Searched refs:resp_data (Results 1 – 9 of 9) sorted by relevance
/external/libbrillo/brillo/http/ |
D | http_request_unittest.cc | 151 std::string resp_data{"FooBar response body"}; in TEST_F() local 153 [&resp_data](void* buffer, Unused, size_t* read, Unused) -> bool { in TEST_F() 154 memcpy(buffer, resp_data.data(), resp_data.size()); in TEST_F() 155 *read = resp_data.size(); in TEST_F() 160 [](MockConnection* connection, const std::string& resp_data, in TEST_F() 175 EXPECT_EQ(resp_data, resp->ExtractDataAsString()); in TEST_F() 176 }, connection_.get(), resp_data); in TEST_F()
|
/external/u-boot/drivers/misc/ |
D | cros_ec_sandbox.c | 284 struct ec_host_response *resp_hdr, void *resp_data) in process_cmd() argument 294 struct ec_response_hello *resp = resp_data; in process_cmd() 301 struct ec_response_get_version *resp = resp_data; in process_cmd() 312 struct ec_response_vbnvcontext *resp = resp_data; in process_cmd() 351 struct ec_response_host_event_mask *resp = resp_data; in process_cmd() 364 struct ec_response_vboot_hash *resp = resp_data; in process_cmd() 399 struct ec_response_flash_protect *resp = resp_data; in process_cmd() 418 struct ec_response_flash_region_info *resp = resp_data; in process_cmd() 455 len = cros_ec_keyscan(ec, resp_data); in process_cmd() 475 void *resp_data = resp_hdr + 1; in cros_ec_sandbox_packet() local [all …]
|
/external/selinux/libselinux/src/ |
D | setrans_client.c | 135 struct iovec resp_data; in receive_response() local 163 resp_data.iov_base = data; in receive_response() 164 resp_data.iov_len = data_size; in receive_response() 166 while (((count = readv(fd, &resp_data, 1))) < 0 && (errno == EINTR)) ; in receive_response()
|
/external/selinux/mcstrans/src/ |
D | mcstransd.c | 89 struct iovec resp_data; in send_response() local 110 resp_data.iov_base = data; in send_response() 111 resp_data.iov_len = data_size; in send_response() 113 while (((count = writev(fd, &resp_data, 1)) < 0) && (errno == EINTR)); in send_response()
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_openssl_ocsp.c | 489 const uint8_t *resp_data; in check_ocsp_resp() local 519 SSL_get0_ocsp_response(ssl, &resp_data, &resp_len); in check_ocsp_resp() 520 if (resp_data == NULL || resp_len == 0) { in check_ocsp_resp() 525 wpa_hexdump(MSG_DEBUG, "OpenSSL: OCSP response", resp_data, resp_len); in check_ocsp_resp() 527 resp = d2i_OCSPResponse(NULL, &resp_data, resp_len); in check_ocsp_resp()
|
/external/curl/tests/ |
D | smbserver.py | 172 resp_data = "" 220 resp_data = "" 224 resp_cmd["Data"] = resp_data
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_proxy_qmi_oc.c | 1096 u8 *resp_data; in handle_qmi_eap_reply() local 1144 eap_proxy->qmi_resp_data.eap_send_pkt_resp.resp_data = in handle_qmi_eap_reply() 1147 resp_data = in handle_qmi_eap_reply() 1148 (u8 *)eap_proxy->qmi_resp_data.eap_send_pkt_resp.resp_data; in handle_qmi_eap_reply() 1150 if (NULL == resp_data) { in handle_qmi_eap_reply() 1159 os_memcpy(resp_data, in handle_qmi_eap_reply() 1165 dump_buff(resp_data, length); in handle_qmi_eap_reply() 1504 (eap_proxy->qmi_resp_data.eap_send_pkt_resp.resp_data == NULL) in eap_proxy_get_eapRespData() 1519 os_memcpy(resp->buf, eap_proxy->qmi_resp_data.eap_send_pkt_resp.resp_data, in eap_proxy_get_eapRespData() 1526 os_free(eap_proxy->qmi_resp_data.eap_send_pkt_resp.resp_data); in eap_proxy_get_eapRespData() [all …]
|
D | eap_proxy_qmi_oc.h | 92 void *resp_data; /* Pointer to the Response Packet*/ member
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_client_ocsp.c | 359 const u8 *resp_data, *sign_value, *key_hash = NULL, *responses; in tls_process_basic_ocsp_response() local 404 resp_data = hdr.payload; in tls_process_basic_ocsp_response() 486 pos = resp_data; in tls_process_basic_ocsp_response() 487 end = resp_data + resp_data_len; in tls_process_basic_ocsp_response()
|