/external/bluetooth/bluez/tools/ |
D | hciattach_qualcomm.c | 71 command_complete_t resp; in read_command_complete() local 81 n = read_hci_event(fd, (unsigned char *)&resp, sizeof(resp)); in read_command_complete() 85 FAILIF(resp.hci_hdr.evt != EVT_CMD_COMPLETE, in read_command_complete() 87 "but 0x%02x!\n", resp.hci_hdr.evt); in read_command_complete() 89 FAILIF(resp.hci_hdr.plen < 4, /* plen >= 4 for EVT_CMD_COMPLETE */ in read_command_complete() 91 resp.hci_hdr.plen); in read_command_complete() 94 FAILIF(resp.cmd_complete.opcode != 0, in read_command_complete() 96 resp.cmd_complete.opcode); in read_command_complete() 98 return resp.status == 0 ? 0 : -1; in read_command_complete() 171 unsigned char resp[100]; /* Response */ in qualcomm_init() local [all …]
|
D | hciattach_tialt.c | 67 command_complete_t resp; in read_command_complete() local 69 FAILIF(read_hci_event(fd, (unsigned char *)&resp, sizeof(resp)) < 0, in read_command_complete() 73 FAILIF(resp.uart_prefix != HCI_EVENT_PKT, in read_command_complete() 75 resp.uart_prefix); in read_command_complete() 77 FAILIF(resp.hci_hdr.evt != EVT_CMD_COMPLETE, /* event must be event-complete */ in read_command_complete() 79 "but 0x%02x!\n", resp.hci_hdr.evt); in read_command_complete() 81 FAILIF(resp.hci_hdr.plen < 4, /* plen >= 4 for EVT_CMD_COMPLETE */ in read_command_complete() 83 resp.hci_hdr.plen); in read_command_complete() 86 FAILIF(resp.cmd_complete.opcode != (uint16_t)opcode, in read_command_complete() 88 resp.cmd_complete.opcode, opcode); in read_command_complete() [all …]
|
/external/qemu/hw/ |
D | goldfish_mmc.c | 76 uint32_t resp[4]; member 94 QFIELD_INT32(resp[0]), in QFIELD_INT32() 95 QFIELD_INT32(resp[1]), in QFIELD_INT32() 96 QFIELD_INT32(resp[2]), in QFIELD_INT32() 97 QFIELD_INT32(resp[3]), in QFIELD_INT32() 223 s->resp[0] = 0; in goldfish_mmc_do_command() 224 s->resp[1] = 0; in goldfish_mmc_do_command() 225 s->resp[2] = 0; in goldfish_mmc_do_command() 226 s->resp[3] = 0; in goldfish_mmc_do_command() 244 s->resp[3] = 0x400E0032; in goldfish_mmc_do_command() [all …]
|
/external/qemu/android/protocol/ |
D | core-commands-impl.c | 130 _coreCmdImpl_respond(CoreCmdImpl* corecmd, UICmdRespHeader* resp, void* resp_data) in _coreCmdImpl_respond() argument 135 status = syncsocket_write(corecmd->sync_writer, resp, in _coreCmdImpl_respond() 139 if (status > 0 && resp_data != NULL && resp->resp_data_size != 0) { in _coreCmdImpl_respond() 141 resp->resp_data_size, in _coreCmdImpl_respond() 142 _coreCmdImpl_get_timeout(resp->resp_data_size)); in _coreCmdImpl_respond() 149 resp->resp_data_size, errno_str); in _coreCmdImpl_respond() 197 UICmdRespHeader resp; in _coreCmdImpl_handle_command() local 198 resp.resp_data_size = 0; in _coreCmdImpl_handle_command() 199 resp.result = qemu_net_disable; in _coreCmdImpl_handle_command() 200 _coreCmdImpl_respond(corecmd, &resp, NULL); in _coreCmdImpl_handle_command() [all …]
|
D | core-commands-proxy.c | 95 _coreCmdProxy_get_response(UICmdRespHeader* resp, void** resp_data) in _coreCmdProxy_get_response() argument 100 status = syncsocket_read(_coreCmdProxy.sync_reader, resp, in _coreCmdProxy_get_response() 104 if (status > 0 && resp->resp_data_size) { in _coreCmdProxy_get_response() 105 *resp_data = malloc(resp->resp_data_size); in _coreCmdProxy_get_response() 110 resp->resp_data_size, in _coreCmdProxy_get_response() 111 core_connection_get_timeout(resp->resp_data_size)); in _coreCmdProxy_get_response() 150 UICmdRespHeader resp; in corecmd_is_network_disabled() local 158 status = _coreCmdProxy_get_response(&resp, &tmp); in corecmd_is_network_disabled() 162 return resp.result; in corecmd_is_network_disabled() 169 UICmdRespHeader resp; in corecmd_get_netspeed() local [all …]
|
/external/openssh/openbsd-compat/ |
D | getrrsetbyname.c | 387 struct dns_response *resp; in parse_dns_response() local 391 resp = calloc(1, sizeof(*resp)); in parse_dns_response() 392 if (resp == NULL) in parse_dns_response() 399 memcpy(&resp->header, cp, HFIXEDSZ); in parse_dns_response() 403 resp->header.qdcount = ntohs(resp->header.qdcount); in parse_dns_response() 404 resp->header.ancount = ntohs(resp->header.ancount); in parse_dns_response() 405 resp->header.nscount = ntohs(resp->header.nscount); in parse_dns_response() 406 resp->header.arcount = ntohs(resp->header.arcount); in parse_dns_response() 409 if (resp->header.qdcount < 1) { in parse_dns_response() 410 free_dns_response(resp); in parse_dns_response() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_sake.c | 149 struct wpabuf *resp; in eap_sake_process_identity() local 169 resp = eap_sake_build_msg(data, eap_get_id(reqData), in eap_sake_process_identity() 172 if (resp == NULL) in eap_sake_process_identity() 176 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, in eap_sake_process_identity() 181 return resp; in eap_sake_process_identity() 193 struct wpabuf *resp; in eap_sake_process_challenge() local 250 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen, in eap_sake_process_challenge() 252 if (resp == NULL) in eap_sake_process_challenge() 256 eap_sake_add_attr(resp, EAP_SAKE_AT_RAND_P, in eap_sake_process_challenge() 261 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, in eap_sake_process_challenge() [all …]
|
D | eap_gpsk.c | 260 struct wpabuf *resp; in eap_gpsk_process_gpsk_1() local 280 resp = eap_gpsk_send_gpsk_2(data, eap_get_id(reqData), in eap_gpsk_process_gpsk_1() 282 if (resp == NULL) in eap_gpsk_process_gpsk_1() 287 return resp; in eap_gpsk_process_gpsk_1() 296 struct wpabuf *resp; in eap_gpsk_send_gpsk_2() local 308 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, in eap_gpsk_send_gpsk_2() 310 if (resp == NULL) in eap_gpsk_send_gpsk_2() 313 wpabuf_put_u8(resp, EAP_GPSK_OPCODE_GPSK_2); in eap_gpsk_send_gpsk_2() 314 start = wpabuf_put(resp, 0); in eap_gpsk_send_gpsk_2() 318 wpabuf_put_be16(resp, data->id_peer_len); in eap_gpsk_send_gpsk_2() [all …]
|
D | eap_gtc.c | 49 struct wpabuf *resp; in eap_gtc_process() local 72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, in eap_gtc_process() 74 return resp; in eap_gtc_process() 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, in eap_gtc_process() 106 if (resp == NULL) in eap_gtc_process() 109 wpabuf_put_data(resp, "RESPONSE=", 9); in eap_gtc_process() 110 wpabuf_put_data(resp, identity, identity_len); in eap_gtc_process() 111 wpabuf_put_u8(resp, '\0'); in eap_gtc_process() 113 wpabuf_put_data(resp, password, password_len); in eap_gtc_process() 115 wpabuf_head_u8(resp) + sizeof(struct eap_hdr) + in eap_gtc_process() [all …]
|
D | eap_pax.c | 96 struct wpabuf *resp; in eap_pax_alloc_resp() local 99 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, in eap_pax_alloc_resp() 101 if (resp == NULL) in eap_pax_alloc_resp() 104 pax = wpabuf_put(resp, sizeof(*pax)); in eap_pax_alloc_resp() 111 return resp; in eap_pax_alloc_resp() 120 struct wpabuf *resp; in eap_pax_process_std_1() local 191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); in eap_pax_process_std_1() 192 if (resp == NULL) in eap_pax_process_std_1() 195 wpabuf_put_be16(resp, EAP_PAX_RAND_LEN); in eap_pax_process_std_1() 196 wpabuf_put_data(resp, data->rand.r.y, EAP_PAX_RAND_LEN); in eap_pax_process_std_1() [all …]
|
D | eap_ttls.c | 185 static int eap_ttls_avp_encapsulate(struct wpabuf **resp, u32 avp_code, in eap_ttls_avp_encapsulate() argument 191 msg = wpabuf_alloc(sizeof(struct ttls_avp) + wpabuf_len(*resp) + 4); in eap_ttls_avp_encapsulate() 193 wpabuf_free(*resp); in eap_ttls_avp_encapsulate() 194 *resp = NULL; in eap_ttls_avp_encapsulate() 199 pos = eap_ttls_avp_hdr(avp, avp_code, 0, mandatory, wpabuf_len(*resp)); in eap_ttls_avp_encapsulate() 200 os_memcpy(pos, wpabuf_head(*resp), wpabuf_len(*resp)); in eap_ttls_avp_encapsulate() 201 pos += wpabuf_len(*resp); in eap_ttls_avp_encapsulate() 203 wpabuf_free(*resp); in eap_ttls_avp_encapsulate() 205 *resp = msg; in eap_ttls_avp_encapsulate() 262 struct wpabuf **resp) in eap_ttls_phase2_eap_process() argument [all …]
|
D | eap_tnc.c | 86 struct wpabuf *resp; in eap_tnc_build_msg() local 108 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, in eap_tnc_build_msg() 110 if (resp == NULL) in eap_tnc_build_msg() 113 wpabuf_put_u8(resp, flags); /* Flags */ in eap_tnc_build_msg() 115 wpabuf_put_be32(resp, wpabuf_len(data->out_buf)); in eap_tnc_build_msg() 117 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used, in eap_tnc_build_msg() 139 return resp; in eap_tnc_build_msg() 201 struct wpabuf *resp; in eap_tnc_process() local 353 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, in eap_tnc_process() 355 if (resp == NULL) in eap_tnc_process() [all …]
|
D | eap_leap.c | 64 struct wpabuf *resp; in eap_leap_process_request() local 109 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, in eap_leap_process_request() 112 if (resp == NULL) in eap_leap_process_request() 114 wpabuf_put_u8(resp, LEAP_VERSION); in eap_leap_process_request() 115 wpabuf_put_u8(resp, 0); /* unused */ in eap_leap_process_request() 116 wpabuf_put_u8(resp, LEAP_RESPONSE_LEN); in eap_leap_process_request() 117 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); in eap_leap_process_request() 125 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_request() 129 return resp; in eap_leap_process_request() 138 struct wpabuf *resp; in eap_leap_process_success() local [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_sake.c | 154 struct wpabuf *resp; in eap_sake_process_identity() local 174 resp = eap_sake_build_msg(data, eap_get_id(reqData), in eap_sake_process_identity() 177 if (resp == NULL) in eap_sake_process_identity() 181 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, in eap_sake_process_identity() 186 return resp; in eap_sake_process_identity() 198 struct wpabuf *resp; in eap_sake_process_challenge() local 255 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen, in eap_sake_process_challenge() 257 if (resp == NULL) in eap_sake_process_challenge() 261 eap_sake_add_attr(resp, EAP_SAKE_AT_RAND_P, in eap_sake_process_challenge() 266 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, in eap_sake_process_challenge() [all …]
|
D | eap_gpsk.c | 265 struct wpabuf *resp; in eap_gpsk_process_gpsk_1() local 285 resp = eap_gpsk_send_gpsk_2(data, eap_get_id(reqData), in eap_gpsk_process_gpsk_1() 287 if (resp == NULL) in eap_gpsk_process_gpsk_1() 292 return resp; in eap_gpsk_process_gpsk_1() 301 struct wpabuf *resp; in eap_gpsk_send_gpsk_2() local 313 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, in eap_gpsk_send_gpsk_2() 315 if (resp == NULL) in eap_gpsk_send_gpsk_2() 318 wpabuf_put_u8(resp, EAP_GPSK_OPCODE_GPSK_2); in eap_gpsk_send_gpsk_2() 319 start = wpabuf_put(resp, 0); in eap_gpsk_send_gpsk_2() 323 wpabuf_put_be16(resp, data->id_peer_len); in eap_gpsk_send_gpsk_2() [all …]
|
D | eap_gtc.c | 55 struct wpabuf *resp; in eap_gtc_process() local 78 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, in eap_gtc_process() 80 return resp; in eap_gtc_process() 110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, in eap_gtc_process() 112 if (resp == NULL) in eap_gtc_process() 115 wpabuf_put_data(resp, "RESPONSE=", 9); in eap_gtc_process() 116 wpabuf_put_data(resp, identity, identity_len); in eap_gtc_process() 117 wpabuf_put_u8(resp, '\0'); in eap_gtc_process() 119 wpabuf_put_data(resp, password, password_len); in eap_gtc_process() 121 wpabuf_head_u8(resp) + sizeof(struct eap_hdr) + in eap_gtc_process() [all …]
|
D | eap_pax.c | 103 struct wpabuf *resp; in eap_pax_alloc_resp() local 106 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, in eap_pax_alloc_resp() 108 if (resp == NULL) in eap_pax_alloc_resp() 111 pax = wpabuf_put(resp, sizeof(*pax)); in eap_pax_alloc_resp() 118 return resp; in eap_pax_alloc_resp() 127 struct wpabuf *resp; in eap_pax_process_std_1() local 198 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); in eap_pax_process_std_1() 199 if (resp == NULL) in eap_pax_process_std_1() 202 wpabuf_put_be16(resp, EAP_PAX_RAND_LEN); in eap_pax_process_std_1() 203 wpabuf_put_data(resp, data->rand.r.y, EAP_PAX_RAND_LEN); in eap_pax_process_std_1() [all …]
|
D | eap_tnc.c | 92 struct wpabuf *resp; in eap_tnc_build_msg() local 114 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, in eap_tnc_build_msg() 116 if (resp == NULL) in eap_tnc_build_msg() 119 wpabuf_put_u8(resp, flags); /* Flags */ in eap_tnc_build_msg() 121 wpabuf_put_be32(resp, wpabuf_len(data->out_buf)); in eap_tnc_build_msg() 123 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used, in eap_tnc_build_msg() 145 return resp; in eap_tnc_build_msg() 207 struct wpabuf *resp; in eap_tnc_process() local 359 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, in eap_tnc_process() 361 if (resp == NULL) in eap_tnc_process() [all …]
|
D | eap_leap.c | 69 struct wpabuf *resp; in eap_leap_process_request() local 114 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, in eap_leap_process_request() 117 if (resp == NULL) in eap_leap_process_request() 119 wpabuf_put_u8(resp, LEAP_VERSION); in eap_leap_process_request() 120 wpabuf_put_u8(resp, 0); /* unused */ in eap_leap_process_request() 121 wpabuf_put_u8(resp, LEAP_RESPONSE_LEN); in eap_leap_process_request() 122 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); in eap_leap_process_request() 130 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_request() 134 return resp; in eap_leap_process_request() 143 struct wpabuf *resp; in eap_leap_process_success() local [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_pax.c | 187 struct eap_pax_hdr *resp; in eap_pax_check() local 193 if (pos == NULL || len < sizeof(*resp)) { in eap_pax_check() 199 resp = (struct eap_pax_hdr *) pos; in eap_pax_check() 204 resp->op_code, resp->flags, resp->mac_id, resp->dh_group_id, in eap_pax_check() 205 resp->public_key_id); in eap_pax_check() 207 (u8 *) (resp + 1), len - sizeof(*resp) - EAP_PAX_ICV_LEN); in eap_pax_check() 210 resp->op_code != EAP_PAX_OP_STD_2) { in eap_pax_check() 212 "ignore op %d", resp->op_code); in eap_pax_check() 217 resp->op_code != EAP_PAX_OP_ACK) { in eap_pax_check() 219 "ignore op %d", resp->op_code); in eap_pax_check() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_pax.c | 192 struct eap_pax_hdr *resp; in eap_pax_check() local 198 if (pos == NULL || len < sizeof(*resp)) { in eap_pax_check() 204 resp = (struct eap_pax_hdr *) pos; in eap_pax_check() 209 resp->op_code, resp->flags, resp->mac_id, resp->dh_group_id, in eap_pax_check() 210 resp->public_key_id); in eap_pax_check() 212 (u8 *) (resp + 1), len - sizeof(*resp) - EAP_PAX_ICV_LEN); in eap_pax_check() 215 resp->op_code != EAP_PAX_OP_STD_2) { in eap_pax_check() 217 "ignore op %d", resp->op_code); in eap_pax_check() 222 resp->op_code != EAP_PAX_OP_ACK) { in eap_pax_check() 224 "ignore op %d", resp->op_code); in eap_pax_check() [all …]
|
/external/chromium/net/spdy/ |
D | spdy_proxy_client_socket_unittest.cc | 423 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame()); in TEST_F() local 425 CreateMockRead(*resp, 1, true), in TEST_F() 444 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectAuthReplyFrame()); in TEST_F() local 446 CreateMockRead(*resp, 1, true), in TEST_F() 467 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame()); in TEST_F() local 469 CreateMockRead(*resp, 1, true), in TEST_F() 487 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame()); in TEST_F() local 509 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame()); in TEST_F() local 511 CreateMockRead(*resp, 1, true), in TEST_F() 532 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame()); in TEST_F() local [all …]
|
/external/dropbear/ |
D | svr-authpam.c | 55 struct pam_response* resp = NULL; in pamConvFunc() local 115 resp = (struct pam_response*) m_malloc(sizeof(struct pam_response)); in pamConvFunc() 116 memset(resp, 0, sizeof(struct pam_response)); in pamConvFunc() 118 resp->resp = m_strdup(userDatap->passwd); in pamConvFunc() 120 (*respp) = resp; in pamConvFunc() 141 resp = (struct pam_response*) m_malloc(sizeof(struct pam_response)); in pamConvFunc() 142 memset(resp, 0, sizeof(struct pam_response)); in pamConvFunc() 144 resp->resp = m_strdup(userDatap->user); in pamConvFunc() 146 (*respp) = resp; in pamConvFunc()
|
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
D | pcsc_funcs.c | 707 unsigned char resp[3]; in _scard_select_file() local 734 len = sizeof(resp); in _scard_select_file() 735 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); in _scard_select_file() 748 if (resp[0] == 0x98 && resp[1] == 0x04) { in _scard_select_file() 755 if (resp[0] == 0x6e) { in _scard_select_file() 760 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[0] != 0x61) { in _scard_select_file() 762 "(expected 0x61, 0x6c, or 0x9f)", resp[0]); in _scard_select_file() 766 get_resp[4] = resp[1]; in _scard_select_file() 768 resp[1]); in _scard_select_file() 773 *buf_len = resp[1] < rlen ? resp[1] : rlen; in _scard_select_file() [all …]
|
/external/wpa_supplicant_8/src/utils/ |
D | pcsc_funcs.c | 701 unsigned char resp[3]; in _scard_select_file() local 728 len = sizeof(resp); in _scard_select_file() 729 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); in _scard_select_file() 742 if (resp[0] == 0x98 && resp[1] == 0x04) { in _scard_select_file() 749 if (resp[0] == 0x6e) { in _scard_select_file() 754 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[0] != 0x61) { in _scard_select_file() 756 "(expected 0x61, 0x6c, or 0x9f)", resp[0]); in _scard_select_file() 760 get_resp[4] = resp[1]; in _scard_select_file() 762 resp[1]); in _scard_select_file() 767 *buf_len = resp[1] < rlen ? resp[1] : rlen; in _scard_select_file() [all …]
|