/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_ttls.c | 224 static int eap_ttls_avp_encapsulate(struct wpabuf **resp, u32 avp_code, argument 230 msg = wpabuf_alloc(sizeof(struct ttls_avp) + wpabuf_len(*resp) + 4); 232 wpabuf_free(*resp); 233 *resp = NULL; 238 pos = eap_ttls_avp_hdr(avp, avp_code, 0, mandatory, wpabuf_len(*resp)); 239 os_memcpy(pos, wpabuf_head(*resp), wpabuf_len(*resp)); 240 pos += wpabuf_len(*resp); 242 wpabuf_free(*resp); 244 *resp 476 eap_ttls_phase2_eap_process(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, size_t len, struct wpabuf **resp) argument 503 eap_ttls_phase2_request_eap_method(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, size_t len, u8 method, struct wpabuf **resp) argument 575 eap_ttls_phase2_request_eap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument 638 eap_ttls_phase2_request_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 723 eap_ttls_phase2_request_mschap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 812 eap_ttls_phase2_request_pap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 873 eap_ttls_phase2_request_chap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 956 eap_ttls_phase2_request(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument 1243 eap_ttls_encrypt_response(struct eap_sm *sm, struct eap_ttls_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1266 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct ttls_parse_avp *parse, struct wpabuf **resp) argument 1389 eap_ttls_process_tnc_start(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct ttls_parse_avp *parse, struct wpabuf **resp) argument 1428 struct wpabuf *resp = NULL; local 1519 struct wpabuf *resp; local 1797 struct wpabuf *resp; local [all...] |
H A D | eap_fast.c | 406 struct wpabuf **resp) 422 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1); 442 hdr, resp)) 458 *resp = data->phase2_method->process(sm, data->phase2_priv, &iret, 460 if (*resp == NULL || 472 if (*resp == NULL && config && 477 } else if (*resp == NULL) 549 struct wpabuf *resp = NULL; local 571 if (eap_fast_phase2_request(sm, data, ret, hdr, &resp)) { 577 return eap_fast_tlv_eap_payload(resp); 402 eap_fast_phase2_request(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument 743 struct wpabuf *resp; local 1051 eap_fast_parse_decrypted(struct wpabuf *decrypted, struct eap_fast_tlv_parse *tlv, struct wpabuf **resp) argument 1100 eap_fast_encrypt_response(struct eap_sm *sm, struct eap_fast_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1147 struct wpabuf *resp = NULL, *tmp; local 1496 struct wpabuf *resp; local [all...] |
H A D | eap.c | 755 struct wpabuf *resp; local 762 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_EXPANDED, 764 if (resp == NULL) 767 wpabuf_put_be24(resp, EAP_VENDOR_IETF); 768 wpabuf_put_be32(resp, EAP_TYPE_NAK); 778 wpabuf_put_u8(resp, EAP_TYPE_EXPANDED); 779 wpabuf_put_be24(resp, m->vendor); 780 wpabuf_put_be32(resp, m->method); 787 wpabuf_put_u8(resp, EAP_TYPE_EXPANDED); 788 wpabuf_put_be24(resp, EAP_VENDOR_IET 800 struct wpabuf *resp; local 964 struct wpabuf *resp; local 1048 struct wpabuf *resp; local 1952 struct wpabuf *resp; local [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_11.c | 236 u16 auth_alg, u16 auth_transaction, u16 resp, 257 reply->u.auth.status_code = host_to_le16(resp); 263 " auth_alg=%d auth_transaction=%d resp=%d (IE len=%lu)", 265 resp, (unsigned long) ies_len); 303 u16 resp = WLAN_STATUS_SUCCESS; local 341 resp = WLAN_REASON_MICHAEL_MIC_FAILURE; 355 resp = WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG; 363 resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION; 370 resp = WLAN_STATUS_UNSPECIFIED_FAILURE; 382 resp 234 send_auth_reply(struct hostapd_data *hapd, const u8 *dst, const u8 *bssid, u16 auth_alg, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument 612 u16 resp; local 953 u16 resp = WLAN_STATUS_SUCCESS; local 1336 struct ieee80211_mgmt *resp; local [all...] |
H A D | ieee802_11_shared.c | 80 struct ieee80211_mgmt resp; local 98 os_memset(&resp, 0, sizeof(resp)); 99 resp.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT, 101 os_memcpy(resp.da, sa, ETH_ALEN); 102 os_memcpy(resp.sa, hapd->own_addr, ETH_ALEN); 103 os_memcpy(resp.bssid, hapd->own_addr, ETH_ALEN); 104 resp.u.action.category = WLAN_ACTION_SA_QUERY; 105 resp.u.action.u.sa_query_req.action = WLAN_SA_QUERY_RESPONSE; 106 os_memcpy(resp [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_11.c | 236 u16 auth_alg, u16 auth_transaction, u16 resp, 257 reply->u.auth.status_code = host_to_le16(resp); 263 " auth_alg=%d auth_transaction=%d resp=%d (IE len=%lu)", 265 resp, (unsigned long) ies_len); 303 u16 resp = WLAN_STATUS_SUCCESS; local 341 resp = WLAN_REASON_MICHAEL_MIC_FAILURE; 355 resp = WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG; 363 resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION; 370 resp = WLAN_STATUS_UNSPECIFIED_FAILURE; 382 resp 234 send_auth_reply(struct hostapd_data *hapd, const u8 *dst, const u8 *bssid, u16 auth_alg, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument 612 u16 resp; local 953 u16 resp = WLAN_STATUS_SUCCESS; local 1336 struct ieee80211_mgmt *resp; local [all...] |
H A D | ieee802_11_shared.c | 80 struct ieee80211_mgmt resp; local 98 os_memset(&resp, 0, sizeof(resp)); 99 resp.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT, 101 os_memcpy(resp.da, sa, ETH_ALEN); 102 os_memcpy(resp.sa, hapd->own_addr, ETH_ALEN); 103 os_memcpy(resp.bssid, hapd->own_addr, ETH_ALEN); 104 resp.u.action.category = WLAN_ACTION_SA_QUERY; 105 resp.u.action.u.sa_query_req.action = WLAN_SA_QUERY_RESPONSE; 106 os_memcpy(resp [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_11.c | 236 u16 auth_alg, u16 auth_transaction, u16 resp, 257 reply->u.auth.status_code = host_to_le16(resp); 263 " auth_alg=%d auth_transaction=%d resp=%d (IE len=%lu)", 265 resp, (unsigned long) ies_len); 303 u16 resp = WLAN_STATUS_SUCCESS; local 341 resp = WLAN_REASON_MICHAEL_MIC_FAILURE; 355 resp = WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG; 363 resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION; 370 resp = WLAN_STATUS_UNSPECIFIED_FAILURE; 382 resp 234 send_auth_reply(struct hostapd_data *hapd, const u8 *dst, const u8 *bssid, u16 auth_alg, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument 612 u16 resp; local 953 u16 resp = WLAN_STATUS_SUCCESS; local 1336 struct ieee80211_mgmt *resp; local [all...] |
H A D | ieee802_11_shared.c | 80 struct ieee80211_mgmt resp; local 98 os_memset(&resp, 0, sizeof(resp)); 99 resp.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT, 101 os_memcpy(resp.da, sa, ETH_ALEN); 102 os_memcpy(resp.sa, hapd->own_addr, ETH_ALEN); 103 os_memcpy(resp.bssid, hapd->own_addr, ETH_ALEN); 104 resp.u.action.category = WLAN_ACTION_SA_QUERY; 105 resp.u.action.u.sa_query_req.action = WLAN_SA_QUERY_RESPONSE; 106 os_memcpy(resp [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_fast.c | 400 struct wpabuf **resp) 416 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1); 436 hdr, resp)) 453 *resp = data->phase2_method->process(sm, data->phase2_priv, &iret, 455 if (*resp == NULL || 467 if (*resp == NULL && config && 472 } else if (*resp == NULL) 544 struct wpabuf *resp = NULL; local 566 if (eap_fast_phase2_request(sm, data, ret, hdr, &resp)) { 572 return eap_fast_tlv_eap_payload(resp); 396 eap_fast_phase2_request(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument 738 struct wpabuf *resp; local 1050 eap_fast_parse_decrypted(struct wpabuf *decrypted, struct eap_fast_tlv_parse *tlv, struct wpabuf **resp) argument 1099 eap_fast_encrypt_response(struct eap_sm *sm, struct eap_fast_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1146 struct wpabuf *resp = NULL, *tmp; local 1495 struct wpabuf *resp; local [all...] |
H A D | eap_tls.c | 113 struct wpabuf *resp, u8 id) 134 if (resp) { 139 return resp; 177 struct wpabuf *resp; local 194 resp = NULL; 196 id, pos, left, &resp); 199 return eap_tls_failure(sm, data, ret, res, resp, id); 206 wpabuf_free(resp); 210 return resp; 110 eap_tls_failure(struct eap_sm *sm, struct eap_tls_data *data, struct eap_method_ret *ret, int res, struct wpabuf *resp, u8 id) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_fast.c | 400 struct wpabuf **resp) 416 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1); 436 hdr, resp)) 453 *resp = data->phase2_method->process(sm, data->phase2_priv, &iret, 455 if (*resp == NULL || 467 if (*resp == NULL && config && 472 } else if (*resp == NULL) 544 struct wpabuf *resp = NULL; local 566 if (eap_fast_phase2_request(sm, data, ret, hdr, &resp)) { 572 return eap_fast_tlv_eap_payload(resp); 396 eap_fast_phase2_request(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument 738 struct wpabuf *resp; local 1050 eap_fast_parse_decrypted(struct wpabuf *decrypted, struct eap_fast_tlv_parse *tlv, struct wpabuf **resp) argument 1099 eap_fast_encrypt_response(struct eap_sm *sm, struct eap_fast_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1146 struct wpabuf *resp = NULL, *tmp; local 1495 struct wpabuf *resp; local [all...] |
H A D | eap_tls.c | 113 struct wpabuf *resp, u8 id) 134 if (resp) { 139 return resp; 177 struct wpabuf *resp; local 194 resp = NULL; 196 id, pos, left, &resp); 199 return eap_tls_failure(sm, data, ret, res, resp, id); 206 wpabuf_free(resp); 210 return resp; 110 eap_tls_failure(struct eap_sm *sm, struct eap_tls_data *data, struct eap_method_ret *ret, int res, struct wpabuf *resp, u8 id) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_fast.c | 400 struct wpabuf **resp) 416 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1); 436 hdr, resp)) 453 *resp = data->phase2_method->process(sm, data->phase2_priv, &iret, 455 if (*resp == NULL || 467 if (*resp == NULL && config && 472 } else if (*resp == NULL) 544 struct wpabuf *resp = NULL; local 566 if (eap_fast_phase2_request(sm, data, ret, hdr, &resp)) { 572 return eap_fast_tlv_eap_payload(resp); 396 eap_fast_phase2_request(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument 738 struct wpabuf *resp; local 1050 eap_fast_parse_decrypted(struct wpabuf *decrypted, struct eap_fast_tlv_parse *tlv, struct wpabuf **resp) argument 1099 eap_fast_encrypt_response(struct eap_sm *sm, struct eap_fast_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1146 struct wpabuf *resp = NULL, *tmp; local 1495 struct wpabuf *resp; local [all...] |
H A D | eap_tls.c | 113 struct wpabuf *resp, u8 id) 134 if (resp) { 139 return resp; 177 struct wpabuf *resp; local 194 resp = NULL; 196 id, pos, left, &resp); 199 return eap_tls_failure(sm, data, ret, res, resp, id); 206 wpabuf_free(resp); 210 return resp; 110 eap_tls_failure(struct eap_sm *sm, struct eap_tls_data *data, struct eap_method_ret *ret, int res, struct wpabuf *resp, u8 id) argument
|
/external/speex/libspeex/ |
H A D | cb_search_arm4.h | 39 static void compute_weighted_codebook(const signed char *shape_cb, const spx_word16_t *r, spx_word16_t *resp, spx_word16_t *resp2, spx_word32_t *E, int shape_cb_size, int subvect_size, char *stack) 57 res = resp+j; 86 res = resp+j; 131 resp += subvect_size<<2;
|
/external/openssh/ |
H A D | auth-pam.c | 342 struct pam_response **resp, void *data) 350 *resp = NULL; 376 reply[i].resp = buffer_get_string(&buffer, NULL); 388 reply[i].resp = buffer_get_string(&buffer, NULL); 410 *resp = reply; 415 if (reply[i].resp != NULL) 416 xfree(reply[i].resp); 546 struct pam_response **resp, void *data) 556 struct pam_response **resp, void *data) 563 *resp 341 sshpam_thread_conv(int n, sshpam_const struct pam_message **msg, struct pam_response **resp, void *data) argument 545 sshpam_null_conv(int n, sshpam_const struct pam_message **msg, struct pam_response **resp, void *data) argument 555 sshpam_store_conv(int n, sshpam_const struct pam_message **msg, struct pam_response **resp, void *data) argument 814 sshpam_respond(void *ctx, u_int num, char **resp) argument 962 sshpam_tty_conv(int n, sshpam_const struct pam_message **msg, struct pam_response **resp, void *data) argument 1121 sshpam_passwd_conv(int n, sshpam_const struct pam_message **msg, struct pam_response **resp, void *data) argument [all...] |
/external/openssl/apps/ |
H A D | ocsp.c | 107 static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, 115 static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp); 138 OCSP_RESPONSE *resp = NULL; local 693 resp = OCSP_response_create(OCSP_RESPONSE_STATUS_MALFORMEDREQUEST, NULL); 694 send_ocsp_response(cbio, resp); 764 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays); 766 send_ocsp_response(cbio, resp); 771 resp = process_responder(bio_err, req, host, path, 773 if (!resp) 788 resp 1053 make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, X509 *ca, X509 *rcert, EVP_PKEY *rkey, STACK_OF(X509) *rother, unsigned long flags, int nmin, int ndays) argument 1263 send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp) argument 1380 OCSP_RESPONSE *resp = NULL; local [all...] |
/external/elfutils/lib/ |
H A D | system.h | 64 extern int crc32_file (int fd, uint32_t *resp);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | gas_query.h | 37 const struct wpabuf *resp, u16 status_code),
|
H A D | gas_query.c | 35 struct wpabuf *resp; member in struct:gas_query_pending 39 const struct wpabuf *resp, u16 status_code); 78 query->adv_proto, query->resp, query->status_code); 80 wpabuf_free(query->resp); 116 if (wpabuf_resize(&query->resp, len) < 0) { 120 wpabuf_put_data(query->resp, data, len); 192 const u8 *adv_proto, const u8 *resp, 212 if (gas_query_append(query, resp, len) < 0) { 223 const u8 *adv_proto, const u8 *resp, 263 if (gas_query_append(query, resp, le 190 gas_query_rx_initial(struct gas_query *gas, struct gas_query_pending *query, const u8 *adv_proto, const u8 *resp, size_t len, u16 comeback_delay) argument 221 gas_query_rx_comeback(struct gas_query *gas, struct gas_query_pending *query, const u8 *adv_proto, const u8 *resp, size_t len, u8 frag_id, u8 more_frags, u16 comeback_delay) argument 417 gas_query_req(struct gas_query *gas, const u8 *dst, int freq, struct wpabuf *req, void (*cb)(void *ctx, const u8 *dst, u8 dialog_token, enum gas_query_result result, const struct wpabuf *adv_proto, const struct wpabuf *resp, u16 status_code), void *ctx) argument [all...] |
/external/libffi/testsuite/libffi.call/ |
H A D | cls_1_1byte.c | 31 cls_struct_1_1byte_gn(ffi_cif* cif __UNUSED__, void* resp, void** args, argument 40 *(cls_struct_1_1byte*)resp = cls_struct_1_1byte_fn(a1, a2);
|
H A D | cls_2byte.c | 31 cls_struct_2byte_gn(ffi_cif* cif __UNUSED__, void* resp, void** args, argument 40 *(cls_struct_2byte*)resp = cls_struct_2byte_fn(a1, a2);
|
H A D | cls_3byte1.c | 31 cls_struct_3byte_gn(ffi_cif* cif __UNUSED__, void* resp, void** args, argument 40 *(cls_struct_3byte*)resp = cls_struct_3byte_fn(a1, a2);
|
H A D | cls_3byte2.c | 31 cls_struct_3byte_gn1(ffi_cif* cif __UNUSED__, void* resp, void** args, argument 40 *(cls_struct_3byte_1*)resp = cls_struct_3byte_fn1(a1, a2);
|