HomeSort by relevance Sort by last modified time
    Searched refs:resp (Results 51 - 75 of 422) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/src/eap_peer/
eap_eke.c 163 struct wpabuf *resp; local
168 resp = eap_eke_build_msg(data, eap_get_id(reqData), 4, EAP_EKE_FAILURE);
169 if (resp)
170 wpabuf_put_be32(resp, failure_code);
180 return resp;
190 struct wpabuf *resp; local
281 resp = eap_eke_build_msg(data, eap_get_id(reqData),
284 if (resp == NULL) {
289 wpabuf_put_u8(resp, 1); /* NumProposals */
290 wpabuf_put_u8(resp, 0); /* Reserved *
319 struct wpabuf *resp; local
463 struct wpabuf *resp; local
608 struct wpabuf *resp; local
    [all...]
eap_tnc.c 86 struct wpabuf *resp; local
108 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen,
110 if (resp == NULL)
113 wpabuf_put_u8(resp, flags); /* Flags */
115 wpabuf_put_be32(resp, wpabuf_len(data->out_buf));
117 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used,
139 return resp;
201 struct wpabuf *resp; local
353 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1,
355 if (resp == NULL
    [all...]
eap_pax.c 96 struct wpabuf *resp; local
99 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX,
101 if (resp == NULL)
104 pax = wpabuf_put(resp, sizeof(*pax));
111 return resp;
120 struct wpabuf *resp; local
191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen);
192 if (resp == NULL)
195 wpabuf_put_be16(resp, EAP_PAX_RAND_LEN);
196 wpabuf_put_data(resp, data->rand.r.y, EAP_PAX_RAND_LEN)
236 struct wpabuf *resp; local
328 struct wpabuf *resp; local
    [all...]
eap_leap.c 64 struct wpabuf *resp; local
109 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP,
112 if (resp == NULL)
114 wpabuf_put_u8(resp, LEAP_VERSION);
115 wpabuf_put_u8(resp, 0); /* unused */
116 wpabuf_put_u8(resp, LEAP_RESPONSE_LEN);
117 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN);
125 wpabuf_put_data(resp, identity, identity_len);
129 return resp;
138 struct wpabuf *resp; local
    [all...]
eap_mschapv2.c 151 struct wpabuf *resp; local
168 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len,
170 if (resp == NULL)
173 ms = wpabuf_put(resp, sizeof(*ms));
187 wpabuf_put_u8(resp, sizeof(*r)); /* Value-Size */
190 r = wpabuf_put(resp, sizeof(*r));
198 wpabuf_free(resp);
213 wpabuf_free(resp);
221 wpabuf_put_data(resp, identity, identity_len);
224 return resp;
345 struct wpabuf *resp; local
502 struct wpabuf *resp; local
633 struct wpabuf *resp; local
    [all...]
eap_gpsk.c 260 struct wpabuf *resp; local
280 resp = eap_gpsk_send_gpsk_2(data, eap_get_id(reqData),
282 if (resp == NULL)
287 return resp;
296 struct wpabuf *resp; local
308 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len,
310 if (resp == NULL)
313 wpabuf_put_u8(resp, EAP_GPSK_OPCODE_GPSK_2);
314 start = wpabuf_put(resp, 0);
318 wpabuf_put_be16(resp, data->id_peer_len)
566 struct wpabuf *resp; local
609 struct wpabuf *resp; local
646 struct wpabuf *resp; local
    [all...]
eap_peap.c 452 * @resp: Buffer to return a pointer to the allocated response message. This
461 const struct wpabuf *req, struct wpabuf **resp,
505 *resp = eap_tlv_build_nak(eap_get_id(req),
507 return *resp == NULL ? -1 : 0;
575 *resp = eap_tlv_build_result(sm, data, crypto_tlv != NULL,
614 struct wpabuf **resp)
631 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1);
635 if (eap_tlv_process(sm, data, &iret, req, resp,
664 *resp = eap_msg_alloc(
669 if (*resp == NULL)
764 struct wpabuf *resp = NULL; local
1037 struct wpabuf *resp; local
    [all...]
eap_vendor_test.c 69 struct wpabuf *resp; local
119 resp = eap_msg_alloc(EAP_VENDOR_ID, EAP_VENDOR_TYPE, 1,
121 if (resp == NULL)
125 wpabuf_put_u8(resp, 2);
130 wpabuf_put_u8(resp, 4);
136 return resp;
  /libcore/luni/src/main/java/org/apache/harmony/security/x509/tsp/
TimeStampResp.java 89 TimeStampResp resp = (TimeStampResp) object;
91 values[0] = resp.status;
92 values[1] = resp.timeStampToken;
  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 243 struct eap_mschapv2_hdr *resp; local
254 resp = (struct eap_mschapv2_hdr *) pos;
256 resp->op_code != MSCHAPV2_OP_RESPONSE) {
258 "ignore op %d", resp->op_code);
263 resp->op_code != MSCHAPV2_OP_SUCCESS &&
264 resp->op_code != MSCHAPV2_OP_FAILURE) {
266 "Failure - ignore op %d", resp->op_code);
271 resp->op_code != MSCHAPV2_OP_FAILURE) {
273 "- ignore op %d", resp->op_code);
285 struct eap_mschapv2_hdr *resp; local
432 struct eap_mschapv2_hdr *resp; local
459 struct eap_mschapv2_hdr *resp; local
    [all...]
  /development/samples/SampleSyncAdapter/src/com/example/android/samplesync/client/
NetworkUtilities.java 106 final HttpResponse resp; local
122 resp = getHttpClient().execute(post);
124 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_OK) {
125 InputStream istream = (resp.getEntity() != null) ? resp.getEntity().getContent()
136 Log.e(TAG, "Error authenticating" + resp.getStatusLine());
192 final HttpResponse resp = getHttpClient().execute(post); local
193 final String response = EntityUtils.toString(resp.getEntity());
194 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_OK) {
208 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_UNAUTHORIZED)
    [all...]
  /external/wpa_supplicant_8/src/utils/
pcsc_funcs.c 795 unsigned char resp[3]; local
822 len = sizeof(resp);
823 ret = scard_transmit(scard, cmd, cmdlen, resp, &len);
831 wpa_printf(MSG_WARNING, "SCARD: unexpected resp len "
836 if (resp[0] == 0x98 && resp[1] == 0x04) {
843 if (resp[0] == 0x6e) {
848 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[0] != 0x61)
1007 unsigned char resp[3]; local
1039 unsigned char resp[3]; local
1230 unsigned char resp[3], buf[12 + 3 + 2]; local
1330 unsigned char resp[3], buf[64], *pos, *end; local
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
smtplib.py 350 resp = []
365 resp.append(line[4:].strip())
378 errmsg = "\n".join(resp)
418 resp = self.ehlo_resp.split('\n')
419 del resp[0]
420 for each in resp:
535 (code, resp) = self.helo()
537 raise SMTPHeloError(code, resp)
595 (code, resp) = self.docmd("AUTH", AUTH_CRAM_MD5)
598 return (code, resp)
    [all...]
poplib.py 124 resp, o = self._getline()
125 if self._debugging > 1: print '*resp*', repr(resp)
126 c = resp[:1]
128 raise error_proto(resp)
129 return resp
135 resp = self._getresp()
145 return resp, list, octets
251 resp = self._shortcmd('QUIT')
253 resp = va
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
smtplib.py 350 resp = []
365 resp.append(line[4:].strip())
378 errmsg = "\n".join(resp)
418 resp = self.ehlo_resp.split('\n')
419 del resp[0]
420 for each in resp:
535 (code, resp) = self.helo()
537 raise SMTPHeloError(code, resp)
595 (code, resp) = self.docmd("AUTH", AUTH_CRAM_MD5)
598 return (code, resp)
    [all...]
poplib.py 124 resp, o = self._getline()
125 if self._debugging > 1: print '*resp*', repr(resp)
126 c = resp[:1]
128 raise error_proto(resp)
129 return resp
135 resp = self._getresp()
145 return resp, list, octets
251 resp = self._shortcmd('QUIT')
253 resp = va
    [all...]
  /external/chromium/net/spdy/
spdy_proxy_client_socket_unittest.cc 423 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame());
425 CreateMockRead(*resp, 1, true),
444 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectAuthReplyFrame());
446 CreateMockRead(*resp, 1, true),
467 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame());
469 CreateMockRead(*resp, 1, true),
487 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame());
509 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame());
511 CreateMockRead(*resp, 1, true),
532 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame())
    [all...]
  /hardware/qcom/keymaster/
keymaster_qcom.cpp 337 keymaster_gen_keypair_resp_t *resp = NULL; local
344 resp = (keymaster_gen_keypair_resp_t *)(handle->ion_sbuffer +
350 resp->status = KEYMASTER_FAILURE;
351 resp->key_blob_len = sizeof(qcom_km_key_blob_t);
360 QSEECOM_ALIGN(sizeof(keymaster_gen_keypair_cmd_t)), resp,
366 if ( (ret < 0) || (resp->status < 0)) {
367 ALOGE("Generate key command failed resp->status = %d ret =%d", resp->status, ret);
370 UniquePtr<unsigned char[]> keydata(new unsigned char[resp->key_blob_len]);
376 memcpy(p, (unsigned char *)(&resp->key_blob), resp->key_blob_len)
419 keymaster_import_keypair_resp_t *resp = NULL; local
500 keymaster_sign_data_resp_t *resp = NULL; local
599 keymaster_verify_data_resp_t *resp = NULL; local
    [all...]
  /packages/apps/Exchange/src/com/android/exchange/service/
EasAutoDiscover.java 83 final EasResponse resp = getResponse(post, domain); local
84 if (resp == null) {
89 // resp is either an authentication error, or a good response.
90 final int code = resp.getStatus();
97 final HostAuth hostAuth = parseAutodiscover(resp);
118 resp.close();
179 EasResponse resp = doPost(post, true); local
180 if (resp == null) {
183 resp = doPost(post, true);
185 return resp;
197 final EasResponse resp; local
    [all...]
  /frameworks/av/media/libmedia/
IEffect.cpp 159 char *resp = NULL; local
161 resp = (char *)malloc(replySize);
163 status_t status = command(cmdCode, cmdSize, cmd, &replySz, resp);
170 reply->write(resp, replySize);
175 if (resp) {
176 free(resp);
  /packages/apps/Exchange/src/com/android/exchange/
EasAccountService.java 197 * @param resp the EasResponse from the current POST
200 private boolean canHandleAccountMailboxRedirect(EasResponse resp) {
204 if (ha != null && getValidateRedirect(resp, ha)) {
252 EasResponse resp = sendHttpClientOptions(); local
254 int code = resp.getStatus();
257 Header header = resp.getHeader("MS-ASProtocolCommands");
259 header = resp.getHeader("ms-asprotocolversions");
284 } else if (code == EAS_REDIRECT_CODE && canHandleAccountMailboxRedirect(resp)) {
287 } else if (resp.isProvisionError()) {
289 } else if (resp.isAuthError())
327 EasResponse resp = sendHttpClientPost("FolderSync", s.toByteArray()); local
640 EasResponse resp = local
    [all...]
  /external/chromium_org/media/tools/layout_tests/
test_expectations.py 63 resp = urllib2.urlopen(url)
64 if resp.code != 200:
67 for line in resp.read().split('\n'):
  /external/wpa_supplicant_8/src/wps/
http_server.c 132 void http_request_send(struct http_request *req, struct wpabuf *resp)
137 (unsigned long) wpabuf_len(resp),
141 res = send(req->fd, wpabuf_head(resp), wpabuf_len(resp), 0);
145 } else if ((size_t) res < wpabuf_len(resp)) {
147 res, (unsigned long) wpabuf_len(resp));
151 wpabuf_free(resp);
156 struct wpabuf *resp)
158 http_request_send(req, resp);
  /packages/apps/Exchange/src/com/android/exchange/adapter/
AttachmentLoader.java 133 EasResponse resp = null; local
143 resp = mService.sendHttpClientPost("ItemOperations", s.toByteArray());
152 resp = mService.sendHttpClientPost(cmd, null, EasSyncService.COMMAND_TIMEOUT);
155 int status = resp.getStatus();
157 if (!resp.isEmpty()) {
158 InputStream is = resp.getInputStream();
173 int len = resp.getLength();
200 if (resp != null) {
201 resp.close();
  /frameworks/base/wifi/java/android/net/wifi/p2p/
WifiP2pManager.java 744 WifiP2pServiceResponse resp = (WifiP2pServiceResponse) message.obj; local
745 handleServiceResponse(resp);
761 private void handleServiceResponse(WifiP2pServiceResponse resp) {
762 if (resp instanceof WifiP2pDnsSdServiceResponse) {
763 handleDnsSdServiceResponse((WifiP2pDnsSdServiceResponse)resp);
764 } else if (resp instanceof WifiP2pUpnpServiceResponse) {
766 handleUpnpServiceResponse((WifiP2pUpnpServiceResponse)resp);
    [all...]

Completed in 3467 milliseconds

1 23 4 5 6 7 8 91011>>