/external/wpa_supplicant_8/src/eap_peer/ |
eap_eke.c | 163 struct wpabuf *resp; local 168 resp = eap_eke_build_msg(data, eap_get_id(reqData), 4, EAP_EKE_FAILURE); 169 if (resp) 170 wpabuf_put_be32(resp, failure_code); 180 return resp; 190 struct wpabuf *resp; local 281 resp = eap_eke_build_msg(data, eap_get_id(reqData), 284 if (resp == NULL) { 289 wpabuf_put_u8(resp, 1); /* NumProposals */ 290 wpabuf_put_u8(resp, 0); /* Reserved * 319 struct wpabuf *resp; local 463 struct wpabuf *resp; local 608 struct wpabuf *resp; local [all...] |
eap_tnc.c | 86 struct wpabuf *resp; local 108 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, 110 if (resp == NULL) 113 wpabuf_put_u8(resp, flags); /* Flags */ 115 wpabuf_put_be32(resp, wpabuf_len(data->out_buf)); 117 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used, 139 return resp; 201 struct wpabuf *resp; local 353 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, 355 if (resp == NULL [all...] |
eap_pax.c | 96 struct wpabuf *resp; local 99 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, 101 if (resp == NULL) 104 pax = wpabuf_put(resp, sizeof(*pax)); 111 return resp; 120 struct wpabuf *resp; local 191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); 192 if (resp == NULL) 195 wpabuf_put_be16(resp, EAP_PAX_RAND_LEN); 196 wpabuf_put_data(resp, data->rand.r.y, EAP_PAX_RAND_LEN) 236 struct wpabuf *resp; local 328 struct wpabuf *resp; local [all...] |
eap_leap.c | 64 struct wpabuf *resp; local 109 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, 112 if (resp == NULL) 114 wpabuf_put_u8(resp, LEAP_VERSION); 115 wpabuf_put_u8(resp, 0); /* unused */ 116 wpabuf_put_u8(resp, LEAP_RESPONSE_LEN); 117 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); 125 wpabuf_put_data(resp, identity, identity_len); 129 return resp; 138 struct wpabuf *resp; local [all...] |
eap_mschapv2.c | 151 struct wpabuf *resp; local 168 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, 170 if (resp == NULL) 173 ms = wpabuf_put(resp, sizeof(*ms)); 187 wpabuf_put_u8(resp, sizeof(*r)); /* Value-Size */ 190 r = wpabuf_put(resp, sizeof(*r)); 198 wpabuf_free(resp); 213 wpabuf_free(resp); 221 wpabuf_put_data(resp, identity, identity_len); 224 return resp; 345 struct wpabuf *resp; local 502 struct wpabuf *resp; local 633 struct wpabuf *resp; local [all...] |
eap_gpsk.c | 260 struct wpabuf *resp; local 280 resp = eap_gpsk_send_gpsk_2(data, eap_get_id(reqData), 282 if (resp == NULL) 287 return resp; 296 struct wpabuf *resp; local 308 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, 310 if (resp == NULL) 313 wpabuf_put_u8(resp, EAP_GPSK_OPCODE_GPSK_2); 314 start = wpabuf_put(resp, 0); 318 wpabuf_put_be16(resp, data->id_peer_len) 566 struct wpabuf *resp; local 609 struct wpabuf *resp; local 646 struct wpabuf *resp; local [all...] |
eap_peap.c | 452 * @resp: Buffer to return a pointer to the allocated response message. This 461 const struct wpabuf *req, struct wpabuf **resp, 505 *resp = eap_tlv_build_nak(eap_get_id(req), 507 return *resp == NULL ? -1 : 0; 575 *resp = eap_tlv_build_result(sm, data, crypto_tlv != NULL, 614 struct wpabuf **resp) 631 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1); 635 if (eap_tlv_process(sm, data, &iret, req, resp, 664 *resp = eap_msg_alloc( 669 if (*resp == NULL) 764 struct wpabuf *resp = NULL; local 1037 struct wpabuf *resp; local [all...] |
eap_vendor_test.c | 69 struct wpabuf *resp; local 119 resp = eap_msg_alloc(EAP_VENDOR_ID, EAP_VENDOR_TYPE, 1, 121 if (resp == NULL) 125 wpabuf_put_u8(resp, 2); 130 wpabuf_put_u8(resp, 4); 136 return resp;
|
/libcore/luni/src/main/java/org/apache/harmony/security/x509/tsp/ |
TimeStampResp.java | 89 TimeStampResp resp = (TimeStampResp) object; 91 values[0] = resp.status; 92 values[1] = resp.timeStampToken;
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 243 struct eap_mschapv2_hdr *resp; local 254 resp = (struct eap_mschapv2_hdr *) pos; 256 resp->op_code != MSCHAPV2_OP_RESPONSE) { 258 "ignore op %d", resp->op_code); 263 resp->op_code != MSCHAPV2_OP_SUCCESS && 264 resp->op_code != MSCHAPV2_OP_FAILURE) { 266 "Failure - ignore op %d", resp->op_code); 271 resp->op_code != MSCHAPV2_OP_FAILURE) { 273 "- ignore op %d", resp->op_code); 285 struct eap_mschapv2_hdr *resp; local 432 struct eap_mschapv2_hdr *resp; local 459 struct eap_mschapv2_hdr *resp; local [all...] |
/development/samples/SampleSyncAdapter/src/com/example/android/samplesync/client/ |
NetworkUtilities.java | 106 final HttpResponse resp; local 122 resp = getHttpClient().execute(post); 124 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_OK) { 125 InputStream istream = (resp.getEntity() != null) ? resp.getEntity().getContent() 136 Log.e(TAG, "Error authenticating" + resp.getStatusLine()); 192 final HttpResponse resp = getHttpClient().execute(post); local 193 final String response = EntityUtils.toString(resp.getEntity()); 194 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_OK) { 208 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_UNAUTHORIZED) [all...] |
/external/wpa_supplicant_8/src/utils/ |
pcsc_funcs.c | 795 unsigned char resp[3]; local 822 len = sizeof(resp); 823 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); 831 wpa_printf(MSG_WARNING, "SCARD: unexpected resp len " 836 if (resp[0] == 0x98 && resp[1] == 0x04) { 843 if (resp[0] == 0x6e) { 848 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[0] != 0x61) 1007 unsigned char resp[3]; local 1039 unsigned char resp[3]; local 1230 unsigned char resp[3], buf[12 + 3 + 2]; local 1330 unsigned char resp[3], buf[64], *pos, *end; local [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
smtplib.py | 350 resp = [] 365 resp.append(line[4:].strip()) 378 errmsg = "\n".join(resp) 418 resp = self.ehlo_resp.split('\n') 419 del resp[0] 420 for each in resp: 535 (code, resp) = self.helo() 537 raise SMTPHeloError(code, resp) 595 (code, resp) = self.docmd("AUTH", AUTH_CRAM_MD5) 598 return (code, resp) [all...] |
poplib.py | 124 resp, o = self._getline() 125 if self._debugging > 1: print '*resp*', repr(resp) 126 c = resp[:1] 128 raise error_proto(resp) 129 return resp 135 resp = self._getresp() 145 return resp, list, octets 251 resp = self._shortcmd('QUIT') 253 resp = va [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
smtplib.py | 350 resp = [] 365 resp.append(line[4:].strip()) 378 errmsg = "\n".join(resp) 418 resp = self.ehlo_resp.split('\n') 419 del resp[0] 420 for each in resp: 535 (code, resp) = self.helo() 537 raise SMTPHeloError(code, resp) 595 (code, resp) = self.docmd("AUTH", AUTH_CRAM_MD5) 598 return (code, resp) [all...] |
poplib.py | 124 resp, o = self._getline() 125 if self._debugging > 1: print '*resp*', repr(resp) 126 c = resp[:1] 128 raise error_proto(resp) 129 return resp 135 resp = self._getresp() 145 return resp, list, octets 251 resp = self._shortcmd('QUIT') 253 resp = va [all...] |
/external/chromium/net/spdy/ |
spdy_proxy_client_socket_unittest.cc | 423 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame()); 425 CreateMockRead(*resp, 1, true), 444 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectAuthReplyFrame()); 446 CreateMockRead(*resp, 1, true), 467 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame()); 469 CreateMockRead(*resp, 1, true), 487 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame()); 509 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame()); 511 CreateMockRead(*resp, 1, true), 532 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame()) [all...] |
/hardware/qcom/keymaster/ |
keymaster_qcom.cpp | 337 keymaster_gen_keypair_resp_t *resp = NULL; local 344 resp = (keymaster_gen_keypair_resp_t *)(handle->ion_sbuffer + 350 resp->status = KEYMASTER_FAILURE; 351 resp->key_blob_len = sizeof(qcom_km_key_blob_t); 360 QSEECOM_ALIGN(sizeof(keymaster_gen_keypair_cmd_t)), resp, 366 if ( (ret < 0) || (resp->status < 0)) { 367 ALOGE("Generate key command failed resp->status = %d ret =%d", resp->status, ret); 370 UniquePtr<unsigned char[]> keydata(new unsigned char[resp->key_blob_len]); 376 memcpy(p, (unsigned char *)(&resp->key_blob), resp->key_blob_len) 419 keymaster_import_keypair_resp_t *resp = NULL; local 500 keymaster_sign_data_resp_t *resp = NULL; local 599 keymaster_verify_data_resp_t *resp = NULL; local [all...] |
/packages/apps/Exchange/src/com/android/exchange/service/ |
EasAutoDiscover.java | 83 final EasResponse resp = getResponse(post, domain); local 84 if (resp == null) { 89 // resp is either an authentication error, or a good response. 90 final int code = resp.getStatus(); 97 final HostAuth hostAuth = parseAutodiscover(resp); 118 resp.close(); 179 EasResponse resp = doPost(post, true); local 180 if (resp == null) { 183 resp = doPost(post, true); 185 return resp; 197 final EasResponse resp; local [all...] |
/frameworks/av/media/libmedia/ |
IEffect.cpp | 159 char *resp = NULL; local 161 resp = (char *)malloc(replySize); 163 status_t status = command(cmdCode, cmdSize, cmd, &replySz, resp); 170 reply->write(resp, replySize); 175 if (resp) { 176 free(resp);
|
/packages/apps/Exchange/src/com/android/exchange/ |
EasAccountService.java | 197 * @param resp the EasResponse from the current POST 200 private boolean canHandleAccountMailboxRedirect(EasResponse resp) { 204 if (ha != null && getValidateRedirect(resp, ha)) { 252 EasResponse resp = sendHttpClientOptions(); local 254 int code = resp.getStatus(); 257 Header header = resp.getHeader("MS-ASProtocolCommands"); 259 header = resp.getHeader("ms-asprotocolversions"); 284 } else if (code == EAS_REDIRECT_CODE && canHandleAccountMailboxRedirect(resp)) { 287 } else if (resp.isProvisionError()) { 289 } else if (resp.isAuthError()) 327 EasResponse resp = sendHttpClientPost("FolderSync", s.toByteArray()); local 640 EasResponse resp = local [all...] |
/external/chromium_org/media/tools/layout_tests/ |
test_expectations.py | 63 resp = urllib2.urlopen(url) 64 if resp.code != 200: 67 for line in resp.read().split('\n'):
|
/external/wpa_supplicant_8/src/wps/ |
http_server.c | 132 void http_request_send(struct http_request *req, struct wpabuf *resp) 137 (unsigned long) wpabuf_len(resp), 141 res = send(req->fd, wpabuf_head(resp), wpabuf_len(resp), 0); 145 } else if ((size_t) res < wpabuf_len(resp)) { 147 res, (unsigned long) wpabuf_len(resp)); 151 wpabuf_free(resp); 156 struct wpabuf *resp) 158 http_request_send(req, resp);
|
/packages/apps/Exchange/src/com/android/exchange/adapter/ |
AttachmentLoader.java | 133 EasResponse resp = null; local 143 resp = mService.sendHttpClientPost("ItemOperations", s.toByteArray()); 152 resp = mService.sendHttpClientPost(cmd, null, EasSyncService.COMMAND_TIMEOUT); 155 int status = resp.getStatus(); 157 if (!resp.isEmpty()) { 158 InputStream is = resp.getInputStream(); 173 int len = resp.getLength(); 200 if (resp != null) { 201 resp.close();
|
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pManager.java | 744 WifiP2pServiceResponse resp = (WifiP2pServiceResponse) message.obj; local 745 handleServiceResponse(resp); 761 private void handleServiceResponse(WifiP2pServiceResponse resp) { 762 if (resp instanceof WifiP2pDnsSdServiceResponse) { 763 handleDnsSdServiceResponse((WifiP2pDnsSdServiceResponse)resp); 764 } else if (resp instanceof WifiP2pUpnpServiceResponse) { 766 handleUpnpServiceResponse((WifiP2pUpnpServiceResponse)resp); [all...] |