/external/chromium_org/third_party/WebKit/Source/modules/websockets/ |
H A D | NewWebSocketChannelImpl.cpp | 433 void NewWebSocketChannelImpl::didFinishOpeningHandshake(WebSocketHandle* handle, const WebSocketHandshakeResponseInfo& response) argument 439 InspectorInstrumentation::didReceiveWebSocketHandshakeResponse(document(), m_identifier, m_handshakeRequest.get(), &response.toCoreResponse());
|
/external/chromium_org/third_party/WebKit/Source/platform/network/ |
H A D | ResourceResponse.cpp | 99 OwnPtr<ResourceResponse> response = adoptPtr(new ResourceResponse); local 100 response->setURL(data->m_url); 101 response->setMimeType(AtomicString(data->m_mimeType)); 102 response->setExpectedContentLength(data->m_expectedContentLength); 103 response->setTextEncodingName(AtomicString(data->m_textEncodingName)); 104 response->setSuggestedFilename(data->m_suggestedFilename); 106 response->setHTTPStatusCode(data->m_httpStatusCode); 107 response->setHTTPStatusText(AtomicString(data->m_httpStatusText)); 109 response->m_httpHeaderFields.adopt(data->m_httpHeaders.release()); 110 response [all...] |
/external/chromium_org/third_party/WebKit/Source/web/ |
H A D | AssociatedURLLoader.cpp | 196 void AssociatedURLLoader::ClientAdapter::didReceiveResponse(unsigned long, const ResourceResponse& response) argument 202 WebURLResponse validatedResponse = WrappedResourceResponse(response); 207 // If there are blocked headers, copy the response so we can remove them. 311 void AssociatedURLLoader::loadSynchronously(const WebURLRequest& request, WebURLResponse& response, WebURLError& error, WebData& data) argument
|
/external/chromium_org/third_party/WebKit/Source/web/tests/ |
H A D | AssociatedURLLoaderTest.cpp | 79 WebURLResponse response; local 80 response.initialize(); 81 response.setMIMEType("text/html"); 85 Platform::current()->unitTestSupport()->registerMockedURL(url, response, localPath); 143 void didReceiveResponse(WebURLLoader* loader, const WebURLResponse& response) argument 146 m_actualResponse = WebURLResponse(response); 148 EXPECT_EQ(m_expectedResponse.url(), response.url()); 149 EXPECT_EQ(m_expectedResponse.httpStatusCode(), response.httpStatusCode()); 407 // The loader needs to receive the response, before doing the CORS check. 437 // The loader needs to receive the response, befor [all...] |
/external/chromium_org/third_party/libjingle/source/talk/examples/peerconnection/client/ |
H A D | peer_connection_client.cc | 357 // First response. Let's store our server assigned ID. 362 // The body of the response will be a list of already connected peers. 465 int PeerConnectionClient::GetResponseStatus(const std::string& response) { argument 467 size_t pos = response.find(' '); 469 status = atoi(&response[pos + 1]); 473 bool PeerConnectionClient::ParseServerResponse(const std::string& response, argument 477 int status = GetResponseStatus(response.c_str()); 485 *eoh = response.find("\r\n\r\n"); 494 GetHeaderValue(response, *eoh, "\r\nPragma: ", peer_id);
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/client/ |
H A D | connectivitychecker_unittest.cc | 135 rtc::AsyncHttpRequest* response = CreateAsyncHttpResponse(port); local 136 TestHttpPortAllocatorSession::OnRequestDone(response); 137 response->Destroy(true); 141 // Helper method for creating a response to a relay session request. 153 request->response().document.reset( 155 request->response().set_success();
|
/external/libnfc-nci/src/nfa/hci/ |
H A D | nfa_hci_act.c | 953 ** Description action function to send response on the given pipe 974 if ((status = nfa_hciu_send_msg (p_pipe->pipe_id, NFA_HCI_RESPONSE_TYPE, p_evt_data->send_rsp.response, 1154 UINT8 response = NFA_HCI_ANY_OK; local 1173 response = NFA_HCI_ANY_E_REG_PAR_UNKNOWN; 1185 response = NFA_HCI_ANY_E_REG_PAR_UNKNOWN; 1199 response = NFA_HCI_ANY_E_CMD_NOT_SUPPORTED; 1203 nfa_hciu_send_msg (NFA_HCI_LINK_MANAGEMENT_PIPE, NFA_HCI_RESPONSE_TYPE, response, rsp_len, data); 1222 tNFA_HCI_RESPONSE response = NFA_HCI_ANY_OK; local 1240 nfa_hciu_send_msg (p_pipe->pipe_id, NFA_HCI_RESPONSE_TYPE, response, rsp_len, data); 1257 tNFA_HCI_RESPONSE response local 1812 tNFA_HCI_RESPONSE response = NFA_HCI_ANY_OK; local 2118 tNFA_HCI_RESPONSE response = NFA_HCI_ANY_OK; local [all...] |
/external/libnfc-nxp/src/ |
H A D | phHciNfc_AdminMgmt.c | 113 * response from the Host Controller Gate. 122 * response received from the Host Controller. 973 uint8_t response = (uint8_t) ANY_OK; local 1059 response = ANY_E_CMD_NOT_SUPPORTED; 1067 HCP_MSG_TYPE_RESPONSE, response ); 1073 p_admin_info->admin_pipe_info->prev_msg = response;
|
H A D | phHciNfc_Emulation.c | 1168 uint8_t response = (uint8_t) ANY_OK; local 1208 response = ANY_E_PIPE_NOT_OPENED; 1221 response = ANY_E_CMD_NOT_SUPPORTED; 1227 response = ANY_E_NOK; 1234 pipe_id, HCP_MSG_TYPE_RESPONSE, response ); 1240 p_pipe_info->prev_msg = response ;
|
/external/libsepol/src/ |
H A D | mls.c | 653 const char *mls1, const char *mls2, int *response) 670 *response = mls_range_contains(ctx1->range, ctx2->range); 651 sepol_mls_contains(sepol_handle_t * handle, sepol_policydb_t * policydb, const char *mls1, const char *mls2, int *response) argument
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
H A D | AuthenticationHeader.java | 460 * @return String response parameter value. 469 * @param response 472 public void setResponse(String response) throws ParseException { argument 473 if (response == null) 476 this.setParameter(RESPONSE, response);
|
/external/nist-sip/java/gov/nist/javax/sip/stack/ |
H A D | SIPServerTransaction.java | 81 * send response+-----------+ 83 * | | Proceeding| |send response 90 * send response | |send response | 94 * send response+-----------+ send response | 130 * | |send response 132 * |send response | 135 * send response+-----------+send response| 1233 sendResponse(Response response) argument [all...] |
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/mockwebserver/ |
H A D | MockWebServer.java | 219 * Scripts {@code response} to be returned to a request made in sequence. The 220 * first request is served by the first enqueued response; the second request 221 * by the second enqueued response; and so on. 226 public void enqueue(MockResponse response) { argument 227 ((QueueDispatcher) dispatcher).enqueueResponse(response.clone()); 371 * Respond to CONNECT requests until a SWITCH_TO_SSL_AT_END response is 385 * Reads a request and writes its response. Returns true if a request was 394 MockResponse response = dispatcher.dispatch(request); 395 writeResponse(out, response); 396 if (response 514 writeResponse(OutputStream out, MockResponse response) argument 675 writeResponse(SpdyStream stream, MockResponse response) argument [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
H A D | HttpResponseCache.java | 81 * contains a stale copy of the response, the client will issue a conditional 82 * {@code GET}. The server will then send either the updated response if it has 83 * changed, or a short 'not modified' response if the client's copy is still 97 * If it is only necessary to force a cached response to be validated by the 116 * This technique works even better in situations where a stale response is 117 * better than no response. To permit stale cached responses, use the {@code 148 Response response = get(request); 149 if (response == null) { 152 return JavaApiConverter.createJavaCacheResponse(response); 174 Response response 196 put(Response response) argument 480 Entry(Response response) argument 550 matches(Request request, Response response) argument 556 public Response response(Request request, DiskLruCache.Snapshot snapshot) { method in class:HttpResponseCache.Entry [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/ |
H A D | HttpEngine.java | 58 * Handles a single HTTP request/response pair. Each HTTP engine follows this 66 * <li>The HTTP response message is read with readResponse(). After the 67 * response has been read the response headers and body can be read. 68 * All responses have a response body input stream, though in some 72 * <p>The request and response may be served by the HTTP response cache, by the 116 * The cached response, or null if the cache doesn't exist or cannot be used 123 * The response read from the network. Null if the network response has 244 stripBody(Response response) argument [all...] |
/external/ppp/pppd/ |
H A D | chap-new.c | 54 unsigned char *challenge, unsigned char *response, 88 * These limits apply to challenge and response packets we send. 124 unsigned char *challenge, unsigned char *response, 307 * chap_handle_response - check the response to our challenge. 314 unsigned char *response, *p; local 328 response = pkt; 355 response, message, sizeof(message)); 362 /* send the response */ 392 * chap_verify_response - check whether the peer's response matches 399 unsigned char *challenge, unsigned char *response, 397 chap_verify_response(char *name, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 429 unsigned char response[RESP_MAX_PKTLEN]; local [all...] |
/external/qemu/distrib/sdl-1.2.15/src/video/macrom/ |
H A D | SDL_romvideo.c | 281 long response; local 302 if (!Gestalt(gestaltControlStripAttr, &response) && 303 (response & (1L << gestaltControlStripExists))) { 364 long response; local 427 if (!Gestalt(gestaltControlStripAttr, &response) && 428 (response & (1L << gestaltControlStripExists)))
|
/external/robolectric/src/main/java/com/xtremelabs/robolectric/ |
H A D | Robolectric.java | 1069 * Sets up an HTTP response to be returned by calls to Apache's {@code HttpClient} implementers. 1071 * @param statusCode the status code of the response 1072 * @param responseBody the body of the response 1080 * Sets up an HTTP response to be returned by calls to Apache's {@code HttpClient} implementers. 1082 * @param statusCode the status code of the response 1083 * @param responseBody the body of the response 1084 * @param contentType the contentType of the response 1093 * Sets up an HTTP response to be returned by calls to Apache's {@code HttpClient} implementers. 1095 * @param httpResponse the response 1102 * Sets up an HTTP response t 1154 addHttpResponseRule(String method, String uri, HttpResponse response) argument 1164 addHttpResponseRule(String uri, HttpResponse response) argument 1174 addHttpResponseRule(String uri, String response) argument 1184 addHttpResponseRule(RequestMatcher requestMatcher, HttpResponse response) argument [all...] |
/external/robolectric/src/main/java/com/xtremelabs/robolectric/tester/org/apache/http/ |
H A D | FakeHttpLayer.java | 54 public void addHttpResponseRule(String method, String uri, HttpResponse response) { argument 55 addHttpResponseRule(new DefaultRequestMatcher(method, uri), response); 58 public void addHttpResponseRule(String uri, HttpResponse response) { argument 59 addHttpResponseRule(new UriRequestMatcher(uri), response); 62 public void addHttpResponseRule(String uri, String response) { argument 63 addHttpResponseRule(new UriRequestMatcher(uri), new TestHttpResponse(200, response)); 66 public void addHttpResponseRule(RequestMatcher requestMatcher, HttpResponse response) { argument 67 addHttpResponseRule(new RequestMatcherResponseRule(requestMatcher, response)); 71 * Add a response rule.
|
/external/smack/src/org/xbill/DNS/ |
H A D | Lookup.java | 406 processResponse(Name name, SetResponse response) { argument 407 if (response.isSuccessful()) { 408 RRset [] rrsets = response.answers(); 422 } else if (response.isNXDOMAIN()) { 429 } else if (response.isNXRRSET()) { 433 } else if (response.isCNAME()) { 434 CNAMERecord cname = response.getCNAME(); 436 } else if (response.isDNAME()) { 437 DNAMERecord dname = response.getDNAME(); 445 } else if (response [all...] |
/external/tcpdump/ |
H A D | print-lwres.c | 67 #define LWRES_LWPACKETFLAG_RESPONSE 0x0001U /* if set, pkt is a response */ 303 int response; local 319 response = EXTRACT_16BITS(&np->pktflags) & LWRES_LWPACKETFLAG_RESPONSE; 324 printf(" %s%s", s, response ? "" : "?"); 346 if (!response) {
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | ms_funcs.c | 143 * @response: 24-octet Response (OUT) 146 u8 *response) 149 des_encrypt(challenge, password_hash, response); 150 des_encrypt(challenge, password_hash + 7, response + 8); 154 des_encrypt(challenge, zpwd, response + 16); 166 * @response: 24-octet Response (OUT) 172 u8 *response) 182 challenge_response(challenge, password_hash, response); 194 * @response: 24-octet Response (OUT) 201 u8 *response) 145 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument 169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | ms_funcs.c | 143 * @response: 24-octet Response (OUT) 146 u8 *response) 149 des_encrypt(challenge, password_hash, response); 150 des_encrypt(challenge, password_hash + 7, response + 8); 154 des_encrypt(challenge, zpwd, response + 16); 166 * @response: 24-octet Response (OUT) 172 u8 *response) 182 challenge_response(challenge, password_hash, response); 194 * @response: 24-octet Response (OUT) 201 u8 *response) 145 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument 169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 143 * @response: 24-octet Response (OUT) 146 u8 *response) 149 des_encrypt(challenge, password_hash, response); 150 des_encrypt(challenge, password_hash + 7, response + 8); 154 des_encrypt(challenge, zpwd, response + 16); 166 * @response: 24-octet Response (OUT) 172 u8 *response) 182 challenge_response(challenge, password_hash, response); 194 * @response: 24-octet Response (OUT) 201 u8 *response) 145 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument 169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument [all...] |
/external/chromium_org/chrome/browser/chromeos/app_mode/ |
H A D | kiosk_app_data.cc | 473 LOG(ERROR) << "Webstore response error (icon url): " 493 bool KioskAppData::CheckResponseKeyValue(const base::DictionaryValue* response, argument 496 if (!response->GetString(key, value)) { 497 LOG(ERROR) << "Webstore response error (" << key 498 << "): " << ValueToString(response);
|