/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hs20/client/ |
H A D | est.c | 126 size_t pkcs7_len, resp_len; in est_load_cacerts() local 154 resp = os_readfile("Cert/est-cacerts.txt", &resp_len); in est_load_cacerts() 161 pkcs7 = base64_decode(resp, resp_len, &pkcs7_len); in est_load_cacerts() 162 if (pkcs7 && pkcs7_len < resp_len / 2) { in est_load_cacerts() 164 (unsigned int) pkcs7_len, (unsigned int) resp_len); in est_load_cacerts() 170 pkcs7 = os_malloc(resp_len); in est_load_cacerts() 172 os_memcpy(pkcs7, resp, resp_len); in est_load_cacerts() 173 pkcs7_len = resp_len; in est_load_cacerts() 630 size_t resp_len; in est_build_csr() local 636 resp = os_readfile("Cert/est-csrattrs.txt", &resp_len); in est_build_csr() 679 size_t buflen, resp_len, len, pkcs7_len; est_simple_enroll() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/hs20/client/ |
H A D | est.c | 126 size_t pkcs7_len, resp_len; in est_load_cacerts() local 154 resp = os_readfile("Cert/est-cacerts.txt", &resp_len); in est_load_cacerts() 161 pkcs7 = base64_decode((unsigned char *) resp, resp_len, &pkcs7_len); in est_load_cacerts() 162 if (pkcs7 && pkcs7_len < resp_len / 2) { in est_load_cacerts() 164 (unsigned int) pkcs7_len, (unsigned int) resp_len); in est_load_cacerts() 170 pkcs7 = os_malloc(resp_len); in est_load_cacerts() 172 os_memcpy(pkcs7, resp, resp_len); in est_load_cacerts() 173 pkcs7_len = resp_len; in est_load_cacerts() 630 size_t resp_len; in est_build_csr() local 636 resp = os_readfile("Cert/est-csrattrs.txt", &resp_len); in est_build_csr() 680 size_t buflen, resp_len, len, pkcs7_len; est_simple_enroll() local [all...] |
/third_party/backends/backend/pixma/ |
H A D | pixma_bjnp.c | 661 int resp_len) in udp_command() 717 if ((numbytes = recv (sockfd, response, resp_len, 0)) == -1) in udp_command() 748 int resp_len; in get_scanner_id() local 762 if ( ( resp_len = udp_command (dev_no, (char *) &cmd, sizeof (struct BJNP_command), in get_scanner_id() 769 PDBG (bjnp_hexdump (LOG_DEBUG2, resp_buf, resp_len)); in get_scanner_id() 1103 int resp_len; in bjnp_finish_job() local 1111 resp_len = in bjnp_finish_job() 1115 if (resp_len != sizeof (struct BJNP_command)) in bjnp_finish_job() 1120 resp_len, (int) sizeof (struct BJNP_command))); in bjnp_finish_job() 1124 PDBG (bjnp_hexdump (LOG_DEBUG2, resp_buf, resp_len)); in bjnp_finish_job() 660 udp_command(const int dev_no, char *command, int cmd_len, char *response, int resp_len) udp_command() argument 1138 int resp_len; bjnp_poll_scanner() local 1234 int resp_len; bjnp_send_job_details() local 1277 int resp_len; bjnp_get_scanner_mac_address() local [all...] |
/third_party/node/deps/openssl/openssl/crypto/http/ |
H A D | http_client.c | 63 size_t resp_len; /* Length of response */ member 152 return rctx->resp_len; in OSSL_HTTP_REQ_CTX_get_resp_len() 215 rctx->resp_len = 0; in OSSL_HTTP_REQ_CTX_set_request_line() 495 if (rctx->resp_len != 0 && rctx->resp_len != len) { in check_set_resp_len() 498 len, rctx->resp_len); in check_set_resp_len() 501 rctx->resp_len = len; in check_set_resp_len() 528 size_t resp_len; in OSSL_HTTP_REQ_CTX_nbio() local 729 resp_len = (size_t)strtoul(value, &line_end, 10); in OSSL_HTTP_REQ_CTX_nbio() 736 if (!check_set_resp_len(rctx, resp_len)) in OSSL_HTTP_REQ_CTX_nbio() [all...] |
/third_party/openssl/crypto/http/ |
H A D | http_client.c | 63 size_t resp_len; /* Length of response */ member 152 return rctx->resp_len; in OSSL_HTTP_REQ_CTX_get_resp_len() 208 rctx->resp_len = 0; in OSSL_HTTP_REQ_CTX_set_request_line() 486 if (rctx->resp_len != 0 && rctx->resp_len != len) in check_set_resp_len() 489 len, rctx->resp_len); in check_set_resp_len() 490 rctx->resp_len = len; in check_set_resp_len() 517 size_t resp_len; in OSSL_HTTP_REQ_CTX_nbio() local 718 resp_len = (size_t)strtoul(value, &line_end, 10); in OSSL_HTTP_REQ_CTX_nbio() 725 if (!check_set_resp_len(rctx, resp_len)) in OSSL_HTTP_REQ_CTX_nbio() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
H A D | hlr_auc_gw.c | 589 static int sim_req_auth(char *imsi, char *resp, size_t resp_len) in sim_req_auth() argument 608 rend = resp + resp_len; in sim_req_auth() 662 static int gsm_auth_req(char *imsi, char *resp, size_t resp_len) in gsm_auth_req() argument 675 rend = resp + resp_len; in gsm_auth_req() 734 static int aka_req_auth(char *imsi, char *resp, size_t resp_len) in aka_req_auth() argument 785 end = resp + resp_len; in aka_req_auth() 811 static int aka_auts(char *imsi, char *resp, size_t resp_len) in aka_auts() argument 866 static int process_cmd(char *cmd, char *resp, size_t resp_len) in process_cmd() argument 869 return sim_req_auth(cmd + 13, resp, resp_len); in process_cmd() 872 return gsm_auth_req(cmd + 13, resp, resp_len); in process_cmd() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
H A D | hlr_auc_gw.c | 589 static int sim_req_auth(char *imsi, char *resp, size_t resp_len) in sim_req_auth() argument 608 rend = resp + resp_len; in sim_req_auth() 662 static int gsm_auth_req(char *imsi, char *resp, size_t resp_len) in gsm_auth_req() argument 675 rend = resp + resp_len; in gsm_auth_req() 734 static int aka_req_auth(char *imsi, char *resp, size_t resp_len) in aka_req_auth() argument 785 end = resp + resp_len; in aka_req_auth() 811 static int aka_auts(char *imsi, char *resp, size_t resp_len) in aka_auts() argument 866 static int process_cmd(char *cmd, char *resp, size_t resp_len) in process_cmd() argument 869 return sim_req_auth(cmd + 13, resp, resp_len); in process_cmd() 872 return gsm_auth_req(cmd + 13, resp, resp_len); in process_cmd() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | ctrl_iface.h | 20 * @resp_len: Variable to be set to the response length 21 * Returns: Response (*resp_len bytes) or %NULL on failure 27 * this. If %NULL is returned, *resp_len can be set to two special values: 28 * 1 = send "FAIL\n" response, 2 = send "OK\n" response. If *resp_len has any 32 char *buf, size_t *resp_len); 38 * @resp_len: Variable to be set to the response length 39 * Returns: Response (*resp_len bytes) or %NULL on failure 44 * freeing the buffer after this. If %NULL is returned, *resp_len can be set to 46 * *resp_len has any other value, no response is sent. 49 char *buf, size_t *resp_len); [all...] |
H A D | gas_query.c | 524 u16 comeback_delay, resp_len; in gas_query_rx() local 626 resp_len = WPA_GET_LE16(pos); in gas_query_rx() 630 if (resp_len > left) { in gas_query_rx() 636 if (resp_len < left) { in gas_query_rx() 639 left - resp_len, MAC2STR(sa)); in gas_query_rx() 643 gas_query_rx_comeback(gas, query, adv_proto, pos, resp_len, in gas_query_rx() 646 gas_query_rx_initial(gas, query, adv_proto, pos, resp_len, in gas_query_rx()
|
H A D | ctrl_iface.c | 7301 size_t resp_len, start, requested_len; in gas_response_get() local 7325 resp_len = wpabuf_len(resp); in gas_response_get() 7327 requested_len = resp_len; in gas_response_get() 7332 if (start > resp_len) in gas_response_get() 7339 if (start + requested_len > resp_len) in gas_response_get() 7349 if (start + requested_len == resp_len) { in gas_response_get() 9983 char *buf, size_t *resp_len) in wpa_supplicant_ctrl_iface_process() 10019 *resp_len = 1; in wpa_supplicant_ctrl_iface_process() 10850 *resp_len = reply_len; in wpa_supplicant_ctrl_iface_process() 11110 char *cmd, size_t *resp_len) in wpas_global_ctrl_iface_ifname() 9982 wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s, char *buf, size_t *resp_len) wpa_supplicant_ctrl_iface_process() argument 11108 wpas_global_ctrl_iface_ifname(struct wpa_global *global, const char *ifname, char *cmd, size_t *resp_len) wpas_global_ctrl_iface_ifname() argument 11132 wpas_global_ctrl_iface_redir_p2p(struct wpa_global *global, char *buf, size_t *resp_len) wpas_global_ctrl_iface_redir_p2p() argument 11223 wpas_global_ctrl_iface_redir_wfd(struct wpa_global *global, char *buf, size_t *resp_len) wpas_global_ctrl_iface_redir_wfd() argument 11238 wpas_global_ctrl_iface_redir(struct wpa_global *global, char *buf, size_t *resp_len) wpas_global_ctrl_iface_redir() argument 11457 wpa_supplicant_global_ctrl_iface_process(struct wpa_global *global, char *buf, size_t *resp_len) wpa_supplicant_global_ctrl_iface_process() argument [all...] |
H A D | sme.c | 2475 u8 resp_len = 2 + WLAN_SA_QUERY_TR_ID_LEN; in sme_process_sa_query_request() local 2494 if (ocv_insert_extended_oci(&ci, resp + resp_len) < 0) in sme_process_sa_query_request() 2497 resp_len += OCV_OCI_EXTENDED_LEN; in sme_process_sa_query_request() 2503 resp, resp_len, 0) < 0) in sme_process_sa_query_request()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | gas_query_ap.c | 471 u16 comeback_delay, resp_len; in gas_query_ap_rx() local 573 resp_len = WPA_GET_LE16(pos); in gas_query_ap_rx() 577 if (resp_len > left) { in gas_query_ap_rx() 583 if (resp_len < left) { in gas_query_ap_rx() 586 left - resp_len, MAC2STR_SEC(sa)); in gas_query_ap_rx() 590 gas_query_rx_comeback(gas, query, adv_proto, pos, resp_len, in gas_query_ap_rx() 593 gas_query_rx_initial(gas, query, adv_proto, pos, resp_len, in gas_query_ap_rx()
|
H A D | beacon.c | 433 int is_p2p, size_t *resp_len) in hostapd_gen_probe_resp() 637 *resp_len = pos - (u8 *) resp; in hostapd_gen_probe_resp() 848 size_t i, resp_len; in handle_probe_req() local 1081 &resp_len); in handle_probe_req() 1103 ret = hostapd_drv_send_mlme(hapd, resp, resp_len, noack, in handle_probe_req() 1119 size_t *resp_len) in hostapd_probe_resp_offloads() 1150 return hostapd_gen_probe_resp(hapd, NULL, 0, resp_len); in hostapd_probe_resp_offloads() 1431 size_t resp_len = 0; in ieee802_11_build_ap_params() local 1662 resp = hostapd_probe_resp_offloads(hapd, &resp_len); in ieee802_11_build_ap_params() 1671 params->proberesp_len = resp_len; in ieee802_11_build_ap_params() 431 hostapd_gen_probe_resp(struct hostapd_data *hapd, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) hostapd_gen_probe_resp() argument 1118 hostapd_probe_resp_offloads(struct hostapd_data *hapd, size_t *resp_len) hostapd_probe_resp_offloads() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | gas_query_ap.c | 471 u16 comeback_delay, resp_len; in gas_query_ap_rx() local 573 resp_len = WPA_GET_LE16(pos); in gas_query_ap_rx() 577 if (resp_len > left) { in gas_query_ap_rx() 583 if (resp_len < left) { in gas_query_ap_rx() 586 left - resp_len, MAC2STR(sa)); in gas_query_ap_rx() 590 gas_query_rx_comeback(gas, query, adv_proto, pos, resp_len, in gas_query_ap_rx() 593 gas_query_rx_initial(gas, query, adv_proto, pos, resp_len, in gas_query_ap_rx()
|
H A D | beacon.c | 370 int is_p2p, size_t *resp_len) in hostapd_gen_probe_resp() 568 *resp_len = pos - (u8 *) resp; in hostapd_gen_probe_resp() 738 size_t i, resp_len; in handle_probe_req() local 966 &resp_len); in handle_probe_req() 988 ret = hostapd_drv_send_mlme_csa(hapd, resp, resp_len, noack, in handle_probe_req() 1004 size_t *resp_len) in hostapd_probe_resp_offloads() 1035 return hostapd_gen_probe_resp(hapd, NULL, 0, resp_len); in hostapd_probe_resp_offloads() 1058 size_t resp_len = 0; in ieee802_11_build_ap_params() local 1289 resp = hostapd_probe_resp_offloads(hapd, &resp_len); in ieee802_11_build_ap_params() 1298 params->proberesp_len = resp_len; in ieee802_11_build_ap_params() 368 hostapd_gen_probe_resp(struct hostapd_data *hapd, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) hostapd_gen_probe_resp() argument 1003 hostapd_probe_resp_offloads(struct hostapd_data *hapd, size_t *resp_len) hostapd_probe_resp_offloads() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_client_read.c | 894 u32 resp_len; in tls_process_certificate_status() local 911 resp_len = WPA_GET_BE24(pos); in tls_process_certificate_status() 913 if (end - pos < resp_len) { in tls_process_certificate_status() 916 resp_len); in tls_process_certificate_status() 920 end = pos + resp_len; in tls_process_certificate_status() 923 resp_len = WPA_GET_BE24(pos); in tls_process_certificate_status() 925 if (resp_len > end - pos) { in tls_process_certificate_status() 928 resp_len, (int) (end - pos)); in tls_process_certificate_status() 932 if (!resp_len) in tls_process_certificate_status() 935 conn, pos - 3, resp_len in tls_process_certificate_status() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_client_read.c | 902 u32 resp_len; in tls_process_certificate_status() local 919 resp_len = WPA_GET_BE24(pos); in tls_process_certificate_status() 921 if (end - pos < resp_len) { in tls_process_certificate_status() 924 resp_len); in tls_process_certificate_status() 928 end = pos + resp_len; in tls_process_certificate_status() 931 resp_len = WPA_GET_BE24(pos); in tls_process_certificate_status() 933 if (resp_len > end - pos) { in tls_process_certificate_status() 936 resp_len, (int) (end - pos)); in tls_process_certificate_status() 940 if (!resp_len) in tls_process_certificate_status() 943 conn, pos - 3, resp_len in tls_process_certificate_status() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | ctrl_iface.h | 24 * @resp_len: Variable to be set to the response length 25 * Returns: Response (*resp_len bytes) or %NULL on failure 31 * this. If %NULL is returned, *resp_len can be set to two special values: 32 * 1 = send "FAIL\n" response, 2 = send "OK\n" response. If *resp_len has any 36 char *buf, size_t *resp_len); 42 * @resp_len: Variable to be set to the response length 43 * Returns: Response (*resp_len bytes) or %NULL on failure 48 * freeing the buffer after this. If %NULL is returned, *resp_len can be set to 50 * *resp_len has any other value, no response is sent. 53 char *buf, size_t *resp_len); [all...] |
H A D | gas_query.c | 515 u16 comeback_delay, resp_len; in gas_query_rx() local 617 resp_len = WPA_GET_LE16(pos); in gas_query_rx() 621 if (resp_len > left) { in gas_query_rx() 627 if (resp_len < left) { in gas_query_rx() 630 left - resp_len, MAC2STR_SEC(sa)); in gas_query_rx() 634 gas_query_rx_comeback(gas, query, adv_proto, pos, resp_len, in gas_query_rx() 637 gas_query_rx_initial(gas, query, adv_proto, pos, resp_len, in gas_query_rx()
|
H A D | ctrl_iface.c | 8142 size_t resp_len, start, requested_len; local 8166 resp_len = wpabuf_len(resp); 8168 requested_len = resp_len; 8173 if (start > resp_len) 8180 if (start + requested_len > resp_len) 8190 if (start + requested_len == resp_len) { 12266 char *buf, size_t *resp_len) 12303 *resp_len = 1; 13270 *resp_len = reply_len; 13530 char *cmd, size_t *resp_len) [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_openssl_ocsp.c | 490 size_t resp_len; in check_ocsp_resp() local 519 SSL_get0_ocsp_response(ssl, &resp_data, &resp_len); in check_ocsp_resp() 520 if (resp_data == NULL || resp_len == 0) { in check_ocsp_resp() 525 wpa_hexdump(MSG_DEBUG, "OpenSSL: OCSP response", resp_data, resp_len); in check_ocsp_resp() 527 resp = d2i_OCSPResponse(NULL, &resp_data, resp_len); in check_ocsp_resp()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | tls_openssl_ocsp.c | 490 size_t resp_len; in check_ocsp_resp() local 519 SSL_get0_ocsp_response(ssl, &resp_data, &resp_len); in check_ocsp_resp() 520 if (resp_data == NULL || resp_len == 0) { in check_ocsp_resp() 525 wpa_hexdump(MSG_DEBUG, "OpenSSL: OCSP response", resp_data, resp_len); in check_ocsp_resp() 527 resp = d2i_OCSPResponse(NULL, &resp_data, resp_len); in check_ocsp_resp()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | http-utils.h | 56 size_t *resp_len);
|
H A D | http_curl.c | 1685 size_t *resp_len) in http_post() 1735 if (resp_len) in http_post() 1736 *resp_len = ctx->curl_buf_len; in http_post() 1680 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) http_post() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | http-utils.h | 56 size_t *resp_len);
|