Home
last modified time | relevance | path

Searched refs:resp (Results 1 – 25 of 31) sorted by relevance

12

/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/
Deap_ttls.c181 static int eap_ttls_avp_encapsulate(struct wpabuf **resp, u32 avp_code, in eap_ttls_avp_encapsulate() argument
187 msg = wpabuf_alloc(sizeof(struct ttls_avp) + wpabuf_len(*resp) + 4); in eap_ttls_avp_encapsulate()
189 wpabuf_free(*resp); in eap_ttls_avp_encapsulate()
190 *resp = NULL; in eap_ttls_avp_encapsulate()
195 pos = eap_ttls_avp_hdr(avp, avp_code, 0, mandatory, wpabuf_len(*resp)); in eap_ttls_avp_encapsulate()
196 os_memcpy(pos, wpabuf_head(*resp), wpabuf_len(*resp)); in eap_ttls_avp_encapsulate()
197 pos += wpabuf_len(*resp); in eap_ttls_avp_encapsulate()
199 wpabuf_free(*resp); in eap_ttls_avp_encapsulate()
201 *resp = msg; in eap_ttls_avp_encapsulate()
274 struct wpabuf **resp) in eap_ttls_phase2_eap_process() argument
[all …]
Deap_fast.c417 struct wpabuf **resp) in eap_fast_phase2_request() argument
433 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1); in eap_fast_phase2_request()
453 hdr, resp)) in eap_fast_phase2_request()
470 *resp = data->phase2_method->process(sm, data->phase2_priv, &iret, in eap_fast_phase2_request()
472 if (*resp == NULL || in eap_fast_phase2_request()
484 if (*resp == NULL && config && in eap_fast_phase2_request()
490 } else if (*resp == NULL) in eap_fast_phase2_request()
562 struct wpabuf *resp = NULL; in eap_fast_process_eap_payload_tlv() local
584 if (eap_fast_phase2_request(sm, data, ret, hdr, &resp)) { in eap_fast_process_eap_payload_tlv()
590 return eap_fast_tlv_eap_payload(resp); in eap_fast_process_eap_payload_tlv()
[all …]
Deap_mschapv2.c134 struct wpabuf *resp; in eap_mschapv2_challenge_reply() local
151 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, in eap_mschapv2_challenge_reply()
153 if (resp == NULL) in eap_mschapv2_challenge_reply()
156 ms = wpabuf_put(resp, sizeof(*ms)); in eap_mschapv2_challenge_reply()
169 wpabuf_put_u8(resp, sizeof(*r)); in eap_mschapv2_challenge_reply()
172 r = wpabuf_put(resp, sizeof(*r)); in eap_mschapv2_challenge_reply()
180 wpabuf_free(resp); in eap_mschapv2_challenge_reply()
195 wpabuf_free(resp); in eap_mschapv2_challenge_reply()
203 wpabuf_put_data(resp, identity, identity_len); in eap_mschapv2_challenge_reply()
206 return resp; in eap_mschapv2_challenge_reply()
[all …]
Deap_tls.c77 struct wpabuf *resp, u8 id) in eap_tls_failure() argument
98 if (resp) { in eap_tls_failure()
103 return resp; in eap_tls_failure()
152 struct wpabuf *resp; in eap_tls_process() local
169 resp = NULL; in eap_tls_process()
171 id, pos, left, &resp); in eap_tls_process()
174 return eap_tls_failure(sm, data, ret, res, resp, id); in eap_tls_process()
181 wpabuf_free(resp); in eap_tls_process()
185 return resp; in eap_tls_process()
Deap_peap.c498 const struct wpabuf *req, struct wpabuf **resp, in eap_tlv_process() argument
542 *resp = eap_tlv_build_nak(eap_get_id(req), in eap_tlv_process()
544 return *resp == NULL ? -1 : 0; in eap_tlv_process()
617 *resp = eap_tlv_build_result(sm, data, crypto_tlv != NULL, in eap_tlv_process()
657 struct wpabuf **resp) in eap_peap_phase2_request() argument
673 *resp = eap_sm_build_identity_resp(sm, hdr->identifier, 1); in eap_peap_phase2_request()
677 if (eap_tlv_process(sm, data, &iret, req, resp, in eap_peap_phase2_request()
705 *resp = eap_msg_alloc( in eap_peap_phase2_request()
710 if (*resp == NULL) { in eap_peap_phase2_request()
715 wpabuf_put_buf(*resp, buf); in eap_peap_phase2_request()
[all …]
Deap.c353 struct wpabuf *resp; in eap_sm_buildIdentity() local
399 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, identity_len, in eap_sm_buildIdentity()
401 if (resp == NULL) in eap_sm_buildIdentity()
404 wpabuf_put_data(resp, identity, identity_len); in eap_sm_buildIdentity()
406 return resp; in eap_sm_buildIdentity()
453 struct wpabuf *resp; in eap_sm_build_nak() local
462 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_EXPANDED, in eap_sm_build_nak()
464 if (resp == NULL) in eap_sm_build_nak()
466 wpabuf_put_be24(resp, EAP_VENDOR_IETF); in eap_sm_build_nak()
467 wpabuf_put_be32(resp, EAP_TYPE_NAK); in eap_sm_build_nak()
[all …]
Deap_tls_common.c679 struct wpabuf *resp; in eap_peer_tls_build_ack() local
681 resp = eap_tls_msg_alloc(eap_type, 1, EAP_CODE_RESPONSE, id); in eap_peer_tls_build_ack()
682 if (resp == NULL) in eap_peer_tls_build_ack()
686 wpabuf_put_u8(resp, peap_version); /* Flags */ in eap_peer_tls_build_ack()
687 return resp; in eap_peer_tls_build_ack()
1026 struct eap_hdr *hdr, struct wpabuf **resp) in eap_peer_tls_phase2_nak() argument
1037 *resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_NAK, num_types, in eap_peer_tls_phase2_nak()
1039 if (*resp == NULL) in eap_peer_tls_phase2_nak()
1045 wpabuf_put_u8(*resp, types[i].method); in eap_peer_tls_phase2_nak()
1048 eap_update_len(*resp); in eap_peer_tls_phase2_nak()
Deap_tls_common.h134 struct eap_hdr *hdr, struct wpabuf **resp);
/hal_espressif-latest/components/wpa_supplicant/src/ap/
Dieee802_11.c468 int resp = WLAN_STATUS_SUCCESS; in handle_auth_sae() local
484 resp = WLAN_STATUS_UNSPECIFIED_FAILURE; in handle_auth_sae()
489 resp = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA; in handle_auth_sae()
530 resp = sae_parse_commit(sta->sae, buf, len, &token, &token_len, default_group, in handle_auth_sae()
532 if (resp == SAE_SILENTLY_DISCARD) { in handle_auth_sae()
536 resp = WLAN_STATUS_SUCCESS; in handle_auth_sae()
540 if (resp == WLAN_STATUS_UNKNOWN_PASSWORD_IDENTIFIER) { in handle_auth_sae()
553 resp = WLAN_STATUS_UNSPECIFIED_FAILURE; in handle_auth_sae()
558 resp = WLAN_STATUS_UNSPECIFIED_FAILURE; in handle_auth_sae()
562 if (resp != WLAN_STATUS_SUCCESS) { in handle_auth_sae()
[all …]
/hal_espressif-latest/tools/esptool_py/flasher_stub/
Dstub_flasher.c187 esp_command_response_t resp = { in cmd_loop() local
188 .resp = 1, in cmd_loop()
198 resp.value = READ_REG(data_words[0]); in cmd_loop()
202 resp.len_ret = 16 + 2; /* Will sent 16 bytes of data with MD5 value */ in cmd_loop()
206 resp.len_ret = SECURITY_INFO_BYTES; /* Buffer size varies */ in cmd_loop()
215 SLIP_send_frame_data_buf(&resp, sizeof(esp_command_response_t)); in cmd_loop()
241 resp.value = 0; in cmd_loop()
248 SLIP_send_frame_data_buf(&resp, sizeof(esp_command_response_t)); in cmd_loop()
/hal_espressif-latest/components/wpa_supplicant/src/tls/
Dtlsv1_client_ocsp.c113 const u8 *resp, size_t len, in tls_process_ocsp_single_response() argument
129 wpa_hexdump(MSG_MSGDUMP, "OCSP: SingleResponse", resp, len); in tls_process_ocsp_single_response()
141 if (asn1_get_next(resp, len, &hdr) < 0 || !asn1_is_sequence(&hdr)) { in tls_process_ocsp_single_response()
232 end = resp + len; in tls_process_ocsp_single_response()
313 struct x509_certificate *issuer, const u8 *resp, in tls_process_ocsp_responses() argument
320 pos = resp; in tls_process_ocsp_responses()
321 end = resp + len; in tls_process_ocsp_responses()
346 const u8 *resp, size_t len) in tls_process_basic_ocsp_response() argument
362 wpa_hexdump(MSG_MSGDUMP, "OCSP: BasicOCSPResponse", resp, len); in tls_process_basic_ocsp_response()
375 if (asn1_get_next(resp, len, &hdr) < 0 || !asn1_is_sequence(&hdr)) { in tls_process_basic_ocsp_response()
[all …]
Dtlsv1_client_i.h100 const u8 *resp, size_t len);
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/
Desp_eap_client.c308 int eap_sm_send_eapol(struct eap_sm *sm, struct wpabuf *resp) in eap_sm_send_eapol() argument
323 wpabuf_head_u8(resp), wpabuf_len(resp), in eap_sm_send_eapol()
345 struct wpabuf *resp = NULL; in eap_sm_process_request() local
362 resp = sm->lastRespData; in eap_sm_process_request()
371 resp = (struct wpabuf *)eap_sm_build_identity_resp(sm, ehdr->identifier, 0); in eap_sm_process_request()
391 resp = sm->m->process(sm, sm->eap_method_priv, in eap_sm_process_request()
419 resp = sm->m->process(sm, sm->eap_method_priv, &m_res, reqData); in eap_sm_process_request()
434 resp = (struct wpabuf *)eap_sm_build_nak(sm, type, ehdr->identifier); in eap_sm_process_request()
435 if (resp == NULL) { in eap_sm_process_request()
439 if (resp == NULL) { in eap_sm_process_request()
[all …]
Desp_wpa3_i.h62 u16 auth_alg, u16 auth_transaction, u16 resp,
Desp_wpa3.c675 u16 auth_alg, u16 auth_transaction, u16 resp, in esp_send_sae_auth_reply() argument
688 ((uint16_t *)req->data)[2] = htole16(resp); in esp_send_sae_auth_reply()
/hal_espressif-latest/components/wpa_supplicant/src/eap_server/
Deap_server.c31 static void eap_sm_parseEapResp(struct eap_sm *sm, const struct wpabuf *resp);
1498 static void eap_sm_parseEapResp(struct eap_sm *sm, const struct wpabuf *resp) in eap_sm_parseEapResp() argument
1511 if (resp == NULL || wpabuf_len(resp) < sizeof(*hdr)) { in eap_sm_parseEapResp()
1513 "len=%lu", resp, in eap_sm_parseEapResp()
1514 resp ? (unsigned long) wpabuf_len(resp) : 0); in eap_sm_parseEapResp()
1518 hdr = wpabuf_head(resp); in eap_sm_parseEapResp()
1520 if (plen > wpabuf_len(resp)) { in eap_sm_parseEapResp()
1523 (unsigned long) wpabuf_len(resp), in eap_sm_parseEapResp()
1575 struct eap_hdr *resp; in eap_sm_buildSuccess() local
1578 msg = wpabuf_alloc(sizeof(*resp)); in eap_sm_buildSuccess()
[all …]
/hal_espressif-latest/components/bt/host/bluedroid/bta/hf_ag/
Dbta_ag_sco.c1657 tBTM_ESCO_PARAMS resp; in bta_ag_sco_conn_rsp() local
1671 resp = bta_ag_cb.sco.params; in bta_ag_sco_conn_rsp()
1675 resp.rx_bw = BTM_64KBITS_RATE; in bta_ag_sco_conn_rsp()
1676 resp.tx_bw = BTM_64KBITS_RATE; in bta_ag_sco_conn_rsp()
1677 resp.max_latency = 10; in bta_ag_sco_conn_rsp()
1678 resp.voice_contfmt = 0x60; in bta_ag_sco_conn_rsp()
1679 resp.retrans_effort = BTM_ESCO_RETRANS_POWER; in bta_ag_sco_conn_rsp()
1683 resp.retrans_effort = BTM_ESCO_RETRANS_OFF; in bta_ag_sco_conn_rsp()
1684 resp.packet_types = (BTM_SCO_PKT_TYPES_MASK_HV1 | in bta_ag_sco_conn_rsp()
1696 resp.max_latency = 12; in bta_ag_sco_conn_rsp()
[all …]
/hal_espressif-latest/tools/esptool_py/flasher_stub/include/
Dstub_flasher.h79 uint8_t resp; /* should be '1' */ member
/hal_espressif-latest/components/esp_wifi/wifi_apps/include/
Desp_nan.h140 esp_err_t esp_wifi_nan_datapath_resp(wifi_nan_datapath_resp_t *resp);
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/
Dtls_mbedtls.c746 struct wpabuf *resp; in tls_connection_handshake() local
795 resp = conn->tls_io_data.out_data; in tls_connection_handshake()
797 return resp; in tls_connection_handshake()
814 struct wpabuf *resp; in tls_connection_encrypt() local
827 resp = conn->tls_io_data.out_data; in tls_connection_encrypt()
829 return resp; in tls_connection_encrypt()
/hal_espressif-latest/components/esp_wifi/wifi_apps/src/
Dnan_app.c1015 esp_err_t esp_wifi_nan_datapath_resp(wifi_nan_datapath_resp_t *resp) in esp_wifi_nan_datapath_resp() argument
1018 struct ndl_info *ndl = nan_find_ndl(resp->ndp_id, NULL); in esp_wifi_nan_datapath_resp()
1021 ESP_LOGE(TAG, "No NDL with ndp id %d", resp->ndp_id); in esp_wifi_nan_datapath_resp()
1029 if (!MACADDR_EQUAL(resp->peer_mac, null_mac)) { in esp_wifi_nan_datapath_resp()
1030 MACADDR_COPY(resp->peer_mac, ndl->peer_nmi); in esp_wifi_nan_datapath_resp()
1033 if (esp_nan_internal_datapath_resp(resp) == ESP_OK) { in esp_wifi_nan_datapath_resp()
/hal_espressif-latest/components/bt/host/bluedroid/bta/hf_client/
Dbta_hf_client_sco.c236 tBTM_ESCO_PARAMS resp; in bta_hf_client_sco_conn_rsp() local
263 resp = bta_hf_client_esco_params[index]; in bta_hf_client_sco_conn_rsp()
280 BTM_EScoConnRsp(p_data->sco_inx, hci_status, &resp); in bta_hf_client_sco_conn_rsp()
/hal_espressif-latest/components/esp_wifi/include/esp_private/
Dwifi.h743 esp_err_t esp_nan_internal_datapath_resp(wifi_nan_datapath_resp_t *resp);
/hal_espressif-latest/components/soc/esp32s3/include/soc/
Dsdmmc_struct.h181 uint32_t resp[4]; ///< Response from card member
/hal_espressif-latest/components/soc/esp32/include/soc/
Dsdmmc_struct.h183 volatile uint32_t resp[4]; ///< Response from card member

12