HomeSort by relevance Sort by last modified time
    Searched defs:resp (Results 126 - 150 of 243) sorted by null

1 2 3 4 56 7 8 910

  /external/wpa_supplicant_8/src/ap/
beacon.c 333 struct ieee80211_mgmt *resp; local
349 resp = os_zalloc(buflen);
350 if (resp == NULL)
353 epos = ((u8 *) resp) + MAX_PROBERESP_LEN;
355 resp->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
358 os_memcpy(resp->da, req->sa, ETH_ALEN);
359 os_memcpy(resp->sa, hapd->own_addr, ETH_ALEN);
361 os_memcpy(resp->bssid, hapd->own_addr, ETH_ALEN);
362 resp->u.probe_resp.beacon_int =
366 resp->u.probe_resp.capab_info
503 u8 *resp; local
724 u8 *resp = NULL; local
    [all...]
ieee802_11.c 262 u16 auth_alg, u16 auth_transaction, u16 resp,
283 reply->u.auth.status_code = host_to_le16(resp);
289 " auth_alg=%d auth_transaction=%d resp=%d (IE len=%lu)",
291 resp, (unsigned long) ies_len);
447 u16 resp = WLAN_STATUS_SUCCESS; local
465 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable,
477 if (resp == WLAN_STATUS_SUCCESS) {
483 resp = WLAN_STATUS_ANTI_CLOGGING_TOKEN_REQ;
487 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
498 resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION
547 u16 resp = WLAN_STATUS_SUCCESS; local
880 u16 resp; local
1279 u16 resp = WLAN_STATUS_SUCCESS; local
1689 struct ieee80211_mgmt *resp; local
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_eke.c 201 struct wpabuf *resp; local
206 resp = eap_eke_build_msg(data, eap_get_id(reqData), 4, EAP_EKE_FAILURE);
207 if (resp)
208 wpabuf_put_be32(resp, failure_code);
218 return resp;
228 struct wpabuf *resp; local
323 resp = eap_eke_build_msg(data, eap_get_id(reqData),
326 if (resp == NULL) {
331 wpabuf_put_u8(resp, 1); /* NumProposals */
332 wpabuf_put_u8(resp, 0); /* Reserved *
361 struct wpabuf *resp; local
505 struct wpabuf *resp; local
650 struct wpabuf *resp; local
    [all...]
eap_gpsk.c 283 struct wpabuf *resp; local
304 resp = eap_gpsk_send_gpsk_2(data, eap_get_id(reqData),
306 if (resp == NULL)
311 return resp;
320 struct wpabuf *resp; local
332 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len,
334 if (resp == NULL)
337 wpabuf_put_u8(resp, EAP_GPSK_OPCODE_GPSK_2);
338 start = wpabuf_put(resp, 0);
342 wpabuf_put_be16(resp, data->id_peer_len)
590 struct wpabuf *resp; local
633 struct wpabuf *resp; local
670 struct wpabuf *resp; local
    [all...]
eap_pwd.c 705 struct wpabuf *resp = NULL; local
749 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PWD,
752 if (resp == NULL) {
757 wpabuf_put_u8(resp, lm_exch);
759 wpabuf_put_data(resp, buf + data->out_frag_pos, len);
777 return resp;
817 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PWD,
820 if (resp != NULL)
821 wpabuf_put_u8(resp, (EAP_PWD_GET_EXCHANGE(lm_exch)));
824 return resp;
    [all...]
eap_mschapv2.c 151 struct wpabuf *resp; local
168 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len,
170 if (resp == NULL)
173 ms = wpabuf_put(resp, sizeof(*ms));
187 wpabuf_put_u8(resp, sizeof(*r)); /* Value-Size */
190 r = wpabuf_put(resp, sizeof(*r));
198 wpabuf_free(resp);
213 wpabuf_free(resp);
221 wpabuf_put_data(resp, identity, identity_len);
224 return resp;
350 struct wpabuf *resp; local
507 struct wpabuf *resp; local
644 struct wpabuf *resp; local
    [all...]
eap_peap.c 458 * @resp: Buffer to return a pointer to the allocated response message. This
467 const struct wpabuf *req, struct wpabuf **resp,
511 *resp = eap_tlv_build_nak(eap_get_id(req),
513 return *resp == NULL ? -1 : 0;
581 *resp = eap_tlv_build_result(sm, data, crypto_tlv != NULL,
593 struct wpabuf **resp)
610 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1);
614 if (eap_tlv_process(sm, data, &iret, req, resp,
643 *resp = eap_msg_alloc(
648 if (*resp == NULL)
743 struct wpabuf *resp = NULL; local
968 struct wpabuf *resp; local
    [all...]
eap_sim.c 184 char *resp, *pos; local
190 resp = conf->external_sim_resp;
193 if (os_strncmp(resp, "GSM-AUTH:", 9) != 0) {
195 os_free(resp);
199 pos = resp + 9;
225 os_free(resp);
230 os_free(resp);
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_mschapv2.c 243 struct eap_mschapv2_hdr *resp; local
254 resp = (struct eap_mschapv2_hdr *) pos;
256 resp->op_code != MSCHAPV2_OP_RESPONSE) {
258 "ignore op %d", resp->op_code);
263 resp->op_code != MSCHAPV2_OP_SUCCESS &&
264 resp->op_code != MSCHAPV2_OP_FAILURE) {
266 "Failure - ignore op %d", resp->op_code);
271 resp->op_code != MSCHAPV2_OP_FAILURE) {
273 "- ignore op %d", resp->op_code);
285 struct eap_mschapv2_hdr *resp; local
440 struct eap_mschapv2_hdr *resp; local
467 struct eap_mschapv2_hdr *resp; local
    [all...]
eap_server_peap.c 1029 const struct eap_hdr *resp; local
1039 resp = wpabuf_head(respData);
1041 nhdr->code = resp->code;
1042 nhdr->identifier = resp->identifier;
  /frameworks/base/core/tests/coretests/src/android/app/
DownloadManagerFunctionalTest.java 271 final MockResponse resp = buildResponse(HTTP_REDIRECT); local
272 resp.setHeader("Location", uri.toString());
273 enqueueResponse(resp);
295 final MockResponse resp = buildResponse(HTTP_REDIRECT); local
296 resp.setHeader("Location", "://blah.blah.blah.com");
297 enqueueResponse(resp);
391 final MockResponse resp = buildResponse(HTTP_OK, blobData); local
392 resp.setHeader("Content-Length", "50000");
393 enqueueResponse(resp);
  /packages/apps/Nfc/nxp/jni/
com_android_nfc_NativeNfcTag.cpp 1086 jbyte* resp = e->GetByteArrayElements(respBytes, NULL); local
    [all...]
  /external/chromium_org/net/dns/
dns_transaction.cc 157 const DnsResponse* resp = response_.get(); variable
158 return (resp != NULL && resp->IsValid()) ? resp : NULL;
328 const DnsResponse* resp = response_.get(); variable
329 return (resp != NULL && resp->IsValid()) ? resp : NULL;
  /external/chromium_org/third_party/openssl/openssl/apps/
ocsp.c 107 static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db,
115 static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp);
138 OCSP_RESPONSE *resp = NULL; local
693 resp = OCSP_response_create(OCSP_RESPONSE_STATUS_MALFORMEDREQUEST, NULL);
694 send_ocsp_response(cbio, resp);
764 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays);
766 send_ocsp_response(cbio, resp);
771 resp = process_responder(bio_err, req, host, path,
773 if (!resp)
788 resp = d2i_OCSP_RESPONSE_bio(derbio, NULL)
1380 OCSP_RESPONSE *resp = NULL; local
    [all...]
  /external/openssl/apps/
ocsp.c 107 static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db,
115 static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp);
139 OCSP_RESPONSE *resp = NULL; local
703 resp = OCSP_response_create(OCSP_RESPONSE_STATUS_MALFORMEDREQUEST, NULL);
704 send_ocsp_response(cbio, resp);
774 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays);
776 send_ocsp_response(cbio, resp);
781 resp = process_responder(bio_err, req, host, path,
783 if (!resp)
798 resp = d2i_OCSP_RESPONSE_bio(derbio, NULL)
1390 OCSP_RESPONSE *resp = NULL; local
    [all...]
  /external/sepolicy/tools/
check_seapp.c 247 int resp; local
293 ret = sepol_bool_exists(pol.handle, pol.db, se_key, &resp);
302 if(!resp) {
  /external/wpa_supplicant_8/hostapd/
hlr_auc_gw.c 19 * SIM-RESP-AUTH <IMSI> Kc1:SRES1:RAND1 Kc2:SRES2:RAND2 [Kc3:SRES3:RAND3]
20 * SIM-RESP-AUTH <IMSI> FAILURE
22 * GSM-AUTH-RESP <IMSI> Kc1:SRES1:Kc2:SRES2[:Kc3:SRES3]
23 * GSM-AUTH-RESP <IMSI> FAILURE
27 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES>
28 * AKA-RESP-AUTH <IMSI> FAILURE
625 static int sim_req_auth(char *imsi, char *resp, size_t resp_len)
633 resp[0] = '\0';
644 rend = resp + resp_len;
645 rpos = resp;
919 char buf[1000], resp[1000]; local
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_group.c 645 struct wpabuf *resp; local
664 resp = wpabuf_alloc(20 + extra);
665 if (resp == NULL)
670 wpabuf_put_buf(resp, group->wfd_ie);
675 wpabuf_put_buf(resp,
678 rlen = p2p_buf_add_ie_hdr(resp);
680 p2p_buf_add_status(resp, status);
681 p2p_buf_update_ie_hdr(resp, rlen);
683 return resp;
  /external/wpa_supplicant_8/wpa_supplicant/
sme.c 153 struct wpabuf *resp = NULL; local
396 resp = sme_auth_build_sae_commit(wpa_s, ssid,
399 resp = sme_auth_build_sae_confirm(wpa_s);
400 if (resp == NULL) {
404 params.sae_data = wpabuf_head(resp);
405 params.sae_data_len = wpabuf_len(resp);
444 wpabuf_free(resp);
458 wpabuf_free(resp);
471 wpabuf_free(resp);
    [all...]
  /hardware/qcom/gps/loc_api/libloc_api-rpc-50001/libloc_api-rpc-glue/src/
LocApiRpc.cpp 510 rpc_loc_ni_user_resp_e_type resp; local
    [all...]
  /packages/apps/Exchange/src/com/android/exchange/eas/
EasAutoDiscover.java 176 // resp is either an authentication error, or a good response.
359 * @param resp The {@link EasResponse} from the server.
362 private static HostAuth parseAutodiscover(final EasResponse resp) {
366 parser.setInput(resp.getInputStream(), "UTF-8");
  /external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
javax.servlet_2.5.0.v200910301333.jar 
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
turnserver.cc 186 static bool InitResponse(const StunMessage* req, StunMessage* resp) {
190 resp->SetType(resp_type);
191 resp->SetTransactionID(req->transaction_id());
196 const std::string& reason, StunMessage* resp) {
200 resp->SetType(resp_type);
201 resp->SetTransactionID(req->transaction_id());
202 VERIFY(resp->AddAttribute(new cricket::StunErrorCodeAttribute(
535 TurnMessage resp; local
536 InitErrorResponse(req, code, reason, &resp);
537 LOG(LS_INFO) << "Sending error response, type=" << resp.type(
545 TurnMessage resp; local
    [all...]
  /external/smack/src/com/kenai/jbosh/
BOSHClient.java 513 HTTPResponse resp = httpSender.send(params, finalReq); local
514 exch.setHTTPResponse(resp);
1026 HTTPResponse resp; local
    [all...]
  /external/wpa_supplicant_8/hs20/client/
oma_dm_client.c 917 xml_node_t *resp; local
951 resp = xml_node_from_buf(ctx->xml, res);
953 if (resp == NULL) {
958 debug_dump_node(ctx, "OMA DM Package", resp);
960 return resp;
965 xml_node_t *resp, int msgid,
982 name = xml_node_get_localname(ctx->xml, resp);
988 hdr = get_node(ctx->xml, resp, "SyncHdr");
989 body = get_node(ctx->xml, resp, "SyncBody");
1128 xml_node_t *syncml, *resp; local
1165 xml_node_t *syncml, *resp; local
1227 xml_node_t *syncml, *resp; local
1274 xml_node_t *syncml, *resp; local
    [all...]

Completed in 4167 milliseconds

1 2 3 4 56 7 8 910