Home
last modified time | relevance | path

Searched refs:resp (Results 1 – 25 of 237) sorted by relevance

12345678910

/external/bluetooth/bluez/tools/
Dhciattach_qualcomm.c71 command_complete_t resp; in read_command_complete() local
81 n = read_hci_event(fd, (unsigned char *)&resp, sizeof(resp)); in read_command_complete()
85 FAILIF(resp.hci_hdr.evt != EVT_CMD_COMPLETE, in read_command_complete()
87 "but 0x%02x!\n", resp.hci_hdr.evt); in read_command_complete()
89 FAILIF(resp.hci_hdr.plen < 4, /* plen >= 4 for EVT_CMD_COMPLETE */ in read_command_complete()
91 resp.hci_hdr.plen); in read_command_complete()
94 FAILIF(resp.cmd_complete.opcode != 0, in read_command_complete()
96 resp.cmd_complete.opcode); in read_command_complete()
98 return resp.status == 0 ? 0 : -1; in read_command_complete()
171 unsigned char resp[100]; /* Response */ in qualcomm_init() local
[all …]
Dhciattach_tialt.c67 command_complete_t resp; in read_command_complete() local
69 FAILIF(read_hci_event(fd, (unsigned char *)&resp, sizeof(resp)) < 0, in read_command_complete()
73 FAILIF(resp.uart_prefix != HCI_EVENT_PKT, in read_command_complete()
75 resp.uart_prefix); in read_command_complete()
77 FAILIF(resp.hci_hdr.evt != EVT_CMD_COMPLETE, /* event must be event-complete */ in read_command_complete()
79 "but 0x%02x!\n", resp.hci_hdr.evt); in read_command_complete()
81 FAILIF(resp.hci_hdr.plen < 4, /* plen >= 4 for EVT_CMD_COMPLETE */ in read_command_complete()
83 resp.hci_hdr.plen); in read_command_complete()
86 FAILIF(resp.cmd_complete.opcode != (uint16_t)opcode, in read_command_complete()
88 resp.cmd_complete.opcode, opcode); in read_command_complete()
[all …]
/external/qemu/hw/
Dgoldfish_mmc.c76 uint32_t resp[4]; member
94 QFIELD_INT32(resp[0]), in QFIELD_INT32()
95 QFIELD_INT32(resp[1]), in QFIELD_INT32()
96 QFIELD_INT32(resp[2]), in QFIELD_INT32()
97 QFIELD_INT32(resp[3]), in QFIELD_INT32()
223 s->resp[0] = 0; in goldfish_mmc_do_command()
224 s->resp[1] = 0; in goldfish_mmc_do_command()
225 s->resp[2] = 0; in goldfish_mmc_do_command()
226 s->resp[3] = 0; in goldfish_mmc_do_command()
244 s->resp[3] = 0x400E0032; in goldfish_mmc_do_command()
[all …]
/external/qemu/android/protocol/
Dcore-commands-impl.c130 _coreCmdImpl_respond(CoreCmdImpl* corecmd, UICmdRespHeader* resp, void* resp_data) in _coreCmdImpl_respond() argument
135 status = syncsocket_write(corecmd->sync_writer, resp, in _coreCmdImpl_respond()
139 if (status > 0 && resp_data != NULL && resp->resp_data_size != 0) { in _coreCmdImpl_respond()
141 resp->resp_data_size, in _coreCmdImpl_respond()
142 _coreCmdImpl_get_timeout(resp->resp_data_size)); in _coreCmdImpl_respond()
149 resp->resp_data_size, errno_str); in _coreCmdImpl_respond()
197 UICmdRespHeader resp; in _coreCmdImpl_handle_command() local
198 resp.resp_data_size = 0; in _coreCmdImpl_handle_command()
199 resp.result = qemu_net_disable; in _coreCmdImpl_handle_command()
200 _coreCmdImpl_respond(corecmd, &resp, NULL); in _coreCmdImpl_handle_command()
[all …]
Dcore-commands-proxy.c95 _coreCmdProxy_get_response(UICmdRespHeader* resp, void** resp_data) in _coreCmdProxy_get_response() argument
100 status = syncsocket_read(_coreCmdProxy.sync_reader, resp, in _coreCmdProxy_get_response()
104 if (status > 0 && resp->resp_data_size) { in _coreCmdProxy_get_response()
105 *resp_data = malloc(resp->resp_data_size); in _coreCmdProxy_get_response()
110 resp->resp_data_size, in _coreCmdProxy_get_response()
111 core_connection_get_timeout(resp->resp_data_size)); in _coreCmdProxy_get_response()
150 UICmdRespHeader resp; in corecmd_is_network_disabled() local
158 status = _coreCmdProxy_get_response(&resp, &tmp); in corecmd_is_network_disabled()
162 return resp.result; in corecmd_is_network_disabled()
169 UICmdRespHeader resp; in corecmd_get_netspeed() local
[all …]
/external/openssh/openbsd-compat/
Dgetrrsetbyname.c387 struct dns_response *resp; in parse_dns_response() local
391 resp = calloc(1, sizeof(*resp)); in parse_dns_response()
392 if (resp == NULL) in parse_dns_response()
399 memcpy(&resp->header, cp, HFIXEDSZ); in parse_dns_response()
403 resp->header.qdcount = ntohs(resp->header.qdcount); in parse_dns_response()
404 resp->header.ancount = ntohs(resp->header.ancount); in parse_dns_response()
405 resp->header.nscount = ntohs(resp->header.nscount); in parse_dns_response()
406 resp->header.arcount = ntohs(resp->header.arcount); in parse_dns_response()
409 if (resp->header.qdcount < 1) { in parse_dns_response()
410 free_dns_response(resp); in parse_dns_response()
[all …]
/external/wpa_supplicant_8/src/eap_peer/
Deap_sake.c149 struct wpabuf *resp; in eap_sake_process_identity() local
169 resp = eap_sake_build_msg(data, eap_get_id(reqData), in eap_sake_process_identity()
172 if (resp == NULL) in eap_sake_process_identity()
176 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, in eap_sake_process_identity()
181 return resp; in eap_sake_process_identity()
193 struct wpabuf *resp; in eap_sake_process_challenge() local
250 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen, in eap_sake_process_challenge()
252 if (resp == NULL) in eap_sake_process_challenge()
256 eap_sake_add_attr(resp, EAP_SAKE_AT_RAND_P, in eap_sake_process_challenge()
261 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, in eap_sake_process_challenge()
[all …]
Deap_gpsk.c260 struct wpabuf *resp; in eap_gpsk_process_gpsk_1() local
280 resp = eap_gpsk_send_gpsk_2(data, eap_get_id(reqData), in eap_gpsk_process_gpsk_1()
282 if (resp == NULL) in eap_gpsk_process_gpsk_1()
287 return resp; in eap_gpsk_process_gpsk_1()
296 struct wpabuf *resp; in eap_gpsk_send_gpsk_2() local
308 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, in eap_gpsk_send_gpsk_2()
310 if (resp == NULL) in eap_gpsk_send_gpsk_2()
313 wpabuf_put_u8(resp, EAP_GPSK_OPCODE_GPSK_2); in eap_gpsk_send_gpsk_2()
314 start = wpabuf_put(resp, 0); in eap_gpsk_send_gpsk_2()
318 wpabuf_put_be16(resp, data->id_peer_len); in eap_gpsk_send_gpsk_2()
[all …]
Deap_gtc.c49 struct wpabuf *resp; in eap_gtc_process() local
72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, in eap_gtc_process()
74 return resp; in eap_gtc_process()
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, in eap_gtc_process()
106 if (resp == NULL) in eap_gtc_process()
109 wpabuf_put_data(resp, "RESPONSE=", 9); in eap_gtc_process()
110 wpabuf_put_data(resp, identity, identity_len); in eap_gtc_process()
111 wpabuf_put_u8(resp, '\0'); in eap_gtc_process()
113 wpabuf_put_data(resp, password, password_len); in eap_gtc_process()
115 wpabuf_head_u8(resp) + sizeof(struct eap_hdr) + in eap_gtc_process()
[all …]
Deap_pax.c96 struct wpabuf *resp; in eap_pax_alloc_resp() local
99 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, in eap_pax_alloc_resp()
101 if (resp == NULL) in eap_pax_alloc_resp()
104 pax = wpabuf_put(resp, sizeof(*pax)); in eap_pax_alloc_resp()
111 return resp; in eap_pax_alloc_resp()
120 struct wpabuf *resp; in eap_pax_process_std_1() local
191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); in eap_pax_process_std_1()
192 if (resp == NULL) in eap_pax_process_std_1()
195 wpabuf_put_be16(resp, EAP_PAX_RAND_LEN); in eap_pax_process_std_1()
196 wpabuf_put_data(resp, data->rand.r.y, EAP_PAX_RAND_LEN); in eap_pax_process_std_1()
[all …]
Deap_ttls.c185 static int eap_ttls_avp_encapsulate(struct wpabuf **resp, u32 avp_code, in eap_ttls_avp_encapsulate() argument
191 msg = wpabuf_alloc(sizeof(struct ttls_avp) + wpabuf_len(*resp) + 4); in eap_ttls_avp_encapsulate()
193 wpabuf_free(*resp); in eap_ttls_avp_encapsulate()
194 *resp = NULL; in eap_ttls_avp_encapsulate()
199 pos = eap_ttls_avp_hdr(avp, avp_code, 0, mandatory, wpabuf_len(*resp)); in eap_ttls_avp_encapsulate()
200 os_memcpy(pos, wpabuf_head(*resp), wpabuf_len(*resp)); in eap_ttls_avp_encapsulate()
201 pos += wpabuf_len(*resp); in eap_ttls_avp_encapsulate()
203 wpabuf_free(*resp); in eap_ttls_avp_encapsulate()
205 *resp = msg; in eap_ttls_avp_encapsulate()
262 struct wpabuf **resp) in eap_ttls_phase2_eap_process() argument
[all …]
Deap_tnc.c86 struct wpabuf *resp; in eap_tnc_build_msg() local
108 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, in eap_tnc_build_msg()
110 if (resp == NULL) in eap_tnc_build_msg()
113 wpabuf_put_u8(resp, flags); /* Flags */ in eap_tnc_build_msg()
115 wpabuf_put_be32(resp, wpabuf_len(data->out_buf)); in eap_tnc_build_msg()
117 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used, in eap_tnc_build_msg()
139 return resp; in eap_tnc_build_msg()
201 struct wpabuf *resp; in eap_tnc_process() local
353 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, in eap_tnc_process()
355 if (resp == NULL) in eap_tnc_process()
[all …]
Deap_leap.c64 struct wpabuf *resp; in eap_leap_process_request() local
109 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, in eap_leap_process_request()
112 if (resp == NULL) in eap_leap_process_request()
114 wpabuf_put_u8(resp, LEAP_VERSION); in eap_leap_process_request()
115 wpabuf_put_u8(resp, 0); /* unused */ in eap_leap_process_request()
116 wpabuf_put_u8(resp, LEAP_RESPONSE_LEN); in eap_leap_process_request()
117 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); in eap_leap_process_request()
125 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_request()
129 return resp; in eap_leap_process_request()
138 struct wpabuf *resp; in eap_leap_process_success() local
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
Deap_sake.c154 struct wpabuf *resp; in eap_sake_process_identity() local
174 resp = eap_sake_build_msg(data, eap_get_id(reqData), in eap_sake_process_identity()
177 if (resp == NULL) in eap_sake_process_identity()
181 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, in eap_sake_process_identity()
186 return resp; in eap_sake_process_identity()
198 struct wpabuf *resp; in eap_sake_process_challenge() local
255 resp = eap_sake_build_msg(data, eap_get_id(reqData), rlen, in eap_sake_process_challenge()
257 if (resp == NULL) in eap_sake_process_challenge()
261 eap_sake_add_attr(resp, EAP_SAKE_AT_RAND_P, in eap_sake_process_challenge()
266 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, in eap_sake_process_challenge()
[all …]
Deap_gpsk.c265 struct wpabuf *resp; in eap_gpsk_process_gpsk_1() local
285 resp = eap_gpsk_send_gpsk_2(data, eap_get_id(reqData), in eap_gpsk_process_gpsk_1()
287 if (resp == NULL) in eap_gpsk_process_gpsk_1()
292 return resp; in eap_gpsk_process_gpsk_1()
301 struct wpabuf *resp; in eap_gpsk_send_gpsk_2() local
313 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, in eap_gpsk_send_gpsk_2()
315 if (resp == NULL) in eap_gpsk_send_gpsk_2()
318 wpabuf_put_u8(resp, EAP_GPSK_OPCODE_GPSK_2); in eap_gpsk_send_gpsk_2()
319 start = wpabuf_put(resp, 0); in eap_gpsk_send_gpsk_2()
323 wpabuf_put_be16(resp, data->id_peer_len); in eap_gpsk_send_gpsk_2()
[all …]
Deap_gtc.c55 struct wpabuf *resp; in eap_gtc_process() local
78 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, in eap_gtc_process()
80 return resp; in eap_gtc_process()
110 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, in eap_gtc_process()
112 if (resp == NULL) in eap_gtc_process()
115 wpabuf_put_data(resp, "RESPONSE=", 9); in eap_gtc_process()
116 wpabuf_put_data(resp, identity, identity_len); in eap_gtc_process()
117 wpabuf_put_u8(resp, '\0'); in eap_gtc_process()
119 wpabuf_put_data(resp, password, password_len); in eap_gtc_process()
121 wpabuf_head_u8(resp) + sizeof(struct eap_hdr) + in eap_gtc_process()
[all …]
Deap_pax.c103 struct wpabuf *resp; in eap_pax_alloc_resp() local
106 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, in eap_pax_alloc_resp()
108 if (resp == NULL) in eap_pax_alloc_resp()
111 pax = wpabuf_put(resp, sizeof(*pax)); in eap_pax_alloc_resp()
118 return resp; in eap_pax_alloc_resp()
127 struct wpabuf *resp; in eap_pax_process_std_1() local
198 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); in eap_pax_process_std_1()
199 if (resp == NULL) in eap_pax_process_std_1()
202 wpabuf_put_be16(resp, EAP_PAX_RAND_LEN); in eap_pax_process_std_1()
203 wpabuf_put_data(resp, data->rand.r.y, EAP_PAX_RAND_LEN); in eap_pax_process_std_1()
[all …]
Deap_tnc.c92 struct wpabuf *resp; in eap_tnc_build_msg() local
114 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, in eap_tnc_build_msg()
116 if (resp == NULL) in eap_tnc_build_msg()
119 wpabuf_put_u8(resp, flags); /* Flags */ in eap_tnc_build_msg()
121 wpabuf_put_be32(resp, wpabuf_len(data->out_buf)); in eap_tnc_build_msg()
123 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used, in eap_tnc_build_msg()
145 return resp; in eap_tnc_build_msg()
207 struct wpabuf *resp; in eap_tnc_process() local
359 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, in eap_tnc_process()
361 if (resp == NULL) in eap_tnc_process()
[all …]
Deap_leap.c69 struct wpabuf *resp; in eap_leap_process_request() local
114 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, in eap_leap_process_request()
117 if (resp == NULL) in eap_leap_process_request()
119 wpabuf_put_u8(resp, LEAP_VERSION); in eap_leap_process_request()
120 wpabuf_put_u8(resp, 0); /* unused */ in eap_leap_process_request()
121 wpabuf_put_u8(resp, LEAP_RESPONSE_LEN); in eap_leap_process_request()
122 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); in eap_leap_process_request()
130 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_request()
134 return resp; in eap_leap_process_request()
143 struct wpabuf *resp; in eap_leap_process_success() local
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server_pax.c187 struct eap_pax_hdr *resp; in eap_pax_check() local
193 if (pos == NULL || len < sizeof(*resp)) { in eap_pax_check()
199 resp = (struct eap_pax_hdr *) pos; in eap_pax_check()
204 resp->op_code, resp->flags, resp->mac_id, resp->dh_group_id, in eap_pax_check()
205 resp->public_key_id); in eap_pax_check()
207 (u8 *) (resp + 1), len - sizeof(*resp) - EAP_PAX_ICV_LEN); in eap_pax_check()
210 resp->op_code != EAP_PAX_OP_STD_2) { in eap_pax_check()
212 "ignore op %d", resp->op_code); in eap_pax_check()
217 resp->op_code != EAP_PAX_OP_ACK) { in eap_pax_check()
219 "ignore op %d", resp->op_code); in eap_pax_check()
[all …]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
Deap_pax.c192 struct eap_pax_hdr *resp; in eap_pax_check() local
198 if (pos == NULL || len < sizeof(*resp)) { in eap_pax_check()
204 resp = (struct eap_pax_hdr *) pos; in eap_pax_check()
209 resp->op_code, resp->flags, resp->mac_id, resp->dh_group_id, in eap_pax_check()
210 resp->public_key_id); in eap_pax_check()
212 (u8 *) (resp + 1), len - sizeof(*resp) - EAP_PAX_ICV_LEN); in eap_pax_check()
215 resp->op_code != EAP_PAX_OP_STD_2) { in eap_pax_check()
217 "ignore op %d", resp->op_code); in eap_pax_check()
222 resp->op_code != EAP_PAX_OP_ACK) { in eap_pax_check()
224 "ignore op %d", resp->op_code); in eap_pax_check()
[all …]
/external/chromium/net/spdy/
Dspdy_proxy_client_socket_unittest.cc423 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame()); in TEST_F() local
425 CreateMockRead(*resp, 1, true), in TEST_F()
444 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectAuthReplyFrame()); in TEST_F() local
446 CreateMockRead(*resp, 1, true), in TEST_F()
467 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame()); in TEST_F() local
469 CreateMockRead(*resp, 1, true), in TEST_F()
487 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame()); in TEST_F() local
509 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame()); in TEST_F() local
511 CreateMockRead(*resp, 1, true), in TEST_F()
532 scoped_ptr<spdy::SpdyFrame> resp(ConstructConnectReplyFrame()); in TEST_F() local
[all …]
/external/dropbear/
Dsvr-authpam.c55 struct pam_response* resp = NULL; in pamConvFunc() local
115 resp = (struct pam_response*) m_malloc(sizeof(struct pam_response)); in pamConvFunc()
116 memset(resp, 0, sizeof(struct pam_response)); in pamConvFunc()
118 resp->resp = m_strdup(userDatap->passwd); in pamConvFunc()
120 (*respp) = resp; in pamConvFunc()
141 resp = (struct pam_response*) m_malloc(sizeof(struct pam_response)); in pamConvFunc()
142 memset(resp, 0, sizeof(struct pam_response)); in pamConvFunc()
144 resp->resp = m_strdup(userDatap->user); in pamConvFunc()
146 (*respp) = resp; in pamConvFunc()
/external/wpa_supplicant_6/wpa_supplicant/src/utils/
Dpcsc_funcs.c707 unsigned char resp[3]; in _scard_select_file() local
734 len = sizeof(resp); in _scard_select_file()
735 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); in _scard_select_file()
748 if (resp[0] == 0x98 && resp[1] == 0x04) { in _scard_select_file()
755 if (resp[0] == 0x6e) { in _scard_select_file()
760 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[0] != 0x61) { in _scard_select_file()
762 "(expected 0x61, 0x6c, or 0x9f)", resp[0]); in _scard_select_file()
766 get_resp[4] = resp[1]; in _scard_select_file()
768 resp[1]); in _scard_select_file()
773 *buf_len = resp[1] < rlen ? resp[1] : rlen; in _scard_select_file()
[all …]
/external/wpa_supplicant_8/src/utils/
Dpcsc_funcs.c701 unsigned char resp[3]; in _scard_select_file() local
728 len = sizeof(resp); in _scard_select_file()
729 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); in _scard_select_file()
742 if (resp[0] == 0x98 && resp[1] == 0x04) { in _scard_select_file()
749 if (resp[0] == 0x6e) { in _scard_select_file()
754 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[0] != 0x61) { in _scard_select_file()
756 "(expected 0x61, 0x6c, or 0x9f)", resp[0]); in _scard_select_file()
760 get_resp[4] = resp[1]; in _scard_select_file()
762 resp[1]); in _scard_select_file()
767 *buf_len = resp[1] < rlen ? resp[1] : rlen; in _scard_select_file()
[all …]

12345678910