Searched defs:response (Results 501 - 525 of 710) sorted by relevance

<<212223242526272829

/external/chromium_org/third_party/WebKit/Source/modules/websockets/
H A DNewWebSocketChannelImpl.cpp433 void NewWebSocketChannelImpl::didFinishOpeningHandshake(WebSocketHandle* handle, const WebSocketHandshakeResponseInfo& response) argument
439 InspectorInstrumentation::didReceiveWebSocketHandshakeResponse(document(), m_identifier, m_handshakeRequest.get(), &response.toCoreResponse());
/external/chromium_org/third_party/WebKit/Source/platform/network/
H A DResourceResponse.cpp99 OwnPtr<ResourceResponse> response = adoptPtr(new ResourceResponse); local
100 response->setURL(data->m_url);
101 response->setMimeType(AtomicString(data->m_mimeType));
102 response->setExpectedContentLength(data->m_expectedContentLength);
103 response->setTextEncodingName(AtomicString(data->m_textEncodingName));
104 response->setSuggestedFilename(data->m_suggestedFilename);
106 response->setHTTPStatusCode(data->m_httpStatusCode);
107 response->setHTTPStatusText(AtomicString(data->m_httpStatusText));
109 response->m_httpHeaderFields.adopt(data->m_httpHeaders.release());
110 response
[all...]
/external/chromium_org/third_party/WebKit/Source/web/
H A DAssociatedURLLoader.cpp196 void AssociatedURLLoader::ClientAdapter::didReceiveResponse(unsigned long, const ResourceResponse& response) argument
202 WebURLResponse validatedResponse = WrappedResourceResponse(response);
207 // If there are blocked headers, copy the response so we can remove them.
311 void AssociatedURLLoader::loadSynchronously(const WebURLRequest& request, WebURLResponse& response, WebURLError& error, WebData& data) argument
/external/chromium_org/third_party/WebKit/Source/web/tests/
H A DAssociatedURLLoaderTest.cpp79 WebURLResponse response; local
80 response.initialize();
81 response.setMIMEType("text/html");
85 Platform::current()->unitTestSupport()->registerMockedURL(url, response, localPath);
143 void didReceiveResponse(WebURLLoader* loader, const WebURLResponse& response) argument
146 m_actualResponse = WebURLResponse(response);
148 EXPECT_EQ(m_expectedResponse.url(), response.url());
149 EXPECT_EQ(m_expectedResponse.httpStatusCode(), response.httpStatusCode());
407 // The loader needs to receive the response, before doing the CORS check.
437 // The loader needs to receive the response, befor
[all...]
/external/chromium_org/third_party/libjingle/source/talk/examples/peerconnection/client/
H A Dpeer_connection_client.cc357 // First response. Let's store our server assigned ID.
362 // The body of the response will be a list of already connected peers.
465 int PeerConnectionClient::GetResponseStatus(const std::string& response) { argument
467 size_t pos = response.find(' ');
469 status = atoi(&response[pos + 1]);
473 bool PeerConnectionClient::ParseServerResponse(const std::string& response, argument
477 int status = GetResponseStatus(response.c_str());
485 *eoh = response.find("\r\n\r\n");
494 GetHeaderValue(response, *eoh, "\r\nPragma: ", peer_id);
/external/chromium_org/third_party/libjingle/source/talk/p2p/client/
H A Dconnectivitychecker_unittest.cc135 rtc::AsyncHttpRequest* response = CreateAsyncHttpResponse(port); local
136 TestHttpPortAllocatorSession::OnRequestDone(response);
137 response->Destroy(true);
141 // Helper method for creating a response to a relay session request.
153 request->response().document.reset(
155 request->response().set_success();
/external/libnfc-nci/src/nfa/hci/
H A Dnfa_hci_act.c953 ** Description action function to send response on the given pipe
974 if ((status = nfa_hciu_send_msg (p_pipe->pipe_id, NFA_HCI_RESPONSE_TYPE, p_evt_data->send_rsp.response,
1154 UINT8 response = NFA_HCI_ANY_OK; local
1173 response = NFA_HCI_ANY_E_REG_PAR_UNKNOWN;
1185 response = NFA_HCI_ANY_E_REG_PAR_UNKNOWN;
1199 response = NFA_HCI_ANY_E_CMD_NOT_SUPPORTED;
1203 nfa_hciu_send_msg (NFA_HCI_LINK_MANAGEMENT_PIPE, NFA_HCI_RESPONSE_TYPE, response, rsp_len, data);
1222 tNFA_HCI_RESPONSE response = NFA_HCI_ANY_OK; local
1240 nfa_hciu_send_msg (p_pipe->pipe_id, NFA_HCI_RESPONSE_TYPE, response, rsp_len, data);
1257 tNFA_HCI_RESPONSE response local
1812 tNFA_HCI_RESPONSE response = NFA_HCI_ANY_OK; local
2118 tNFA_HCI_RESPONSE response = NFA_HCI_ANY_OK; local
[all...]
/external/libnfc-nxp/src/
H A DphHciNfc_AdminMgmt.c113 * response from the Host Controller Gate.
122 * response received from the Host Controller.
973 uint8_t response = (uint8_t) ANY_OK; local
1059 response = ANY_E_CMD_NOT_SUPPORTED;
1067 HCP_MSG_TYPE_RESPONSE, response );
1073 p_admin_info->admin_pipe_info->prev_msg = response;
H A DphHciNfc_Emulation.c1168 uint8_t response = (uint8_t) ANY_OK; local
1208 response = ANY_E_PIPE_NOT_OPENED;
1221 response = ANY_E_CMD_NOT_SUPPORTED;
1227 response = ANY_E_NOK;
1234 pipe_id, HCP_MSG_TYPE_RESPONSE, response );
1240 p_pipe_info->prev_msg = response ;
/external/libsepol/src/
H A Dmls.c653 const char *mls1, const char *mls2, int *response)
670 *response = mls_range_contains(ctx1->range, ctx2->range);
651 sepol_mls_contains(sepol_handle_t * handle, sepol_policydb_t * policydb, const char *mls1, const char *mls2, int *response) argument
/external/nist-sip/java/gov/nist/javax/sip/header/
H A DAuthenticationHeader.java460 * @return String response parameter value.
469 * @param response
472 public void setResponse(String response) throws ParseException { argument
473 if (response == null)
476 this.setParameter(RESPONSE, response);
/external/nist-sip/java/gov/nist/javax/sip/stack/
H A DSIPServerTransaction.java81 * send response+-----------+
83 * | | Proceeding| |send response
90 * send response | |send response |
94 * send response+-----------+ send response |
130 * | |send response
132 * |send response |
135 * send response+-----------+send response|
1233 sendResponse(Response response) argument
[all...]
/external/okhttp/mockwebserver/src/main/java/com/squareup/okhttp/mockwebserver/
H A DMockWebServer.java219 * Scripts {@code response} to be returned to a request made in sequence. The
220 * first request is served by the first enqueued response; the second request
221 * by the second enqueued response; and so on.
226 public void enqueue(MockResponse response) { argument
227 ((QueueDispatcher) dispatcher).enqueueResponse(response.clone());
371 * Respond to CONNECT requests until a SWITCH_TO_SSL_AT_END response is
385 * Reads a request and writes its response. Returns true if a request was
394 MockResponse response = dispatcher.dispatch(request);
395 writeResponse(out, response);
396 if (response
514 writeResponse(OutputStream out, MockResponse response) argument
675 writeResponse(SpdyStream stream, MockResponse response) argument
[all...]
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/
H A DHttpResponseCache.java81 * contains a stale copy of the response, the client will issue a conditional
82 * {@code GET}. The server will then send either the updated response if it has
83 * changed, or a short 'not modified' response if the client's copy is still
97 * If it is only necessary to force a cached response to be validated by the
116 * This technique works even better in situations where a stale response is
117 * better than no response. To permit stale cached responses, use the {@code
148 Response response = get(request);
149 if (response == null) {
152 return JavaApiConverter.createJavaCacheResponse(response);
174 Response response
196 put(Response response) argument
480 Entry(Response response) argument
550 matches(Request request, Response response) argument
556 public Response response(Request request, DiskLruCache.Snapshot snapshot) { method in class:HttpResponseCache.Entry
[all...]
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/http/
H A DHttpEngine.java58 * Handles a single HTTP request/response pair. Each HTTP engine follows this
66 * <li>The HTTP response message is read with readResponse(). After the
67 * response has been read the response headers and body can be read.
68 * All responses have a response body input stream, though in some
72 * <p>The request and response may be served by the HTTP response cache, by the
116 * The cached response, or null if the cache doesn't exist or cannot be used
123 * The response read from the network. Null if the network response has
244 stripBody(Response response) argument
[all...]
/external/ppp/pppd/
H A Dchap-new.c54 unsigned char *challenge, unsigned char *response,
88 * These limits apply to challenge and response packets we send.
124 unsigned char *challenge, unsigned char *response,
307 * chap_handle_response - check the response to our challenge.
314 unsigned char *response, *p; local
328 response = pkt;
355 response, message, sizeof(message));
362 /* send the response */
392 * chap_verify_response - check whether the peer's response matches
399 unsigned char *challenge, unsigned char *response,
397 chap_verify_response(char *name, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
429 unsigned char response[RESP_MAX_PKTLEN]; local
[all...]
/external/qemu/distrib/sdl-1.2.15/src/video/macrom/
H A DSDL_romvideo.c281 long response; local
302 if (!Gestalt(gestaltControlStripAttr, &response) &&
303 (response & (1L << gestaltControlStripExists))) {
364 long response; local
427 if (!Gestalt(gestaltControlStripAttr, &response) &&
428 (response & (1L << gestaltControlStripExists)))
/external/robolectric/src/main/java/com/xtremelabs/robolectric/
H A DRobolectric.java1069 * Sets up an HTTP response to be returned by calls to Apache's {@code HttpClient} implementers.
1071 * @param statusCode the status code of the response
1072 * @param responseBody the body of the response
1080 * Sets up an HTTP response to be returned by calls to Apache's {@code HttpClient} implementers.
1082 * @param statusCode the status code of the response
1083 * @param responseBody the body of the response
1084 * @param contentType the contentType of the response
1093 * Sets up an HTTP response to be returned by calls to Apache's {@code HttpClient} implementers.
1095 * @param httpResponse the response
1102 * Sets up an HTTP response t
1154 addHttpResponseRule(String method, String uri, HttpResponse response) argument
1164 addHttpResponseRule(String uri, HttpResponse response) argument
1174 addHttpResponseRule(String uri, String response) argument
1184 addHttpResponseRule(RequestMatcher requestMatcher, HttpResponse response) argument
[all...]
/external/robolectric/src/main/java/com/xtremelabs/robolectric/tester/org/apache/http/
H A DFakeHttpLayer.java54 public void addHttpResponseRule(String method, String uri, HttpResponse response) { argument
55 addHttpResponseRule(new DefaultRequestMatcher(method, uri), response);
58 public void addHttpResponseRule(String uri, HttpResponse response) { argument
59 addHttpResponseRule(new UriRequestMatcher(uri), response);
62 public void addHttpResponseRule(String uri, String response) { argument
63 addHttpResponseRule(new UriRequestMatcher(uri), new TestHttpResponse(200, response));
66 public void addHttpResponseRule(RequestMatcher requestMatcher, HttpResponse response) { argument
67 addHttpResponseRule(new RequestMatcherResponseRule(requestMatcher, response));
71 * Add a response rule.
/external/smack/src/org/xbill/DNS/
H A DLookup.java406 processResponse(Name name, SetResponse response) { argument
407 if (response.isSuccessful()) {
408 RRset [] rrsets = response.answers();
422 } else if (response.isNXDOMAIN()) {
429 } else if (response.isNXRRSET()) {
433 } else if (response.isCNAME()) {
434 CNAMERecord cname = response.getCNAME();
436 } else if (response.isDNAME()) {
437 DNAMERecord dname = response.getDNAME();
445 } else if (response
[all...]
/external/tcpdump/
H A Dprint-lwres.c67 #define LWRES_LWPACKETFLAG_RESPONSE 0x0001U /* if set, pkt is a response */
303 int response; local
319 response = EXTRACT_16BITS(&np->pktflags) & LWRES_LWPACKETFLAG_RESPONSE;
324 printf(" %s%s", s, response ? "" : "?");
346 if (!response) {
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dms_funcs.c143 * @response: 24-octet Response (OUT)
146 u8 *response)
149 des_encrypt(challenge, password_hash, response);
150 des_encrypt(challenge, password_hash + 7, response + 8);
154 des_encrypt(challenge, zpwd, response + 16);
166 * @response: 24-octet Response (OUT)
172 u8 *response)
182 challenge_response(challenge, password_hash, response);
194 * @response: 24-octet Response (OUT)
201 u8 *response)
145 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument
169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dms_funcs.c143 * @response: 24-octet Response (OUT)
146 u8 *response)
149 des_encrypt(challenge, password_hash, response);
150 des_encrypt(challenge, password_hash + 7, response + 8);
154 des_encrypt(challenge, zpwd, response + 16);
166 * @response: 24-octet Response (OUT)
172 u8 *response)
182 challenge_response(challenge, password_hash, response);
194 * @response: 24-octet Response (OUT)
201 u8 *response)
145 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument
169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dms_funcs.c143 * @response: 24-octet Response (OUT)
146 u8 *response)
149 des_encrypt(challenge, password_hash, response);
150 des_encrypt(challenge, password_hash + 7, response + 8);
154 des_encrypt(challenge, zpwd, response + 16);
166 * @response: 24-octet Response (OUT)
172 u8 *response)
182 challenge_response(challenge, password_hash, response);
194 * @response: 24-octet Response (OUT)
201 u8 *response)
145 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument
169 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument
197 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument
226 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
285 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument
308 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument
[all...]
/external/chromium_org/chrome/browser/chromeos/app_mode/
H A Dkiosk_app_data.cc473 LOG(ERROR) << "Webstore response error (icon url): "
493 bool KioskAppData::CheckResponseKeyValue(const base::DictionaryValue* response, argument
496 if (!response->GetString(key, value)) {
497 LOG(ERROR) << "Webstore response error (" << key
498 << "): " << ValueToString(response);

Completed in 2612 milliseconds

<<212223242526272829