/external/wpa_supplicant_8/wpa_supplicant/ |
D | p2p_supplicant_sd.c | 183 static void wpas_sd_add_empty(struct wpabuf *resp, u8 srv_proto, in wpas_sd_add_empty() argument 188 if (wpabuf_tailroom(resp) < 5) in wpas_sd_add_empty() 192 len_pos = wpabuf_put(resp, 2); in wpas_sd_add_empty() 193 wpabuf_put_u8(resp, srv_proto); in wpas_sd_add_empty() 194 wpabuf_put_u8(resp, srv_trans_id); in wpas_sd_add_empty() 196 wpabuf_put_u8(resp, status); in wpas_sd_add_empty() 198 WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos - 2); in wpas_sd_add_empty() 202 static void wpas_sd_add_proto_not_avail(struct wpabuf *resp, u8 srv_proto, in wpas_sd_add_proto_not_avail() argument 205 wpas_sd_add_empty(resp, srv_proto, srv_trans_id, in wpas_sd_add_proto_not_avail() 210 static void wpas_sd_add_bad_request(struct wpabuf *resp, u8 srv_proto, in wpas_sd_add_bad_request() argument [all …]
|
/external/openssh/openbsd-compat/ |
D | getrrsetbyname.c | 387 struct dns_response *resp; in parse_dns_response() local 391 resp = calloc(1, sizeof(*resp)); in parse_dns_response() 392 if (resp == NULL) in parse_dns_response() 399 memcpy(&resp->header, cp, HFIXEDSZ); in parse_dns_response() 403 resp->header.qdcount = ntohs(resp->header.qdcount); in parse_dns_response() 404 resp->header.ancount = ntohs(resp->header.ancount); in parse_dns_response() 405 resp->header.nscount = ntohs(resp->header.nscount); in parse_dns_response() 406 resp->header.arcount = ntohs(resp->header.arcount); in parse_dns_response() 409 if (resp->header.qdcount < 1) { in parse_dns_response() 410 free_dns_response(resp); in parse_dns_response() [all …]
|
D | getrrsetbyname.c.orig | 385 struct dns_response *resp; 389 resp = calloc(1, sizeof(*resp)); 390 if (resp == NULL) 397 memcpy(&resp->header, cp, HFIXEDSZ); 401 resp->header.qdcount = ntohs(resp->header.qdcount); 402 resp->header.ancount = ntohs(resp->header.ancount); 403 resp->header.nscount = ntohs(resp->header.nscount); 404 resp->header.arcount = ntohs(resp->header.arcount); 407 if (resp->header.qdcount < 1) { 408 free_dns_response(resp); [all …]
|
/external/robolectric/src/test/java/com/xtremelabs/robolectric/tester/org/apache/http/ |
D | TestHttpResponseTest.java | 19 HttpResponse resp = in shouldSupportGetFirstHeader() local 23 assertThat(resp.getFirstHeader("None"), nullValue()); in shouldSupportGetFirstHeader() 27 assertThat(resp.getFirstHeader(l).getValue(), equalTo("http://bar.com")); in shouldSupportGetFirstHeader() 33 HttpResponse resp = in shouldSupportGetLastHeader() local 38 assertThat(resp.getLastHeader("None"), nullValue()); in shouldSupportGetLastHeader() 41 assertThat(resp.getLastHeader(l).getValue(), equalTo("http://zombo.com")); in shouldSupportGetLastHeader() 47 HttpResponse resp = in shouldSupportContainsHeader() local 51 assertThat(resp.containsHeader("X-Zombo-Com"), is(true)); in shouldSupportContainsHeader() 52 assertThat(resp.containsHeader("Location"), is(false)); in shouldSupportContainsHeader() 57 HttpResponse resp = in shouldSupportHeaderIterator() local [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_eke.c | 200 struct wpabuf *resp; in eap_eke_build_fail() local 205 resp = eap_eke_build_msg(data, id, 4, EAP_EKE_FAILURE); in eap_eke_build_fail() 206 if (resp) in eap_eke_build_fail() 207 wpabuf_put_be32(resp, failure_code); in eap_eke_build_fail() 217 return resp; in eap_eke_build_fail() 227 struct wpabuf *resp; in eap_eke_process_id() local 323 resp = eap_eke_build_msg(data, id, in eap_eke_process_id() 326 if (resp == NULL) { in eap_eke_process_id() 331 wpabuf_put_u8(resp, 1); /* NumProposals */ in eap_eke_process_id() 332 wpabuf_put_u8(resp, 0); /* Reserved */ in eap_eke_process_id() [all …]
|
D | eap_sake.c | 149 struct wpabuf *resp; in eap_sake_process_identity() local 169 resp = eap_sake_build_msg(data, id, 2 + data->peerid_len, in eap_sake_process_identity() 171 if (resp == NULL) in eap_sake_process_identity() 175 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, in eap_sake_process_identity() 180 return resp; in eap_sake_process_identity() 192 struct wpabuf *resp; in eap_sake_process_challenge() local 249 resp = eap_sake_build_msg(data, id, rlen, EAP_SAKE_SUBTYPE_CHALLENGE); in eap_sake_process_challenge() 250 if (resp == NULL) in eap_sake_process_challenge() 254 eap_sake_add_attr(resp, EAP_SAKE_AT_RAND_P, in eap_sake_process_challenge() 259 eap_sake_add_attr(resp, EAP_SAKE_AT_PEERID, in eap_sake_process_challenge() [all …]
|
D | eap_gpsk.c | 283 struct wpabuf *resp; in eap_gpsk_process_gpsk_1() local 304 resp = eap_gpsk_send_gpsk_2(data, identifier, in eap_gpsk_process_gpsk_1() 306 if (resp == NULL) in eap_gpsk_process_gpsk_1() 311 return resp; in eap_gpsk_process_gpsk_1() 320 struct wpabuf *resp; in eap_gpsk_send_gpsk_2() local 332 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, in eap_gpsk_send_gpsk_2() 334 if (resp == NULL) in eap_gpsk_send_gpsk_2() 337 wpabuf_put_u8(resp, EAP_GPSK_OPCODE_GPSK_2); in eap_gpsk_send_gpsk_2() 338 start = wpabuf_put(resp, 0); in eap_gpsk_send_gpsk_2() 342 wpabuf_put_be16(resp, data->id_peer_len); in eap_gpsk_send_gpsk_2() [all …]
|
D | eap_gtc.c | 49 struct wpabuf *resp; in eap_gtc_process() local 72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, in eap_gtc_process() 74 return resp; in eap_gtc_process() 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, in eap_gtc_process() 106 if (resp == NULL) in eap_gtc_process() 109 wpabuf_put_data(resp, "RESPONSE=", 9); in eap_gtc_process() 110 wpabuf_put_data(resp, identity, identity_len); in eap_gtc_process() 111 wpabuf_put_u8(resp, '\0'); in eap_gtc_process() 113 wpabuf_put_data(resp, password, password_len); in eap_gtc_process() 115 wpabuf_head_u8(resp) + sizeof(struct eap_hdr) + in eap_gtc_process() [all …]
|
D | eap_pax.c | 97 struct wpabuf *resp; in eap_pax_alloc_resp() local 100 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, in eap_pax_alloc_resp() 102 if (resp == NULL) in eap_pax_alloc_resp() 105 pax = wpabuf_put(resp, sizeof(*pax)); in eap_pax_alloc_resp() 112 return resp; in eap_pax_alloc_resp() 121 struct wpabuf *resp; in eap_pax_process_std_1() local 192 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); in eap_pax_process_std_1() 193 if (resp == NULL) in eap_pax_process_std_1() 196 wpabuf_put_be16(resp, EAP_PAX_RAND_LEN); in eap_pax_process_std_1() 197 wpabuf_put_data(resp, data->rand.r.y, EAP_PAX_RAND_LEN); in eap_pax_process_std_1() [all …]
|
D | eap_tnc.c | 86 struct wpabuf *resp; in eap_tnc_build_msg() local 108 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, plen, in eap_tnc_build_msg() 110 if (resp == NULL) in eap_tnc_build_msg() 113 wpabuf_put_u8(resp, flags); /* Flags */ in eap_tnc_build_msg() 115 wpabuf_put_be32(resp, wpabuf_len(data->out_buf)); in eap_tnc_build_msg() 117 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used, in eap_tnc_build_msg() 139 return resp; in eap_tnc_build_msg() 201 struct wpabuf *resp; in eap_tnc_process() local 354 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, in eap_tnc_process() 356 if (resp == NULL) in eap_tnc_process() [all …]
|
D | eap_ttls.c | 197 static int eap_ttls_avp_encapsulate(struct wpabuf **resp, u32 avp_code, in eap_ttls_avp_encapsulate() argument 203 msg = wpabuf_alloc(sizeof(struct ttls_avp) + wpabuf_len(*resp) + 4); in eap_ttls_avp_encapsulate() 205 wpabuf_free(*resp); in eap_ttls_avp_encapsulate() 206 *resp = NULL; in eap_ttls_avp_encapsulate() 211 pos = eap_ttls_avp_hdr(avp, avp_code, 0, mandatory, wpabuf_len(*resp)); in eap_ttls_avp_encapsulate() 212 os_memcpy(pos, wpabuf_head(*resp), wpabuf_len(*resp)); in eap_ttls_avp_encapsulate() 213 pos += wpabuf_len(*resp); in eap_ttls_avp_encapsulate() 215 wpabuf_free(*resp); in eap_ttls_avp_encapsulate() 217 *resp = msg; in eap_ttls_avp_encapsulate() 289 struct wpabuf **resp) in eap_ttls_phase2_eap_process() argument [all …]
|
D | eap_leap.c | 64 struct wpabuf *resp; in eap_leap_process_request() local 109 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, in eap_leap_process_request() 112 if (resp == NULL) in eap_leap_process_request() 114 wpabuf_put_u8(resp, LEAP_VERSION); in eap_leap_process_request() 115 wpabuf_put_u8(resp, 0); /* unused */ in eap_leap_process_request() 116 wpabuf_put_u8(resp, LEAP_RESPONSE_LEN); in eap_leap_process_request() 117 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); in eap_leap_process_request() 125 wpabuf_put_data(resp, identity, identity_len); in eap_leap_process_request() 129 return resp; in eap_leap_process_request() 138 struct wpabuf *resp; in eap_leap_process_success() local [all …]
|
D | eap_md5.c | 33 struct wpabuf *resp; in eap_md5_process() local 76 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, 1 + CHAP_MD5_LEN, in eap_md5_process() 78 if (resp == NULL) in eap_md5_process() 85 wpabuf_put_u8(resp, CHAP_MD5_LEN); in eap_md5_process() 87 id = eap_get_id(resp); in eap_md5_process() 88 rpos = wpabuf_put(resp, CHAP_MD5_LEN); in eap_md5_process() 93 wpabuf_free(resp); in eap_md5_process() 98 return resp; in eap_md5_process()
|
D | eap_fast.c | 420 struct wpabuf **resp) in eap_fast_phase2_request() argument 436 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1); in eap_fast_phase2_request() 456 hdr, resp)) in eap_fast_phase2_request() 473 *resp = data->phase2_method->process(sm, data->phase2_priv, &iret, in eap_fast_phase2_request() 475 if (*resp == NULL || in eap_fast_phase2_request() 487 if (*resp == NULL && config && in eap_fast_phase2_request() 492 } else if (*resp == NULL) in eap_fast_phase2_request() 564 struct wpabuf *resp = NULL; in eap_fast_process_eap_payload_tlv() local 586 if (eap_fast_phase2_request(sm, data, ret, hdr, &resp)) { in eap_fast_process_eap_payload_tlv() 592 return eap_fast_tlv_eap_payload(resp); in eap_fast_process_eap_payload_tlv() [all …]
|
D | eap_peap.c | 467 const struct wpabuf *req, struct wpabuf **resp, in eap_tlv_process() argument 511 *resp = eap_tlv_build_nak(eap_get_id(req), in eap_tlv_process() 513 return *resp == NULL ? -1 : 0; in eap_tlv_process() 581 *resp = eap_tlv_build_result(sm, data, crypto_tlv != NULL, in eap_tlv_process() 593 struct wpabuf **resp) in eap_peap_phase2_request() argument 610 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1); in eap_peap_phase2_request() 614 if (eap_tlv_process(sm, data, &iret, req, resp, in eap_peap_phase2_request() 643 *resp = eap_msg_alloc( in eap_peap_phase2_request() 648 if (*resp == NULL) { in eap_peap_phase2_request() 653 wpabuf_put_buf(*resp, buf); in eap_peap_phase2_request() [all …]
|
D | eap_mschapv2.c | 151 struct wpabuf *resp; in eap_mschapv2_challenge_reply() local 168 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_challenge_reply() 170 if (resp == NULL) in eap_mschapv2_challenge_reply() 173 ms = wpabuf_put(resp, sizeof(*ms)); in eap_mschapv2_challenge_reply() 187 wpabuf_put_u8(resp, sizeof(*r)); /* Value-Size */ in eap_mschapv2_challenge_reply() 190 r = wpabuf_put(resp, sizeof(*r)); in eap_mschapv2_challenge_reply() 198 wpabuf_free(resp); in eap_mschapv2_challenge_reply() 213 wpabuf_free(resp); in eap_mschapv2_challenge_reply() 221 wpabuf_put_data(resp, identity, identity_len); in eap_mschapv2_challenge_reply() 224 return resp; in eap_mschapv2_challenge_reply() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_pax.c | 187 struct eap_pax_hdr *resp; in eap_pax_check() local 193 if (pos == NULL || len < sizeof(*resp)) { in eap_pax_check() 199 resp = (struct eap_pax_hdr *) pos; in eap_pax_check() 204 resp->op_code, resp->flags, resp->mac_id, resp->dh_group_id, in eap_pax_check() 205 resp->public_key_id); in eap_pax_check() 207 (u8 *) (resp + 1), len - sizeof(*resp) - EAP_PAX_ICV_LEN); in eap_pax_check() 210 resp->op_code != EAP_PAX_OP_STD_2) { in eap_pax_check() 212 "ignore op %d", resp->op_code); in eap_pax_check() 217 resp->op_code != EAP_PAX_OP_ACK) { in eap_pax_check() 219 "ignore op %d", resp->op_code); in eap_pax_check() [all …]
|
D | eap_server_mschapv2.c | 243 struct eap_mschapv2_hdr *resp; in eap_mschapv2_check() local 254 resp = (struct eap_mschapv2_hdr *) pos; in eap_mschapv2_check() 256 resp->op_code != MSCHAPV2_OP_RESPONSE) { in eap_mschapv2_check() 258 "ignore op %d", resp->op_code); in eap_mschapv2_check() 263 resp->op_code != MSCHAPV2_OP_SUCCESS && in eap_mschapv2_check() 264 resp->op_code != MSCHAPV2_OP_FAILURE) { in eap_mschapv2_check() 266 "Failure - ignore op %d", resp->op_code); in eap_mschapv2_check() 271 resp->op_code != MSCHAPV2_OP_FAILURE) { in eap_mschapv2_check() 273 "- ignore op %d", resp->op_code); in eap_mschapv2_check() 285 struct eap_mschapv2_hdr *resp; in eap_mschapv2_process_response() local [all …]
|
/external/chromium-trace/trace-viewer/third_party/WebOb/webob/ |
D | dec.py | 130 resp = self.call_func(req, *args, **self.kwargs) 132 resp = exc 133 if resp is None: 135 resp = req.response 136 if isinstance(resp, text_type): 137 resp = bytes_(resp, req.charset) 138 if isinstance(resp, bytes): 139 body = resp 140 resp = req.response 141 resp.write(body) [all …]
|
/external/chromium-trace/trace-viewer/third_party/WebOb/docs/comment-example-code/ |
D | example.py | 23 resp = req.get_response(self.app) 24 if resp.content_type != 'text/html' or resp.status_code != 200: 27 return resp(environ, start_response) 29 resp.decode_content() 31 body = resp.body 34 resp.body = body 35 return resp(environ, start_response) 106 resp = exc.HTTPBadRequest('Missing parameter: %s' % e) 107 return resp 115 resp = exc.HTTPSeeOther(location=url+'#comment-area') [all …]
|
/external/wpa_supplicant_8/src/utils/ |
D | pcsc_funcs.c | 795 unsigned char resp[3]; in _scard_select_file() local 822 len = sizeof(resp); in _scard_select_file() 823 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); in _scard_select_file() 836 if (resp[0] == 0x98 && resp[1] == 0x04) { in _scard_select_file() 843 if (resp[0] == 0x6e) { in _scard_select_file() 848 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[0] != 0x61) { in _scard_select_file() 850 "(expected 0x61, 0x6c, or 0x9f)", resp[0]); in _scard_select_file() 854 get_resp[4] = resp[1]; in _scard_select_file() 856 resp[1]); in _scard_select_file() 861 *buf_len = resp[1] < rlen ? resp[1] : rlen; in _scard_select_file() [all …]
|
/external/chromium-trace/trace-viewer/third_party/WebOb/docs/jsonrpc-example-code/ |
D | jsonrpc.py | 19 resp = self.process(req) 21 resp = exc.HTTPBadRequest(str(e)) 23 resp = e 24 return resp(environ, start_response) 111 resp = req.get_response(self.parent.proxy) 112 if resp.status_code != 200 and not ( 113 resp.status_code == 500 114 and resp.content_type == 'application/json'): 117 % (self.parent._url, resp.status), 118 resp) [all …]
|
/external/chromium-trace/trace-viewer/third_party/WebOb/docs/wiki-example-code/ |
D | example.py | 69 resp = meth(req, page) 71 resp = e 72 return resp(environ, start_response) 97 resp = Response(text) 99 resp.delete_cookie('message') 101 resp.last_modified = page.mtime 102 resp.conditional_response = True 103 return resp 113 resp = exc.HTTPSeeOther( 115 resp.set_cookie('message', 'Page updated') [all …]
|
/external/tcpdump/tests/ |
D | igmpv3-queries.out | 2 IP 192.2.0.2 > 224.0.0.1: igmp query v3 [max resp time 51m12s] 3 IP 192.2.0.2 > 224.0.0.1: igmp query v3 [max resp time 51m12s] 4 IP 192.2.0.2 > 224.0.0.1: igmp query v3 [max resp time 1.0s] 5 IP 192.2.0.2 > 224.0.0.1: igmp query v3 [max resp time 1.0s] 6 IP 192.2.0.2 > 224.0.0.1: igmp query v3 [max resp time 1.0s]
|
/external/wpa_supplicant_8/src/ap/ |
D | ieee802_11.c | 251 u16 auth_alg, u16 auth_transaction, u16 resp, in send_auth_reply() argument 272 reply->u.auth.status_code = host_to_le16(resp); in send_auth_reply() 280 resp, (unsigned long) ies_len); in send_auth_reply() 696 u16 resp = WLAN_STATUS_SUCCESS; in handle_auth_sae() local 725 resp = WLAN_STATUS_UNSPECIFIED_FAILURE; in handle_auth_sae() 728 resp = sae_group_allowed(sta->sae, in handle_auth_sae() 731 if (resp != WLAN_STATUS_SUCCESS) { in handle_auth_sae() 768 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable, in handle_auth_sae() 772 if (resp == SAE_SILENTLY_DISCARD) { in handle_auth_sae() 786 if (resp != WLAN_STATUS_SUCCESS) in handle_auth_sae() [all …]
|