/external/chromium_org/third_party/openssl/openssl/apps/ |
ocsp.c | 107 static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, 115 static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp); 138 OCSP_RESPONSE *resp = NULL; local 693 resp = OCSP_response_create(OCSP_RESPONSE_STATUS_MALFORMEDREQUEST, NULL); 694 send_ocsp_response(cbio, resp); 764 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays); 766 send_ocsp_response(cbio, resp); 771 resp = process_responder(bio_err, req, host, path, 773 if (!resp) 788 resp = d2i_OCSP_RESPONSE_bio(derbio, NULL) 1380 OCSP_RESPONSE *resp = NULL; local [all...] |
/external/openssl/apps/ |
ocsp.c | 107 static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, 115 static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp); 139 OCSP_RESPONSE *resp = NULL; local 703 resp = OCSP_response_create(OCSP_RESPONSE_STATUS_MALFORMEDREQUEST, NULL); 704 send_ocsp_response(cbio, resp); 774 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays); 776 send_ocsp_response(cbio, resp); 781 resp = process_responder(bio_err, req, host, path, 783 if (!resp) 798 resp = d2i_OCSP_RESPONSE_bio(derbio, NULL) 1390 OCSP_RESPONSE *resp = NULL; local [all...] |
/frameworks/base/wifi/java/android/net/wifi/p2p/nsd/ |
WifiP2pServiceResponse.java | 190 * P2P-SERV-DISC-RESP <address> <update indicator> <response data> 191 * e.g) P2P-SERV-DISC-RESP 02:03:7f:11:62:da 1 0300000101 247 WifiP2pServiceResponse resp; local 249 resp = WifiP2pDnsSdServiceResponse.newInstance(status, 252 resp = WifiP2pUpnpServiceResponse.newInstance(status, 255 resp = new WifiP2pServiceResponse(type, status, transId, dev, data); 257 if (resp != null && resp.getStatus() == Status.SUCCESS) { 258 respList.add(resp);
|
/frameworks/base/core/tests/coretests/src/android/app/ |
DownloadManagerFunctionalTest.java | 271 final MockResponse resp = buildResponse(HTTP_REDIRECT); local 272 resp.setHeader("Location", uri.toString()); 273 enqueueResponse(resp); 295 final MockResponse resp = buildResponse(HTTP_REDIRECT); local 296 resp.setHeader("Location", "://blah.blah.blah.com"); 297 enqueueResponse(resp); 391 final MockResponse resp = buildResponse(HTTP_OK, blobData); local 392 resp.setHeader("Content-Length", "50000"); 393 enqueueResponse(resp);
|
/external/chromium_org/content/browser/loader/ |
certificate_resource_handler.cc | 38 ResourceResponse* resp, 44 bool CertificateResourceHandler::OnResponseStarted(ResourceResponse* resp, 46 cert_type_ = net::GetCertificateMimeTypeForMimeType(resp->head.mime_type);
|
stream_resource_handler.cc | 40 ResourceResponse* resp, 45 bool StreamResourceHandler::OnResponseStarted(ResourceResponse* resp,
|
/external/chromium_org/tools/memory_inspector/memory_inspector/frontends/ |
www_server.py | 125 resp = [] 132 resp += [{'backend': device.backend.name, 135 return _HTTP_OK, [], resp 273 resp = {'cols': [{'label': 'bucket', 'type': 'string'}, 282 resp['rows'] += [{'c': [ 290 return _HTTP_OK, [], resp 323 resp = {'cols': [], 'rows': []} 334 if not resp['cols']: 335 resp['cols'] += [{'label': 'Time', 'type': 'string'}] 337 resp['cols'] += [{'label': child_bucket.name, 'type': 'number'} [all...] |
/external/wpa_supplicant_8/hostapd/ |
hlr_auc_gw.c | 19 * SIM-RESP-AUTH <IMSI> Kc1:SRES1:RAND1 Kc2:SRES2:RAND2 [Kc3:SRES3:RAND3] 20 * SIM-RESP-AUTH <IMSI> FAILURE 22 * GSM-AUTH-RESP <IMSI> Kc1:SRES1:Kc2:SRES2[:Kc3:SRES3] 23 * GSM-AUTH-RESP <IMSI> FAILURE 27 * AKA-RESP-AUTH <IMSI> <RAND> <AUTN> <IK> <CK> <RES> 28 * AKA-RESP-AUTH <IMSI> FAILURE 625 static int sim_req_auth(char *imsi, char *resp, size_t resp_len) 633 resp[0] = '\0'; 644 rend = resp + resp_len; 645 rpos = resp; 919 char buf[1000], resp[1000]; local [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_helpers.h | 15 char *resp, size_t resp_size);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
gas_query.h | 41 const struct wpabuf *resp, u16 status_code),
|
interworking.h | 19 const struct wpabuf *resp, u16 status_code);
|
/external/speex/libspeex/ |
cb_search_sse.h | 54 static void compute_weighted_codebook(const signed char *shape_cb, const spx_sig_t *_r, float *resp, __m128 *resp2, __m128 *E, int shape_cb_size, int subvect_size, char *stack) 66 float *_res = resp+i*subvect_size;
|
/hardware/qcom/gps/loc_api/libloc_api_50001/ |
loc_eng_ni.cpp | 69 GpsUserResponseType resp, 72 mResponse(resp), mPayload(data) 228 pSession->resp = GPS_NI_RESPONSE_NORESP; 237 LOC_LOGD("pSession->resp is %d\n",pSession->resp); 246 if (pSession->resp != GPS_NI_RESPONSE_IGNORE) { 247 LOC_LOGD("pSession->resp != GPS_NI_RESPONSE_IGNORE \n"); 249 pSession->resp, 391 loc_eng_ni_data_p->session.resp = GPS_NI_RESPONSE_IGNORE; 404 pSession->resp = user_response [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_dev_disc.c | 140 struct wpabuf *resp; local 142 resp = p2p_build_dev_disc_resp(dialog_token, status); 143 if (resp == NULL) 153 wpabuf_head(resp), wpabuf_len(resp), 200) < 0) { 157 wpabuf_free(resp);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_ikev2.c | 139 struct wpabuf *resp; local 176 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen, 178 if (resp == NULL) 181 wpabuf_put_u8(resp, flags); /* Flags */ 183 wpabuf_put_be32(resp, wpabuf_len(data->out_buf)); 185 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used, 190 const u8 *msg = wpabuf_head(resp); 191 size_t len = wpabuf_len(resp); 195 msg, len, wpabuf_put(resp, icv_len)); 242 return resp; [all...] |
eap_tls.c | 152 struct wpabuf *resp, u8 id) 173 if (resp) { 178 return resp; 227 struct wpabuf *resp; local 244 resp = NULL; 246 id, pos, left, &resp); 249 return eap_tls_failure(sm, data, ret, res, resp, id); 256 wpabuf_free(resp); 260 return resp;
|
eap.c | 831 struct wpabuf *resp; local 838 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_EXPANDED, 840 if (resp == NULL) 843 wpabuf_put_be24(resp, EAP_VENDOR_IETF); 844 wpabuf_put_be32(resp, EAP_TYPE_NAK); 854 wpabuf_put_u8(resp, EAP_TYPE_EXPANDED); 855 wpabuf_put_be24(resp, m->vendor); 856 wpabuf_put_be32(resp, m->method); 863 wpabuf_put_u8(resp, EAP_TYPE_EXPANDED); 864 wpabuf_put_be24(resp, EAP_VENDOR_IETF) 876 struct wpabuf *resp; local 1138 struct wpabuf *resp; local 1222 struct wpabuf *resp; local 2274 struct wpabuf *resp; local [all...] |
/external/wpa_supplicant_8/hs20/client/ |
oma_dm_client.c | 917 xml_node_t *resp; local 951 resp = xml_node_from_buf(ctx->xml, res); 953 if (resp == NULL) { 958 debug_dump_node(ctx, "OMA DM Package", resp); 960 return resp; 965 xml_node_t *resp, int msgid, 982 name = xml_node_get_localname(ctx->xml, resp); 988 hdr = get_node(ctx->xml, resp, "SyncHdr"); 989 body = get_node(ctx->xml, resp, "SyncBody"); 1128 xml_node_t *syncml, *resp; local 1165 xml_node_t *syncml, *resp; local 1227 xml_node_t *syncml, *resp; local 1274 xml_node_t *syncml, *resp; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
beacon.c | 333 struct ieee80211_mgmt *resp; local 349 resp = os_zalloc(buflen); 350 if (resp == NULL) 353 epos = ((u8 *) resp) + MAX_PROBERESP_LEN; 355 resp->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT, 358 os_memcpy(resp->da, req->sa, ETH_ALEN); 359 os_memcpy(resp->sa, hapd->own_addr, ETH_ALEN); 361 os_memcpy(resp->bssid, hapd->own_addr, ETH_ALEN); 362 resp->u.probe_resp.beacon_int = 366 resp->u.probe_resp.capab_info 503 u8 *resp; local 724 u8 *resp = NULL; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 217 const struct eap_psk_hdr_2 *resp; local 230 if (cpos == NULL || left < sizeof(*resp)) { 234 resp = (const struct eap_psk_hdr_2 *) cpos; 235 cpos = (const u8 *) (resp + 1); 236 left -= sizeof(*resp); 293 resp->rand_p, EAP_PSK_RAND_LEN); 294 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN); 316 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", resp->mac_p, EAP_PSK_MAC_LEN); 317 if (os_memcmp_const(mac, resp->mac_p, EAP_PSK_MAC_LEN) != 0) { 333 const struct eap_psk_hdr_4 *resp; local [all...] |
eap_server_sake.c | 239 struct eap_sake_hdr *resp; local 250 resp = (struct eap_sake_hdr *) pos; 251 version = resp->version; 252 session_id = resp->session_id; 253 subtype = resp->subtype; 413 struct eap_sake_hdr *resp; local 422 resp = (struct eap_sake_hdr *) pos; 424 subtype = resp->subtype; 425 pos = (u8 *) (resp + 1);
|
eap_server.c | 35 static void eap_sm_parseEapResp(struct eap_sm *sm, const struct wpabuf *resp); 925 static void eap_sm_parseEapResp(struct eap_sm *sm, const struct wpabuf *resp) 937 if (resp == NULL || wpabuf_len(resp) < sizeof(*hdr)) { 938 wpa_printf(MSG_DEBUG, "EAP: parseEapResp: invalid resp=%p " 939 "len=%lu", resp, 940 resp ? (unsigned long) wpabuf_len(resp) : 0); 944 hdr = wpabuf_head(resp); 946 if (plen > wpabuf_len(resp)) { 998 struct eap_hdr *resp; local 1016 struct eap_hdr *resp; local [all...] |
/hardware/qcom/gps/msm8960/loc_api/libloc_api_50001/ |
loc_eng_ni.cpp | 69 GpsUserResponseType resp, 72 mResponse(resp), mPayload(data) 212 loc_eng_ni_data_p->resp = GPS_NI_RESPONSE_NORESP; 229 loc_eng_ni_data_p->resp, 344 loc_eng_ni_data_p->resp = user_response;
|
/external/wpa_supplicant_8/hs20/server/www/ |
est.php | 67 $resp = md5($A1 . ':' . $data['nonce'] . ':' . $data['nc'] . ':' . variable 69 if ($data['response'] != $resp) { 189 $resp = wordwrap(base64_encode($data), 72, "\n", true); variable 190 echo $resp . "\n"; 191 error_log("EST: simpleenroll - PKCS#7 response: " . $resp);
|
/packages/apps/Nfc/src/com/android/nfc/handover/ |
HandoverServer.java | 195 NdefMessage resp = mHandoverManager.tryHandoverRequest(handoverRequestMsg); local 196 if (resp == null) { 203 byte[] buffer = resp.toByteArray();
|