/nrf52832-nimble/rt-thread/components/drivers/spi/ |
H A D | spi_msd.c | 143 uint8_t *response in _send_cmd() argument 184 message.recv_buf = response; in _send_cmd() 191 if (0 == (response[0] & 0x80)) in _send_cmd() 195 } /* wait response */ in _send_cmd() 238 message.recv_buf = response + 1; in _send_cmd() 249 message.recv_buf = response + 1; in _send_cmd() 404 /* put crc and get data response */ in _write_block() 407 uint8_t response; in _write_block() local 418 // response = 0x0E & recv_buffer[2]; in _write_block() 419 response = MSD_GET_DATA_RESPONSE(recv_buffer[2]); in _write_block() [all …]
|
/nrf52832-nimble/rt-thread/components/net/at/src/ |
H A D | at_client.c | 35 * Create response object. 37 * @param buf_size the maximum response buffer size 38 * @param line_num the number of setting response lines 39 * = 0: the response data will auto return when received 'OK' or 'ERROR' 40 * != 0: the response data will return when received setting lines number data 41 * @param timeout the maximum response time 43 * @return != RT_NULL: response object 53 LOG_E("AT create response object failed! No memory for response object!"); in at_create_resp() 60 LOG_E("AT create response object failed! No memory for response buffer!"); in at_create_resp() 74 * Delete and free response object. [all …]
|
/nrf52832-nimble/rt-thread/components/net/lwip-2.1.0/src/netif/ppp/ |
H A D | chap_ms.c | 34 * Implemented LANManager type password response to MS-CHAP challenges. 104 #define MS_CHAP_RESPONSE_LEN 49 /* Response length for MS-CHAP */ 105 #define MS_CHAP2_RESPONSE_LEN 49 /* Response length for MS-CHAPv2 */ 106 #define MS_AUTH_RESPONSE_LENGTH 40 /* MS-CHAPv2 authenticator response, */ 118 * Offsets within the response field for MS-CHAP 127 * Offsets within the response field for MS-CHAP2 251 const unsigned char *challenge, const unsigned char *response, in chapms_verify_response() argument 260 response_len = *response++; in chapms_verify_response() 265 if (!response[MS_CHAP_USENT]) { in chapms_verify_response() 272 /* Generate the expected response. */ in chapms_verify_response() [all …]
|
H A D | chap-md5.c | 63 const unsigned char *challenge, const unsigned char *response, in chap_md5_verify_response() argument 73 response_len = *response++; in chap_md5_verify_response() 84 /* Test if our hash matches the peer's response */ in chap_md5_verify_response() 85 if (memcmp(hash, response, MD5_HASH_SIZE) == 0) { in chap_md5_verify_response() 95 static void chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_n… in chap_md5_make_response() argument 110 lwip_md5_finish(&ctx, &response[1]); in chap_md5_make_response() 112 response[0] = MD5_HASH_SIZE; in chap_md5_make_response()
|
H A D | chap-new.c | 56 const unsigned char *challenge, const unsigned char *response, 97 const unsigned char *challenge, const unsigned char *response, 280 * chap_handle_response - check the response to our challenge. 285 const unsigned char *response; local 301 response = pkt; 330 response, pcb->chap_server.message, sizeof(pcb->chap_server.message)); 334 response, message, sizeof(message)); 345 /* send the response */ 407 * chap_verify_response - check whether the peer's response matches 413 const unsigned char *challenge, const unsigned char *response, argument [all …]
|
/nrf52832-nimble/rt-thread/components/net/lwip-2.0.2/src/netif/ppp/ |
H A D | chap_ms.c | 34 * Implemented LANManager type password response to MS-CHAP challenges. 104 #define MS_CHAP_RESPONSE_LEN 49 /* Response length for MS-CHAP */ 105 #define MS_CHAP2_RESPONSE_LEN 49 /* Response length for MS-CHAPv2 */ 106 #define MS_AUTH_RESPONSE_LENGTH 40 /* MS-CHAPv2 authenticator response, */ 118 * Offsets within the response field for MS-CHAP 127 * Offsets within the response field for MS-CHAP2 251 const unsigned char *challenge, const unsigned char *response, in chapms_verify_response() argument 260 response_len = *response++; in chapms_verify_response() 265 if (!response[MS_CHAP_USENT]) { in chapms_verify_response() 272 /* Generate the expected response. */ in chapms_verify_response() [all …]
|
H A D | chap-md5.c | 63 const unsigned char *challenge, const unsigned char *response, in chap_md5_verify_response() argument 73 response_len = *response++; in chap_md5_verify_response() 84 /* Test if our hash matches the peer's response */ in chap_md5_verify_response() 85 if (memcmp(hash, response, MD5_HASH_SIZE) == 0) { in chap_md5_verify_response() 95 static void chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_n… in chap_md5_make_response() argument 110 lwip_md5_finish(&ctx, &response[1]); in chap_md5_make_response() 112 response[0] = MD5_HASH_SIZE; in chap_md5_make_response()
|
H A D | chap-new.c | 56 const unsigned char *challenge, const unsigned char *response, 97 const unsigned char *challenge, const unsigned char *response, 280 * chap_handle_response - check the response to our challenge. 285 const unsigned char *response; local 301 response = pkt; 330 response, pcb->chap_server.message, sizeof(pcb->chap_server.message)); 334 response, message, sizeof(message)); 345 /* send the response */ 407 * chap_verify_response - check whether the peer's response matches 413 const unsigned char *challenge, const unsigned char *response, argument [all …]
|
/nrf52832-nimble/rt-thread/components/drivers/usb/usbdevice/class/ |
H A D | rndis.c | 310 struct rt_rndis_response * response; in _rndis_init_response() local 312 response = rt_malloc(sizeof(struct rt_rndis_response)); in _rndis_init_response() 315 if( (response == RT_NULL) || (resp == RT_NULL) ) in _rndis_init_response() 319 if(response != RT_NULL) in _rndis_init_response() 320 rt_free(response); in _rndis_init_response() 343 response->buffer = resp; in _rndis_init_response() 347 rt_list_insert_before(&((rt_rndis_eth_t)func->user_data)->response_list, &response->list); in _rndis_init_response() 380 rt_uint32_t * response = (rt_uint32_t *)((char *)resp + sizeof(struct rndis_query_cmplt)); in _set_resp() local 381 *response = value; in _set_resp() 387 struct rt_rndis_response * response; in _rndis_query_response() local [all …]
|
H A D | rndis.h | 100 /* Response */ 140 /* Response */ 165 /* Response */ 202 /* Response: */
|
/nrf52832-nimble/rt-thread/components/net/at/include/ |
H A D | at.h | 116 AT_RESP_OK = 0, /* AT response end is OK */ 117 AT_RESP_ERROR = -1, /* AT response end is ERROR */ 118 AT_RESP_TIMEOUT = -2, /* AT response is timeout */ 119 AT_RESP_BUFF_FULL= -3, /* AT response buffer is full */ 125 /* response buffer */ 127 /* the maximum response buffer size */ 129 /* the number of setting response lines 130 * == 0: the response data will auto return when received 'OK' or 'ERROR' 131 * != 0: the response data will return when received setting lines number data */ 133 /* the count of received response lines */ [all …]
|
/nrf52832-nimble/rt-thread/components/net/lwip-1.4.1/src/netif/ppp/ |
H A D | chpms.c | 62 * Implemented LANManager type password response to MS-CHAP challenges. 102 u_char UseNT; /* If 1, ignore the LANMan response field */ 128 u_char *response /* OUT 24 octets */ 135 MS_ChapResponse *response 145 u_char *response /* OUT 24 octets */) in ChallengeResponse() argument 156 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); in ChallengeResponse() 157 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); in ChallengeResponse() 158 DesEncrypt(challenge, ZPasswordHash + 14, response + 16); in ChallengeResponse() 161 log_packet(response, 24, "ChallengeResponse - response", LOG_DEBUG); in ChallengeResponse() 309 MS_ChapResponse *response) in ChapMS_NT() argument [all …]
|
H A D | chap.h | 81 #define MS_CHAP_RESPONSE_LEN 49 /* Response length for MS-CHAP */ 113 int resp_transmits; /* Number of transmissions of response */ 114 u_char response[MAX_RESPONSE_LENGTH]; /* Response to send */ member 115 u_char resp_length; /* length of response */ 116 u_char resp_id; /* ID for response messages */ 118 char *resp_name; /* Our name to send with response */ 129 #define CHAPCS_RESPONSE 4 /* Sent response, waiting for status */
|
H A D | chap.c | 252 * ChapResponseTimeout - Timeout expired on sending response. 259 /* if we aren't sending a response, don't worry. */ in ChapResponseTimeout() 264 ChapSendResponse(cstate); /* re-send response */ in ChapResponseTimeout() 276 /* if we aren't sending a response, don't worry. */ in ChapRechallenge() 420 * ChapReceiveChallenge - Receive Challenge and send Response. 480 /* cancel response send timeout if necessary */ in ChapReceiveChallenge() 497 BCOPY(hash, cstate->response, MD5_SIGNATURE_SIZE); in ChapReceiveChallenge() 518 * ChapReceiveResponse - Receive and process response. 545 * If we have received a duplicate or bogus Response, in ChapReceiveResponse() 547 * as we did for the first Response we saw. in ChapReceiveResponse() [all …]
|
/nrf52832-nimble/rt-thread/components/net/freemodbus/modbus/include/ |
H A D | mb.h | 230 * <em>Report Slave ID</em> response. 234 * bytes of the <em> Report Slave ID</em> response. 250 * the creation of an appropriate response. In case of an error it should return 301 * Modbus response is sent. 304 * <b>ILLEGAL DATA ADDRESS</b> exception frame is sent as a response. 306 * currently not available and the application dependent response 308 * exception is sent as a response. 310 * a <b>SLAVE DEVICE FAILURE</b> exception is sent as a response. 336 * Modbus response is sent. 339 * <b>ILLEGAL DATA ADDRESS</b> exception frame is sent as a response. [all …]
|
/nrf52832-nimble/rt-thread/components/net/lwip-2.1.0/src/core/ipv6/ |
H A D | icmp6.c | 212 * This function must be used only in direct response to a packet that is being 228 * This function must be used only in direct response to a packet that is being 244 * This function must be used only in direct response to a packet that is being 261 * This function may be used to send a response sometime after receiving the 262 * packet for which this response is meant. The provided source and destination 282 * This function must be used only in direct response to a packet that is being 299 * Send an ICMPv6 packet in response to an incoming packet. 302 * @param p the input packet for which the response should be sent, 314 LWIP_ASSERT("icmpv6 packet not a direct response", netif != NULL); in icmp6_send_response() 327 * Send an ICMPv6 packet in response to an incoming packet. [all …]
|
/nrf52832-nimble/packages/NimBLE-latest/nimble/controller/src/ |
H A D | ble_ll_hci.c | 300 * @param rspbuf Pointer to response buffer 301 * @param rsplen Length of response buffer 405 * @param rspbuf Pointer to response buffer 406 * @param rsplen Length of response buffer 448 * @param rspbuf Pointer to response buffer 449 * @param rsplen Length of response buffer 467 * @param rspbuf Pointer to response buffer 468 * @param rsplen Length of response buffer 489 * @param rspbuf Pointer to response buffer 490 * @param rsplen Length of response buffer [all …]
|
/nrf52832-nimble/packages/NimBLE-latest/apps/blecsc/src/ |
H A D | gatt_svr.c | 174 uint8_t response = SC_CP_RESPONSE_OP_NOT_SUPPORTED; in gatt_svr_chr_access_sc_control_point() local 193 /* Allocate response buffer */ in gatt_svr_chr_access_sc_control_point() 213 response = SC_CP_RESPONSE_SUCCESS; in gatt_svr_chr_access_sc_control_point() 229 response = SC_CP_RESPONSE_INVALID_PARAM; in gatt_svr_chr_access_sc_control_point() 233 response = SC_CP_RESPONSE_SUCCESS; in gatt_svr_chr_access_sc_control_point() 240 response = SC_CP_RESPONSE_SUCCESS; in gatt_svr_chr_access_sc_control_point() 248 /* Append response value */ in gatt_svr_chr_access_sc_control_point() 249 rc = os_mbuf_append(om_indication, &response, sizeof(response)); in gatt_svr_chr_access_sc_control_point()
|
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/src/ |
H A D | ble_att_svr.c | 38 * Both of these handlers attempt to allocate a new buffer for the response 41 * "insufficient resources" ATT error response. These handlers don't reuse the 42 * request mbuf for an affirmative response because the buffer contains the 357 * Allocates an mbuf to be used for an ATT response. If an mbuf cannot be 358 * allocated, the received request mbuf is reused for the error response. 369 /* Allocation failure. Reuse receive buffer for response. */ in ble_att_svr_pkt() 585 * Transmits a response or error message over the specified connection. 588 * o If rc == 0: tx an affirmative response. 589 * o Else if err_status != 0: tx an error response. 592 * In addition, if transmission of an affirmative response fails, an error is [all …]
|
H A D | ble_gattc.c | 68 * The maximum time to wait for a single ATT response. The spec defines this 215 * Error functions - these handle an incoming ATT error response and apply it 291 * timed out while waiting for a response. 1051 * op code of the incoming response. 1260 * Handles an incoming ATT error response for the specified mtu-exchange proc. 1410 * Handles an incoming ATT error response for the specified 1428 * Handles an incoming attribute data entry from a read-group-type response for 1480 * Handles a notification that an incoming read-group-type response has been 1638 * Handles an incoming ATT error response for the specified 1656 * Handles an incoming "handles info" entry from a find-type-value response for [all …]
|
/nrf52832-nimble/rt-thread/components/net/lwip-2.0.2/src/include/netif/ppp/ |
H A D | chap-new.h | 62 * Semi-arbitrary limits on challenge and response fields. 68 * These limits apply to challenge and response packets we send. 132 * Note: challenge and response arguments below are formatted as 133 * a length byte followed by the actual challenge/response data. 138 const unsigned char *challenge, const unsigned char *response, 141 void (*make_response)(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, 176 unsigned char *challenge, unsigned char *response,
|
/nrf52832-nimble/rt-thread/components/net/lwip-2.1.0/src/include/netif/ppp/ |
H A D | chap-new.h | 66 * Semi-arbitrary limits on challenge and response fields. 72 * These limits apply to challenge and response packets we send. 136 * Note: challenge and response arguments below are formatted as 137 * a length byte followed by the actual challenge/response data. 142 const unsigned char *challenge, const unsigned char *response, 145 void (*make_response)(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name, 180 unsigned char *challenge, unsigned char *response,
|
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/test/src/ |
H A D | ble_gatt_write_test.c | 153 /* Receive Prep Write response. */ in ble_gatt_write_test_misc_long_good() 166 /* Receive Exec Write response. */ in ble_gatt_write_test_misc_long_good() 209 /* Receive Prep Write response. */ in ble_gatt_write_test_misc_long_bad() 338 /* Receive Prep Write response. */ in ble_gatt_write_test_misc_reliable_good() 355 /* Receive Exec Write response. */ in ble_gatt_write_test_misc_reliable_good() 385 /* No response expected; verify callback not called. */ in TEST_CASE() 405 /* Response not received yet; verify callback not called. */ in TEST_CASE() 408 /* Receive write response. */ in TEST_CASE() 583 /* Receive Prep Write response. */ in TEST_CASE() 644 /* Exhaust the msys pool. Leave one mbuf for the forthcoming response. */ in TEST_CASE() [all …]
|
H A D | ble_att_clt_test.c | 113 /* Receive response with attribute mapping. */ in TEST_CASE() 129 /* Receive response with attribute mapping. */ in TEST_CASE() 145 /* Receive response with attribute mappings. */ in TEST_CASE() 305 /*** Larger response. */ in TEST_CASE() 310 /*** Zero-length response. */ in TEST_CASE() 347 /*** Larger response. */ in TEST_CASE() 352 /*** Zero-length response. */ in TEST_CASE() 400 /*** Larger response. */ in TEST_CASE() 409 /*** Zero-length response. */ in TEST_CASE()
|
/nrf52832-nimble/rt-thread/components/net/lwip-2.0.2/src/include/lwip/apps/ |
H A D | sntp_opts.h | 95 * - >= 1 to check address and port of the response packet to ensure the 96 * response comes from the server we sent the request to. 98 * sent to the server (to ensure response to older request). 143 * to send in request and compare in response. 149 /** Default retry timeout (in milliseconds) if the response
|