Searched refs:resp (Results 51 - 75 of 186) sorted by relevance

12345678

/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/
H A Deap_pax.c101 struct wpabuf *resp; local
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX,
106 if (resp == NULL)
109 pax = wpabuf_put(resp, sizeof(*pax));
116 return resp;
125 struct wpabuf *resp; local
196 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen);
197 if (resp == NULL)
200 wpabuf_put_be16(resp, EAP_PAX_RAND_LEN);
201 wpabuf_put_data(resp, dat
241 struct wpabuf *resp; local
333 struct wpabuf *resp; local
[all...]
H A Deap_psk.c93 struct wpabuf *resp; local
139 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PSK,
142 if (resp == NULL)
144 hdr2 = wpabuf_put(resp, sizeof(*hdr2));
148 wpabuf_put_data(resp, data->id_p, data->id_p_len);
153 wpabuf_free(resp);
165 wpabuf_free(resp);
177 return resp;
187 struct wpabuf *resp; local
320 resp
380 struct wpabuf *resp = NULL; local
[all...]
H A Deap_leap.c69 struct wpabuf *resp; local
114 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_LEAP,
117 if (resp == NULL)
119 wpabuf_put_u8(resp, LEAP_VERSION);
120 wpabuf_put_u8(resp, 0); /* unused */
121 wpabuf_put_u8(resp, LEAP_RESPONSE_LEN);
122 rpos = wpabuf_put(resp, LEAP_RESPONSE_LEN);
130 wpabuf_put_data(resp, identity, identity_len);
134 return resp;
143 struct wpabuf *resp; local
[all...]
H A Deap_mschapv2.c156 struct wpabuf *resp; local
173 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len,
175 if (resp == NULL)
178 ms = wpabuf_put(resp, sizeof(*ms));
192 wpabuf_put_u8(resp, sizeof(*r)); /* Value-Size */
195 r = wpabuf_put(resp, sizeof(*r));
203 wpabuf_free(resp);
218 wpabuf_free(resp);
226 wpabuf_put_data(resp, identity, identity_len);
229 return resp;
348 struct wpabuf *resp; local
505 struct wpabuf *resp; local
636 struct wpabuf *resp; local
[all...]
H A Deap_peap.c453 * @resp: Buffer to return a pointer to the allocated response message. This
462 const struct wpabuf *req, struct wpabuf **resp,
506 *resp = eap_tlv_build_nak(eap_get_id(req),
508 return *resp == NULL ? -1 : 0;
576 *resp = eap_tlv_build_result(sm, data, crypto_tlv != NULL,
615 struct wpabuf **resp)
632 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1);
636 if (eap_tlv_process(sm, data, &iret, req, resp,
665 *resp = eap_msg_alloc(
670 if (*resp
460 eap_tlv_process(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, const struct wpabuf *req, struct wpabuf **resp, int force_failure) argument
611 eap_peap_phase2_request(struct eap_sm *sm, struct eap_peap_data *data, struct eap_method_ret *ret, struct wpabuf *req, struct wpabuf **resp) argument
765 struct wpabuf *resp = NULL; local
1038 struct wpabuf *resp; local
[all...]
H A Deap_vendor_test.c75 struct wpabuf *resp; local
125 resp = eap_msg_alloc(EAP_VENDOR_ID, EAP_VENDOR_TYPE, 1,
127 if (resp == NULL)
131 wpabuf_put_u8(resp, 2);
136 wpabuf_put_u8(resp, 4);
142 return resp;
H A Deap_tls.c85 struct wpabuf *resp, u8 id)
106 if (resp) {
111 return resp;
149 struct wpabuf *resp; local
166 resp = NULL;
168 pos, left, &resp);
171 return eap_tls_failure(sm, data, ret, res, resp, id);
178 wpabuf_free(resp);
182 return resp;
82 eap_tls_failure(struct eap_sm *sm, struct eap_tls_data *data, struct eap_method_ret *ret, int res, struct wpabuf *resp, u8 id) argument
H A Deap_ttls.c224 static int eap_ttls_avp_encapsulate(struct wpabuf **resp, u32 avp_code, argument
230 msg = wpabuf_alloc(sizeof(struct ttls_avp) + wpabuf_len(*resp) + 4);
232 wpabuf_free(*resp);
233 *resp = NULL;
238 pos = eap_ttls_avp_hdr(avp, avp_code, 0, mandatory, wpabuf_len(*resp));
239 os_memcpy(pos, wpabuf_head(*resp), wpabuf_len(*resp));
240 pos += wpabuf_len(*resp);
242 wpabuf_free(*resp);
244 *resp
476 eap_ttls_phase2_eap_process(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, size_t len, struct wpabuf **resp) argument
503 eap_ttls_phase2_request_eap_method(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, size_t len, u8 method, struct wpabuf **resp) argument
575 eap_ttls_phase2_request_eap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument
638 eap_ttls_phase2_request_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument
728 eap_ttls_phase2_request_mschap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument
817 eap_ttls_phase2_request_pap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument
878 eap_ttls_phase2_request_chap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct wpabuf **resp) argument
961 eap_ttls_phase2_request(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument
1246 eap_ttls_encrypt_response(struct eap_sm *sm, struct eap_ttls_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument
1269 eap_ttls_process_phase2_eap(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct ttls_parse_avp *parse, struct wpabuf **resp) argument
1392 eap_ttls_process_tnc_start(struct eap_sm *sm, struct eap_ttls_data *data, struct eap_method_ret *ret, struct ttls_parse_avp *parse, struct wpabuf **resp) argument
1431 struct wpabuf *resp = NULL; local
1522 struct wpabuf *resp; local
1800 struct wpabuf *resp; local
[all...]
H A Deap_fast.c406 struct wpabuf **resp)
422 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1);
442 hdr, resp))
458 *resp = data->phase2_method->process(sm, data->phase2_priv, &iret,
460 if (*resp == NULL ||
472 if (*resp == NULL && config &&
477 } else if (*resp == NULL)
549 struct wpabuf *resp = NULL; local
571 if (eap_fast_phase2_request(sm, data, ret, hdr, &resp)) {
577 return eap_fast_tlv_eap_payload(resp);
402 eap_fast_phase2_request(struct eap_sm *sm, struct eap_fast_data *data, struct eap_method_ret *ret, struct eap_hdr *hdr, struct wpabuf **resp) argument
743 struct wpabuf *resp; local
1051 eap_fast_parse_decrypted(struct wpabuf *decrypted, struct eap_fast_tlv_parse *tlv, struct wpabuf **resp) argument
1100 eap_fast_encrypt_response(struct eap_sm *sm, struct eap_fast_data *data, struct wpabuf *resp, u8 identifier, struct wpabuf **out_data) argument
1147 struct wpabuf *resp = NULL, *tmp; local
1496 struct wpabuf *resp; local
[all...]
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/smtp/
H A Dsmtp_sasl_glue.c297 SMTP_RESP *resp; local
365 while ((resp = smtp_chat_resp(session))->code / 100 == 3) {
380 line = resp->str;
402 if (resp->code / 100 != 2) {
405 if (smtp_sasl_auth_cache && resp->code == 535)
406 smtp_sasl_auth_cache_store(smtp_sasl_auth_cache, session, resp);
408 if (var_smtp_sasl_auth_soft_bounce && resp->code / 100 == 5)
409 STR(resp->dsn_buf)[0] = '4';
410 dsb_update(why, resp->dsn, DSB_DEF_ACTION,
412 var_procname, resp
[all...]
H A Dsmtp_proto.c262 SMTP_RESP *resp; local
314 switch ((resp = smtp_chat_resp(session))->code / 100) {
319 STR(resp->dsn_buf)[0] = '4';
322 return (smtp_site_fail(state, session->host, resp,
325 translit(resp->str, "\n", " ")));
345 if (resp->str[strspn(resp->str, "20 *\t\n")] == 0) {
374 words = resp->str;
412 if ((resp = smtp_chat_resp(session))->code / 100 != 2) {
413 if (resp
1115 SMTP_RESP *resp; local
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/utils/
H A Dpcsc_funcs.c707 unsigned char resp[3]; local
734 len = sizeof(resp);
735 ret = scard_transmit(scard, cmd, cmdlen, resp, &len);
743 wpa_printf(MSG_WARNING, "SCARD: unexpected resp len "
748 if (resp[0] == 0x98 && resp[1] == 0x04) {
755 if (resp[0] == 0x6e) {
760 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[
919 unsigned char resp[3]; local
1047 unsigned char resp[3], buf[12 + 3 + 2]; local
1147 unsigned char resp[3], buf[64], *pos, *end; local
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/ap/
H A Dieee802_11.c255 u16 auth_alg, u16 auth_transaction, u16 resp,
276 reply->u.auth.status_code = host_to_le16(resp);
282 " auth_alg=%d auth_transaction=%d resp=%d (IE len=%lu)",
284 resp, (unsigned long) ies_len);
322 u16 resp = WLAN_STATUS_SUCCESS; local
356 resp = WLAN_REASON_MICHAEL_MIC_FAILURE;
372 resp = WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG;
380 resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION;
387 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
397 resp
253 send_auth_reply(struct hostapd_data *hapd, const u8 *dst, const u8 *bssid, u16 auth_alg, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument
617 u16 resp; local
875 u16 resp = WLAN_STATUS_SUCCESS; local
1183 struct ieee80211_mgmt resp; local
1359 struct ieee80211_mgmt *resp; local
[all...]
H A Dbeacon.c199 struct ieee80211_mgmt *resp; local
274 resp = os_zalloc(buflen);
275 if (resp == NULL)
277 epos = ((u8 *) resp) + MAX_PROBERESP_LEN;
279 resp->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
281 os_memcpy(resp->da, mgmt->sa, ETH_ALEN);
282 os_memcpy(resp->sa, hapd->own_addr, ETH_ALEN);
284 os_memcpy(resp->bssid, hapd->own_addr, ETH_ALEN);
285 resp->u.probe_resp.beacon_int =
289 resp
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/libbind/dist/resolv/
H A Dres_findzonecut.c276 u_char *resp = NULL; local
291 resp = malloc(NS_MAXMSG);
292 if (resp == NULL)
302 n = do_query(statp, dname, class, ns_t_soa, resp, &msg);
373 if (ns_name_uncompress(resp, ns_msg_end(msg), rdata,
384 free(resp);
405 if (resp != NULL)
406 free(resp);
414 u_char *resp; local
418 resp
446 u_char *resp; local
672 do_query(res_state statp, const char *dname, ns_class class, ns_type qtype, u_char *resp, ns_msg *msg) argument
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/
H A Dspnego.c411 const NegTokenResp * resp,
428 resp, &buf_len);
480 NegTokenResp resp; local
483 resp.negState = malloc(sizeof(*resp.negState));
484 if (resp.negState == NULL) {
488 *(resp.negState) = reject;
490 resp.supportedMech = NULL;
491 resp.responseToken = NULL;
492 resp
410 code_NegTokenArg(OM_uint32 * minor_status, const NegTokenResp * resp, unsigned char **outbuf, size_t * outbuf_size) argument
510 NegTokenResp resp; local
1626 NegTokenResp resp; local
[all...]
/netbsd-6-1-5-RELEASE/sys/rump/librump/rumpkern/
H A Dcprng_stub.c103 uint8_t *resp, *pchar = (uint8_t *)p; local
109 resp = (uint8_t *)&res;
112 *pchar++ = resp[i];
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/wps/
H A Dhttp_server.c138 void http_request_send(struct http_request *req, struct wpabuf *resp) argument
143 (unsigned long) wpabuf_len(resp),
147 res = send(req->fd, wpabuf_head(resp), wpabuf_len(resp), 0);
151 } else if ((size_t) res < wpabuf_len(resp)) {
153 res, (unsigned long) wpabuf_len(resp));
157 wpabuf_free(resp);
162 struct wpabuf *resp)
164 http_request_send(req, resp);
161 http_request_send_and_deinit(struct http_request *req, struct wpabuf *resp) argument
/netbsd-6-1-5-RELEASE/sys/dev/sdmmc/
H A Dsdmmc_mem.c189 sdmmc_response resp; local
205 error = sdmmc_mem_send_cid(sc, &resp);
231 memcpy(sf->raw_cid, resp, sizeof(sf->raw_cid));
269 error = sdmmc_mem_send_csd(sc, sf, &resp);
275 if (sdmmc_decode_csd(sc, resp, sf) != 0 ||
291 sdmmc_decode_csd(struct sdmmc_softc *sc, sdmmc_response resp, argument
317 csd->csdver = SD_CSD_CSDVER(resp);
322 csd->capacity = SD_CSD_V2_CAPACITY(resp);
324 csd->ccc = SD_CSD_CCC(resp);
329 csd->capacity = SD_CSD_CAPACITY(resp);
375 sdmmc_decode_cid(struct sdmmc_softc *sc, sdmmc_response resp, struct sdmmc_function *sf) argument
425 sdmmc_print_csd(sdmmc_response resp, struct sdmmc_csd *csd) argument
796 sdmmc_mem_send_cid(struct sdmmc_softc *sc, sdmmc_response *resp) argument
821 sdmmc_mem_send_csd(struct sdmmc_softc *sc, struct sdmmc_function *sf, sdmmc_response *resp) argument
926 sdmmc_response resp; local
[all...]
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_radius/
H A Dpam_radius.c195 struct pam_response *resp; local
249 if ((retval = conv->conv(num_msgs, msg_ptrs, &resp,
252 if (build_access_request(radh, user, resp[num_msgs-1].resp, NULL,
255 memset(resp[num_msgs-1].resp, 0, strlen(resp[num_msgs-1].resp));
256 free(resp[num_msgs-1].resp);
[all...]
/netbsd-6-1-5-RELEASE/include/rpc/
H A Dclnt.h199 * CLNT_CALL(rh, proc, xargs, argsp, xres, resp, timeout)
205 * caddr_t resp;
208 #define CLNT_CALL(rh, proc, xargs, argsp, xres, resp, secs) \
211 (caddr_t)(void *)resp, secs))
212 #define clnt_call(rh, proc, xargs, argsp, xres, resp, secs) \
215 (caddr_t)(void *)resp, secs))
236 * CLNT_FREERES(rh, xres, resp);
239 * caddr_t resp;
241 #define CLNT_FREERES(rh,xres,resp) ((*(rh)->cl_ops->cl_freeres)(rh,xres,resp))
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/
H A Dauth-pam.c359 struct pam_response **resp, void *data)
367 *resp = NULL;
393 reply[i].resp = buffer_get_string(&buffer, NULL);
405 reply[i].resp = buffer_get_string(&buffer, NULL);
427 *resp = reply;
432 if (reply[i].resp != NULL)
433 xfree(reply[i].resp);
563 struct pam_response **resp, void *data)
573 struct pam_response **resp, void *data)
580 *resp
358 sshpam_thread_conv(int n, sshpam_const struct pam_message **msg, struct pam_response **resp, void *data) argument
562 sshpam_null_conv(int n, sshpam_const struct pam_message **msg, struct pam_response **resp, void *data) argument
572 sshpam_store_conv(int n, sshpam_const struct pam_message **msg, struct pam_response **resp, void *data) argument
830 sshpam_respond(void *ctx, u_int num, char **resp) argument
978 sshpam_tty_conv(int n, sshpam_const struct pam_message **msg, struct pam_response **resp, void *data) argument
1137 sshpam_passwd_conv(int n, sshpam_const struct pam_message **msg, struct pam_response **resp, void *data) argument
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/apps/
H A Docsp.c107 static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db,
115 static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp);
139 OCSP_RESPONSE *resp = NULL; local
703 resp = OCSP_response_create(OCSP_RESPONSE_STATUS_MALFORMEDREQUEST, NULL);
704 send_ocsp_response(cbio, resp);
774 i = make_ocsp_response(&resp, req, rdb, rca_cert, rsigner, rkey, rother, rflags, nmin, ndays);
776 send_ocsp_response(cbio, resp);
781 resp = process_responder(bio_err, req, host, path,
783 if (!resp)
798 resp
1063 make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db, X509 *ca, X509 *rcert, EVP_PKEY *rkey, STACK_OF(X509) *rother, unsigned long flags, int nmin, int ndays) argument
1273 send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp) argument
1390 OCSP_RESPONSE *resp = NULL; local
[all...]
/netbsd-6-1-5-RELEASE/distrib/hp300/miniroot/
H A Dinstall.md46 TERM="$resp"
156 case "$resp" in
168 _secsize="$resp"
170 resp="" # force one iteration
171 while [ "X${resp}" = "X" ]; do
175 _cylinders="$resp"
178 resp="" # force one iteration
179 while [ "X${resp}" = "X" ]; do
183 _tracks_per_cyl="$resp"
185 resp
[all...]
/netbsd-6-1-5-RELEASE/sys/dev/pckbport/
H A Dpms.c105 u_char cmd[2], resp[1]; local
122 res = pckbport_enqueue_cmd(tag, slot, cmd, 1, 1, 1, resp);
125 if (resp[0] == p->response) {
139 u_char cmd[1], resp[2]; local
150 res = pckbport_poll_cmd(pa->pa_tag, pa->pa_slot, cmd, 1, 2, resp, 1);
155 if (resp[0] != PMS_RSTDONE) {
156 printf("pmsprobe: reset response 0x%x\n", resp[0]);
161 if (resp[1] != 0) {
162 aprint_debug("pmsprobe: type 0x%x\n", resp[1]);
175 u_char cmd[2], resp[ local
424 u_char cmd[1], resp[2]; local
[all...]

Completed in 316 milliseconds

12345678