/external/wpa_supplicant_8/src/utils/ |
browser-wpadebug.c | 33 struct wpabuf *resp; local 48 resp = wpabuf_alloc(100); 49 if (resp == NULL) { 55 wpabuf_put_str(resp, "User input completed"); 62 http_request_send_and_deinit(req, resp);
|
browser-android.c | 33 struct wpabuf *resp; local 48 resp = wpabuf_alloc(1); 49 if (resp == NULL) { 61 http_request_send_and_deinit(req, resp);
|
pcsc_funcs.c | 787 unsigned char resp[3]; local 814 len = sizeof(resp); 815 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); 823 wpa_printf(MSG_WARNING, "SCARD: unexpected resp len " 828 if (resp[0] == 0x98 && resp[1] == 0x04) { 835 if (resp[0] == 0x6e) { 840 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[0] != 0x61) 999 unsigned char resp[3]; local 1031 unsigned char resp[3]; local 1222 unsigned char resp[3], buf[12 + 3 + 2]; local 1323 unsigned char resp[3], buf[64], *pos, *end; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_pax.c | 187 struct eap_pax_hdr *resp; local 193 if (pos == NULL || len < sizeof(*resp)) { 199 resp = (struct eap_pax_hdr *) pos; 204 resp->op_code, resp->flags, resp->mac_id, resp->dh_group_id, 205 resp->public_key_id); 207 (u8 *) (resp + 1), len - sizeof(*resp) - EAP_PAX_ICV_LEN) 287 struct eap_pax_hdr *resp; local 455 struct eap_pax_hdr *resp; local [all...] |
/frameworks/av/media/libmedia/ |
IEffectClient.cpp | 123 char *resp = NULL; local 125 resp = (char *)malloc(replySize); 126 data.read(resp, replySize); 128 commandExecuted(cmdCode, cmdSize, cmd, replySize, resp); 132 if (resp) { 133 free(resp);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_sake.c | 149 struct wpabuf *resp; local 169 resp = eap_sake_build_msg(data, eap_get_id(reqData), 172 if (resp == NULL) 176 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, 181 return resp; 193 struct wpabuf *resp; local 250 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen, 252 if (resp == NULL) 256 eap_sake_add_attr(resp, EAP_SAKE_AT_RAND_P, 261 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID 294 struct wpabuf *resp; local 367 struct wpabuf *resp; local [all...] |
eap_ttls.c | 197 static int eap_ttls_avp_encapsulate(struct wpabuf **resp, u32 avp_code, 203 msg = wpabuf_alloc(sizeof(struct ttls_avp) + wpabuf_len(*resp) + 4); 205 wpabuf_free(*resp); 206 *resp = NULL; 211 pos = eap_ttls_avp_hdr(avp, avp_code, 0, mandatory, wpabuf_len(*resp)); 212 os_memcpy(pos, wpabuf_head(*resp), wpabuf_len(*resp)); 213 pos += wpabuf_len(*resp); 215 wpabuf_free(*resp); 217 *resp = msg 1159 struct wpabuf *resp = NULL; local 1232 struct wpabuf *resp; local 1472 struct wpabuf *resp; local [all...] |
eap_eke.c | 201 struct wpabuf *resp; local 206 resp = eap_eke_build_msg(data, eap_get_id(reqData), 4, EAP_EKE_FAILURE); 207 if (resp) 208 wpabuf_put_be32(resp, failure_code); 218 return resp; 228 struct wpabuf *resp; local 323 resp = eap_eke_build_msg(data, eap_get_id(reqData), 326 if (resp == NULL) { 331 wpabuf_put_u8(resp, 1); /* NumProposals */ 332 wpabuf_put_u8(resp, 0); /* Reserved * 361 struct wpabuf *resp; local 505 struct wpabuf *resp; local 650 struct wpabuf *resp; local [all...] |
eap_tnc.c | 86 struct wpabuf *resp; local 108 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, 110 if (resp == NULL) 113 wpabuf_put_u8(resp, flags); /* Flags */ 115 wpabuf_put_be32(resp, wpabuf_len(data->out_buf)); 117 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used, 139 return resp; 201 struct wpabuf *resp; local 354 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, 356 if (resp == NULL [all...] |
eap_pax.c | 96 struct wpabuf *resp; local 99 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, 101 if (resp == NULL) 104 pax = wpabuf_put(resp, sizeof(*pax)); 111 return resp; 120 struct wpabuf *resp; local 191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); 192 if (resp == NULL) 195 wpabuf_put_be16(resp, EAP_PAX_RAND_LEN); 196 wpabuf_put_data(resp, data->rand.r.y, EAP_PAX_RAND_LEN) 236 struct wpabuf *resp; local 328 struct wpabuf *resp; local [all...] |
eap_leap.c | 64 struct wpabuf *resp; local 109 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, 112 if (resp == NULL) 114 wpabuf_put_u8(resp, LEAP_VERSION); 115 wpabuf_put_u8(resp, 0); /* unused */ 116 wpabuf_put_u8(resp, LEAP_RESPONSE_LEN); 117 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); 125 wpabuf_put_data(resp, identity, identity_len); 129 return resp; 138 struct wpabuf *resp; local [all...] |
eap_mschapv2.c | 151 struct wpabuf *resp; local 168 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, 170 if (resp == NULL) 173 ms = wpabuf_put(resp, sizeof(*ms)); 187 wpabuf_put_u8(resp, sizeof(*r)); /* Value-Size */ 190 r = wpabuf_put(resp, sizeof(*r)); 198 wpabuf_free(resp); 213 wpabuf_free(resp); 221 wpabuf_put_data(resp, identity, identity_len); 224 return resp; 350 struct wpabuf *resp; local 507 struct wpabuf *resp; local 644 struct wpabuf *resp; local [all...] |
eap_gpsk.c | 283 struct wpabuf *resp; local 304 resp = eap_gpsk_send_gpsk_2(data, eap_get_id(reqData), 306 if (resp == NULL) 311 return resp; 320 struct wpabuf *resp; local 332 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, 334 if (resp == NULL) 337 wpabuf_put_u8(resp, EAP_GPSK_OPCODE_GPSK_2); 338 start = wpabuf_put(resp, 0); 342 wpabuf_put_be16(resp, data->id_peer_len) 590 struct wpabuf *resp; local 633 struct wpabuf *resp; local 670 struct wpabuf *resp; local [all...] |
/system/core/fastboot/ |
engine.c | 76 int (*func)(Action *a, int status, char *resp); 124 static int cb_default(Action *a, int status, char *resp) 127 fprintf(stderr,"FAILED (%s)\n", resp); 225 static int cb_check(Action *a, int status, char *resp, int invert) 233 fprintf(stderr,"FAILED (%s)\n", resp); 247 yes = match(resp, value, count); 258 fprintf(stderr,"Device %s is '%s'.\n", a->cmd + 7, resp); 268 static int cb_require(Action *a, int status, char *resp) 270 return cb_check(a, status, resp, 0); 273 static int cb_reject(Action *a, int status, char *resp) 370 char resp[FB_RESPONSE_SZ+1]; local [all...] |
/hardware/samsung_slsi/exynos5/libsecurepath/ |
tlwvdrm_api.h | 68 tci_resp_t resp; /**< Response message structure */ member in union:__anon41883::__anon41884
|
/external/chromium_org/media/tools/layout_tests/ |
test_expectations.py | 63 resp = urllib2.urlopen(url) 64 if resp.code != 200: 67 for line in resp.read().split('\n'):
|
/external/chromium_org/third_party/google_appengine_cloudstorage/cloudstorage/ |
api_utils.py | 100 def _should_retry(resp): 102 return (resp.status_code == httplib.REQUEST_TIMEOUT or 103 (resp.status_code >= 500 and 104 resp.status_code < 600)) 251 resp = None 255 resp = urlfetch.fetch(url, **kwds) 266 if resp and not _should_retry(resp): 268 elif resp: 270 'Got status %s from GCS.', resp.status_code [all...] |
rest_api.py | 176 resp = None 178 resp = yield self.urlfetch_async(url, payload=payload, method=method, 181 if resp.status_code == httplib.UNAUTHORIZED: 184 resp = yield self.urlfetch_async( 190 retry = api_utils._should_retry(resp) 197 resp = retry_resp 198 elif not resp: 201 raise ndb.Return((resp.status_code, resp.headers, resp.content) [all...] |
/external/elfutils/0.153/lib/ |
crc32_file.c | 56 crc32_file (int fd, uint32_t *resp) 84 *resp = crc32 (crc, mapped, st.st_size); 104 *resp = crc;
|
/external/robolectric/src/test/java/com/xtremelabs/robolectric/shadows/ |
AndroidHttpClientTest.java | 38 HttpResponse resp = client.execute(new HttpGet("/foo")); local 39 assertThat(resp.getStatusLine().getStatusCode(), is(200)); 40 assertThat(Strings.fromStream(resp.getEntity().getContent()), equalTo("foo"));
|
/libcore/luni/src/main/java/org/apache/harmony/security/x509/tsp/ |
TimeStampResp.java | 89 TimeStampResp resp = (TimeStampResp) object; 91 values[0] = resp.status; 92 values[1] = resp.timeStampToken;
|
/development/samples/SampleSyncAdapter/src/com/example/android/samplesync/client/ |
NetworkUtilities.java | 106 final HttpResponse resp; local 122 resp = getHttpClient().execute(post); 124 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_OK) { 125 InputStream istream = (resp.getEntity() != null) ? resp.getEntity().getContent() 136 Log.e(TAG, "Error authenticating" + resp.getStatusLine()); 192 final HttpResponse resp = getHttpClient().execute(post); local 193 final String response = EntityUtils.toString(resp.getEntity()); 194 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_OK) { 208 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_UNAUTHORIZED) [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
smtplib.py | 350 resp = [] 365 resp.append(line[4:].strip()) 378 errmsg = "\n".join(resp) 418 resp = self.ehlo_resp.split('\n') 419 del resp[0] 420 for each in resp: 535 (code, resp) = self.helo() 537 raise SMTPHeloError(code, resp) 595 (code, resp) = self.docmd("AUTH", AUTH_CRAM_MD5) 598 return (code, resp) [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
smtplib.py | 350 resp = [] 365 resp.append(line[4:].strip()) 378 errmsg = "\n".join(resp) 418 resp = self.ehlo_resp.split('\n') 419 del resp[0] 420 for each in resp: 535 (code, resp) = self.helo() 537 raise SMTPHeloError(code, resp) 595 (code, resp) = self.docmd("AUTH", AUTH_CRAM_MD5) 598 return (code, resp) [all...] |
/hardware/qcom/keymaster/ |
keymaster_qcom.cpp | 338 keymaster_gen_keypair_resp_t *resp = NULL; local 345 resp = (keymaster_gen_keypair_resp_t *)(handle->ion_sbuffer + 351 resp->status = KEYMASTER_FAILURE; 352 resp->key_blob_len = sizeof(qcom_km_key_blob_t); 361 QSEECOM_ALIGN(sizeof(keymaster_gen_keypair_cmd_t)), resp, 367 if ( (ret < 0) || (resp->status < 0)) { 368 ALOGE("Generate key command failed resp->status = %d ret =%d", resp->status, ret); 371 UniquePtr<unsigned char[]> keydata(new unsigned char[resp->key_blob_len]); 377 memcpy(p, (unsigned char *)(&resp->key_blob), resp->key_blob_len) 420 keymaster_import_keypair_resp_t *resp = NULL; local 501 keymaster_sign_data_resp_t *resp = NULL; local 600 keymaster_verify_data_resp_t *resp = NULL; local [all...] |