/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/ |
D | eap_ttls.c | 181 static int eap_ttls_avp_encapsulate(struct wpabuf **resp, u32 avp_code, in eap_ttls_avp_encapsulate() argument 187 msg = wpabuf_alloc(sizeof(struct ttls_avp) + wpabuf_len(*resp) + 4); in eap_ttls_avp_encapsulate() 189 wpabuf_free(*resp); in eap_ttls_avp_encapsulate() 190 *resp = NULL; in eap_ttls_avp_encapsulate() 195 pos = eap_ttls_avp_hdr(avp, avp_code, 0, mandatory, wpabuf_len(*resp)); in eap_ttls_avp_encapsulate() 196 os_memcpy(pos, wpabuf_head(*resp), wpabuf_len(*resp)); in eap_ttls_avp_encapsulate() 197 pos += wpabuf_len(*resp); in eap_ttls_avp_encapsulate() 199 wpabuf_free(*resp); in eap_ttls_avp_encapsulate() 201 *resp = msg; in eap_ttls_avp_encapsulate() 274 struct wpabuf **resp) in eap_ttls_phase2_eap_process() argument [all …]
|
D | eap_fast.c | 417 struct wpabuf **resp) in eap_fast_phase2_request() argument 433 *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1); in eap_fast_phase2_request() 453 hdr, resp)) in eap_fast_phase2_request() 470 *resp = data->phase2_method->process(sm, data->phase2_priv, &iret, in eap_fast_phase2_request() 472 if (*resp == NULL || in eap_fast_phase2_request() 484 if (*resp == NULL && config && in eap_fast_phase2_request() 490 } else if (*resp == NULL) in eap_fast_phase2_request() 562 struct wpabuf *resp = NULL; in eap_fast_process_eap_payload_tlv() local 584 if (eap_fast_phase2_request(sm, data, ret, hdr, &resp)) { in eap_fast_process_eap_payload_tlv() 590 return eap_fast_tlv_eap_payload(resp); in eap_fast_process_eap_payload_tlv() [all …]
|
D | eap_mschapv2.c | 134 struct wpabuf *resp; in eap_mschapv2_challenge_reply() local 151 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, in eap_mschapv2_challenge_reply() 153 if (resp == NULL) in eap_mschapv2_challenge_reply() 156 ms = wpabuf_put(resp, sizeof(*ms)); in eap_mschapv2_challenge_reply() 169 wpabuf_put_u8(resp, sizeof(*r)); in eap_mschapv2_challenge_reply() 172 r = wpabuf_put(resp, sizeof(*r)); in eap_mschapv2_challenge_reply() 180 wpabuf_free(resp); in eap_mschapv2_challenge_reply() 195 wpabuf_free(resp); in eap_mschapv2_challenge_reply() 203 wpabuf_put_data(resp, identity, identity_len); in eap_mschapv2_challenge_reply() 206 return resp; in eap_mschapv2_challenge_reply() [all …]
|
D | eap_tls.c | 77 struct wpabuf *resp, u8 id) in eap_tls_failure() argument 98 if (resp) { in eap_tls_failure() 103 return resp; in eap_tls_failure() 152 struct wpabuf *resp; in eap_tls_process() local 169 resp = NULL; in eap_tls_process() 171 id, pos, left, &resp); in eap_tls_process() 174 return eap_tls_failure(sm, data, ret, res, resp, id); in eap_tls_process() 181 wpabuf_free(resp); in eap_tls_process() 185 return resp; in eap_tls_process()
|
D | eap_peap.c | 498 const struct wpabuf *req, struct wpabuf **resp, in eap_tlv_process() argument 542 *resp = eap_tlv_build_nak(eap_get_id(req), in eap_tlv_process() 544 return *resp == NULL ? -1 : 0; in eap_tlv_process() 617 *resp = eap_tlv_build_result(sm, data, crypto_tlv != NULL, in eap_tlv_process() 657 struct wpabuf **resp) in eap_peap_phase2_request() argument 673 *resp = eap_sm_build_identity_resp(sm, hdr->identifier, 1); in eap_peap_phase2_request() 677 if (eap_tlv_process(sm, data, &iret, req, resp, in eap_peap_phase2_request() 705 *resp = eap_msg_alloc( in eap_peap_phase2_request() 710 if (*resp == NULL) { in eap_peap_phase2_request() 715 wpabuf_put_buf(*resp, buf); in eap_peap_phase2_request() [all …]
|
D | eap.c | 353 struct wpabuf *resp; in eap_sm_buildIdentity() local 399 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IDENTITY, identity_len, in eap_sm_buildIdentity() 401 if (resp == NULL) in eap_sm_buildIdentity() 404 wpabuf_put_data(resp, identity, identity_len); in eap_sm_buildIdentity() 406 return resp; in eap_sm_buildIdentity() 453 struct wpabuf *resp; in eap_sm_build_nak() local 462 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_EXPANDED, in eap_sm_build_nak() 464 if (resp == NULL) in eap_sm_build_nak() 466 wpabuf_put_be24(resp, EAP_VENDOR_IETF); in eap_sm_build_nak() 467 wpabuf_put_be32(resp, EAP_TYPE_NAK); in eap_sm_build_nak() [all …]
|
D | eap_tls_common.c | 679 struct wpabuf *resp; in eap_peer_tls_build_ack() local 681 resp = eap_tls_msg_alloc(eap_type, 1, EAP_CODE_RESPONSE, id); in eap_peer_tls_build_ack() 682 if (resp == NULL) in eap_peer_tls_build_ack() 686 wpabuf_put_u8(resp, peap_version); /* Flags */ in eap_peer_tls_build_ack() 687 return resp; in eap_peer_tls_build_ack() 1026 struct eap_hdr *hdr, struct wpabuf **resp) in eap_peer_tls_phase2_nak() argument 1037 *resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_NAK, num_types, in eap_peer_tls_phase2_nak() 1039 if (*resp == NULL) in eap_peer_tls_phase2_nak() 1045 wpabuf_put_u8(*resp, types[i].method); in eap_peer_tls_phase2_nak() 1048 eap_update_len(*resp); in eap_peer_tls_phase2_nak()
|
D | eap_tls_common.h | 134 struct eap_hdr *hdr, struct wpabuf **resp);
|
/hal_espressif-latest/components/wpa_supplicant/src/ap/ |
D | ieee802_11.c | 468 int resp = WLAN_STATUS_SUCCESS; in handle_auth_sae() local 484 resp = WLAN_STATUS_UNSPECIFIED_FAILURE; in handle_auth_sae() 489 resp = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA; in handle_auth_sae() 530 resp = sae_parse_commit(sta->sae, buf, len, &token, &token_len, default_group, in handle_auth_sae() 532 if (resp == SAE_SILENTLY_DISCARD) { in handle_auth_sae() 536 resp = WLAN_STATUS_SUCCESS; in handle_auth_sae() 540 if (resp == WLAN_STATUS_UNKNOWN_PASSWORD_IDENTIFIER) { in handle_auth_sae() 553 resp = WLAN_STATUS_UNSPECIFIED_FAILURE; in handle_auth_sae() 558 resp = WLAN_STATUS_UNSPECIFIED_FAILURE; in handle_auth_sae() 562 if (resp != WLAN_STATUS_SUCCESS) { in handle_auth_sae() [all …]
|
/hal_espressif-latest/tools/esptool_py/flasher_stub/ |
D | stub_flasher.c | 187 esp_command_response_t resp = { in cmd_loop() local 188 .resp = 1, in cmd_loop() 198 resp.value = READ_REG(data_words[0]); in cmd_loop() 202 resp.len_ret = 16 + 2; /* Will sent 16 bytes of data with MD5 value */ in cmd_loop() 206 resp.len_ret = SECURITY_INFO_BYTES; /* Buffer size varies */ in cmd_loop() 215 SLIP_send_frame_data_buf(&resp, sizeof(esp_command_response_t)); in cmd_loop() 241 resp.value = 0; in cmd_loop() 248 SLIP_send_frame_data_buf(&resp, sizeof(esp_command_response_t)); in cmd_loop()
|
/hal_espressif-latest/components/wpa_supplicant/src/tls/ |
D | tlsv1_client_ocsp.c | 113 const u8 *resp, size_t len, in tls_process_ocsp_single_response() argument 129 wpa_hexdump(MSG_MSGDUMP, "OCSP: SingleResponse", resp, len); in tls_process_ocsp_single_response() 141 if (asn1_get_next(resp, len, &hdr) < 0 || !asn1_is_sequence(&hdr)) { in tls_process_ocsp_single_response() 232 end = resp + len; in tls_process_ocsp_single_response() 313 struct x509_certificate *issuer, const u8 *resp, in tls_process_ocsp_responses() argument 320 pos = resp; in tls_process_ocsp_responses() 321 end = resp + len; in tls_process_ocsp_responses() 346 const u8 *resp, size_t len) in tls_process_basic_ocsp_response() argument 362 wpa_hexdump(MSG_MSGDUMP, "OCSP: BasicOCSPResponse", resp, len); in tls_process_basic_ocsp_response() 375 if (asn1_get_next(resp, len, &hdr) < 0 || !asn1_is_sequence(&hdr)) { in tls_process_basic_ocsp_response() [all …]
|
D | tlsv1_client_i.h | 100 const u8 *resp, size_t len);
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/ |
D | esp_eap_client.c | 308 int eap_sm_send_eapol(struct eap_sm *sm, struct wpabuf *resp) in eap_sm_send_eapol() argument 323 wpabuf_head_u8(resp), wpabuf_len(resp), in eap_sm_send_eapol() 345 struct wpabuf *resp = NULL; in eap_sm_process_request() local 362 resp = sm->lastRespData; in eap_sm_process_request() 371 resp = (struct wpabuf *)eap_sm_build_identity_resp(sm, ehdr->identifier, 0); in eap_sm_process_request() 391 resp = sm->m->process(sm, sm->eap_method_priv, in eap_sm_process_request() 419 resp = sm->m->process(sm, sm->eap_method_priv, &m_res, reqData); in eap_sm_process_request() 434 resp = (struct wpabuf *)eap_sm_build_nak(sm, type, ehdr->identifier); in eap_sm_process_request() 435 if (resp == NULL) { in eap_sm_process_request() 439 if (resp == NULL) { in eap_sm_process_request() [all …]
|
D | esp_wpa3_i.h | 62 u16 auth_alg, u16 auth_transaction, u16 resp,
|
D | esp_wpa3.c | 675 u16 auth_alg, u16 auth_transaction, u16 resp, in esp_send_sae_auth_reply() argument 688 ((uint16_t *)req->data)[2] = htole16(resp); in esp_send_sae_auth_reply()
|
/hal_espressif-latest/components/wpa_supplicant/src/eap_server/ |
D | eap_server.c | 31 static void eap_sm_parseEapResp(struct eap_sm *sm, const struct wpabuf *resp); 1498 static void eap_sm_parseEapResp(struct eap_sm *sm, const struct wpabuf *resp) in eap_sm_parseEapResp() argument 1511 if (resp == NULL || wpabuf_len(resp) < sizeof(*hdr)) { in eap_sm_parseEapResp() 1513 "len=%lu", resp, in eap_sm_parseEapResp() 1514 resp ? (unsigned long) wpabuf_len(resp) : 0); in eap_sm_parseEapResp() 1518 hdr = wpabuf_head(resp); in eap_sm_parseEapResp() 1520 if (plen > wpabuf_len(resp)) { in eap_sm_parseEapResp() 1523 (unsigned long) wpabuf_len(resp), in eap_sm_parseEapResp() 1575 struct eap_hdr *resp; in eap_sm_buildSuccess() local 1578 msg = wpabuf_alloc(sizeof(*resp)); in eap_sm_buildSuccess() [all …]
|
/hal_espressif-latest/components/bt/host/bluedroid/bta/hf_ag/ |
D | bta_ag_sco.c | 1657 tBTM_ESCO_PARAMS resp; in bta_ag_sco_conn_rsp() local 1671 resp = bta_ag_cb.sco.params; in bta_ag_sco_conn_rsp() 1675 resp.rx_bw = BTM_64KBITS_RATE; in bta_ag_sco_conn_rsp() 1676 resp.tx_bw = BTM_64KBITS_RATE; in bta_ag_sco_conn_rsp() 1677 resp.max_latency = 10; in bta_ag_sco_conn_rsp() 1678 resp.voice_contfmt = 0x60; in bta_ag_sco_conn_rsp() 1679 resp.retrans_effort = BTM_ESCO_RETRANS_POWER; in bta_ag_sco_conn_rsp() 1683 resp.retrans_effort = BTM_ESCO_RETRANS_OFF; in bta_ag_sco_conn_rsp() 1684 resp.packet_types = (BTM_SCO_PKT_TYPES_MASK_HV1 | in bta_ag_sco_conn_rsp() 1696 resp.max_latency = 12; in bta_ag_sco_conn_rsp() [all …]
|
/hal_espressif-latest/tools/esptool_py/flasher_stub/include/ |
D | stub_flasher.h | 79 uint8_t resp; /* should be '1' */ member
|
/hal_espressif-latest/components/esp_wifi/wifi_apps/include/ |
D | esp_nan.h | 140 esp_err_t esp_wifi_nan_datapath_resp(wifi_nan_datapath_resp_t *resp);
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/ |
D | tls_mbedtls.c | 746 struct wpabuf *resp; in tls_connection_handshake() local 795 resp = conn->tls_io_data.out_data; in tls_connection_handshake() 797 return resp; in tls_connection_handshake() 814 struct wpabuf *resp; in tls_connection_encrypt() local 827 resp = conn->tls_io_data.out_data; in tls_connection_encrypt() 829 return resp; in tls_connection_encrypt()
|
/hal_espressif-latest/components/esp_wifi/wifi_apps/src/ |
D | nan_app.c | 1015 esp_err_t esp_wifi_nan_datapath_resp(wifi_nan_datapath_resp_t *resp) in esp_wifi_nan_datapath_resp() argument 1018 struct ndl_info *ndl = nan_find_ndl(resp->ndp_id, NULL); in esp_wifi_nan_datapath_resp() 1021 ESP_LOGE(TAG, "No NDL with ndp id %d", resp->ndp_id); in esp_wifi_nan_datapath_resp() 1029 if (!MACADDR_EQUAL(resp->peer_mac, null_mac)) { in esp_wifi_nan_datapath_resp() 1030 MACADDR_COPY(resp->peer_mac, ndl->peer_nmi); in esp_wifi_nan_datapath_resp() 1033 if (esp_nan_internal_datapath_resp(resp) == ESP_OK) { in esp_wifi_nan_datapath_resp()
|
/hal_espressif-latest/components/bt/host/bluedroid/bta/hf_client/ |
D | bta_hf_client_sco.c | 236 tBTM_ESCO_PARAMS resp; in bta_hf_client_sco_conn_rsp() local 263 resp = bta_hf_client_esco_params[index]; in bta_hf_client_sco_conn_rsp() 280 BTM_EScoConnRsp(p_data->sco_inx, hci_status, &resp); in bta_hf_client_sco_conn_rsp()
|
/hal_espressif-latest/components/esp_wifi/include/esp_private/ |
D | wifi.h | 743 esp_err_t esp_nan_internal_datapath_resp(wifi_nan_datapath_resp_t *resp);
|
/hal_espressif-latest/components/soc/esp32s3/include/soc/ |
D | sdmmc_struct.h | 181 uint32_t resp[4]; ///< Response from card member
|
/hal_espressif-latest/components/soc/esp32/include/soc/ |
D | sdmmc_struct.h | 183 volatile uint32_t resp[4]; ///< Response from card member
|