Searched defs:response (Results 276 - 300 of 334) sorted by relevance

<<11121314

/external/kernel-headers/original/uapi/rdma/
H A Drdma_user_cm.h83 __u64 response; member in struct:rdma_ucm_create_id
94 __u64 response; member in struct:rdma_ucm_destroy_id
104 __u64 response; member in struct:rdma_ucm_bind_ip
145 __u64 response; member in struct:rdma_ucm_query
230 __u64 response; member in struct:rdma_ucm_init_qp_attr
241 __u64 response; /* rdma_ucm_create_id_resp */ member in struct:rdma_ucm_join_ip_mcast
248 __u64 response; /* rdma_ucma_create_id_resp */ member in struct:rdma_ucm_join_mcast
257 __u64 response; member in struct:rdma_ucm_get_event
294 __u64 response; member in struct:rdma_ucm_migrate_id
/external/libvncserver/libvncserver/
H A Dmain.c701 /* response is cl->authChallenge vncEncrypted with passwd */
702 static rfbBool rfbDefaultPasswordCheck(rfbClientPtr cl,const char* response,int len) argument
721 if (memcmp(cl->authChallenge, response, len) != 0) {
732 rfbBool rfbCheckPasswordByList(rfbClientPtr cl,const char* response,int len) argument
742 if (memcmp(auth_tmp, response, len) == 0) {
H A Dwebsockets.c202 rfbLog("Got Flash policy request, sending response\n");
205 rfbErr("webSocketsHandshake: failed sending Flash policy response");
237 char *buf, *response, *line; local
252 response = (char *) malloc(WEBSOCKETS_MAX_HANDSHAKE_LEN);
253 if (!response) {
269 free(response);
288 free(response);
344 free(response);
352 free(response);
370 * Generate the WebSockets server response base
[all...]
/external/nist-sip/java/gov/nist/javax/sip/header/
H A DHeaderFactoryImpl.java188 * response value.
190 * @param response - the new string value of the response.
192 * unexpectedly while parsing the response value.
196 public AuthenticationInfoHeader createAuthenticationInfoHeader(String response) argument
198 if (response == null)
199 throw new NullPointerException("null arg response");
201 auth.setResponse(response);
/external/openssh/
H A Dmonitor_wrap.c764 /* Get the challenge, and format the response */
822 /* Get the challenge, and format the response */
945 mm_auth_rsa_verify_response(Key *key, BIGNUM *p, u_char response[16]) argument
961 buffer_put_string(&m, response, 16);
H A Dscp.c361 int response(void);
492 (void) response();
569 return (response());
682 if (response() < 0)
807 if (response() < 0)
853 (void) response();
884 if (response() < 0) {
903 (void) response();
1177 (void) response();
1203 response(voi function
[all...]
/external/protobuf/src/google/protobuf/compiler/
H A Dcommand_line_interface.cc1289 CodeGeneratorResponse response; local
1314 if (!subprocess.Communicate(request, &response, &communicate_error)) {
1322 for (int i = 0; i < response.file_size(); i++) {
1323 const CodeGeneratorResponse::File& output_file = response.file(i);
1352 if (!response.error().empty()) {
1354 *error = response.error();
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_gnutls.c826 gnutls_datum_t response, buf; local
837 "GnuTLS: No valid OCSP response received");
842 "GnuTLS: Valid OCSP response was not received - continue since OCSP was not required");
847 * GnuTLS has already verified the OCSP response in
849 * found to be revoked. However, if the response indicates that the
851 * re-import the OCSP response to check for unknown certificate status,
856 res = gnutls_ocsp_status_request_get(session, &response);
859 "GnuTLS: OCSP response was received, but it was not valid");
866 res = gnutls_ocsp_resp_import(resp, &response);
869 "GnuTLS: Could not parse received OCSP response
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_ttls.c589 u8 *response, size_t response_len)
593 if (challenge == NULL || response == NULL ||
597 "attributes (challenge len %lu response len %lu)",
624 challenge, response + 2 + 24);
629 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) {
643 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) {
644 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response");
649 response + 2 + 24, 24);
661 u8 *response, size_t response_len)
667 if (challenge == NULL || response
586 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
657 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dtls_gnutls.c826 gnutls_datum_t response, buf; local
837 "GnuTLS: No valid OCSP response received");
842 "GnuTLS: Valid OCSP response was not received - continue since OCSP was not required");
847 * GnuTLS has already verified the OCSP response in
849 * found to be revoked. However, if the response indicates that the
851 * re-import the OCSP response to check for unknown certificate status,
856 res = gnutls_ocsp_status_request_get(session, &response);
859 "GnuTLS: OCSP response was received, but it was not valid");
866 res = gnutls_ocsp_resp_import(resp, &response);
869 "GnuTLS: Could not parse received OCSP response
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_ttls.c589 u8 *response, size_t response_len)
593 if (challenge == NULL || response == NULL ||
597 "attributes (challenge len %lu response len %lu)",
624 challenge, response + 2 + 24);
629 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) {
643 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) {
644 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response");
649 response + 2 + 24, 24);
661 u8 *response, size_t response_len)
667 if (challenge == NULL || response
586 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
657 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_gnutls.c826 gnutls_datum_t response, buf; local
837 "GnuTLS: No valid OCSP response received");
842 "GnuTLS: Valid OCSP response was not received - continue since OCSP was not required");
847 * GnuTLS has already verified the OCSP response in
849 * found to be revoked. However, if the response indicates that the
851 * re-import the OCSP response to check for unknown certificate status,
856 res = gnutls_ocsp_status_request_get(session, &response);
859 "GnuTLS: OCSP response was received, but it was not valid");
866 res = gnutls_ocsp_resp_import(resp, &response);
869 "GnuTLS: Could not parse received OCSP response
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_ttls.c589 u8 *response, size_t response_len)
593 if (challenge == NULL || response == NULL ||
597 "attributes (challenge len %lu response len %lu)",
624 challenge, response + 2 + 24);
629 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) {
643 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) {
644 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response");
649 response + 2 + 24, 24);
661 u8 *response, size_t response_len)
667 if (challenge == NULL || response
586 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
657 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
[all...]
/external/jetty/lib/
H A Djavax.servlet-3.0.0.v201112011016.jar ... servlet.ServletRequest request private javax.servlet.ServletResponse response private Throwable throwable public void " href="/6.0.0 ...
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/
H A Djavax.servlet_2.5.0.v200910301333.jarMETA-INF/MANIFEST.MF META-INF/ECLIPSEF.SF META-INF/ECLIPSEF.RSA META ...
/external/fio/
H A Dgoptions.c1445 static gint gopt_dialog_cancel(gint response) argument
1447 switch (response) {
1459 static gint gopt_dialog_done(gint response) argument
1461 switch (response) {
1473 gint response; local
1476 response = gtk_dialog_run(GTK_DIALOG(gjv->dialog));
1478 if (gopt_dialog_cancel(response) ||
1479 gopt_dialog_done(response))
1489 if (gopt_dialog_cancel(response))
/external/jetty/src/java/org/eclipse/jetty/server/
H A DRequest.java1583 * {@link #setQueryEncoding}. <p> if the attribute name is "org.eclipse.jetty.server.server.ResponseBuffer", then the response buffer is flushed with @{link
2029 public boolean authenticate(HttpServletResponse response) throws IOException, ServletException argument
2033 setAuthentication(((Authentication.Deferred)_authentication).authenticate(this,response));
2036 response.sendError(HttpStatus.UNAUTHORIZED_401);
/external/jetty/src/java/org/eclipse/jetty/server/handler/
H A DContextHandler.java857 public boolean checkContext(final String target, final Request baseRequest, final HttpServletResponse response) throws IOException, ServletException argument
868 response.sendError(HttpServletResponse.SC_SERVICE_UNAVAILABLE);
923 response.sendRedirect(URIUtil.addPaths(baseRequest.getRequestURI(),URIUtil.SLASH) + "?" + baseRequest.getQueryString());
925 response.sendRedirect(URIUtil.addPaths(baseRequest.getRequestURI(),URIUtil.SLASH));
939 public void doScope(String target, Request baseRequest, HttpServletRequest request, HttpServletResponse response) throws IOException, ServletException argument
964 if (!checkContext(target,baseRequest,response))
1016 // start manual inline of nextScope(target,baseRequest,request,response);
1018 nextScope(target,baseRequest,request,response);
1020 _nextScope.doScope(target,baseRequest,request,response);
1022 _outerScope.doHandle(target,baseRequest,request,response);
1053 doHandle(String target, Request baseRequest, HttpServletRequest request, HttpServletResponse response) argument
[all...]
/external/libnfc-nci/src/nfa/int/
H A Dnfa_hci_int.h54 #define NFA_HCI_STATE_WAIT_RSP 0x04 /* HCI is waiting for response to command sent */
95 NFA_HCI_RSP_TIMEOUT_EVT, /* Timeout to response for the HCP Command packet */
274 UINT8 response; member in struct:__anon8653
378 TIMER_LIST_ENT timer; /* Timer to avoid indefinitely waiting for response */
386 tNFA_HANDLE app_in_use; /* Index of the application that is waiting for response */
406 UINT8 *p_rsp_buf; /* Buffer to hold response to sent event */
/external/libvncserver/x11vnc/
H A Duser.c59 rfbBool custom_passwd_check(rfbClientPtr cl, const char *response, int len);
1129 rfbBool custom_passwd_check(rfbClientPtr cl, const char *response, int len) { argument
1155 input[j] = response[i];
/external/nanohttpd/core/src/main/java/fi/iki/elonen/
H A DNanoHTTPD.java266 * @return HTTP response, see class Response for details
281 * @return HTTP response, see class Response for details
534 * HTTP response. Return one of these from serve().
546 * Data of the response, may be null.
550 * Headers for the HTTP response. Use addHeader() to add lines.
554 * The request method that spawned this response.
563 * Default constructor: response = HTTP_OK, mime = MIME_HTML and your supplied message
603 * Sends given response to the socket.
743 * Some HTTP response status codes
817 * Handles one session, i.e. parses the HTTP request and returns the response
1431 unloadQueue(Response response) argument
[all...]
/external/nist-sip/java/gov/nist/javax/sip/stack/
H A DSIPDialog.java120 * INVITE transactions, a Dialog is created when a success message is received (i.e. a response
150 // Last response (JvB: either sent or received).
398 // resend last response.
405 * Issue 106. Section 13.3.1.4 RFC 3261 The 2xx response is passed to the transport
407 * until it reaches T2 seconds If the server retransmits the 2xx response for 64*T1
424 SIPResponse response = transaction.getLastResponse();
425 if (response.getStatusCode() == 200) {
428 // resend the last response.
430 transaction.sendMessage(response);
446 stack.getStackLogger().logDebug("resend 200 response fro
2813 startRetransmitTimer(SIPServerTransaction sipServerTx, Response response) argument
[all...]
/external/okhttp/okhttp-android-support/src/test/java/com/squareup/okhttp/internal/huc/
H A DResponseCacheTest.java136 * Test that response caching is consistent with the RI and the spec.
143 // We can't test 100 because it's not really a response.
482 MockResponse response = new MockResponse();
483 transferKind.setBody(response, "ABCDE\nFGHIJKLMNOPQRSTUVWXYZ", 16);
484 server.enqueue(truncateViolently(response, 16));
517 MockResponse response = new MockResponse()
519 transferKind.setBody(response, "ABCDE\nFGHIJKLMNOPQRSTUVWXYZ", 1024);
520 server.enqueue(response);
785 // 2. invalidate it with uncacheable response
933 private void assertNonIdentityEncodingCached(MockResponse response) throw argument
1710 assertNotCached(MockResponse response) argument
1721 assertConditionallyCached(MockResponse response) argument
1754 assertFullyCached(MockResponse response) argument
1768 truncateViolently(MockResponse response, int numBytesToKeep) argument
1798 setBody(MockResponse response, Buffer content, int chunkSize) argument
1800 setBody(MockResponse response, String content, int chunkSize) argument
[all...]
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/
H A DCacheTest.java105 * Test that response caching is consistent with the RI and the spec.
112 // We can't test 100 because it's not really a response.
181 Response response = client.newCall(request).execute();
182 assertEquals(responseCode, response.code());
185 response.body().string();
501 Response response = get(server.getUrl("/"));
502 assertEquals("Request #2", response.body().string());
588 Response response = get(server.getUrl("/"));
589 assertEquals("A", response.body().string());
590 assertEquals("113 HttpURLConnection \"Heuristic expiration\"", response
951 assertNonIdentityEncodingCached(MockResponse response) argument
2156 assertNotCached(MockResponse response) argument
2167 assertConditionallyCached(MockResponse response) argument
2204 assertFullyCached(MockResponse response) argument
2218 truncateViolently(MockResponse response, int numBytesToKeep) argument
2248 setBody(MockResponse response, Buffer content, int chunkSize) argument
2250 setBody(MockResponse response, String content, int chunkSize) argument
[all...]
/external/okhttp/okhttp-urlconnection/src/test/java/com/squareup/okhttp/
H A DUrlConnectionCacheTest.java114 * Test that response caching is consistent with the RI and the spec.
121 // We can't test 100 because it's not really a response.
173 MockResponse response = new MockResponse()
180 response.addHeader("Proxy-Authenticate: Basic realm=\"protected area\"");
182 response.addHeader("WWW-Authenticate: Basic realm=\"protected area\"");
184 server.enqueue(response);
221 MockResponse response =
225 transferKind.setBody(response, "I love puppies but hate spiders", 1);
226 server.enqueue(response);
409 MockResponse response
808 assertNonIdentityEncodingCached(MockResponse response) argument
1688 assertNotCached(MockResponse response) argument
1698 assertConditionallyCached(MockResponse response) argument
1731 assertFullyCached(MockResponse response) argument
1745 truncateViolently(MockResponse response, int numBytesToKeep) argument
1817 setBody(MockResponse response, Buffer content, int chunkSize) argument
1819 setBody(MockResponse response, String content, int chunkSize) argument
[all...]

Completed in 812 milliseconds

<<11121314