Home
last modified time | relevance | path

Searched refs:resp_len (Results 1 - 25 of 39) sorted by relevance

12

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/
H A Dest.c126 size_t pkcs7_len, resp_len; in est_load_cacerts() local
154 resp = os_readfile("Cert/est-cacerts.txt", &resp_len); in est_load_cacerts()
161 pkcs7 = base64_decode(resp, resp_len, &pkcs7_len); in est_load_cacerts()
162 if (pkcs7 && pkcs7_len < resp_len / 2) { in est_load_cacerts()
164 (unsigned int) pkcs7_len, (unsigned int) resp_len); in est_load_cacerts()
170 pkcs7 = os_malloc(resp_len); in est_load_cacerts()
172 os_memcpy(pkcs7, resp, resp_len); in est_load_cacerts()
173 pkcs7_len = resp_len; in est_load_cacerts()
630 size_t resp_len; in est_build_csr() local
636 resp = os_readfile("Cert/est-csrattrs.txt", &resp_len); in est_build_csr()
679 size_t buflen, resp_len, len, pkcs7_len; est_simple_enroll() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/
H A Dest.c126 size_t pkcs7_len, resp_len; in est_load_cacerts() local
154 resp = os_readfile("Cert/est-cacerts.txt", &resp_len); in est_load_cacerts()
161 pkcs7 = base64_decode((unsigned char *) resp, resp_len, &pkcs7_len); in est_load_cacerts()
162 if (pkcs7 && pkcs7_len < resp_len / 2) { in est_load_cacerts()
164 (unsigned int) pkcs7_len, (unsigned int) resp_len); in est_load_cacerts()
170 pkcs7 = os_malloc(resp_len); in est_load_cacerts()
172 os_memcpy(pkcs7, resp, resp_len); in est_load_cacerts()
173 pkcs7_len = resp_len; in est_load_cacerts()
630 size_t resp_len; in est_build_csr() local
636 resp = os_readfile("Cert/est-csrattrs.txt", &resp_len); in est_build_csr()
680 size_t buflen, resp_len, len, pkcs7_len; est_simple_enroll() local
[all...]
/third_party/backends/backend/pixma/
H A Dpixma_bjnp.c661 int resp_len) in udp_command()
717 if ((numbytes = recv (sockfd, response, resp_len, 0)) == -1) in udp_command()
748 int resp_len; in get_scanner_id() local
762 if ( ( resp_len = udp_command (dev_no, (char *) &cmd, sizeof (struct BJNP_command), in get_scanner_id()
769 PDBG (bjnp_hexdump (LOG_DEBUG2, resp_buf, resp_len)); in get_scanner_id()
1103 int resp_len; in bjnp_finish_job() local
1111 resp_len = in bjnp_finish_job()
1115 if (resp_len != sizeof (struct BJNP_command)) in bjnp_finish_job()
1120 resp_len, (int) sizeof (struct BJNP_command))); in bjnp_finish_job()
1124 PDBG (bjnp_hexdump (LOG_DEBUG2, resp_buf, resp_len)); in bjnp_finish_job()
660 udp_command(const int dev_no, char *command, int cmd_len, char *response, int resp_len) udp_command() argument
1138 int resp_len; bjnp_poll_scanner() local
1234 int resp_len; bjnp_send_job_details() local
1277 int resp_len; bjnp_get_scanner_mac_address() local
[all...]
/third_party/node/deps/openssl/openssl/crypto/http/
H A Dhttp_client.c63 size_t resp_len; /* Length of response */ member
152 return rctx->resp_len; in OSSL_HTTP_REQ_CTX_get_resp_len()
215 rctx->resp_len = 0; in OSSL_HTTP_REQ_CTX_set_request_line()
495 if (rctx->resp_len != 0 && rctx->resp_len != len) { in check_set_resp_len()
498 len, rctx->resp_len); in check_set_resp_len()
501 rctx->resp_len = len; in check_set_resp_len()
528 size_t resp_len; in OSSL_HTTP_REQ_CTX_nbio() local
729 resp_len = (size_t)strtoul(value, &line_end, 10); in OSSL_HTTP_REQ_CTX_nbio()
736 if (!check_set_resp_len(rctx, resp_len)) in OSSL_HTTP_REQ_CTX_nbio()
[all...]
/third_party/openssl/crypto/http/
H A Dhttp_client.c63 size_t resp_len; /* Length of response */ member
152 return rctx->resp_len; in OSSL_HTTP_REQ_CTX_get_resp_len()
208 rctx->resp_len = 0; in OSSL_HTTP_REQ_CTX_set_request_line()
486 if (rctx->resp_len != 0 && rctx->resp_len != len) in check_set_resp_len()
489 len, rctx->resp_len); in check_set_resp_len()
490 rctx->resp_len = len; in check_set_resp_len()
517 size_t resp_len; in OSSL_HTTP_REQ_CTX_nbio() local
718 resp_len = (size_t)strtoul(value, &line_end, 10); in OSSL_HTTP_REQ_CTX_nbio()
725 if (!check_set_resp_len(rctx, resp_len)) in OSSL_HTTP_REQ_CTX_nbio()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/
H A Dhlr_auc_gw.c589 static int sim_req_auth(char *imsi, char *resp, size_t resp_len) in sim_req_auth() argument
608 rend = resp + resp_len; in sim_req_auth()
662 static int gsm_auth_req(char *imsi, char *resp, size_t resp_len) in gsm_auth_req() argument
675 rend = resp + resp_len; in gsm_auth_req()
734 static int aka_req_auth(char *imsi, char *resp, size_t resp_len) in aka_req_auth() argument
785 end = resp + resp_len; in aka_req_auth()
811 static int aka_auts(char *imsi, char *resp, size_t resp_len) in aka_auts() argument
866 static int process_cmd(char *cmd, char *resp, size_t resp_len) in process_cmd() argument
869 return sim_req_auth(cmd + 13, resp, resp_len); in process_cmd()
872 return gsm_auth_req(cmd + 13, resp, resp_len); in process_cmd()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/
H A Dhlr_auc_gw.c589 static int sim_req_auth(char *imsi, char *resp, size_t resp_len) in sim_req_auth() argument
608 rend = resp + resp_len; in sim_req_auth()
662 static int gsm_auth_req(char *imsi, char *resp, size_t resp_len) in gsm_auth_req() argument
675 rend = resp + resp_len; in gsm_auth_req()
734 static int aka_req_auth(char *imsi, char *resp, size_t resp_len) in aka_req_auth() argument
785 end = resp + resp_len; in aka_req_auth()
811 static int aka_auts(char *imsi, char *resp, size_t resp_len) in aka_auts() argument
866 static int process_cmd(char *cmd, char *resp, size_t resp_len) in process_cmd() argument
869 return sim_req_auth(cmd + 13, resp, resp_len); in process_cmd()
872 return gsm_auth_req(cmd + 13, resp, resp_len); in process_cmd()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dctrl_iface.h20 * @resp_len: Variable to be set to the response length
21 * Returns: Response (*resp_len bytes) or %NULL on failure
27 * this. If %NULL is returned, *resp_len can be set to two special values:
28 * 1 = send "FAIL\n" response, 2 = send "OK\n" response. If *resp_len has any
32 char *buf, size_t *resp_len);
38 * @resp_len: Variable to be set to the response length
39 * Returns: Response (*resp_len bytes) or %NULL on failure
44 * freeing the buffer after this. If %NULL is returned, *resp_len can be set to
46 * *resp_len has any other value, no response is sent.
49 char *buf, size_t *resp_len);
[all...]
H A Dgas_query.c524 u16 comeback_delay, resp_len; in gas_query_rx() local
626 resp_len = WPA_GET_LE16(pos); in gas_query_rx()
630 if (resp_len > left) { in gas_query_rx()
636 if (resp_len < left) { in gas_query_rx()
639 left - resp_len, MAC2STR(sa)); in gas_query_rx()
643 gas_query_rx_comeback(gas, query, adv_proto, pos, resp_len, in gas_query_rx()
646 gas_query_rx_initial(gas, query, adv_proto, pos, resp_len, in gas_query_rx()
H A Dctrl_iface.c7301 size_t resp_len, start, requested_len; in gas_response_get() local
7325 resp_len = wpabuf_len(resp); in gas_response_get()
7327 requested_len = resp_len; in gas_response_get()
7332 if (start > resp_len) in gas_response_get()
7339 if (start + requested_len > resp_len) in gas_response_get()
7349 if (start + requested_len == resp_len) { in gas_response_get()
9983 char *buf, size_t *resp_len) in wpa_supplicant_ctrl_iface_process()
10019 *resp_len = 1; in wpa_supplicant_ctrl_iface_process()
10850 *resp_len = reply_len; in wpa_supplicant_ctrl_iface_process()
11110 char *cmd, size_t *resp_len) in wpas_global_ctrl_iface_ifname()
9982 wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s, char *buf, size_t *resp_len) wpa_supplicant_ctrl_iface_process() argument
11108 wpas_global_ctrl_iface_ifname(struct wpa_global *global, const char *ifname, char *cmd, size_t *resp_len) wpas_global_ctrl_iface_ifname() argument
11132 wpas_global_ctrl_iface_redir_p2p(struct wpa_global *global, char *buf, size_t *resp_len) wpas_global_ctrl_iface_redir_p2p() argument
11223 wpas_global_ctrl_iface_redir_wfd(struct wpa_global *global, char *buf, size_t *resp_len) wpas_global_ctrl_iface_redir_wfd() argument
11238 wpas_global_ctrl_iface_redir(struct wpa_global *global, char *buf, size_t *resp_len) wpas_global_ctrl_iface_redir() argument
11457 wpa_supplicant_global_ctrl_iface_process(struct wpa_global *global, char *buf, size_t *resp_len) wpa_supplicant_global_ctrl_iface_process() argument
[all...]
H A Dsme.c2475 u8 resp_len = 2 + WLAN_SA_QUERY_TR_ID_LEN; in sme_process_sa_query_request() local
2494 if (ocv_insert_extended_oci(&ci, resp + resp_len) < 0) in sme_process_sa_query_request()
2497 resp_len += OCV_OCI_EXTENDED_LEN; in sme_process_sa_query_request()
2503 resp, resp_len, 0) < 0) in sme_process_sa_query_request()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dgas_query_ap.c471 u16 comeback_delay, resp_len; in gas_query_ap_rx() local
573 resp_len = WPA_GET_LE16(pos); in gas_query_ap_rx()
577 if (resp_len > left) { in gas_query_ap_rx()
583 if (resp_len < left) { in gas_query_ap_rx()
586 left - resp_len, MAC2STR_SEC(sa)); in gas_query_ap_rx()
590 gas_query_rx_comeback(gas, query, adv_proto, pos, resp_len, in gas_query_ap_rx()
593 gas_query_rx_initial(gas, query, adv_proto, pos, resp_len, in gas_query_ap_rx()
H A Dbeacon.c433 int is_p2p, size_t *resp_len) in hostapd_gen_probe_resp()
637 *resp_len = pos - (u8 *) resp; in hostapd_gen_probe_resp()
848 size_t i, resp_len; in handle_probe_req() local
1081 &resp_len); in handle_probe_req()
1103 ret = hostapd_drv_send_mlme(hapd, resp, resp_len, noack, in handle_probe_req()
1119 size_t *resp_len) in hostapd_probe_resp_offloads()
1150 return hostapd_gen_probe_resp(hapd, NULL, 0, resp_len); in hostapd_probe_resp_offloads()
1431 size_t resp_len = 0; in ieee802_11_build_ap_params() local
1662 resp = hostapd_probe_resp_offloads(hapd, &resp_len); in ieee802_11_build_ap_params()
1671 params->proberesp_len = resp_len; in ieee802_11_build_ap_params()
431 hostapd_gen_probe_resp(struct hostapd_data *hapd, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) hostapd_gen_probe_resp() argument
1118 hostapd_probe_resp_offloads(struct hostapd_data *hapd, size_t *resp_len) hostapd_probe_resp_offloads() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dgas_query_ap.c471 u16 comeback_delay, resp_len; in gas_query_ap_rx() local
573 resp_len = WPA_GET_LE16(pos); in gas_query_ap_rx()
577 if (resp_len > left) { in gas_query_ap_rx()
583 if (resp_len < left) { in gas_query_ap_rx()
586 left - resp_len, MAC2STR(sa)); in gas_query_ap_rx()
590 gas_query_rx_comeback(gas, query, adv_proto, pos, resp_len, in gas_query_ap_rx()
593 gas_query_rx_initial(gas, query, adv_proto, pos, resp_len, in gas_query_ap_rx()
H A Dbeacon.c370 int is_p2p, size_t *resp_len) in hostapd_gen_probe_resp()
568 *resp_len = pos - (u8 *) resp; in hostapd_gen_probe_resp()
738 size_t i, resp_len; in handle_probe_req() local
966 &resp_len); in handle_probe_req()
988 ret = hostapd_drv_send_mlme_csa(hapd, resp, resp_len, noack, in handle_probe_req()
1004 size_t *resp_len) in hostapd_probe_resp_offloads()
1035 return hostapd_gen_probe_resp(hapd, NULL, 0, resp_len); in hostapd_probe_resp_offloads()
1058 size_t resp_len = 0; in ieee802_11_build_ap_params() local
1289 resp = hostapd_probe_resp_offloads(hapd, &resp_len); in ieee802_11_build_ap_params()
1298 params->proberesp_len = resp_len; in ieee802_11_build_ap_params()
368 hostapd_gen_probe_resp(struct hostapd_data *hapd, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) hostapd_gen_probe_resp() argument
1003 hostapd_probe_resp_offloads(struct hostapd_data *hapd, size_t *resp_len) hostapd_probe_resp_offloads() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dtlsv1_client_read.c894 u32 resp_len; in tls_process_certificate_status() local
911 resp_len = WPA_GET_BE24(pos); in tls_process_certificate_status()
913 if (end - pos < resp_len) { in tls_process_certificate_status()
916 resp_len); in tls_process_certificate_status()
920 end = pos + resp_len; in tls_process_certificate_status()
923 resp_len = WPA_GET_BE24(pos); in tls_process_certificate_status()
925 if (resp_len > end - pos) { in tls_process_certificate_status()
928 resp_len, (int) (end - pos)); in tls_process_certificate_status()
932 if (!resp_len) in tls_process_certificate_status()
935 conn, pos - 3, resp_len in tls_process_certificate_status()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_client_read.c902 u32 resp_len; in tls_process_certificate_status() local
919 resp_len = WPA_GET_BE24(pos); in tls_process_certificate_status()
921 if (end - pos < resp_len) { in tls_process_certificate_status()
924 resp_len); in tls_process_certificate_status()
928 end = pos + resp_len; in tls_process_certificate_status()
931 resp_len = WPA_GET_BE24(pos); in tls_process_certificate_status()
933 if (resp_len > end - pos) { in tls_process_certificate_status()
936 resp_len, (int) (end - pos)); in tls_process_certificate_status()
940 if (!resp_len) in tls_process_certificate_status()
943 conn, pos - 3, resp_len in tls_process_certificate_status()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dctrl_iface.h24 * @resp_len: Variable to be set to the response length
25 * Returns: Response (*resp_len bytes) or %NULL on failure
31 * this. If %NULL is returned, *resp_len can be set to two special values:
32 * 1 = send "FAIL\n" response, 2 = send "OK\n" response. If *resp_len has any
36 char *buf, size_t *resp_len);
42 * @resp_len: Variable to be set to the response length
43 * Returns: Response (*resp_len bytes) or %NULL on failure
48 * freeing the buffer after this. If %NULL is returned, *resp_len can be set to
50 * *resp_len has any other value, no response is sent.
53 char *buf, size_t *resp_len);
[all...]
H A Dgas_query.c515 u16 comeback_delay, resp_len; in gas_query_rx() local
617 resp_len = WPA_GET_LE16(pos); in gas_query_rx()
621 if (resp_len > left) { in gas_query_rx()
627 if (resp_len < left) { in gas_query_rx()
630 left - resp_len, MAC2STR_SEC(sa)); in gas_query_rx()
634 gas_query_rx_comeback(gas, query, adv_proto, pos, resp_len, in gas_query_rx()
637 gas_query_rx_initial(gas, query, adv_proto, pos, resp_len, in gas_query_rx()
H A Dctrl_iface.c8142 size_t resp_len, start, requested_len; local
8166 resp_len = wpabuf_len(resp);
8168 requested_len = resp_len;
8173 if (start > resp_len)
8180 if (start + requested_len > resp_len)
8190 if (start + requested_len == resp_len) {
12266 char *buf, size_t *resp_len)
12303 *resp_len = 1;
13270 *resp_len = reply_len;
13530 char *cmd, size_t *resp_len)
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_openssl_ocsp.c490 size_t resp_len; in check_ocsp_resp() local
519 SSL_get0_ocsp_response(ssl, &resp_data, &resp_len); in check_ocsp_resp()
520 if (resp_data == NULL || resp_len == 0) { in check_ocsp_resp()
525 wpa_hexdump(MSG_DEBUG, "OpenSSL: OCSP response", resp_data, resp_len); in check_ocsp_resp()
527 resp = d2i_OCSPResponse(NULL, &resp_data, resp_len); in check_ocsp_resp()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dtls_openssl_ocsp.c490 size_t resp_len; in check_ocsp_resp() local
519 SSL_get0_ocsp_response(ssl, &resp_data, &resp_len); in check_ocsp_resp()
520 if (resp_data == NULL || resp_len == 0) { in check_ocsp_resp()
525 wpa_hexdump(MSG_DEBUG, "OpenSSL: OCSP response", resp_data, resp_len); in check_ocsp_resp()
527 resp = d2i_OCSPResponse(NULL, &resp_data, resp_len); in check_ocsp_resp()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/
H A Dhttp-utils.h56 size_t *resp_len);
H A Dhttp_curl.c1685 size_t *resp_len) in http_post()
1735 if (resp_len) in http_post()
1736 *resp_len = ctx->curl_buf_len; in http_post()
1680 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) http_post() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/
H A Dhttp-utils.h56 size_t *resp_len);

Completed in 51 milliseconds

12