/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ctrl_iface.h | 20 * @resp_len: Variable to be set to the response length 21 * Returns: Response (*resp_len bytes) or %NULL on failure 27 * this. If %NULL is returned, *resp_len can be set to two special values: 28 * 1 = send "FAIL\n" response, 2 = send "OK\n" response. If *resp_len has any 32 char *buf, size_t *resp_len); 38 * @resp_len: Variable to be set to the response length 39 * Returns: Response (*resp_len bytes) or %NULL on failure 44 * freeing the buffer after this. If %NULL is returned, *resp_len can be set to 46 * *resp_len has any other value, no response is sent. 49 char *buf, size_t *resp_len); [all...] |
H A D | gas_query.c | 442 u16 comeback_delay, resp_len; local 543 resp_len = WPA_GET_LE16(pos); 546 if (pos + resp_len > data + len) { 552 if (pos + resp_len < data + len) { 555 (unsigned int) (data + len - pos - resp_len), 560 gas_query_rx_comeback(gas, query, adv_proto, pos, resp_len, 563 gas_query_rx_initial(gas, query, adv_proto, pos, resp_len,
|
H A D | ctrl_iface.c | 5251 size_t resp_len, start, requested_len; local 5275 resp_len = wpabuf_len(resp); 5277 requested_len = resp_len; 5282 if (start > resp_len) 5289 if (start + requested_len > resp_len) 5299 if (start + requested_len == resp_len) { 6458 char *buf, size_t *resp_len) 6488 *resp_len = 1; 7041 *resp_len = reply_len; 7220 char *cmd, size_t *resp_len) 6457 wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s, char *buf, size_t *resp_len) argument 7218 wpas_global_ctrl_iface_ifname(struct wpa_global *global, const char *ifname, char *cmd, size_t *resp_len) argument 7242 wpas_global_ctrl_iface_redir_p2p(struct wpa_global *global, char *buf, size_t *resp_len) argument 7316 wpas_global_ctrl_iface_redir_wfd(struct wpa_global *global, char *buf, size_t *resp_len) argument 7331 wpas_global_ctrl_iface_redir(struct wpa_global *global, char *buf, size_t *resp_len) argument 7454 wpa_supplicant_global_ctrl_iface_process(struct wpa_global *global, char *buf, size_t *resp_len) argument [all...] |
/external/wpa_supplicant_8/hs20/client/ |
H A D | est.c | 100 size_t pkcs7_len, resp_len; local 128 resp = os_readfile("Cert/est-cacerts.txt", &resp_len); 135 pkcs7 = base64_decode((unsigned char *) resp, resp_len, &pkcs7_len); 136 if (pkcs7 && pkcs7_len < resp_len / 2) { 138 (unsigned int) pkcs7_len, (unsigned int) resp_len); 144 pkcs7 = os_malloc(resp_len); 146 os_memcpy(pkcs7, resp, resp_len); 147 pkcs7_len = resp_len; 569 size_t resp_len; local 575 resp = os_readfile("Cert/est-csrattrs.txt", &resp_len); 619 size_t buflen, resp_len, len, pkcs7_len; local [all...] |
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | http-utils.h | 56 size_t *resp_len);
|
H A D | http_curl.c | 1568 size_t *resp_len) 1618 if (resp_len) 1619 *resp_len = ctx->curl_buf_len; 1563 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument
|
/external/wpa_supplicant_8/src/utils/ |
H A D | http-utils.h | 56 size_t *resp_len);
|
H A D | http_curl.c | 1568 size_t *resp_len) 1618 if (resp_len) 1619 *resp_len = ctx->curl_buf_len; 1563 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | http-utils.h | 56 size_t *resp_len);
|
H A D | http_curl.c | 1568 size_t *resp_len) 1618 if (resp_len) 1619 *resp_len = ctx->curl_buf_len; 1563 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument
|
/external/wpa_supplicant_8/hostapd/ |
H A D | hlr_auc_gw.c | 625 static int sim_req_auth(char *imsi, char *resp, size_t resp_len) argument 644 rend = resp + resp_len; 698 static int gsm_auth_req(char *imsi, char *resp, size_t resp_len) argument 711 rend = resp + resp_len; 770 static int aka_req_auth(char *imsi, char *resp, size_t resp_len) argument 817 end = resp + resp_len; 843 static int aka_auts(char *imsi, char *resp, size_t resp_len) argument 898 static int process_cmd(char *cmd, char *resp, size_t resp_len) argument 901 return sim_req_auth(cmd + 13, resp, resp_len); 904 return gsm_auth_req(cmd + 13, resp, resp_len); [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | beacon.c | 331 int is_p2p, size_t *resp_len) 454 *resp_len = pos - (u8 *) resp; 508 size_t i, resp_len; local 658 &resp_len); 669 if (hostapd_drv_send_mlme(hapd, resp, resp_len, noack) < 0) 681 size_t *resp_len) 712 return hostapd_gen_probe_resp(hapd, NULL, NULL, 0, resp_len); 725 size_t resp_len = 0; local 870 resp = hostapd_probe_resp_offloads(hapd, &resp_len); 879 params->proberesp_len = resp_len; 328 hostapd_gen_probe_resp(struct hostapd_data *hapd, struct sta_info *sta, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) argument 680 hostapd_probe_resp_offloads(struct hostapd_data *hapd, size_t *resp_len) argument [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | beacon.c | 331 int is_p2p, size_t *resp_len) 454 *resp_len = pos - (u8 *) resp; 508 size_t i, resp_len; local 658 &resp_len); 669 if (hostapd_drv_send_mlme(hapd, resp, resp_len, noack) < 0) 681 size_t *resp_len) 712 return hostapd_gen_probe_resp(hapd, NULL, NULL, 0, resp_len); 725 size_t resp_len = 0; local 870 resp = hostapd_probe_resp_offloads(hapd, &resp_len); 879 params->proberesp_len = resp_len; 328 hostapd_gen_probe_resp(struct hostapd_data *hapd, struct sta_info *sta, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) argument 680 hostapd_probe_resp_offloads(struct hostapd_data *hapd, size_t *resp_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | beacon.c | 331 int is_p2p, size_t *resp_len) 454 *resp_len = pos - (u8 *) resp; 508 size_t i, resp_len; local 658 &resp_len); 669 if (hostapd_drv_send_mlme(hapd, resp, resp_len, noack) < 0) 681 size_t *resp_len) 712 return hostapd_gen_probe_resp(hapd, NULL, NULL, 0, resp_len); 725 size_t resp_len = 0; local 870 resp = hostapd_probe_resp_offloads(hapd, &resp_len); 879 params->proberesp_len = resp_len; 328 hostapd_gen_probe_resp(struct hostapd_data *hapd, struct sta_info *sta, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) argument 680 hostapd_probe_resp_offloads(struct hostapd_data *hapd, size_t *resp_len) argument [all...] |