/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_sake.c | 149 struct wpabuf *resp; local 169 resp = eap_sake_build_msg(data, id, 2 + data->peerid_len, 171 if (resp == NULL) 175 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, 180 return resp; 192 struct wpabuf *resp; local 249 resp = eap_sake_build_msg(data, id, rlen, EAP_SAKE_SUBTYPE_CHALLENGE); 250 if (resp == NULL) 254 eap_sake_add_attr(resp, EAP_SAKE_AT_RAND_P, 259 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERI 293 struct wpabuf *resp; local 365 struct wpabuf *resp; local [all...] |
H A D | eap_eke.c | 200 struct wpabuf *resp; local 205 resp = eap_eke_build_msg(data, id, 4, EAP_EKE_FAILURE); 206 if (resp) 207 wpabuf_put_be32(resp, failure_code); 217 return resp; 227 struct wpabuf *resp; local 323 resp = eap_eke_build_msg(data, id, 326 if (resp == NULL) { 331 wpabuf_put_u8(resp, 1); /* NumProposals */ 332 wpabuf_put_u8(resp, 361 struct wpabuf *resp; local 507 struct wpabuf *resp; local 654 struct wpabuf *resp; local [all...] |
H A D | eap_tnc.c | 91 struct wpabuf *resp; local 113 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, 115 if (resp == NULL) 118 wpabuf_put_u8(resp, flags); /* Flags */ 120 wpabuf_put_be32(resp, wpabuf_len(data->out_buf)); 122 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used, 144 return resp; 206 struct wpabuf *resp; local 354 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, 356 if (resp [all...] |
H A D | eap_pax.c | 97 struct wpabuf *resp; local 100 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, 102 if (resp == NULL) 105 pax = wpabuf_put(resp, sizeof(*pax)); 112 return resp; 121 struct wpabuf *resp; local 192 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); 193 if (resp == NULL) 196 wpabuf_put_be16(resp, EAP_PAX_RAND_LEN); 197 wpabuf_put_data(resp, dat 237 struct wpabuf *resp; local 332 struct wpabuf *resp; local [all...] |
/external/autotest/frontend/afe/json_rpc/ |
H A D | proxy.py | 109 resp = decoder.JSONDecoder().decode(respdata) 112 if resp['error'] is not None: 113 raise BuildException(resp['error']) 115 return resp['result']
|
/external/chromium-trace/catapult/third_party/typ/typ/fakes/tests/ |
H A D | test_result_server_fake_test.py | 30 resp = host.fetch(url, 'foo=bar')
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_eke.c | 200 struct wpabuf *resp; local 205 resp = eap_eke_build_msg(data, id, 4, EAP_EKE_FAILURE); 206 if (resp) 207 wpabuf_put_be32(resp, failure_code); 217 return resp; 227 struct wpabuf *resp; local 323 resp = eap_eke_build_msg(data, id, 326 if (resp == NULL) { 331 wpabuf_put_u8(resp, 1); /* NumProposals */ 332 wpabuf_put_u8(resp, 361 struct wpabuf *resp; local 507 struct wpabuf *resp; local 654 struct wpabuf *resp; local [all...] |
H A D | eap_tnc.c | 91 struct wpabuf *resp; local 113 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, 115 if (resp == NULL) 118 wpabuf_put_u8(resp, flags); /* Flags */ 120 wpabuf_put_be32(resp, wpabuf_len(data->out_buf)); 122 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used, 144 return resp; 206 struct wpabuf *resp; local 354 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, 356 if (resp [all...] |
H A D | eap_pax.c | 97 struct wpabuf *resp; local 100 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, 102 if (resp == NULL) 105 pax = wpabuf_put(resp, sizeof(*pax)); 112 return resp; 121 struct wpabuf *resp; local 192 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); 193 if (resp == NULL) 196 wpabuf_put_be16(resp, EAP_PAX_RAND_LEN); 197 wpabuf_put_data(resp, dat 237 struct wpabuf *resp; local 332 struct wpabuf *resp; local [all...] |
H A D | eap_peap.c | 461 * @resp: Buffer to return a pointer to the allocated response message. This 470 const struct wpabuf *req, struct wpabuf **resp, 514 *resp = eap_tlv_build_nak(eap_get_id(req), 516 return *resp == NULL ? -1 : 0; 584 *resp = eap_tlv_build_result(sm, data, crypto_tlv != NULL, 596 struct wpabuf **resp) 613 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1); 617 if (eap_tlv_process(sm, data, &iret, req, resp, 646 *resp = eap_msg_alloc( 651 if (*resp 468 eap_tlv_process(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct wpabuf *req, struct wpabuf **resp, int force_failure) argument 592 eap_peap_phase2_request(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, struct wpabuf *req, struct wpabuf **resp) argument 747 struct wpabuf *resp = NULL; local 972 struct wpabuf *resp; local [all...] |
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | browser-android.c | 33 struct wpabuf *resp; local 48 resp = wpabuf_alloc(1); 49 if (resp == NULL) { 61 http_request_send_and_deinit(req, resp);
|
H A D | pcsc_funcs.c | 795 unsigned char resp[3]; local 822 len = sizeof(resp); 823 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); 831 wpa_printf(MSG_WARNING, "SCARD: unexpected resp len " 836 if (resp[0] == 0x98 && resp[1] == 0x04) { 843 if (resp[0] == 0x6e) { 848 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[ 1007 unsigned char resp[3]; local 1039 unsigned char resp[3]; local 1230 unsigned char resp[3], buf[12 + 3 + 2]; local 1331 unsigned char resp[3], buf[64], *pos, *end; local [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_eke.c | 200 struct wpabuf *resp; local 205 resp = eap_eke_build_msg(data, id, 4, EAP_EKE_FAILURE); 206 if (resp) 207 wpabuf_put_be32(resp, failure_code); 217 return resp; 227 struct wpabuf *resp; local 323 resp = eap_eke_build_msg(data, id, 326 if (resp == NULL) { 331 wpabuf_put_u8(resp, 1); /* NumProposals */ 332 wpabuf_put_u8(resp, 361 struct wpabuf *resp; local 507 struct wpabuf *resp; local 654 struct wpabuf *resp; local [all...] |
H A D | eap_tnc.c | 91 struct wpabuf *resp; local 113 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, 115 if (resp == NULL) 118 wpabuf_put_u8(resp, flags); /* Flags */ 120 wpabuf_put_be32(resp, wpabuf_len(data->out_buf)); 122 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used, 144 return resp; 206 struct wpabuf *resp; local 354 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, 356 if (resp [all...] |
H A D | eap_pax.c | 97 struct wpabuf *resp; local 100 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, 102 if (resp == NULL) 105 pax = wpabuf_put(resp, sizeof(*pax)); 112 return resp; 121 struct wpabuf *resp; local 192 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); 193 if (resp == NULL) 196 wpabuf_put_be16(resp, EAP_PAX_RAND_LEN); 197 wpabuf_put_data(resp, dat 237 struct wpabuf *resp; local 332 struct wpabuf *resp; local [all...] |
/external/wpa_supplicant_8/src/utils/ |
H A D | browser-android.c | 33 struct wpabuf *resp; local 48 resp = wpabuf_alloc(1); 49 if (resp == NULL) { 61 http_request_send_and_deinit(req, resp);
|
H A D | pcsc_funcs.c | 795 unsigned char resp[3]; local 822 len = sizeof(resp); 823 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); 831 wpa_printf(MSG_WARNING, "SCARD: unexpected resp len " 836 if (resp[0] == 0x98 && resp[1] == 0x04) { 843 if (resp[0] == 0x6e) { 848 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[ 1007 unsigned char resp[3]; local 1039 unsigned char resp[3]; local 1230 unsigned char resp[3], buf[12 + 3 + 2]; local 1331 unsigned char resp[3], buf[64], *pos, *end; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | browser-android.c | 33 struct wpabuf *resp; local 48 resp = wpabuf_alloc(1); 49 if (resp == NULL) { 61 http_request_send_and_deinit(req, resp);
|
H A D | pcsc_funcs.c | 795 unsigned char resp[3]; local 822 len = sizeof(resp); 823 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); 831 wpa_printf(MSG_WARNING, "SCARD: unexpected resp len " 836 if (resp[0] == 0x98 && resp[1] == 0x04) { 843 if (resp[0] == 0x6e) { 848 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[ 1007 unsigned char resp[3]; local 1039 unsigned char resp[3]; local 1230 unsigned char resp[3], buf[12 + 3 + 2]; local 1331 unsigned char resp[3], buf[64], *pos, *end; local [all...] |
/external/chromium-trace/catapult/third_party/WebOb/docs/jsonrpc-example-code/ |
H A D | jsonrpc.py | 19 resp = self.process(req) 21 resp = exc.HTTPBadRequest(str(e)) 23 resp = e 24 return resp(environ, start_response) 111 resp = req.get_response(self.parent.proxy) 112 if resp.status_code != 200 and not ( 113 resp.status_code == 500 114 and resp.content_type == 'application/json'): 117 % (self.parent._url, resp.status), 118 resp) [all...] |
/external/elfutils/lib/ |
H A D | crc32_file.c | 40 crc32_file (int fd, uint32_t *resp) argument 68 *resp = crc32 (crc, mapped, st.st_size); 88 *resp = crc;
|
/external/robolectric/v1/src/test/java/com/xtremelabs/robolectric/shadows/ |
H A D | AndroidHttpClientTest.java | 38 HttpResponse resp = client.execute(new HttpGet("/foo")); 39 assertThat(resp.getStatusLine().getStatusCode(), is(200)); 40 assertThat(Strings.fromStream(resp.getEntity().getContent()), equalTo("foo"));
|
/external/skia/tools/lua/ |
H A D | trigger_ct_lua | 39 resp, content = httplib2.Http().request( 41 if resp['status'] != '200': 44 resp['status'], content)) 80 resp, content = httplib2.Http().request(CT_GET_SKP_REPOS_URL, "GET") 81 if resp['status'] != '200':
|
/external/chromium-trace/catapult/third_party/WebOb/docs/wiki-example-code/ |
H A D | example.py | 69 resp = meth(req, page) 71 resp = e 72 return resp(environ, start_response) 97 resp = Response(text) 99 resp.delete_cookie('message') 101 resp.last_modified = page.mtime 102 resp.conditional_response = True 103 return resp 113 resp = exc.HTTPSeeOther( 115 resp [all...] |
/external/curl/lib/ |
H A D | mk-ca-bundle.pl | 282 my $resp; 307 $resp = $ua->mirror($url, $txt); 308 if ($resp && $resp->code eq '304') { 314 if( !$resp || $resp->code !~ /^(?:200|304)$/ ) { 316 . ($resp? $resp->code . ' - ' . $resp->message : "LWP failed"); 321 my $filedate = $resp [all...] |