Home
last modified time | relevance | path

Searched refs:response (Results 1 – 25 of 31) sorted by relevance

12

/hostap-latest/src/common/
Dgas_server.c57 static void gas_server_free_response(struct gas_server_response *response);
62 struct gas_server_response *response = eloop_ctx; in gas_server_response_timeout() local
66 response, MAC2STR(response->dst), response->dialog_token, in gas_server_response_timeout()
67 response->freq, response->frag_id, in gas_server_response_timeout()
68 (unsigned long) response->offset, in gas_server_response_timeout()
69 (unsigned long) (response->resp ? in gas_server_response_timeout()
70 wpabuf_len(response->resp) : 0)); in gas_server_response_timeout()
71 response->handler->status_cb(response->handler->ctx, in gas_server_response_timeout()
72 response->resp, 0); in gas_server_response_timeout()
73 response->resp = NULL; in gas_server_response_timeout()
[all …]
/hostap-latest/src/crypto/
Dms_funcs.c146 u8 *response) in challenge_response() argument
150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response()
151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response()
156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response()
174 u8 *response) in generate_nt_response() argument
182 challenge_response(challenge, password_hash, response)) in generate_nt_response()
202 u8 *response) in generate_nt_response_pwhash() argument
209 challenge_response(challenge, password_hash, response)) in generate_nt_response_pwhash()
231 const u8 *nt_response, u8 *response) in generate_authenticator_response_pwhash() argument
257 addr2[0] = response; in generate_authenticator_response_pwhash()
[all …]
Dms_funcs.h15 u8 *response);
20 u8 *response);
25 const u8 *nt_response, u8 *response);
30 const u8 *nt_response, u8 *response);
32 size_t password_len, u8 *response);
35 u8 *response);
Dtls_openssl_ocsp.c60 ASN1_OCTET_STRING *response; member
75 ASN1_SIMPLE(ResponseBytes, response, ASN1_OCTET_STRING)
543 basic_data = ASN1_STRING_data(bytes->response); in check_ocsp_resp()
544 basic_len = ASN1_STRING_length(bytes->response); in check_ocsp_resp()
Dtls_wolfssl.c1491 unsigned char **response) in ocsp_status_cb() argument
1500 *response = NULL; in ocsp_status_cb()
1504 *response = (unsigned char *) os_readfile(url, &len); in ocsp_status_cb()
1505 if (!*response) { in ocsp_status_cb()
1516 void ocsp_resp_free_cb(void *ocsp_stapling_response, unsigned char *response) in ocsp_resp_free_cb() argument
1518 os_free(response); in ocsp_resp_free_cb()
Dtls_gnutls.c994 gnutls_datum_t response, buf; in check_ocsp() local
1024 res = gnutls_ocsp_status_request_get(session, &response); in check_ocsp()
1034 res = gnutls_ocsp_resp_import(resp, &response); in check_ocsp()
/hostap-latest/tests/hwsim/
Dtest_dscp.py108 def handle_dscp_response(hapd, response): argument
110 if msg['payload'] != response:
351 response = b'\x7e\x50\x6f\x9a\x1a\x02\x01\x00\x02\x01\x00\x04\x00'
352 handle_dscp_response(hapd, response)
358 response = b'\x7e\x50\x6f\x9a\x1a\x02\x00\x03\x00'
359 handle_dscp_response(hapd, response)
365 response = b'\x7e\x50\x6f\x9a\x1a\x02\x00\x00\x01\x02\x00'
366 handle_dscp_response(hapd, response)
Dfst_module_aux.py365 def send_session_setup_response(self, sid, response): argument
366 request = "FST-MANAGER SESSION_RESPOND " + sid + " " + response
383 response, additional_parameter=None):
384 request = "FST-MANAGER TEST_REQUEST SEND_SETUP_RESPONSE " + fsts_id + " " + response
445 def initiate_session(self, sid, response="accept"): argument
475 if response == '':
477 if response != "timeout":
478 …s = self.peer_obj.grequest("FST-MANAGER SESSION_RESPOND "+ event['id'] + " " + response) # Or rej…
/hostap-latest/src/eap_common/
Dchap.c16 size_t challenge_len, u8 *response) in chap_md5() argument
27 return md5_vector(3, addr, len, response); in chap_md5()
Dchap.h15 size_t challenge_len, u8 *response);
/hostap-latest/hostapd/
Dwps-ap-nfc.py120 response = nfc.ndef.Message("\xd1\x02\x01Hs\x12")
129 response = self.process_request(request)
130 summary("send handover response {}".format(response.type))
131 return response
/hostap-latest/src/eap_server/
Deap_server_ttls.c622 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschap() argument
626 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap()
657 challenge, response + 2 + 24); in eap_ttls_process_phase2_mschap()
662 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) { in eap_ttls_process_phase2_mschap()
679 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { in eap_ttls_process_phase2_mschap()
686 response + 2 + 24, 24); in eap_ttls_process_phase2_mschap()
698 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschapv2() argument
704 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschapv2()
754 response[0] != chal[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]) { in eap_ttls_process_phase2_mschapv2()
763 peer_challenge = response + 2; in eap_ttls_process_phase2_mschapv2()
[all …]
Deap.h302 const u8 *challenge, const u8 *response);
/hostap-latest/wpa_supplicant/examples/
Dwps-nfc.py149 response = nfc.ndef.Message("\xd1\x02\x01Hs\x12")
158 response = self.process_request(request)
159 summary("send handover response {}".format(response.type))
160 return response
Dp2p-nfc.py270 response = nfc.ndef.Message("\xd1\x02\x01Hs\x12")
279 response = self.process_request(request)
280 summary("send handover response {}".format(response.type))
281 return response
/hostap-latest/doc/
Dhostapd_ctrl_iface.doxygen30 messages, a request from the external program and a response from
40 unsolicited message between the command request and response.
45 unsolicited messages. This way command request/response pairs will
Dp2p.doxygen207 \ref p2p_config::p2p_probe_req_rx() and P2P module request a response to
231 \ref p2p_prov_disc_req(). The response to this will be reported with the
293 removed automatically after the response has been received.
304 \ref p2p_config::sd_request() callback. The response to the query is sent
312 services. This value is included in all SD request and response
Dctrl_iface.doxygen31 messages, a request from the external program and a response from
41 unsolicited message between the command request and response.
46 unsolicited messages. This way command request/response pairs will
513 response TLV(s). The first three parameters are copied from the
1025 response. The following parameters are included after the event prefix:
/hostap-latest/src/utils/
Dbrowser.c124 WebKitResponsePolicyDecision *response; in view_cb_decide_policy() local
126 response = WEBKIT_RESPONSE_POLICY_DECISION(policy); in view_cb_decide_policy()
128 response)) { in view_cb_decide_policy()
/hostap-latest/src/fst/
Dfst_session.c1411 char response[FST_MAX_COMMAND_WORD_NAME_LENGTH]; in fst_test_req_send_fst_response() local
1425 if (!fst_read_next_text_param(endp, response, sizeof(response), in fst_test_req_send_fst_response()
1427 if (!os_strcasecmp(response, FST_CS_PVAL_RESPONSE_REJECT)) in fst_test_req_send_fst_response()
1464 if (!fst_read_next_text_param(endp, response, sizeof(response), in fst_test_req_send_fst_response()
1466 if (!os_strcasecmp(response, FST_CTR_PVAL_BAD_NEW_BAND)) in fst_test_req_send_fst_response()
/hostap-latest/wpa_supplicant/doc/docbook/
Dwpa_cli.sgml49 challenge-response that uses an external device for generating the
50 response.</para>
101 <para>Example request for generic token card challenge-response:</para>
/hostap-latest/wpa_supplicant/
DREADME-P2P248 This command sends a provision discovery response from responder side.
317 two optional parameters service information, and response info.
337 Session response information - Optional (used only if auto accept is TRUE)
367 Session response information - Optional (used only if auto accept is TRUE)
384 peers (note: this can result in long response frames). The pending
484 response TLV(s). The first three parameters are copied from the
505 that there is quite strict limit on how quickly the response needs to
608 immediately and the response from the GO is indicated in a
DREADME-HS2082 # If this is set, scans will be used to request response only from BSSes
315 # 1 = try to use OCSP stapling, but not require response
316 # 2 = require valid OCSP stapling response
DREADME696 challenge-response that uses an external device for generating the
697 response.
742 Example request for generic token card challenge-response:
1154 with DSCP response on receipt of a successful DSCP request from its
1155 associated AP. wpa_supplicant sends DSCP policy response based on the
/hostap-latest/tests/
Dcipher-and-key-mgmt-testing.txt127 Received 5 response(s)
134 Received 0 response(s)

12