/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/ |
H A D | eap_pax.c | 101 struct wpabuf *resp; local 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, 106 if (resp == NULL) 109 pax = wpabuf_put(resp, sizeof(*pax)); 116 return resp; 125 struct wpabuf *resp; local 196 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); 197 if (resp == NULL) 200 wpabuf_put_be16(resp, EAP_PAX_RAND_LEN); 201 wpabuf_put_data(resp, dat 241 struct wpabuf *resp; local 333 struct wpabuf *resp; local [all...] |
H A D | eap_psk.c | 93 struct wpabuf *resp; local 139 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK, 142 if (resp == NULL) 144 hdr2 = wpabuf_put(resp, sizeof(*hdr2)); 148 wpabuf_put_data(resp, data->id_p, data->id_p_len); 153 wpabuf_free(resp); 165 wpabuf_free(resp); 177 return resp; 187 struct wpabuf *resp; local 320 resp 380 struct wpabuf *resp = NULL; local [all...] |
H A D | eap_leap.c | 69 struct wpabuf *resp; local 114 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP, 117 if (resp == NULL) 119 wpabuf_put_u8(resp, LEAP_VERSION); 120 wpabuf_put_u8(resp, 0); /* unused */ 121 wpabuf_put_u8(resp, LEAP_RESPONSE_LEN); 122 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN); 130 wpabuf_put_data(resp, identity, identity_len); 134 return resp; 143 struct wpabuf *resp; local [all...] |
H A D | eap_mschapv2.c | 156 struct wpabuf *resp; local 173 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, 175 if (resp == NULL) 178 ms = wpabuf_put(resp, sizeof(*ms)); 192 wpabuf_put_u8(resp, sizeof(*r)); /* Value-Size */ 195 r = wpabuf_put(resp, sizeof(*r)); 203 wpabuf_free(resp); 218 wpabuf_free(resp); 226 wpabuf_put_data(resp, identity, identity_len); 229 return resp; 348 struct wpabuf *resp; local 505 struct wpabuf *resp; local 636 struct wpabuf *resp; local [all...] |
H A D | eap_peap.c | 453 * @resp: Buffer to return a pointer to the allocated response message. This 462 const struct wpabuf *req, struct wpabuf **resp, 506 *resp = eap_tlv_build_nak(eap_get_id(req), 508 return *resp == NULL ? -1 : 0; 576 *resp = eap_tlv_build_result(sm, data, crypto_tlv != NULL, 615 struct wpabuf **resp) 632 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1); 636 if (eap_tlv_process(sm, data, &iret, req, resp, 665 *resp = eap_msg_alloc( 670 if (*resp 460 eap_tlv_process(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct wpabuf *req, struct wpabuf **resp, int force_failure) argument 611 eap_peap_phase2_request(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, struct wpabuf *req, struct wpabuf **resp) argument 765 struct wpabuf *resp = NULL; local 1038 struct wpabuf *resp; local [all...] |
H A D | eap_vendor_test.c | 75 struct wpabuf *resp; local 125 resp = eap_msg_alloc(EAP_VENDOR_ID, EAP_VENDOR_TYPE, 1, 127 if (resp == NULL) 131 wpabuf_put_u8(resp, 2); 136 wpabuf_put_u8(resp, 4); 142 return resp;
|
H A D | eap_tls.c | 85 struct wpabuf *resp, u8 id) 106 if (resp) { 111 return resp; 149 struct wpabuf *resp; local 166 resp = NULL; 168 pos, left, &resp); 171 return eap_tls_failure(sm, data, ret, res, resp, id); 178 wpabuf_free(resp); 182 return resp; 82 eap_tls_failure(struct eap_sm *sm, struct eap_tls_data *data, struct eap_method_ret *ret, int res, struct wpabuf *resp, u8 id) argument
|
H A D | eap_ttls.c | 224 static int eap_ttls_avp_encapsulate(struct wpabuf **resp, u32 avp_code, argument 230 msg = wpabuf_alloc(sizeof(struct ttls_avp) + wpabuf_len(*resp) + 4); 232 wpabuf_free(*resp); 233 *resp = NULL; 238 pos = eap_ttls_avp_hdr(avp, avp_code, 0, mandatory, wpabuf_len(*resp)); 239 os_memcpy(pos, wpabuf_head(*resp), wpabuf_len(*resp)); 240 pos += wpabuf_len(*resp); 242 wpabuf_free(*resp); 244 *resp 476 eap_ttls_phase2_eap_process(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, size_t len, struct wpabuf **resp) argument 503 eap_ttls_phase2_request_eap_method(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, size_t len, u8 method, struct wpabuf **resp) argument 575 eap_ttls_phase2_request_eap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument 638 eap_ttls_phase2_request_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 728 eap_ttls_phase2_request_mschap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 817 eap_ttls_phase2_request_pap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 878 eap_ttls_phase2_request_chap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument 961 eap_ttls_phase2_request(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument 1246 eap_ttls_encrypt_response(struct eap_sm *sm, struct eap_ttls_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1269 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct ttls_parse_avp *parse, struct wpabuf **resp) argument 1392 eap_ttls_process_tnc_start(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct ttls_parse_avp *parse, struct wpabuf **resp) argument 1431 struct wpabuf *resp = NULL; local 1522 struct wpabuf *resp; local 1800 struct wpabuf *resp; local [all...] |
H A D | eap_fast.c | 406 struct wpabuf **resp) 422 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1); 442 hdr, resp)) 458 *resp = data->phase2_method->process(sm, data->phase2_priv, &iret, 460 if (*resp == NULL || 472 if (*resp == NULL && config && 477 } else if (*resp == NULL) 549 struct wpabuf *resp = NULL; local 571 if (eap_fast_phase2_request(sm, data, ret, hdr, &resp)) { 577 return eap_fast_tlv_eap_payload(resp); 402 eap_fast_phase2_request(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument 743 struct wpabuf *resp; local 1051 eap_fast_parse_decrypted(struct wpabuf *decrypted, struct eap_fast_tlv_parse *tlv, struct wpabuf **resp) argument 1100 eap_fast_encrypt_response(struct eap_sm *sm, struct eap_fast_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument 1147 struct wpabuf *resp = NULL, *tmp; local 1496 struct wpabuf *resp; local [all...] |
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/smtp/ |
H A D | smtp_sasl_glue.c | 297 SMTP_RESP *resp; local 365 while ((resp = smtp_chat_resp(session))->code / 100 == 3) { 380 line = resp->str; 402 if (resp->code / 100 != 2) { 405 if (smtp_sasl_auth_cache && resp->code == 535) 406 smtp_sasl_auth_cache_store(smtp_sasl_auth_cache, session, resp); 408 if (var_smtp_sasl_auth_soft_bounce && resp->code / 100 == 5) 409 STR(resp->dsn_buf)[0] = '4'; 410 dsb_update(why, resp->dsn, DSB_DEF_ACTION, 412 var_procname, resp [all...] |
H A D | smtp_proto.c | 262 SMTP_RESP *resp; local 314 switch ((resp = smtp_chat_resp(session))->code / 100) { 319 STR(resp->dsn_buf)[0] = '4'; 322 return (smtp_site_fail(state, session->host, resp, 325 translit(resp->str, "\n", " "))); 345 if (resp->str[strspn(resp->str, "20 *\t\n")] == 0) { 374 words = resp->str; 412 if ((resp = smtp_chat_resp(session))->code / 100 != 2) { 413 if (resp 1115 SMTP_RESP *resp; local [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/utils/ |
H A D | pcsc_funcs.c | 707 unsigned char resp[3]; local 734 len = sizeof(resp); 735 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); 743 wpa_printf(MSG_WARNING, "SCARD: unexpected resp len " 748 if (resp[0] == 0x98 && resp[1] == 0x04) { 755 if (resp[0] == 0x6e) { 760 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[ 919 unsigned char resp[3]; local 1047 unsigned char resp[3], buf[12 + 3 + 2]; local 1147 unsigned char resp[3], buf[64], *pos, *end; local [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/ap/ |
H A D | ieee802_11.c | 255 u16 auth_alg, u16 auth_transaction, u16 resp, 276 reply->u.auth.status_code = host_to_le16(resp); 282 " auth_alg=%d auth_transaction=%d resp=%d (IE len=%lu)", 284 resp, (unsigned long) ies_len); 322 u16 resp = WLAN_STATUS_SUCCESS; local 356 resp = WLAN_REASON_MICHAEL_MIC_FAILURE; 372 resp = WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG; 380 resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION; 387 resp = WLAN_STATUS_UNSPECIFIED_FAILURE; 397 resp 253 send_auth_reply(struct hostapd_data *hapd, const u8 *dst, const u8 *bssid, u16 auth_alg, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument 617 u16 resp; local 875 u16 resp = WLAN_STATUS_SUCCESS; local 1183 struct ieee80211_mgmt resp; local 1359 struct ieee80211_mgmt *resp; local [all...] |
H A D | beacon.c | 199 struct ieee80211_mgmt *resp; local 274 resp = os_zalloc(buflen); 275 if (resp == NULL) 277 epos = ((u8 *) resp) + MAX_PROBERESP_LEN; 279 resp->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT, 281 os_memcpy(resp->da, mgmt->sa, ETH_ALEN); 282 os_memcpy(resp->sa, hapd->own_addr, ETH_ALEN); 284 os_memcpy(resp->bssid, hapd->own_addr, ETH_ALEN); 285 resp->u.probe_resp.beacon_int = 289 resp [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/libbind/dist/resolv/ |
H A D | res_findzonecut.c | 276 u_char *resp = NULL; local 291 resp = malloc(NS_MAXMSG); 292 if (resp == NULL) 302 n = do_query(statp, dname, class, ns_t_soa, resp, &msg); 373 if (ns_name_uncompress(resp, ns_msg_end(msg), rdata, 384 free(resp); 405 if (resp != NULL) 406 free(resp); 414 u_char *resp; local 418 resp 446 u_char *resp; local 672 do_query(res_state statp, const char *dname, ns_class class, ns_type qtype, u_char *resp, ns_msg *msg) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/ |
H A D | spnego.c | 411 const NegTokenResp * resp, 428 resp, &buf_len); 480 NegTokenResp resp; local 483 resp.negState = malloc(sizeof(*resp.negState)); 484 if (resp.negState == NULL) { 488 *(resp.negState) = reject; 490 resp.supportedMech = NULL; 491 resp.responseToken = NULL; 492 resp 410 code_NegTokenArg(OM_uint32 * minor_status, const NegTokenResp * resp, unsigned char **outbuf, size_t * outbuf_size) argument 510 NegTokenResp resp; local 1626 NegTokenResp resp; local [all...] |
/netbsd-6-1-5-RELEASE/sys/rump/librump/rumpkern/ |
H A D | cprng_stub.c | 103 uint8_t *resp, *pchar = (uint8_t *)p; local 109 resp = (uint8_t *)&res; 112 *pchar++ = resp[i];
|
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/wps/ |
H A D | http_server.c | 138 void http_request_send(struct http_request *req, struct wpabuf *resp) argument 143 (unsigned long) wpabuf_len(resp), 147 res = send(req->fd, wpabuf_head(resp), wpabuf_len(resp), 0); 151 } else if ((size_t) res < wpabuf_len(resp)) { 153 res, (unsigned long) wpabuf_len(resp)); 157 wpabuf_free(resp); 162 struct wpabuf *resp) 164 http_request_send(req, resp); 161 http_request_send_and_deinit(struct http_request *req, struct wpabuf *resp) argument
|
/netbsd-6-1-5-RELEASE/sys/dev/sdmmc/ |
H A D | sdmmc_mem.c | 189 sdmmc_response resp; local 205 error = sdmmc_mem_send_cid(sc, &resp); 231 memcpy(sf->raw_cid, resp, sizeof(sf->raw_cid)); 269 error = sdmmc_mem_send_csd(sc, sf, &resp); 275 if (sdmmc_decode_csd(sc, resp, sf) != 0 || 291 sdmmc_decode_csd(struct sdmmc_softc *sc, sdmmc_response resp, argument 317 csd->csdver = SD_CSD_CSDVER(resp); 322 csd->capacity = SD_CSD_V2_CAPACITY(resp); 324 csd->ccc = SD_CSD_CCC(resp); 329 csd->capacity = SD_CSD_CAPACITY(resp); 375 sdmmc_decode_cid(struct sdmmc_softc *sc, sdmmc_response resp, struct sdmmc_function *sf) argument 425 sdmmc_print_csd(sdmmc_response resp, struct sdmmc_csd *csd) argument 796 sdmmc_mem_send_cid(struct sdmmc_softc *sc, sdmmc_response *resp) argument 821 sdmmc_mem_send_csd(struct sdmmc_softc *sc, struct sdmmc_function *sf, sdmmc_response *resp) argument 926 sdmmc_response resp; local [all...] |
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_radius/ |
H A D | pam_radius.c | 195 struct pam_response *resp; local 249 if ((retval = conv->conv(num_msgs, msg_ptrs, &resp, 252 if (build_access_request(radh, user, resp[num_msgs-1].resp, NULL, 255 memset(resp[num_msgs-1].resp, 0, strlen(resp[num_msgs-1].resp)); 256 free(resp[num_msgs-1].resp); [all...] |
/netbsd-6-1-5-RELEASE/include/rpc/ |
H A D | clnt.h | 199 * CLNT_CALL(rh, proc, xargs, argsp, xres, resp, timeout) 205 * caddr_t resp; 208 #define CLNT_CALL(rh, proc, xargs, argsp, xres, resp, secs) \ 211 (caddr_t)(void *)resp, secs)) 212 #define clnt_call(rh, proc, xargs, argsp, xres, resp, secs) \ 215 (caddr_t)(void *)resp, secs)) 236 * CLNT_FREERES(rh, xres, resp); 239 * caddr_t resp; 241 #define CLNT_FREERES(rh,xres,resp) ((*(rh)->cl_ops->cl_freeres)(rh,xres,resp)) [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | auth-pam.c | 359 struct pam_response **resp, void *data) 367 *resp = NULL; 393 reply[i].resp = buffer_get_string(&buffer, NULL); 405 reply[i].resp = buffer_get_string(&buffer, NULL); 427 *resp = reply; 432 if (reply[i].resp != NULL) 433 xfree(reply[i].resp); 563 struct pam_response **resp, void *data) 573 struct pam_response **resp, void *data) 580 *resp 358 sshpam_thread_conv(int n, sshpam_const struct pam_message **msg, struct pam_response **resp, void *data) argument 562 sshpam_null_conv(int n, sshpam_const struct pam_message **msg, struct pam_response **resp, void *data) argument 572 sshpam_store_conv(int n, sshpam_const struct pam_message **msg, struct pam_response **resp, void *data) argument 830 sshpam_respond(void *ctx, u_int num, char **resp) argument 978 sshpam_tty_conv(int n, sshpam_const struct pam_message **msg, struct pam_response **resp, void *data) argument 1137 sshpam_passwd_conv(int n, sshpam_const struct pam_message **msg, struct pam_response **resp, void *data) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/ |
H A D | ocsp.c | 107 static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, 115 static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp); 139 OCSP_RESPONSE *resp = NULL; local 703 resp = OCSP_response_create(OCSP_RESPONSE_STATUS_MALFORMEDREQUEST, NULL); 704 send_ocsp_response(cbio, resp); 774 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays); 776 send_ocsp_response(cbio, resp); 781 resp = process_responder(bio_err, req, host, path, 783 if (!resp) 798 resp 1063 make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, X509 *ca, X509 *rcert, EVP_PKEY *rkey, STACK_OF(X509) *rother, unsigned long flags, int nmin, int ndays) argument 1273 send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp) argument 1390 OCSP_RESPONSE *resp = NULL; local [all...] |
/netbsd-6-1-5-RELEASE/distrib/hp300/miniroot/ |
H A D | install.md | 46 TERM="$resp" 156 case "$resp" in 168 _secsize="$resp" 170 resp="" # force one iteration 171 while [ "X${resp}" = "X" ]; do 175 _cylinders="$resp" 178 resp="" # force one iteration 179 while [ "X${resp}" = "X" ]; do 183 _tracks_per_cyl="$resp" 185 resp [all...] |
/netbsd-6-1-5-RELEASE/sys/dev/pckbport/ |
H A D | pms.c | 105 u_char cmd[2], resp[1]; local 122 res = pckbport_enqueue_cmd(tag, slot, cmd, 1, 1, 1, resp); 125 if (resp[0] == p->response) { 139 u_char cmd[1], resp[2]; local 150 res = pckbport_poll_cmd(pa->pa_tag, pa->pa_slot, cmd, 1, 2, resp, 1); 155 if (resp[0] != PMS_RSTDONE) { 156 printf("pmsprobe: reset response 0x%x\n", resp[0]); 161 if (resp[1] != 0) { 162 aprint_debug("pmsprobe: type 0x%x\n", resp[1]); 175 u_char cmd[2], resp[ local 424 u_char cmd[1], resp[2]; local [all...] |