/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
poplib.py | 124 resp, o = self._getline() 125 if self._debugging > 1: print '*resp*', repr(resp) 126 c = resp[:1] 128 raise error_proto(resp) 129 return resp 135 resp = self._getresp() 145 return resp, list, octets 251 resp = self._shortcmd('QUIT') 253 resp = va [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
poplib.py | 124 resp, o = self._getline() 125 if self._debugging > 1: print '*resp*', repr(resp) 126 c = resp[:1] 128 raise error_proto(resp) 129 return resp 135 resp = self._getresp() 145 return resp, list, octets 251 resp = self._shortcmd('QUIT') 253 resp = va [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_peap.c | 458 * @resp: Buffer to return a pointer to the allocated response message. This 467 const struct wpabuf *req, struct wpabuf **resp, 511 *resp = eap_tlv_build_nak(eap_get_id(req), 513 return *resp == NULL ? -1 : 0; 581 *resp = eap_tlv_build_result(sm, data, crypto_tlv != NULL, 593 struct wpabuf **resp) 610 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1); 614 if (eap_tlv_process(sm, data, &iret, req, resp, 643 *resp = eap_msg_alloc( 648 if (*resp == NULL) 743 struct wpabuf *resp = NULL; local 968 struct wpabuf *resp; local [all...] |
eap_vendor_test.c | 69 struct wpabuf *resp; local 119 resp = eap_msg_alloc(EAP_VENDOR_ID, EAP_VENDOR_TYPE, 1, 121 if (resp == NULL) 125 wpabuf_put_u8(resp, 2); 130 wpabuf_put_u8(resp, 4); 136 return resp;
|
eap_fast.c | 415 struct wpabuf **resp) 431 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1); 451 hdr, resp)) 468 *resp = data->phase2_method->process(sm, data->phase2_priv, &iret, 470 if (*resp == NULL || 482 if (*resp == NULL && config && 487 } else if (*resp == NULL) 559 struct wpabuf *resp = NULL; local 581 if (eap_fast_phase2_request(sm, data, ret, hdr, &resp)) { 587 return eap_fast_tlv_eap_payload(resp); 753 struct wpabuf *resp; local 1179 struct wpabuf *resp = NULL, *tmp; local 1529 struct wpabuf *resp; local [all...] |
eap_psk.c | 89 struct wpabuf *resp; local 136 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, 139 if (resp == NULL) 141 hdr2 = wpabuf_put(resp, sizeof(*hdr2)); 145 wpabuf_put_data(resp, data->id_p, data->id_p_len); 150 wpabuf_free(resp); 162 wpabuf_free(resp); 174 return resp; 184 struct wpabuf *resp; local 317 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, plen 377 struct wpabuf *resp = NULL; local [all...] |
/frameworks/av/media/libmedia/ |
IEffect.cpp | 162 char *resp = NULL; local 164 resp = (char *)malloc(replySize); 166 status_t status = command(cmdCode, cmdSize, cmd, &replySz, resp); 173 reply->write(resp, replySize); 178 if (resp) { 179 free(resp);
|
/external/wpa_supplicant_8/src/wps/ |
http_server.c | 132 void http_request_send(struct http_request *req, struct wpabuf *resp) 137 (unsigned long) wpabuf_len(resp), 141 res = send(req->fd, wpabuf_head(resp), wpabuf_len(resp), 0); 145 } else if ((size_t) res < wpabuf_len(resp)) { 147 res, (unsigned long) wpabuf_len(resp)); 151 wpabuf_free(resp); 156 struct wpabuf *resp) 158 http_request_send(req, resp);
|
/frameworks/base/wifi/java/android/net/wifi/p2p/ |
WifiP2pManager.java | 770 WifiP2pServiceResponse resp = (WifiP2pServiceResponse) message.obj; local 771 handleServiceResponse(resp); [all...] |
/external/chromium_org/net/spdy/ |
spdy_proxy_client_socket_unittest.cc | 392 scoped_ptr<SpdyFrame> resp(ConstructConnectReplyFrame()); 394 CreateMockRead(*resp, 1, ASYNC), 413 scoped_ptr<SpdyFrame> resp(ConstructConnectAuthReplyFrame()); 415 CreateMockRead(*resp, 1, ASYNC), 434 scoped_ptr<SpdyFrame> resp(ConstructConnectReplyFrame()); 436 CreateMockRead(*resp, 1, ASYNC), 456 scoped_ptr<SpdyFrame> resp(ConstructConnectRedirectReplyFrame()); 458 CreateMockRead(*resp, 1, ASYNC), MockRead(ASYNC, 0, 3), // EOF 487 scoped_ptr<SpdyFrame> resp(ConstructConnectReplyFrame()); 511 scoped_ptr<SpdyFrame> resp(ConstructConnectReplyFrame()) [all...] |
/sdk/apps/SdkController/src/com/android/tools/sdkcontroller/handlers/ |
SensorChannel.java | 178 ByteBuffer resp = ByteBuffer.allocate(1024); local 179 resp.order(getEndian()); 188 resp = ExpandIf(resp, required_size); 189 resp.putInt(sensor.getType()); 190 resp.put(name); 191 resp.put((byte) 0); 194 resp = ExpandIf(resp, 4); 195 resp.putInt(-1) [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_mschapv2.c | 243 struct eap_mschapv2_hdr *resp; local 254 resp = (struct eap_mschapv2_hdr *) pos; 256 resp->op_code != MSCHAPV2_OP_RESPONSE) { 258 "ignore op %d", resp->op_code); 263 resp->op_code != MSCHAPV2_OP_SUCCESS && 264 resp->op_code != MSCHAPV2_OP_FAILURE) { 266 "Failure - ignore op %d", resp->op_code); 271 resp->op_code != MSCHAPV2_OP_FAILURE) { 273 "- ignore op %d", resp->op_code); 285 struct eap_mschapv2_hdr *resp; local 440 struct eap_mschapv2_hdr *resp; local 467 struct eap_mschapv2_hdr *resp; local [all...] |
/external/chromium_org/content/browser/loader/ |
certificate_resource_handler.h | 41 ResourceResponse* resp, 45 virtual bool OnResponseStarted(ResourceResponse* resp,
|
stream_resource_handler.h | 38 ResourceResponse* resp, 41 virtual bool OnResponseStarted(ResourceResponse* resp,
|
/external/chromium_org/tools/perf/metrics/ |
chrome_proxy_unittest.py | 85 resp = chrome_proxy.ChromeProxyResponse( 94 self.assertFalse(resp.ShouldHaveChromeProxyViaHeader()) 95 self.assertFalse(resp.HasChromeProxyViaHeader()) 96 self.assertTrue(resp.IsValidByViaHeader()) 99 resp = chrome_proxy.ChromeProxyResponse( 110 self.assertTrue(resp.ShouldHaveChromeProxyViaHeader()) 111 self.assertTrue(resp.HasChromeProxyViaHeader()) 112 self.assertTrue(resp.IsValidByViaHeader())
|
/external/smack/src/com/kenai/jbosh/ |
HTTPExchange.java | 91 void setHTTPResponse(HTTPResponse resp) { 98 response = resp;
|
/external/speex/libspeex/ |
cb_search_arm4.h | 39 static void compute_weighted_codebook(const signed char *shape_cb, const spx_word16_t *r, spx_word16_t *resp, spx_word16_t *resp2, spx_word32_t *E, int shape_cb_size, int subvect_size, char *stack) 57 res = resp+j; 86 res = resp+j; 131 resp += subvect_size<<2;
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.6/sysroot/usr/include/rpc/ |
clnt.h | 158 * CLNT_CALL(rh, proc, xargs, argsp, xres, resp, timeout) 164 * caddr_t resp; 167 #define CLNT_CALL(rh, proc, xargs, argsp, xres, resp, secs) \ 168 ((*(rh)->cl_ops->cl_call)(rh, proc, xargs, argsp, xres, resp, secs)) 169 #define clnt_call(rh, proc, xargs, argsp, xres, resp, secs) \ 170 ((*(rh)->cl_ops->cl_call)(rh, proc, xargs, argsp, xres, resp, secs)) 191 * CLNT_FREERES(rh, xres, resp); 194 * caddr_t resp; 196 #define CLNT_FREERES(rh,xres,resp) ((*(rh)->cl_ops->cl_freeres)(rh,xres,resp)) [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpc/ |
clnt.h | 158 * CLNT_CALL(rh, proc, xargs, argsp, xres, resp, timeout) 164 * caddr_t resp; 167 #define CLNT_CALL(rh, proc, xargs, argsp, xres, resp, secs) \ 168 ((*(rh)->cl_ops->cl_call)(rh, proc, xargs, argsp, xres, resp, secs)) 169 #define clnt_call(rh, proc, xargs, argsp, xres, resp, secs) \ 170 ((*(rh)->cl_ops->cl_call)(rh, proc, xargs, argsp, xres, resp, secs)) 191 * CLNT_FREERES(rh, xres, resp); 194 * caddr_t resp; 196 #define CLNT_FREERES(rh,xres,resp) ((*(rh)->cl_ops->cl_freeres)(rh,xres,resp)) [all...] |
/external/chromium_org/chrome/test/chromedriver/third_party/googlecode/ |
googlecode_upload.py | 106 resp = server.getresponse() 109 if resp.status == 201: 110 location = resp.getheader('Location', None) 113 return resp.status, resp.reason, location
|
/external/owasp/sanitizer/tools/ |
googlecode_upload.py | 100 resp = server.getresponse() 103 if resp.status == 201: 104 location = resp.getheader('Location', None) 107 return resp.status, resp.reason, location
|
/external/wpa_supplicant_8/hs20/server/ |
hs20_spp_server.c | 67 xml_node_t *soap, *spp, *resp; local 102 resp = hs20_spp_server_process(ctx, spp, user, realm, dmacc); 104 if (resp == NULL && user == NULL) { 108 if (resp == NULL) { 113 soap = soap_build_envelope(ctx->xml, resp);
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_11.c | 262 u16 auth_alg, u16 auth_transaction, u16 resp, 283 reply->u.auth.status_code = host_to_le16(resp); 289 " auth_alg=%d auth_transaction=%d resp=%d (IE len=%lu)", 291 resp, (unsigned long) ies_len); 447 u16 resp = WLAN_STATUS_SUCCESS; local 465 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable, 477 if (resp == WLAN_STATUS_SUCCESS) { 483 resp = WLAN_STATUS_ANTI_CLOGGING_TOKEN_REQ; 487 resp = WLAN_STATUS_UNSPECIFIED_FAILURE; 498 resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION 547 u16 resp = WLAN_STATUS_SUCCESS; local 880 u16 resp; local 1279 u16 resp = WLAN_STATUS_SUCCESS; local 1689 struct ieee80211_mgmt *resp; local [all...] |
ieee802_11_shared.c | 80 struct ieee80211_mgmt resp; local 98 os_memset(&resp, 0, sizeof(resp)); 99 resp.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT, 101 os_memcpy(resp.da, sa, ETH_ALEN); 102 os_memcpy(resp.sa, hapd->own_addr, ETH_ALEN); 103 os_memcpy(resp.bssid, hapd->own_addr, ETH_ALEN); 104 resp.u.action.category = WLAN_ACTION_SA_QUERY; 105 resp.u.action.u.sa_query_req.action = WLAN_SA_QUERY_RESPONSE; 106 os_memcpy(resp.u.action.u.sa_query_req.trans_id, trans_id [all...] |
/external/wpa_supplicant_8/hs20/client/ |
est.c | 97 char *buf, *resp; local 128 resp = os_readfile("Cert/est-cacerts.txt", &resp_len); 129 if (resp == NULL) { 135 pkcs7 = base64_decode((unsigned char *) resp, resp_len, &pkcs7_len); 146 os_memcpy(pkcs7, resp, resp_len); 150 os_free(resp); 570 char *resp; local 575 resp = os_readfile("Cert/est-csrattrs.txt", &resp_len); 576 if (resp == NULL) { 581 attrs = base64_decode((unsigned char *) resp, resp_len 618 char *buf, *resp, *req, *req2; local [all...] |