| /hostap-latest/src/common/ |
| D | gas_server.c | 57 static void gas_server_free_response(struct gas_server_response *response); 62 struct gas_server_response *response = eloop_ctx; in gas_server_response_timeout() local 66 response, MAC2STR(response->dst), response->dialog_token, in gas_server_response_timeout() 67 response->freq, response->frag_id, in gas_server_response_timeout() 68 (unsigned long) response->offset, in gas_server_response_timeout() 69 (unsigned long) (response->resp ? in gas_server_response_timeout() 70 wpabuf_len(response->resp) : 0)); in gas_server_response_timeout() 71 response->handler->status_cb(response->handler->ctx, in gas_server_response_timeout() 72 response->resp, 0); in gas_server_response_timeout() 73 response->resp = NULL; in gas_server_response_timeout() [all …]
|
| /hostap-latest/src/crypto/ |
| D | ms_funcs.c | 146 u8 *response) in challenge_response() argument 150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response() 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response() 156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response() 174 u8 *response) in generate_nt_response() argument 182 challenge_response(challenge, password_hash, response)) in generate_nt_response() 202 u8 *response) in generate_nt_response_pwhash() argument 209 challenge_response(challenge, password_hash, response)) in generate_nt_response_pwhash() 231 const u8 *nt_response, u8 *response) in generate_authenticator_response_pwhash() argument 257 addr2[0] = response; in generate_authenticator_response_pwhash() [all …]
|
| D | ms_funcs.h | 15 u8 *response); 20 u8 *response); 25 const u8 *nt_response, u8 *response); 30 const u8 *nt_response, u8 *response); 32 size_t password_len, u8 *response); 35 u8 *response);
|
| D | tls_openssl_ocsp.c | 60 ASN1_OCTET_STRING *response; member 75 ASN1_SIMPLE(ResponseBytes, response, ASN1_OCTET_STRING) 543 basic_data = ASN1_STRING_data(bytes->response); in check_ocsp_resp() 544 basic_len = ASN1_STRING_length(bytes->response); in check_ocsp_resp()
|
| D | tls_wolfssl.c | 1491 unsigned char **response) in ocsp_status_cb() argument 1500 *response = NULL; in ocsp_status_cb() 1504 *response = (unsigned char *) os_readfile(url, &len); in ocsp_status_cb() 1505 if (!*response) { in ocsp_status_cb() 1516 void ocsp_resp_free_cb(void *ocsp_stapling_response, unsigned char *response) in ocsp_resp_free_cb() argument 1518 os_free(response); in ocsp_resp_free_cb()
|
| D | tls_gnutls.c | 994 gnutls_datum_t response, buf; in check_ocsp() local 1024 res = gnutls_ocsp_status_request_get(session, &response); in check_ocsp() 1034 res = gnutls_ocsp_resp_import(resp, &response); in check_ocsp()
|
| /hostap-latest/tests/hwsim/ |
| D | test_dscp.py | 108 def handle_dscp_response(hapd, response): argument 110 if msg['payload'] != response: 351 response = b'\x7e\x50\x6f\x9a\x1a\x02\x01\x00\x02\x01\x00\x04\x00' 352 handle_dscp_response(hapd, response) 358 response = b'\x7e\x50\x6f\x9a\x1a\x02\x00\x03\x00' 359 handle_dscp_response(hapd, response) 365 response = b'\x7e\x50\x6f\x9a\x1a\x02\x00\x00\x01\x02\x00' 366 handle_dscp_response(hapd, response)
|
| D | fst_module_aux.py | 365 def send_session_setup_response(self, sid, response): argument 366 request = "FST-MANAGER SESSION_RESPOND " + sid + " " + response 383 response, additional_parameter=None): 384 request = "FST-MANAGER TEST_REQUEST SEND_SETUP_RESPONSE " + fsts_id + " " + response 445 def initiate_session(self, sid, response="accept"): argument 475 if response == '': 477 if response != "timeout": 478 …s = self.peer_obj.grequest("FST-MANAGER SESSION_RESPOND "+ event['id'] + " " + response) # Or rej…
|
| /hostap-latest/src/eap_common/ |
| D | chap.c | 16 size_t challenge_len, u8 *response) in chap_md5() argument 27 return md5_vector(3, addr, len, response); in chap_md5()
|
| D | chap.h | 15 size_t challenge_len, u8 *response);
|
| /hostap-latest/hostapd/ |
| D | wps-ap-nfc.py | 120 response = nfc.ndef.Message("\xd1\x02\x01Hs\x12") 129 response = self.process_request(request) 130 summary("send handover response {}".format(response.type)) 131 return response
|
| /hostap-latest/src/eap_server/ |
| D | eap_server_ttls.c | 622 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschap() argument 626 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap() 657 challenge, response + 2 + 24); in eap_ttls_process_phase2_mschap() 662 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) { in eap_ttls_process_phase2_mschap() 679 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { in eap_ttls_process_phase2_mschap() 686 response + 2 + 24, 24); in eap_ttls_process_phase2_mschap() 698 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschapv2() argument 704 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschapv2() 754 response[0] != chal[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]) { in eap_ttls_process_phase2_mschapv2() 763 peer_challenge = response + 2; in eap_ttls_process_phase2_mschapv2() [all …]
|
| D | eap.h | 302 const u8 *challenge, const u8 *response);
|
| /hostap-latest/wpa_supplicant/examples/ |
| D | wps-nfc.py | 149 response = nfc.ndef.Message("\xd1\x02\x01Hs\x12") 158 response = self.process_request(request) 159 summary("send handover response {}".format(response.type)) 160 return response
|
| D | p2p-nfc.py | 270 response = nfc.ndef.Message("\xd1\x02\x01Hs\x12") 279 response = self.process_request(request) 280 summary("send handover response {}".format(response.type)) 281 return response
|
| /hostap-latest/doc/ |
| D | hostapd_ctrl_iface.doxygen | 30 messages, a request from the external program and a response from 40 unsolicited message between the command request and response. 45 unsolicited messages. This way command request/response pairs will
|
| D | p2p.doxygen | 207 \ref p2p_config::p2p_probe_req_rx() and P2P module request a response to 231 \ref p2p_prov_disc_req(). The response to this will be reported with the 293 removed automatically after the response has been received. 304 \ref p2p_config::sd_request() callback. The response to the query is sent 312 services. This value is included in all SD request and response
|
| D | ctrl_iface.doxygen | 31 messages, a request from the external program and a response from 41 unsolicited message between the command request and response. 46 unsolicited messages. This way command request/response pairs will 513 response TLV(s). The first three parameters are copied from the 1025 response. The following parameters are included after the event prefix:
|
| /hostap-latest/src/utils/ |
| D | browser.c | 124 WebKitResponsePolicyDecision *response; in view_cb_decide_policy() local 126 response = WEBKIT_RESPONSE_POLICY_DECISION(policy); in view_cb_decide_policy() 128 response)) { in view_cb_decide_policy()
|
| /hostap-latest/src/fst/ |
| D | fst_session.c | 1411 char response[FST_MAX_COMMAND_WORD_NAME_LENGTH]; in fst_test_req_send_fst_response() local 1425 if (!fst_read_next_text_param(endp, response, sizeof(response), in fst_test_req_send_fst_response() 1427 if (!os_strcasecmp(response, FST_CS_PVAL_RESPONSE_REJECT)) in fst_test_req_send_fst_response() 1464 if (!fst_read_next_text_param(endp, response, sizeof(response), in fst_test_req_send_fst_response() 1466 if (!os_strcasecmp(response, FST_CTR_PVAL_BAD_NEW_BAND)) in fst_test_req_send_fst_response()
|
| /hostap-latest/wpa_supplicant/doc/docbook/ |
| D | wpa_cli.sgml | 49 challenge-response that uses an external device for generating the 50 response.</para> 101 <para>Example request for generic token card challenge-response:</para>
|
| /hostap-latest/wpa_supplicant/ |
| D | README-P2P | 248 This command sends a provision discovery response from responder side. 317 two optional parameters service information, and response info. 337 Session response information - Optional (used only if auto accept is TRUE) 367 Session response information - Optional (used only if auto accept is TRUE) 384 peers (note: this can result in long response frames). The pending 484 response TLV(s). The first three parameters are copied from the 505 that there is quite strict limit on how quickly the response needs to 608 immediately and the response from the GO is indicated in a
|
| D | README-HS20 | 82 # If this is set, scans will be used to request response only from BSSes 315 # 1 = try to use OCSP stapling, but not require response 316 # 2 = require valid OCSP stapling response
|
| D | README | 696 challenge-response that uses an external device for generating the 697 response. 742 Example request for generic token card challenge-response: 1154 with DSCP response on receipt of a successful DSCP request from its 1155 associated AP. wpa_supplicant sends DSCP policy response based on the
|
| /hostap-latest/tests/ |
| D | cipher-and-key-mgmt-testing.txt | 127 Received 5 response(s) 134 Received 0 response(s)
|