/external/libffi/testsuite/libffi.call/ |
H A D | cls_ushort.c | 10 static void cls_ret_ushort_fn(ffi_cif* cif __UNUSED__, void* resp, void** args, argument 13 *(ffi_arg*)resp = *(unsigned short *)args[0]; 16 (int)*(ffi_arg *)(resp));
|
/external/v8/test/mjsunit/ |
H A D | debug-evaluate-bool-constructor.js | 52 var resp = dcp.processDebugJSONRequest(request); 53 var response = JSON.parse(resp); 54 assertTrue(response.success, 'Command failed: ' + resp);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_sake.c | 154 struct wpabuf *resp; local 174 resp = eap_sake_build_msg(data, eap_get_id(reqData), 177 if (resp == NULL) 181 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, 186 return resp; 198 struct wpabuf *resp; local 255 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen, 257 if (resp == NULL) 261 eap_sake_add_attr(resp, EAP_SAKE_AT_RAND_P, 266 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERI 299 struct wpabuf *resp; local 372 struct wpabuf *resp; local [all...] |
H A D | eap_gpsk.c | 265 struct wpabuf *resp; local 285 resp = eap_gpsk_send_gpsk_2(data, eap_get_id(reqData), 287 if (resp == NULL) 292 return resp; 301 struct wpabuf *resp; local 313 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, 315 if (resp == NULL) 318 wpabuf_put_u8(resp, EAP_GPSK_OPCODE_GPSK_2); 319 start = wpabuf_put(resp, 0); 323 wpabuf_put_be16(resp, dat 556 struct wpabuf *resp; local 599 struct wpabuf *resp; local 636 struct wpabuf *resp; local [all...] |
H A D | eap_leap.c | 69 struct wpabuf *resp; local 114 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, 117 if (resp == NULL) 119 wpabuf_put_u8(resp, LEAP_VERSION); 120 wpabuf_put_u8(resp, 0); /* unused */ 121 wpabuf_put_u8(resp, LEAP_RESPONSE_LEN); 122 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); 130 wpabuf_put_data(resp, identity, identity_len); 134 return resp; 143 struct wpabuf *resp; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_sake.c | 149 struct wpabuf *resp; local 169 resp = eap_sake_build_msg(data, eap_get_id(reqData), 172 if (resp == NULL) 176 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, 181 return resp; 193 struct wpabuf *resp; local 250 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen, 252 if (resp == NULL) 256 eap_sake_add_attr(resp, EAP_SAKE_AT_RAND_P, 261 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERI 294 struct wpabuf *resp; local 367 struct wpabuf *resp; local [all...] |
H A D | eap_gpsk.c | 260 struct wpabuf *resp; local 280 resp = eap_gpsk_send_gpsk_2(data, eap_get_id(reqData), 282 if (resp == NULL) 287 return resp; 296 struct wpabuf *resp; local 308 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, 310 if (resp == NULL) 313 wpabuf_put_u8(resp, EAP_GPSK_OPCODE_GPSK_2); 314 start = wpabuf_put(resp, 0); 318 wpabuf_put_be16(resp, dat 551 struct wpabuf *resp; local 594 struct wpabuf *resp; local 631 struct wpabuf *resp; local [all...] |
H A D | eap_ttls.c | 185 static int eap_ttls_avp_encapsulate(struct wpabuf **resp, u32 avp_code, argument 191 msg = wpabuf_alloc(sizeof(struct ttls_avp) + wpabuf_len(*resp) + 4); 193 wpabuf_free(*resp); 194 *resp = NULL; 199 pos = eap_ttls_avp_hdr(avp, avp_code, 0, mandatory, wpabuf_len(*resp)); 200 os_memcpy(pos, wpabuf_head(*resp), wpabuf_len(*resp)); 201 pos += wpabuf_len(*resp); 203 wpabuf_free(*resp); 205 *resp 258 eap_ttls_phase2_eap_process(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, size_t len, struct wpabuf **resp) argument 284 eap_ttls_phase2_request_eap_method(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, size_t len, u8 method, struct wpabuf **resp) argument 356 eap_ttls_phase2_request_eap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument 399 eap_ttls_phase2_request_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 499 eap_ttls_phase2_request_mschap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 581 eap_ttls_phase2_request_pap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 635 eap_ttls_phase2_request_chap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 711 eap_ttls_phase2_request(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument 966 eap_ttls_encrypt_response(struct eap_sm *sm, struct eap_ttls_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 989 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct ttls_parse_avp *parse, struct wpabuf **resp) argument 1107 eap_ttls_process_tnc_start(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct ttls_parse_avp *parse, struct wpabuf **resp) argument 1146 struct wpabuf *resp = NULL; local 1219 struct wpabuf *resp; local 1459 struct wpabuf *resp; local [all...] |
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | http_server.h | 16 void http_request_send(struct http_request *req, struct wpabuf *resp); 18 struct wpabuf *resp);
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_sake.c | 149 struct wpabuf *resp; local 169 resp = eap_sake_build_msg(data, eap_get_id(reqData), 172 if (resp == NULL) 176 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, 181 return resp; 193 struct wpabuf *resp; local 250 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen, 252 if (resp == NULL) 256 eap_sake_add_attr(resp, EAP_SAKE_AT_RAND_P, 261 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERI 294 struct wpabuf *resp; local 367 struct wpabuf *resp; local [all...] |
H A D | eap_gpsk.c | 260 struct wpabuf *resp; local 280 resp = eap_gpsk_send_gpsk_2(data, eap_get_id(reqData), 282 if (resp == NULL) 287 return resp; 296 struct wpabuf *resp; local 308 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, 310 if (resp == NULL) 313 wpabuf_put_u8(resp, EAP_GPSK_OPCODE_GPSK_2); 314 start = wpabuf_put(resp, 0); 318 wpabuf_put_be16(resp, dat 551 struct wpabuf *resp; local 594 struct wpabuf *resp; local 631 struct wpabuf *resp; local [all...] |
H A D | eap_ttls.c | 185 static int eap_ttls_avp_encapsulate(struct wpabuf **resp, u32 avp_code, argument 191 msg = wpabuf_alloc(sizeof(struct ttls_avp) + wpabuf_len(*resp) + 4); 193 wpabuf_free(*resp); 194 *resp = NULL; 199 pos = eap_ttls_avp_hdr(avp, avp_code, 0, mandatory, wpabuf_len(*resp)); 200 os_memcpy(pos, wpabuf_head(*resp), wpabuf_len(*resp)); 201 pos += wpabuf_len(*resp); 203 wpabuf_free(*resp); 205 *resp 258 eap_ttls_phase2_eap_process(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, size_t len, struct wpabuf **resp) argument 284 eap_ttls_phase2_request_eap_method(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, size_t len, u8 method, struct wpabuf **resp) argument 356 eap_ttls_phase2_request_eap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument 399 eap_ttls_phase2_request_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 499 eap_ttls_phase2_request_mschap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 581 eap_ttls_phase2_request_pap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 635 eap_ttls_phase2_request_chap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 711 eap_ttls_phase2_request(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument 966 eap_ttls_encrypt_response(struct eap_sm *sm, struct eap_ttls_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 989 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct ttls_parse_avp *parse, struct wpabuf **resp) argument 1107 eap_ttls_process_tnc_start(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct ttls_parse_avp *parse, struct wpabuf **resp) argument 1146 struct wpabuf *resp = NULL; local 1219 struct wpabuf *resp; local 1459 struct wpabuf *resp; local [all...] |
/external/wpa_supplicant_8/src/wps/ |
H A D | http_server.h | 16 void http_request_send(struct http_request *req, struct wpabuf *resp); 18 struct wpabuf *resp);
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
H A D | wps-ap-cli | 21 read -p "Do you want to use this PIN (y/n)? " resp 22 case "$resp" in
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_sake.c | 149 struct wpabuf *resp; local 169 resp = eap_sake_build_msg(data, eap_get_id(reqData), 172 if (resp == NULL) 176 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, 181 return resp; 193 struct wpabuf *resp; local 250 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen, 252 if (resp == NULL) 256 eap_sake_add_attr(resp, EAP_SAKE_AT_RAND_P, 261 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERI 294 struct wpabuf *resp; local 367 struct wpabuf *resp; local [all...] |
H A D | eap_gpsk.c | 260 struct wpabuf *resp; local 280 resp = eap_gpsk_send_gpsk_2(data, eap_get_id(reqData), 282 if (resp == NULL) 287 return resp; 296 struct wpabuf *resp; local 308 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, 310 if (resp == NULL) 313 wpabuf_put_u8(resp, EAP_GPSK_OPCODE_GPSK_2); 314 start = wpabuf_put(resp, 0); 318 wpabuf_put_be16(resp, dat 551 struct wpabuf *resp; local 594 struct wpabuf *resp; local 631 struct wpabuf *resp; local [all...] |
H A D | eap_ttls.c | 185 static int eap_ttls_avp_encapsulate(struct wpabuf **resp, u32 avp_code, argument 191 msg = wpabuf_alloc(sizeof(struct ttls_avp) + wpabuf_len(*resp) + 4); 193 wpabuf_free(*resp); 194 *resp = NULL; 199 pos = eap_ttls_avp_hdr(avp, avp_code, 0, mandatory, wpabuf_len(*resp)); 200 os_memcpy(pos, wpabuf_head(*resp), wpabuf_len(*resp)); 201 pos += wpabuf_len(*resp); 203 wpabuf_free(*resp); 205 *resp 258 eap_ttls_phase2_eap_process(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, size_t len, struct wpabuf **resp) argument 284 eap_ttls_phase2_request_eap_method(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, size_t len, u8 method, struct wpabuf **resp) argument 356 eap_ttls_phase2_request_eap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument 399 eap_ttls_phase2_request_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 499 eap_ttls_phase2_request_mschap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 581 eap_ttls_phase2_request_pap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 635 eap_ttls_phase2_request_chap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 711 eap_ttls_phase2_request(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument 966 eap_ttls_encrypt_response(struct eap_sm *sm, struct eap_ttls_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 989 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct ttls_parse_avp *parse, struct wpabuf **resp) argument 1107 eap_ttls_process_tnc_start(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct ttls_parse_avp *parse, struct wpabuf **resp) argument 1146 struct wpabuf *resp = NULL; local 1219 struct wpabuf *resp; local 1459 struct wpabuf *resp; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | http_server.h | 16 void http_request_send(struct http_request *req, struct wpabuf *resp); 18 struct wpabuf *resp);
|
/external/dropbear/ |
H A D | svr-authpam.c | 55 struct pam_response* resp = NULL; local 113 * free the pam_response and its resp element - ie we _must_ malloc 115 resp = (struct pam_response*) m_malloc(sizeof(struct pam_response)); 116 memset(resp, 0, sizeof(struct pam_response)); 118 resp->resp = m_strdup(userDatap->passwd); 120 (*respp) = resp; 139 * free the pam_response and its resp element - ie we _must_ malloc 141 resp = (struct pam_response*) m_malloc(sizeof(struct pam_response)); 142 memset(resp, [all...] |
/external/libffi/testsuite/libffi.special/ |
H A D | unwindtest.cc | 11 closure_test_fn(ffi_cif* cif __UNUSED__, void* resp __UNUSED__, 19 void closure_test_fn1(ffi_cif* cif __UNUSED__, void* resp, argument 22 *(ffi_arg*)resp = 41 (int)(long)userdata, (int)*(ffi_arg*)resp); 43 throw (int)*(ffi_arg*)resp;
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_pax.c | 192 struct eap_pax_hdr *resp; local 198 if (pos == NULL || len < sizeof(*resp)) { 204 resp = (struct eap_pax_hdr *) pos; 209 resp->op_code, resp->flags, resp->mac_id, resp->dh_group_id, 210 resp->public_key_id); 212 (u8 *) (resp + 1), len - sizeof(*resp) 292 struct eap_pax_hdr *resp; local 460 struct eap_pax_hdr *resp; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_pax.c | 187 struct eap_pax_hdr *resp; local 193 if (pos == NULL || len < sizeof(*resp)) { 199 resp = (struct eap_pax_hdr *) pos; 204 resp->op_code, resp->flags, resp->mac_id, resp->dh_group_id, 205 resp->public_key_id); 207 (u8 *) (resp + 1), len - sizeof(*resp) 287 struct eap_pax_hdr *resp; local 455 struct eap_pax_hdr *resp; local [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_pax.c | 187 struct eap_pax_hdr *resp; local 193 if (pos == NULL || len < sizeof(*resp)) { 199 resp = (struct eap_pax_hdr *) pos; 204 resp->op_code, resp->flags, resp->mac_id, resp->dh_group_id, 205 resp->public_key_id); 207 (u8 *) (resp + 1), len - sizeof(*resp) 287 struct eap_pax_hdr *resp; local 455 struct eap_pax_hdr *resp; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_pax.c | 187 struct eap_pax_hdr *resp; local 193 if (pos == NULL || len < sizeof(*resp)) { 199 resp = (struct eap_pax_hdr *) pos; 204 resp->op_code, resp->flags, resp->mac_id, resp->dh_group_id, 205 resp->public_key_id); 207 (u8 *) (resp + 1), len - sizeof(*resp) 287 struct eap_pax_hdr *resp; local 455 struct eap_pax_hdr *resp; local [all...] |
/external/openssh/ |
H A D | auth-chall.c | 83 char *resp[1], *name, *info, **prompts; local 91 resp[0] = (char *)response; 92 switch (device->respond(authctxt->kbdintctxt, 1, resp)) { 101 device->respond(authctxt->kbdintctxt, 0, resp) == 0)
|