); 875 struct MSCHAPv2_resp *resp = (struct MSCHAPv2_resp *)(ans + 1); local 879 resp->Flags = '\0'; /* rfc2759 says it *MUST* be zero */
|
/external/v8/test/mjsunit/ |
debug-return-value.js | 115 var resp = dcp.processDebugJSONRequest(request); 116 response = new ParsedResponse(resp);
|
debug-backtrace.js | 103 var resp = dcp.processDebugJSONRequest(json); 104 response = new ParsedResponse(resp); 248 resp = dcp.processDebugJSONRequest(json); 249 response = new ParsedResponse(resp);
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/test/ |
test_smtplib.py | 324 resp = ('250-testhost\r\n' 329 resp = resp + self._extrafeatures + '250 HELP' 330 self.push(resp)
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/test/ |
test_smtplib.py | 324 resp = ('250-testhost\r\n' 329 resp = resp + self._extrafeatures + '250 HELP' 330 self.push(resp)
|
/external/chromium_org/net/spdy/ |
spdy_test_util_common.cc | 173 MockRead CreateMockRead(const SpdyFrame& resp) { 174 return MockRead(ASYNC, resp.data(), resp.size()); 178 MockRead CreateMockRead(const SpdyFrame& resp, int seq) { 179 return CreateMockRead(resp, seq, ASYNC); 183 MockRead CreateMockRead(const SpdyFrame& resp, int seq, IoMode mode) { 184 return MockRead(mode, resp.data(), resp.size(), seq); [all...] |
/external/chromium_org/net/tools/testserver/ |
minica.py | 297 resp = asn1.SEQUENCE([ 305 return asn1.ToDER(resp)
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/client/ |
httpportallocator.cc | 330 std::string resp = std::string(stream->GetBuffer(), length); local 331 ReceiveSessionResponse(resp);
|
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 822 struct wpabuf *resp; local 829 resp = eap_proxy_get_eapRespData(sm->eap_proxy); 830 if (resp == NULL) { 838 resp = eap_get_eapRespData(sm->eap); 839 if (resp == NULL) { 847 IEEE802_1X_TYPE_EAP_PACKET, wpabuf_head(resp), 848 wpabuf_len(resp)); 851 wpabuf_free(resp); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
sme.c | 153 struct wpabuf *resp = NULL; local 385 resp = sme_auth_build_sae_commit(wpa_s, ssid, 388 resp = sme_auth_build_sae_confirm(wpa_s); 389 if (resp == NULL) 391 params.sae_data = wpabuf_head(resp); 392 params.sae_data_len = wpabuf_len(resp); 419 wpabuf_free(resp); 431 wpabuf_free(resp); [all...] |
/packages/apps/Mms/src/com/android/mms/transaction/ |
RetrieveTransaction.java | 136 byte[] resp = getPdu(mContentLocation); 139 RetrieveConf retrieveConf = (RetrieveConf) new PduParser(resp).parse();
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 1258 struct ft_r0kh_r1kh_resp_frame resp, r; local [all...] |