/external/chromium-trace/catapult/third_party/gsutil/gslib/commands/ |
H A D | signurl.py | 262 if response.status_code not in [200, 403, 404]: 265 return response.status_code
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/apitools/apitools/scripts/ |
H A D | oauth2l.py | 149 if response.status_code not in [httplib.OK, httplib.BAD_REQUEST]: 151 if response.status_code == httplib.BAD_REQUEST:
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/glacier/ |
H A D | vault.py | 409 def list_jobs(self, completed=None, status_code=None): 420 :type status_code: string 421 :param status_code: Specifies the type of job status to return. 429 status_code)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/protorpc/protorpc/wsgi/ |
H A D | service.py | 113 def send_rpc_error(status_code, state, message, error_name=None): 119 status_code: HTTP integer status code. 133 status_code,
|
/external/libbrillo/brillo/http/ |
H A D | http_request_unittest.cc | 163 .WillOnce(Return(status_code::Partial)); 164 EXPECT_EQ(status_code::Partial, resp->GetStatusCode());
|
H A D | http_connection_curl_unittest.cc | 289 .WillOnce(DoAll(SetArgPointee<2>(status_code::Ok), Return(CURLE_OK))); 309 .WillOnce(DoAll(SetArgPointee<2>(status_code::Ok), Return(CURLE_OK))); 310 EXPECT_EQ(status_code::Ok, connection_->GetResponseStatusCode());
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_11.c | 279 reply->u.auth.status_code = host_to_le16(resp); 723 u16 auth_transaction, u16 status_code) 730 status_code != WLAN_STATUS_SUCCESS) { 756 status_code); 759 status_code == WLAN_STATUS_ANTI_CLOGGING_TOKEN_REQ && 808 if (status_code != WLAN_STATUS_SUCCESS) 850 status_code); 851 if (status_code != WLAN_STATUS_SUCCESS) 867 auth_transaction, status_code); 868 if (status_code ! 721 handle_auth_sae(struct hostapd_data *hapd, struct sta_info *sta, const struct ieee80211_mgmt *mgmt, size_t len, u16 auth_transaction, u16 status_code) argument 928 u16 auth_alg, auth_transaction, status_code; local 1828 send_assoc_resp(struct hostapd_data *hapd, struct sta_info *sta, u16 status_code, int reassoc, const u8 *ies, size_t ies_len) argument 2622 u16 auth_alg, auth_transaction, status_code; local [all...] |
H A D | wpa_auth_ft.c | 526 rdie->status_code = host_to_le16(WLAN_STATUS_SUCCESS); 532 rdie->status_code = 543 rdie->status_code = 550 rdie->status_code = 565 rdie->status_code = 568 rdie->status_code = 586 rdie->status_code = host_to_le16(res); 598 rdie->status_code = host_to_le16(WLAN_STATUS_UNSPECIFIED_FAILURE); 1689 u16 status_code; local 1696 status_code [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_11.c | 279 reply->u.auth.status_code = host_to_le16(resp); 723 u16 auth_transaction, u16 status_code) 730 status_code != WLAN_STATUS_SUCCESS) { 756 status_code); 759 status_code == WLAN_STATUS_ANTI_CLOGGING_TOKEN_REQ && 808 if (status_code != WLAN_STATUS_SUCCESS) 850 status_code); 851 if (status_code != WLAN_STATUS_SUCCESS) 867 auth_transaction, status_code); 868 if (status_code ! 721 handle_auth_sae(struct hostapd_data *hapd, struct sta_info *sta, const struct ieee80211_mgmt *mgmt, size_t len, u16 auth_transaction, u16 status_code) argument 928 u16 auth_alg, auth_transaction, status_code; local 1828 send_assoc_resp(struct hostapd_data *hapd, struct sta_info *sta, u16 status_code, int reassoc, const u8 *ies, size_t ies_len) argument 2622 u16 auth_alg, auth_transaction, status_code; local [all...] |
H A D | wpa_auth_ft.c | 526 rdie->status_code = host_to_le16(WLAN_STATUS_SUCCESS); 532 rdie->status_code = 543 rdie->status_code = 550 rdie->status_code = 565 rdie->status_code = 568 rdie->status_code = 586 rdie->status_code = host_to_le16(res); 598 rdie->status_code = host_to_le16(WLAN_STATUS_UNSPECIFIED_FAILURE); 1689 u16 status_code; local 1696 status_code [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_11.c | 279 reply->u.auth.status_code = host_to_le16(resp); 723 u16 auth_transaction, u16 status_code) 730 status_code != WLAN_STATUS_SUCCESS) { 756 status_code); 759 status_code == WLAN_STATUS_ANTI_CLOGGING_TOKEN_REQ && 808 if (status_code != WLAN_STATUS_SUCCESS) 850 status_code); 851 if (status_code != WLAN_STATUS_SUCCESS) 867 auth_transaction, status_code); 868 if (status_code ! 721 handle_auth_sae(struct hostapd_data *hapd, struct sta_info *sta, const struct ieee80211_mgmt *mgmt, size_t len, u16 auth_transaction, u16 status_code) argument 928 u16 auth_alg, auth_transaction, status_code; local 1828 send_assoc_resp(struct hostapd_data *hapd, struct sta_info *sta, u16 status_code, int reassoc, const u8 *ies, size_t ies_len) argument 2622 u16 auth_alg, auth_transaction, status_code; local [all...] |
H A D | wpa_auth_ft.c | 526 rdie->status_code = host_to_le16(WLAN_STATUS_SUCCESS); 532 rdie->status_code = 543 rdie->status_code = 550 rdie->status_code = 565 rdie->status_code = 568 rdie->status_code = 586 rdie->status_code = host_to_le16(res); 598 rdie->status_code = host_to_le16(WLAN_STATUS_UNSPECIFIED_FAILURE); 1689 u16 status_code; local 1696 status_code [all...] |
/external/curl/lib/ |
H A D | http2.c | 106 http->status_code = -1; 266 stream->status_code */ 267 DEBUGASSERT(stream->status_code != -1); 270 if(stream->status_code / 100 != 1) { 272 stream->status_code = -1; 555 stream->status_code = decode_status_code(value, valuelen); 556 DEBUGASSERT(stream->status_code != -1); 565 stream->status_code));
|
H A D | http.h | 166 int status_code; /* HTTP status code */ member in struct:HTTP
|
/external/autotest/tko/parsers/ |
H A D | version_1.py | 26 status_code = int(lines[1]) 30 if not os.WIFEXITED(status_code): 33 elif os.WEXITSTATUS(status_code) != 0:
|
/external/chromium-trace/catapult/third_party/WebOb/docs/comment-example-code/ |
H A D | example.py | 24 if resp.content_type != 'text/html' or resp.status_code != 200:
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/cloudsearch/ |
H A D | document.py | 231 raise boto.exception.BotoServerError(self.response.status_code, '',
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/ec2/ |
H A D | test_blockdevicemapping.py | 107 self.set_http_response(status_code=200)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/emr/ |
H A D | test_connection.py | 93 self.set_http_response(status_code=200) 123 self.set_http_response(status_code=200) 135 self.set_http_response(status_code=200) 147 self.set_http_response(status_code=200)
|
/external/toybox/toys/pending/ |
H A D | dhcpd.c | 231 uint16_t status_code; member in struct:optval_status_code 1775 void *ia_addr, *status_code; local 1795 status_code = xzalloc(status_code_len); 1797 (struct optval_status_code*)status_code; 1798 (*status_code_p).status_code = htons(DHCP6_STATUS_SUCCESS); 1806 status_code = xzalloc(status_code_len); 1808 (struct optval_status_code*)status_code; 1809 (*status_code_p).status_code = htons(DHCP6_STATUS_NOADDRSAVAIL); 1835 set_optval6(ia_na_optptr, DHCP6_OPT_STATUS_CODE, status_code, 1838 free(status_code); 1903 void *ia_addr, *status_code; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | sme.c | 691 u16 status_code, const u8 *data, size_t len) 696 "status code %u", auth_transaction, status_code); 699 status_code == WLAN_STATUS_ANTI_CLOGGING_TOKEN_REQ && 734 status_code == WLAN_STATUS_FINITE_CYCLIC_GROUP_NOT_SUPPORTED && 747 if (status_code != WLAN_STATUS_SUCCESS) 824 " auth_type=%d auth_transaction=%d status_code=%d", 826 data->auth.auth_transaction, data->auth.status_code); 836 data->auth.status_code, data->auth.ies, 853 if (data->auth.status_code != WLAN_STATUS_SUCCESS) { 865 " auth_type=%u auth_transaction=%u status_code 690 sme_sae_auth(struct wpa_supplicant *wpa_s, u16 auth_transaction, u16 status_code, const u8 *data, size_t len) argument [all...] |
H A D | wmm_ac.c | 668 const u8 resp_dialog_token, const u8 status_code, 703 status_code, tsid, up, dir); 705 if (status_code != WMM_ADDTS_STATUS_ADMISSION_ACCEPTED) { 745 u8 status_code; local 788 status_code = data[1]; 811 wmm_ac_handle_addts_resp(wpa_s, sa, dialog_token, status_code, 667 wmm_ac_handle_addts_resp(struct wpa_supplicant *wpa_s, const u8 *sa, const u8 resp_dialog_token, const u8 status_code, const struct wmm_tspec_element *tspec) argument
|
/external/tcpdump/ |
H A D | print-802_11.c | 272 uint16_t status_code; member in struct:mgmt_body_t 1606 pbody.status_code = EXTRACT_LE_16BITS(p+offset); 1617 (pbody.status_code < NUM_STATUSES 1618 ? status_text[pbody.status_code] 1768 pbody.status_code = EXTRACT_LE_16BITS(p + offset); 1783 ? ((pbody.status_code < NUM_STATUSES) 1784 ? status_text[pbody.status_code] 1794 ? ((pbody.status_code < NUM_STATUSES) 1795 ? status_text[pbody.status_code]
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | ieee802_11_defs.h | 490 le16 status_code; member in struct:ieee80211_mgmt::__anon21369::__anon21370 506 le16 status_code; member in struct:ieee80211_mgmt::__anon21369::__anon21373 545 u8 status_code; member in struct:ieee80211_mgmt::__anon21369::__anon21378::__anon21379::__anon21380 566 le16 status_code; member in struct:ieee80211_mgmt::__anon21369::__anon21378::__anon21379::__anon21383 613 u8 status_code; member in struct:ieee80211_mgmt::__anon21369::__anon21378::__anon21379::__anon21391
|
/external/wpa_supplicant_8/src/common/ |
H A D | ieee802_11_defs.h | 490 le16 status_code; member in struct:ieee80211_mgmt::__anon21631::__anon21632 506 le16 status_code; member in struct:ieee80211_mgmt::__anon21631::__anon21635 545 u8 status_code; member in struct:ieee80211_mgmt::__anon21631::__anon21640::__anon21641::__anon21642 566 le16 status_code; member in struct:ieee80211_mgmt::__anon21631::__anon21640::__anon21641::__anon21645 613 u8 status_code; member in struct:ieee80211_mgmt::__anon21631::__anon21640::__anon21641::__anon21653
|