/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ctrl_iface.h | 20 * @resp_len: Variable to be set to the response length 21 * Returns: Response (*resp_len bytes) or %NULL on failure 27 * this. If %NULL is returned, *resp_len can be set to two special values: 28 * 1 = send "FAIL\n" response, 2 = send "OK\n" response. If *resp_len has any 32 char *buf, size_t *resp_len); 38 * @resp_len: Variable to be set to the response length 39 * Returns: Response (*resp_len bytes) or %NULL on failure 44 * freeing the buffer after this. If %NULL is returned, *resp_len can be set to 46 * *resp_len has any other value, no response is sent. 49 char *buf, size_t *resp_len); [all...] |
H A D | gas_query.c | 442 u16 comeback_delay, resp_len; local 544 resp_len = WPA_GET_LE16(pos); 548 if (resp_len > left) { 554 if (resp_len < left) { 557 left - resp_len, MAC2STR(sa)); 561 gas_query_rx_comeback(gas, query, adv_proto, pos, resp_len, 564 gas_query_rx_initial(gas, query, adv_proto, pos, resp_len,
|
H A D | ctrl_iface.c | 6215 size_t resp_len, start, requested_len; local 6239 resp_len = wpabuf_len(resp); 6241 requested_len = resp_len; 6246 if (start > resp_len) 6253 if (start + requested_len > resp_len) 6263 if (start + requested_len == resp_len) { 7987 char *buf, size_t *resp_len) 8017 *resp_len = 1; 8657 *resp_len = reply_len; 8890 char *cmd, size_t *resp_len) 7986 wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s, char *buf, size_t *resp_len) argument 8888 wpas_global_ctrl_iface_ifname(struct wpa_global *global, const char *ifname, char *cmd, size_t *resp_len) argument 8912 wpas_global_ctrl_iface_redir_p2p(struct wpa_global *global, char *buf, size_t *resp_len) argument 8991 wpas_global_ctrl_iface_redir_wfd(struct wpa_global *global, char *buf, size_t *resp_len) argument 9006 wpas_global_ctrl_iface_redir(struct wpa_global *global, char *buf, size_t *resp_len) argument 9129 wpa_supplicant_global_ctrl_iface_process(struct wpa_global *global, char *buf, size_t *resp_len) argument [all...] |
/external/wpa_supplicant_8/hs20/client/ |
H A D | est.c | 100 size_t pkcs7_len, resp_len; local 128 resp = os_readfile("Cert/est-cacerts.txt", &resp_len); 135 pkcs7 = base64_decode((unsigned char *) resp, resp_len, &pkcs7_len); 136 if (pkcs7 && pkcs7_len < resp_len / 2) { 138 (unsigned int) pkcs7_len, (unsigned int) resp_len); 144 pkcs7 = os_malloc(resp_len); 146 os_memcpy(pkcs7, resp, resp_len); 147 pkcs7_len = resp_len; 569 size_t resp_len; local 575 resp = os_readfile("Cert/est-csrattrs.txt", &resp_len); 619 size_t buflen, resp_len, len, pkcs7_len; local [all...] |
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | http-utils.h | 56 size_t *resp_len);
|
H A D | http_curl.c | 1576 size_t *resp_len) 1626 if (resp_len) 1627 *resp_len = ctx->curl_buf_len; 1571 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument
|
/external/wpa_supplicant_8/src/utils/ |
H A D | http-utils.h | 56 size_t *resp_len);
|
H A D | http_curl.c | 1576 size_t *resp_len) 1626 if (resp_len) 1627 *resp_len = ctx->curl_buf_len; 1571 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | http-utils.h | 56 size_t *resp_len);
|
H A D | http_curl.c | 1576 size_t *resp_len) 1626 if (resp_len) 1627 *resp_len = ctx->curl_buf_len; 1571 http_post(struct http_ctx *ctx, const char *url, const char *data, const char *content_type, const char *ext_hdr, const char *ca_fname, const char *username, const char *password, const char *client_cert, const char *client_key, size_t *resp_len) argument
|
/external/wpa_supplicant_8/hostapd/ |
H A D | hlr_auc_gw.c | 643 static int sim_req_auth(char *imsi, char *resp, size_t resp_len) argument 662 rend = resp + resp_len; 716 static int gsm_auth_req(char *imsi, char *resp, size_t resp_len) argument 729 rend = resp + resp_len; 788 static int aka_req_auth(char *imsi, char *resp, size_t resp_len) argument 839 end = resp + resp_len; 865 static int aka_auts(char *imsi, char *resp, size_t resp_len) argument 920 static int process_cmd(char *cmd, char *resp, size_t resp_len) argument 923 return sim_req_auth(cmd + 13, resp, resp_len); 926 return gsm_auth_req(cmd + 13, resp, resp_len); [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | beacon.c | 364 int is_p2p, size_t *resp_len) 497 *resp_len = pos - (u8 *) resp; 550 size_t i, resp_len; local 716 &resp_len); 727 if (hostapd_drv_send_mlme(hapd, resp, resp_len, noack) < 0) 739 size_t *resp_len) 770 return hostapd_gen_probe_resp(hapd, NULL, 0, resp_len); 783 size_t resp_len = 0; local 944 resp = hostapd_probe_resp_offloads(hapd, &resp_len); 953 params->proberesp_len = resp_len; 362 hostapd_gen_probe_resp(struct hostapd_data *hapd, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) argument 738 hostapd_probe_resp_offloads(struct hostapd_data *hapd, size_t *resp_len) argument [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | beacon.c | 364 int is_p2p, size_t *resp_len) 497 *resp_len = pos - (u8 *) resp; 550 size_t i, resp_len; local 716 &resp_len); 727 if (hostapd_drv_send_mlme(hapd, resp, resp_len, noack) < 0) 739 size_t *resp_len) 770 return hostapd_gen_probe_resp(hapd, NULL, 0, resp_len); 783 size_t resp_len = 0; local 944 resp = hostapd_probe_resp_offloads(hapd, &resp_len); 953 params->proberesp_len = resp_len; 362 hostapd_gen_probe_resp(struct hostapd_data *hapd, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) argument 738 hostapd_probe_resp_offloads(struct hostapd_data *hapd, size_t *resp_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | beacon.c | 364 int is_p2p, size_t *resp_len) 497 *resp_len = pos - (u8 *) resp; 550 size_t i, resp_len; local 716 &resp_len); 727 if (hostapd_drv_send_mlme(hapd, resp, resp_len, noack) < 0) 739 size_t *resp_len) 770 return hostapd_gen_probe_resp(hapd, NULL, 0, resp_len); 783 size_t resp_len = 0; local 944 resp = hostapd_probe_resp_offloads(hapd, &resp_len); 953 params->proberesp_len = resp_len; 362 hostapd_gen_probe_resp(struct hostapd_data *hapd, const struct ieee80211_mgmt *req, int is_p2p, size_t *resp_len) argument 738 hostapd_probe_resp_offloads(struct hostapd_data *hapd, size_t *resp_len) argument [all...] |