Searched refs:resp_len (Results 1 - 25 of 30) sorted by relevance

12

/netbsd-current/external/bsd/wpa/dist/wpa_supplicant/
H A Dctrl_iface.h20 * @resp_len: Variable to be set to the response length
21 * Returns: Response (*resp_len bytes) or %NULL on failure
27 * this. If %NULL is returned, *resp_len can be set to two special values:
28 * 1 = send "FAIL\n" response, 2 = send "OK\n" response. If *resp_len has any
32 char *buf, size_t *resp_len);
38 * @resp_len: Variable to be set to the response length
39 * Returns: Response (*resp_len bytes) or %NULL on failure
44 * freeing the buffer after this. If %NULL is returned, *resp_len can be set to
46 * *resp_len has any other value, no response is sent.
49 char *buf, size_t *resp_len);
[all...]
H A Dgas_query.c524 u16 comeback_delay, resp_len; local
626 resp_len = WPA_GET_LE16(pos);
630 if (resp_len > left) {
636 if (resp_len < left) {
639 left - resp_len, MAC2STR(sa));
643 gas_query_rx_comeback(gas, query, adv_proto, pos, resp_len,
646 gas_query_rx_initial(gas, query, adv_proto, pos, resp_len,
H A Dctrl_iface.c7239 size_t resp_len, start, requested_len; local
7263 resp_len = wpabuf_len(resp);
7265 requested_len = resp_len;
7270 if (start > resp_len)
7277 if (start + requested_len > resp_len)
7287 if (start + requested_len == resp_len) {
9918 char *buf, size_t *resp_len)
9950 *resp_len = 1;
10769 *resp_len = reply_len;
11029 char *cmd, size_t *resp_len)
9917 wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s, char *buf, size_t *resp_len) argument
11027 wpas_global_ctrl_iface_ifname(struct wpa_global *global, const char *ifname, char *cmd, size_t *resp_len) argument
11051 wpas_global_ctrl_iface_redir_p2p(struct wpa_global *global, char *buf, size_t *resp_len) argument
11139 wpas_global_ctrl_iface_redir_wfd(struct wpa_global *global, char *buf, size_t *resp_len) argument
11154 wpas_global_ctrl_iface_redir(struct wpa_global *global, char *buf, size_t *resp_len) argument
11365 wpa_supplicant_global_ctrl_iface_process(struct wpa_global *global, char *buf, size_t *resp_len) argument
[all...]
H A Dsme.c2475 u8 resp_len = 2 + WLAN_SA_QUERY_TR_ID_LEN; local
2494 if (ocv_insert_extended_oci(&ci, resp + resp_len) < 0)
2497 resp_len += OCV_OCI_EXTENDED_LEN;
2503 resp, resp_len, 0) < 0)
/netbsd-current/external/bsd/wpa/dist/hs20/client/
H A Dest.c126 size_t pkcs7_len, resp_len; local
154 resp = os_readfile("Cert/est-cacerts.txt", &resp_len);
161 pkcs7 = base64_decode((unsigned char *) resp, resp_len, &pkcs7_len);
162 if (pkcs7 && pkcs7_len < resp_len / 2) {
164 (unsigned int) pkcs7_len, (unsigned int) resp_len);
170 pkcs7 = os_malloc(resp_len);
172 os_memcpy(pkcs7, resp, resp_len);
173 pkcs7_len = resp_len;
630 size_t resp_len; local
636 resp = os_readfile("Cert/est-csrattrs.txt", &resp_len);
680 size_t buflen, resp_len, len, pkcs7_len; local
[all...]
/netbsd-current/lib/libradius/
H A Dradlib_private.h90 size_t resp_len; /* Length of response */ member in struct:rad_handle
H A Dradlib.c227 if (h->resp_len < POS_ATTRS)
230 if (len > h->resp_len)
273 (size_t)(h->resp_len - POS_ATTRS));
574 h->resp_len = rv;
576 h->resp_len = h->response[POS_LENGTH] << 8 |
688 if (h->resp_pos >= h->resp_len)
690 if (h->resp_pos + 2 > h->resp_len) {
696 if (h->resp_pos + (int)*len > h->resp_len) {
/netbsd-current/external/bsd/wpa/dist/src/utils/
H A Dhttp-utils.h56 size_t *resp_len);
H A Dhttp_curl.c1685 size_t *resp_len)
1735 if (resp_len)
1736 *resp_len = ctx->curl_buf_len;
1680 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/http/
H A Dhttp_client.c63 size_t resp_len; /* Length of response */ member in struct:ossl_http_req_ctx_st
152 return rctx->resp_len;
215 rctx->resp_len = 0;
495 if (rctx->resp_len != 0 && rctx->resp_len != len) {
498 len, rctx->resp_len);
501 rctx->resp_len = len;
528 size_t resp_len; local
729 resp_len = (size_t)strtoul(value, &line_end, 10);
736 if (!check_set_resp_len(rctx, resp_len))
[all...]
/netbsd-current/external/bsd/wpa/dist/hostapd/
H A Dhlr_auc_gw.c589 static int sim_req_auth(char *imsi, char *resp, size_t resp_len) argument
608 rend = resp + resp_len;
662 static int gsm_auth_req(char *imsi, char *resp, size_t resp_len) argument
675 rend = resp + resp_len;
734 static int aka_req_auth(char *imsi, char *resp, size_t resp_len) argument
785 end = resp + resp_len;
811 static int aka_auts(char *imsi, char *resp, size_t resp_len) argument
866 static int process_cmd(char *cmd, char *resp, size_t resp_len) argument
869 return sim_req_auth(cmd + 13, resp, resp_len);
872 return gsm_auth_req(cmd + 13, resp, resp_len);
[all...]
/netbsd-current/external/bsd/wpa/dist/src/ap/
H A Dgas_query_ap.c471 u16 comeback_delay, resp_len; local
573 resp_len = WPA_GET_LE16(pos);
577 if (resp_len > left) {
583 if (resp_len < left) {
586 left - resp_len, MAC2STR(sa));
590 gas_query_rx_comeback(gas, query, adv_proto, pos, resp_len,
593 gas_query_rx_initial(gas, query, adv_proto, pos, resp_len,
H A Dbeacon.c370 int is_p2p, size_t *resp_len)
568 *resp_len = pos - (u8 *) resp;
738 size_t i, resp_len; local
966 &resp_len);
988 ret = hostapd_drv_send_mlme_csa(hapd, resp, resp_len, noack,
1004 size_t *resp_len)
1035 return hostapd_gen_probe_resp(hapd, NULL, 0, resp_len);
1058 size_t resp_len = 0; local
1289 resp = hostapd_probe_resp_offloads(hapd, &resp_len);
1298 params->proberesp_len = resp_len;
368 hostapd_gen_probe_resp(struct hostapd_data *hapd, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) argument
1003 hostapd_probe_resp_offloads(struct hostapd_data *hapd, size_t *resp_len) argument
[all...]
/netbsd-current/external/bsd/wpa/dist/src/tls/
H A Dtlsv1_client_read.c894 u32 resp_len; local
911 resp_len = WPA_GET_BE24(pos);
913 if (end - pos < resp_len) {
916 resp_len);
920 end = pos + resp_len;
923 resp_len = WPA_GET_BE24(pos);
925 if (resp_len > end - pos) {
928 resp_len, (int) (end - pos));
932 if (!resp_len)
935 conn, pos - 3, resp_len
[all...]
/netbsd-current/external/bsd/wpa/dist/src/crypto/
H A Dtls_openssl_ocsp.c490 size_t resp_len; local
519 SSL_get0_ocsp_response(ssl, &resp_data, &resp_len);
520 if (resp_data == NULL || resp_len == 0) {
525 wpa_hexdump(MSG_DEBUG, "OpenSSL: OCSP response", resp_data, resp_len);
527 resp = d2i_OCSPResponse(NULL, &resp_data, resp_len);
/netbsd-current/sys/dev/pci/
H A Dif_bwfm_pci.h217 uint16_t resp_len; member in struct:msgbuf_ioctl_resp_hdr
H A Dif_iwm.c4377 int err, resp_len; local
4398 resp_len = iwm_rx_packet_payload_len(pkt);
4399 if (resp_len != sizeof(*resp)) {
/netbsd-current/crypto/external/bsd/openssl.old/dist/ssl/
H A Ds3_lib.c3537 if (s->ext.ocsp.resp_len == 0
3538 || s->ext.ocsp.resp_len > LONG_MAX)
3540 return (long)s->ext.ocsp.resp_len;
3545 s->ext.ocsp.resp_len = larg;
H A Dssl_lib.c774 s->ext.ocsp.resp_len = 0;
4814 if (s->ext.ocsp.resp == NULL || s->ext.ocsp.resp_len == 0)
4818 rsp = d2i_OCSP_RESPONSE(NULL, &p, (int)s->ext.ocsp.resp_len);
/netbsd-current/crypto/external/bsd/openssl/dist/ssl/
H A Ds3_lib.c3551 if (s->ext.ocsp.resp_len == 0
3552 || s->ext.ocsp.resp_len > LONG_MAX)
3554 return (long)s->ext.ocsp.resp_len;
3559 s->ext.ocsp.resp_len = larg;
H A Dssl_lib.c783 s->ext.ocsp.resp_len = 0;
5065 if (s->ext.ocsp.resp == NULL || s->ext.ocsp.resp_len == 0)
5069 rsp = d2i_OCSP_RESPONSE(NULL, &p, (int)s->ext.ocsp.resp_len);
/netbsd-current/crypto/external/bsd/openssl.old/dist/ssl/statem/
H A Dstatem_clnt.c2781 s->ext.ocsp.resp_len = 0;
2786 s->ext.ocsp.resp_len = resplen;
2826 * |ext.ocsp.resp_len| values will be set if we actually received a status
H A Dextensions.c1099 s->ext.ocsp.resp_len = 0;
/netbsd-current/crypto/external/bsd/openssl/dist/ssl/statem/
H A Dextensions.c1091 s->ext.ocsp.resp_len = 0;
H A Dstatem_clnt.c2650 s->ext.ocsp.resp_len = 0;
2654 s->ext.ocsp.resp_len = resplen;
2693 * |ext.ocsp.resp_len| values will be set if we actually received a status

Completed in 531 milliseconds

12