HomeSort by relevance Sort by last modified time
    Searched refs:resp (Results 26 - 50 of 401) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant_8/src/utils/
browser-wpadebug.c 33 struct wpabuf *resp; local
48 resp = wpabuf_alloc(100);
49 if (resp == NULL) {
55 wpabuf_put_str(resp, "User input completed");
62 http_request_send_and_deinit(req, resp);
browser-android.c 33 struct wpabuf *resp; local
48 resp = wpabuf_alloc(1);
49 if (resp == NULL) {
61 http_request_send_and_deinit(req, resp);
pcsc_funcs.c 787 unsigned char resp[3]; local
814 len = sizeof(resp);
815 ret = scard_transmit(scard, cmd, cmdlen, resp, &len);
823 wpa_printf(MSG_WARNING, "SCARD: unexpected resp len "
828 if (resp[0] == 0x98 && resp[1] == 0x04) {
835 if (resp[0] == 0x6e) {
840 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[0] != 0x61)
999 unsigned char resp[3]; local
1031 unsigned char resp[3]; local
1222 unsigned char resp[3], buf[12 + 3 + 2]; local
1323 unsigned char resp[3], buf[64], *pos, *end; local
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 187 struct eap_pax_hdr *resp; local
193 if (pos == NULL || len < sizeof(*resp)) {
199 resp = (struct eap_pax_hdr *) pos;
204 resp->op_code, resp->flags, resp->mac_id, resp->dh_group_id,
205 resp->public_key_id);
207 (u8 *) (resp + 1), len - sizeof(*resp) - EAP_PAX_ICV_LEN)
287 struct eap_pax_hdr *resp; local
460 struct eap_pax_hdr *resp; local
    [all...]
  /frameworks/av/media/libmedia/
IEffectClient.cpp 123 char *resp = NULL; local
125 resp = (char *)malloc(replySize);
126 data.read(resp, replySize);
128 commandExecuted(cmdCode, cmdSize, cmd, replySize, resp);
132 if (resp) {
133 free(resp);
  /external/wpa_supplicant_8/src/eap_peer/
eap_sake.c 149 struct wpabuf *resp; local
169 resp = eap_sake_build_msg(data, eap_get_id(reqData),
172 if (resp == NULL)
176 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID,
181 return resp;
193 struct wpabuf *resp; local
250 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen,
252 if (resp == NULL)
256 eap_sake_add_attr(resp, EAP_SAKE_AT_RAND_P,
261 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID
294 struct wpabuf *resp; local
367 struct wpabuf *resp; local
    [all...]
eap_ttls.c 197 static int eap_ttls_avp_encapsulate(struct wpabuf **resp, u32 avp_code,
203 msg = wpabuf_alloc(sizeof(struct ttls_avp) + wpabuf_len(*resp) + 4);
205 wpabuf_free(*resp);
206 *resp = NULL;
211 pos = eap_ttls_avp_hdr(avp, avp_code, 0, mandatory, wpabuf_len(*resp));
212 os_memcpy(pos, wpabuf_head(*resp), wpabuf_len(*resp));
213 pos += wpabuf_len(*resp);
215 wpabuf_free(*resp);
217 *resp = msg
1159 struct wpabuf *resp = NULL; local
1232 struct wpabuf *resp; local
1472 struct wpabuf *resp; local
    [all...]
eap_eke.c 201 struct wpabuf *resp; local
206 resp = eap_eke_build_msg(data, eap_get_id(reqData), 4, EAP_EKE_FAILURE);
207 if (resp)
208 wpabuf_put_be32(resp, failure_code);
218 return resp;
228 struct wpabuf *resp; local
323 resp = eap_eke_build_msg(data, eap_get_id(reqData),
326 if (resp == NULL) {
331 wpabuf_put_u8(resp, 1); /* NumProposals */
332 wpabuf_put_u8(resp, 0); /* Reserved *
361 struct wpabuf *resp; local
505 struct wpabuf *resp; local
650 struct wpabuf *resp; local
    [all...]
eap_tnc.c 86 struct wpabuf *resp; local
108 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen,
110 if (resp == NULL)
113 wpabuf_put_u8(resp, flags); /* Flags */
115 wpabuf_put_be32(resp, wpabuf_len(data->out_buf));
117 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used,
139 return resp;
201 struct wpabuf *resp; local
354 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1,
356 if (resp == NULL
    [all...]
eap_pax.c 96 struct wpabuf *resp; local
99 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX,
101 if (resp == NULL)
104 pax = wpabuf_put(resp, sizeof(*pax));
111 return resp;
120 struct wpabuf *resp; local
191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen);
192 if (resp == NULL)
195 wpabuf_put_be16(resp, EAP_PAX_RAND_LEN);
196 wpabuf_put_data(resp, data->rand.r.y, EAP_PAX_RAND_LEN)
236 struct wpabuf *resp; local
328 struct wpabuf *resp; local
    [all...]
eap_leap.c 64 struct wpabuf *resp; local
109 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP,
112 if (resp == NULL)
114 wpabuf_put_u8(resp, LEAP_VERSION);
115 wpabuf_put_u8(resp, 0); /* unused */
116 wpabuf_put_u8(resp, LEAP_RESPONSE_LEN);
117 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN);
125 wpabuf_put_data(resp, identity, identity_len);
129 return resp;
138 struct wpabuf *resp; local
    [all...]
eap_mschapv2.c 151 struct wpabuf *resp; local
168 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len,
170 if (resp == NULL)
173 ms = wpabuf_put(resp, sizeof(*ms));
187 wpabuf_put_u8(resp, sizeof(*r)); /* Value-Size */
190 r = wpabuf_put(resp, sizeof(*r));
198 wpabuf_free(resp);
213 wpabuf_free(resp);
221 wpabuf_put_data(resp, identity, identity_len);
224 return resp;
350 struct wpabuf *resp; local
507 struct wpabuf *resp; local
644 struct wpabuf *resp; local
    [all...]
eap_gpsk.c 283 struct wpabuf *resp; local
304 resp = eap_gpsk_send_gpsk_2(data, eap_get_id(reqData),
306 if (resp == NULL)
311 return resp;
320 struct wpabuf *resp; local
332 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len,
334 if (resp == NULL)
337 wpabuf_put_u8(resp, EAP_GPSK_OPCODE_GPSK_2);
338 start = wpabuf_put(resp, 0);
342 wpabuf_put_be16(resp, data->id_peer_len)
590 struct wpabuf *resp; local
633 struct wpabuf *resp; local
670 struct wpabuf *resp; local
    [all...]
  /system/core/fastboot/
engine.c 76 int (*func)(Action *a, int status, char *resp);
124 static int cb_default(Action *a, int status, char *resp)
127 fprintf(stderr,"FAILED (%s)\n", resp);
225 static int cb_check(Action *a, int status, char *resp, int invert)
233 fprintf(stderr,"FAILED (%s)\n", resp);
247 yes = match(resp, value, count);
258 fprintf(stderr,"Device %s is '%s'.\n", a->cmd + 7, resp);
268 static int cb_require(Action *a, int status, char *resp)
270 return cb_check(a, status, resp, 0);
273 static int cb_reject(Action *a, int status, char *resp)
370 char resp[FB_RESPONSE_SZ+1]; local
    [all...]
  /hardware/samsung_slsi/exynos5/libsecurepath/
tlwvdrm_api.h 68 tci_resp_t resp; /**< Response message structure */ member in union:__anon21892::__anon21893
  /external/chromium_org/media/tools/layout_tests/
test_expectations.py 63 resp = urllib2.urlopen(url)
64 if resp.code != 200:
67 for line in resp.read().split('\n'):
  /external/chromium_org/third_party/google_appengine_cloudstorage/cloudstorage/
api_utils.py 100 def _should_retry(resp):
102 return (resp.status_code == httplib.REQUEST_TIMEOUT or
103 (resp.status_code >= 500 and
104 resp.status_code < 600))
251 resp = None
255 resp = urlfetch.fetch(url, **kwds)
266 if resp and not _should_retry(resp):
268 elif resp:
270 'Got status %s from GCS.', resp.status_code
    [all...]
rest_api.py 176 resp = None
178 resp = yield self.urlfetch_async(url, payload=payload, method=method,
181 if resp.status_code == httplib.UNAUTHORIZED:
184 resp = yield self.urlfetch_async(
190 retry = api_utils._should_retry(resp)
197 resp = retry_resp
198 elif not resp:
201 raise ndb.Return((resp.status_code, resp.headers, resp.content)
    [all...]
  /external/elfutils/0.153/lib/
crc32_file.c 56 crc32_file (int fd, uint32_t *resp)
84 *resp = crc32 (crc, mapped, st.st_size);
104 *resp = crc;
  /external/robolectric/src/test/java/com/xtremelabs/robolectric/shadows/
AndroidHttpClientTest.java 38 HttpResponse resp = client.execute(new HttpGet("/foo")); local
39 assertThat(resp.getStatusLine().getStatusCode(), is(200));
40 assertThat(Strings.fromStream(resp.getEntity().getContent()), equalTo("foo"));
  /libcore/luni/src/main/java/org/apache/harmony/security/x509/tsp/
TimeStampResp.java 89 TimeStampResp resp = (TimeStampResp) object;
91 values[0] = resp.status;
92 values[1] = resp.timeStampToken;
  /development/samples/SampleSyncAdapter/src/com/example/android/samplesync/client/
NetworkUtilities.java 106 final HttpResponse resp; local
122 resp = getHttpClient().execute(post);
124 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_OK) {
125 InputStream istream = (resp.getEntity() != null) ? resp.getEntity().getContent()
136 Log.e(TAG, "Error authenticating" + resp.getStatusLine());
192 final HttpResponse resp = getHttpClient().execute(post); local
193 final String response = EntityUtils.toString(resp.getEntity());
194 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_OK) {
208 if (resp.getStatusLine().getStatusCode() == HttpStatus.SC_UNAUTHORIZED)
    [all...]
  /prebuilts/python/darwin-x86/2.7.5/lib/python2.7/
smtplib.py 350 resp = []
365 resp.append(line[4:].strip())
378 errmsg = "\n".join(resp)
418 resp = self.ehlo_resp.split('\n')
419 del resp[0]
420 for each in resp:
535 (code, resp) = self.helo()
537 raise SMTPHeloError(code, resp)
595 (code, resp) = self.docmd("AUTH", AUTH_CRAM_MD5)
598 return (code, resp)
    [all...]
  /prebuilts/python/linux-x86/2.7.5/lib/python2.7/
smtplib.py 350 resp = []
365 resp.append(line[4:].strip())
378 errmsg = "\n".join(resp)
418 resp = self.ehlo_resp.split('\n')
419 del resp[0]
420 for each in resp:
535 (code, resp) = self.helo()
537 raise SMTPHeloError(code, resp)
595 (code, resp) = self.docmd("AUTH", AUTH_CRAM_MD5)
598 return (code, resp)
    [all...]
  /hardware/qcom/keymaster/
keymaster_qcom.cpp 338 keymaster_gen_keypair_resp_t *resp = NULL; local
345 resp = (keymaster_gen_keypair_resp_t *)(handle->ion_sbuffer +
351 resp->status = KEYMASTER_FAILURE;
352 resp->key_blob_len = sizeof(qcom_km_key_blob_t);
361 QSEECOM_ALIGN(sizeof(keymaster_gen_keypair_cmd_t)), resp,
367 if ( (ret < 0) || (resp->status < 0)) {
368 ALOGE("Generate key command failed resp->status = %d ret =%d", resp->status, ret);
371 UniquePtr<unsigned char[]> keydata(new unsigned char[resp->key_blob_len]);
377 memcpy(p, (unsigned char *)(&resp->key_blob), resp->key_blob_len)
420 keymaster_import_keypair_resp_t *resp = NULL; local
501 keymaster_sign_data_resp_t *resp = NULL; local
600 keymaster_verify_data_resp_t *resp = NULL; local
    [all...]

Completed in 1753 milliseconds

12 3 4 5 6 7 8 91011>>