/netbsd-current/external/bsd/wpa/dist/wpa_supplicant/ |
H A D | ctrl_iface.h | 20 * @resp_len: Variable to be set to the response length 21 * Returns: Response (*resp_len bytes) or %NULL on failure 27 * this. If %NULL is returned, *resp_len can be set to two special values: 28 * 1 = send "FAIL\n" response, 2 = send "OK\n" response. If *resp_len has any 32 char *buf, size_t *resp_len); 38 * @resp_len: Variable to be set to the response length 39 * Returns: Response (*resp_len bytes) or %NULL on failure 44 * freeing the buffer after this. If %NULL is returned, *resp_len can be set to 46 * *resp_len has any other value, no response is sent. 49 char *buf, size_t *resp_len); [all...] |
H A D | gas_query.c | 524 u16 comeback_delay, resp_len; local 626 resp_len = WPA_GET_LE16(pos); 630 if (resp_len > left) { 636 if (resp_len < left) { 639 left - resp_len, MAC2STR(sa)); 643 gas_query_rx_comeback(gas, query, adv_proto, pos, resp_len, 646 gas_query_rx_initial(gas, query, adv_proto, pos, resp_len,
|
H A D | ctrl_iface.c | 7239 size_t resp_len, start, requested_len; local 7263 resp_len = wpabuf_len(resp); 7265 requested_len = resp_len; 7270 if (start > resp_len) 7277 if (start + requested_len > resp_len) 7287 if (start + requested_len == resp_len) { 9918 char *buf, size_t *resp_len) 9950 *resp_len = 1; 10769 *resp_len = reply_len; 11029 char *cmd, size_t *resp_len) 9917 wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s, char *buf, size_t *resp_len) argument 11027 wpas_global_ctrl_iface_ifname(struct wpa_global *global, const char *ifname, char *cmd, size_t *resp_len) argument 11051 wpas_global_ctrl_iface_redir_p2p(struct wpa_global *global, char *buf, size_t *resp_len) argument 11139 wpas_global_ctrl_iface_redir_wfd(struct wpa_global *global, char *buf, size_t *resp_len) argument 11154 wpas_global_ctrl_iface_redir(struct wpa_global *global, char *buf, size_t *resp_len) argument 11365 wpa_supplicant_global_ctrl_iface_process(struct wpa_global *global, char *buf, size_t *resp_len) argument [all...] |
H A D | sme.c | 2475 u8 resp_len = 2 + WLAN_SA_QUERY_TR_ID_LEN; local 2494 if (ocv_insert_extended_oci(&ci, resp + resp_len) < 0) 2497 resp_len += OCV_OCI_EXTENDED_LEN; 2503 resp, resp_len, 0) < 0)
|
/netbsd-current/external/bsd/wpa/dist/hs20/client/ |
H A D | est.c | 126 size_t pkcs7_len, resp_len; local 154 resp = os_readfile("Cert/est-cacerts.txt", &resp_len); 161 pkcs7 = base64_decode((unsigned char *) resp, resp_len, &pkcs7_len); 162 if (pkcs7 && pkcs7_len < resp_len / 2) { 164 (unsigned int) pkcs7_len, (unsigned int) resp_len); 170 pkcs7 = os_malloc(resp_len); 172 os_memcpy(pkcs7, resp, resp_len); 173 pkcs7_len = resp_len; 630 size_t resp_len; local 636 resp = os_readfile("Cert/est-csrattrs.txt", &resp_len); 680 size_t buflen, resp_len, len, pkcs7_len; local [all...] |
/netbsd-current/lib/libradius/ |
H A D | radlib_private.h | 90 size_t resp_len; /* Length of response */ member in struct:rad_handle
|
H A D | radlib.c | 227 if (h->resp_len < POS_ATTRS) 230 if (len > h->resp_len) 273 (size_t)(h->resp_len - POS_ATTRS)); 574 h->resp_len = rv; 576 h->resp_len = h->response[POS_LENGTH] << 8 | 688 if (h->resp_pos >= h->resp_len) 690 if (h->resp_pos + 2 > h->resp_len) { 696 if (h->resp_pos + (int)*len > h->resp_len) {
|
/netbsd-current/external/bsd/wpa/dist/src/utils/ |
H A D | http-utils.h | 56 size_t *resp_len);
|
H A D | http_curl.c | 1685 size_t *resp_len) 1735 if (resp_len) 1736 *resp_len = ctx->curl_buf_len; 1680 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/http/ |
H A D | http_client.c | 63 size_t resp_len; /* Length of response */ member in struct:ossl_http_req_ctx_st 152 return rctx->resp_len; 215 rctx->resp_len = 0; 495 if (rctx->resp_len != 0 && rctx->resp_len != len) { 498 len, rctx->resp_len); 501 rctx->resp_len = len; 528 size_t resp_len; local 729 resp_len = (size_t)strtoul(value, &line_end, 10); 736 if (!check_set_resp_len(rctx, resp_len)) [all...] |
/netbsd-current/external/bsd/wpa/dist/hostapd/ |
H A D | hlr_auc_gw.c | 589 static int sim_req_auth(char *imsi, char *resp, size_t resp_len) argument 608 rend = resp + resp_len; 662 static int gsm_auth_req(char *imsi, char *resp, size_t resp_len) argument 675 rend = resp + resp_len; 734 static int aka_req_auth(char *imsi, char *resp, size_t resp_len) argument 785 end = resp + resp_len; 811 static int aka_auts(char *imsi, char *resp, size_t resp_len) argument 866 static int process_cmd(char *cmd, char *resp, size_t resp_len) argument 869 return sim_req_auth(cmd + 13, resp, resp_len); 872 return gsm_auth_req(cmd + 13, resp, resp_len); [all...] |
/netbsd-current/external/bsd/wpa/dist/src/ap/ |
H A D | gas_query_ap.c | 471 u16 comeback_delay, resp_len; local 573 resp_len = WPA_GET_LE16(pos); 577 if (resp_len > left) { 583 if (resp_len < left) { 586 left - resp_len, MAC2STR(sa)); 590 gas_query_rx_comeback(gas, query, adv_proto, pos, resp_len, 593 gas_query_rx_initial(gas, query, adv_proto, pos, resp_len,
|
H A D | beacon.c | 370 int is_p2p, size_t *resp_len) 568 *resp_len = pos - (u8 *) resp; 738 size_t i, resp_len; local 966 &resp_len); 988 ret = hostapd_drv_send_mlme_csa(hapd, resp, resp_len, noack, 1004 size_t *resp_len) 1035 return hostapd_gen_probe_resp(hapd, NULL, 0, resp_len); 1058 size_t resp_len = 0; local 1289 resp = hostapd_probe_resp_offloads(hapd, &resp_len); 1298 params->proberesp_len = resp_len; 368 hostapd_gen_probe_resp(struct hostapd_data *hapd, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) argument 1003 hostapd_probe_resp_offloads(struct hostapd_data *hapd, size_t *resp_len) argument [all...] |
/netbsd-current/external/bsd/wpa/dist/src/tls/ |
H A D | tlsv1_client_read.c | 894 u32 resp_len; local 911 resp_len = WPA_GET_BE24(pos); 913 if (end - pos < resp_len) { 916 resp_len); 920 end = pos + resp_len; 923 resp_len = WPA_GET_BE24(pos); 925 if (resp_len > end - pos) { 928 resp_len, (int) (end - pos)); 932 if (!resp_len) 935 conn, pos - 3, resp_len [all...] |
/netbsd-current/external/bsd/wpa/dist/src/crypto/ |
H A D | tls_openssl_ocsp.c | 490 size_t resp_len; local 519 SSL_get0_ocsp_response(ssl, &resp_data, &resp_len); 520 if (resp_data == NULL || resp_len == 0) { 525 wpa_hexdump(MSG_DEBUG, "OpenSSL: OCSP response", resp_data, resp_len); 527 resp = d2i_OCSPResponse(NULL, &resp_data, resp_len);
|
/netbsd-current/sys/dev/pci/ |
H A D | if_bwfm_pci.h | 217 uint16_t resp_len; member in struct:msgbuf_ioctl_resp_hdr
|
H A D | if_iwm.c | 4377 int err, resp_len; local 4398 resp_len = iwm_rx_packet_payload_len(pkt); 4399 if (resp_len != sizeof(*resp)) {
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/ssl/ |
H A D | s3_lib.c | 3537 if (s->ext.ocsp.resp_len == 0 3538 || s->ext.ocsp.resp_len > LONG_MAX) 3540 return (long)s->ext.ocsp.resp_len; 3545 s->ext.ocsp.resp_len = larg;
|
H A D | ssl_lib.c | 774 s->ext.ocsp.resp_len = 0; 4814 if (s->ext.ocsp.resp == NULL || s->ext.ocsp.resp_len == 0) 4818 rsp = d2i_OCSP_RESPONSE(NULL, &p, (int)s->ext.ocsp.resp_len);
|
/netbsd-current/crypto/external/bsd/openssl/dist/ssl/ |
H A D | s3_lib.c | 3551 if (s->ext.ocsp.resp_len == 0 3552 || s->ext.ocsp.resp_len > LONG_MAX) 3554 return (long)s->ext.ocsp.resp_len; 3559 s->ext.ocsp.resp_len = larg;
|
H A D | ssl_lib.c | 783 s->ext.ocsp.resp_len = 0; 5065 if (s->ext.ocsp.resp == NULL || s->ext.ocsp.resp_len == 0) 5069 rsp = d2i_OCSP_RESPONSE(NULL, &p, (int)s->ext.ocsp.resp_len);
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
H A D | statem_clnt.c | 2781 s->ext.ocsp.resp_len = 0; 2786 s->ext.ocsp.resp_len = resplen; 2826 * |ext.ocsp.resp_len| values will be set if we actually received a status
|
H A D | extensions.c | 1099 s->ext.ocsp.resp_len = 0;
|
/netbsd-current/crypto/external/bsd/openssl/dist/ssl/statem/ |
H A D | extensions.c | 1091 s->ext.ocsp.resp_len = 0;
|
H A D | statem_clnt.c | 2650 s->ext.ocsp.resp_len = 0; 2654 s->ext.ocsp.resp_len = resplen; 2693 * |ext.ocsp.resp_len| values will be set if we actually received a status
|