Home
last modified time | relevance | path

Searched full:response (Results 1 – 25 of 234) sorted by relevance

12345678910

/nrf52832-nimble/rt-thread/components/drivers/spi/
H A Dspi_msd.c143 uint8_t *response in _send_cmd() argument
184 message.recv_buf = response; in _send_cmd()
191 if (0 == (response[0] & 0x80)) in _send_cmd()
195 } /* wait response */ in _send_cmd()
238 message.recv_buf = response + 1; in _send_cmd()
249 message.recv_buf = response + 1; in _send_cmd()
404 /* put crc and get data response */ in _write_block()
407 uint8_t response; in _write_block() local
418 // response = 0x0E & recv_buffer[2]; in _write_block()
419 response = MSD_GET_DATA_RESPONSE(recv_buffer[2]); in _write_block()
[all …]
/nrf52832-nimble/rt-thread/components/net/at/src/
H A Dat_client.c35 * Create response object.
37 * @param buf_size the maximum response buffer size
38 * @param line_num the number of setting response lines
39 * = 0: the response data will auto return when received 'OK' or 'ERROR'
40 * != 0: the response data will return when received setting lines number data
41 * @param timeout the maximum response time
43 * @return != RT_NULL: response object
53 LOG_E("AT create response object failed! No memory for response object!"); in at_create_resp()
60 LOG_E("AT create response object failed! No memory for response buffer!"); in at_create_resp()
74 * Delete and free response object.
[all …]
/nrf52832-nimble/rt-thread/components/net/lwip-2.1.0/src/netif/ppp/
H A Dchap_ms.c34 * Implemented LANManager type password response to MS-CHAP challenges.
104 #define MS_CHAP_RESPONSE_LEN 49 /* Response length for MS-CHAP */
105 #define MS_CHAP2_RESPONSE_LEN 49 /* Response length for MS-CHAPv2 */
106 #define MS_AUTH_RESPONSE_LENGTH 40 /* MS-CHAPv2 authenticator response, */
118 * Offsets within the response field for MS-CHAP
127 * Offsets within the response field for MS-CHAP2
251 const unsigned char *challenge, const unsigned char *response, in chapms_verify_response() argument
260 response_len = *response++; in chapms_verify_response()
265 if (!response[MS_CHAP_USENT]) { in chapms_verify_response()
272 /* Generate the expected response. */ in chapms_verify_response()
[all …]
H A Dchap-md5.c63 const unsigned char *challenge, const unsigned char *response, in chap_md5_verify_response() argument
73 response_len = *response++; in chap_md5_verify_response()
84 /* Test if our hash matches the peer's response */ in chap_md5_verify_response()
85 if (memcmp(hash, response, MD5_HASH_SIZE) == 0) { in chap_md5_verify_response()
95 static void chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_n… in chap_md5_make_response() argument
110 lwip_md5_finish(&ctx, &response[1]); in chap_md5_make_response()
112 response[0] = MD5_HASH_SIZE; in chap_md5_make_response()
H A Dchap-new.c56 const unsigned char *challenge, const unsigned char *response,
97 const unsigned char *challenge, const unsigned char *response,
280 * chap_handle_response - check the response to our challenge.
285 const unsigned char *response; local
301 response = pkt;
330 response, pcb->chap_server.message, sizeof(pcb->chap_server.message));
334 response, message, sizeof(message));
345 /* send the response */
407 * chap_verify_response - check whether the peer's response matches
413 const unsigned char *challenge, const unsigned char *response, argument
[all …]
/nrf52832-nimble/rt-thread/components/net/lwip-2.0.2/src/netif/ppp/
H A Dchap_ms.c34 * Implemented LANManager type password response to MS-CHAP challenges.
104 #define MS_CHAP_RESPONSE_LEN 49 /* Response length for MS-CHAP */
105 #define MS_CHAP2_RESPONSE_LEN 49 /* Response length for MS-CHAPv2 */
106 #define MS_AUTH_RESPONSE_LENGTH 40 /* MS-CHAPv2 authenticator response, */
118 * Offsets within the response field for MS-CHAP
127 * Offsets within the response field for MS-CHAP2
251 const unsigned char *challenge, const unsigned char *response, in chapms_verify_response() argument
260 response_len = *response++; in chapms_verify_response()
265 if (!response[MS_CHAP_USENT]) { in chapms_verify_response()
272 /* Generate the expected response. */ in chapms_verify_response()
[all …]
H A Dchap-md5.c63 const unsigned char *challenge, const unsigned char *response, in chap_md5_verify_response() argument
73 response_len = *response++; in chap_md5_verify_response()
84 /* Test if our hash matches the peer's response */ in chap_md5_verify_response()
85 if (memcmp(hash, response, MD5_HASH_SIZE) == 0) { in chap_md5_verify_response()
95 static void chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_n… in chap_md5_make_response() argument
110 lwip_md5_finish(&ctx, &response[1]); in chap_md5_make_response()
112 response[0] = MD5_HASH_SIZE; in chap_md5_make_response()
H A Dchap-new.c56 const unsigned char *challenge, const unsigned char *response,
97 const unsigned char *challenge, const unsigned char *response,
280 * chap_handle_response - check the response to our challenge.
285 const unsigned char *response; local
301 response = pkt;
330 response, pcb->chap_server.message, sizeof(pcb->chap_server.message));
334 response, message, sizeof(message));
345 /* send the response */
407 * chap_verify_response - check whether the peer's response matches
413 const unsigned char *challenge, const unsigned char *response, argument
[all …]
/nrf52832-nimble/rt-thread/components/drivers/usb/usbdevice/class/
H A Drndis.c310 struct rt_rndis_response * response; in _rndis_init_response() local
312 response = rt_malloc(sizeof(struct rt_rndis_response)); in _rndis_init_response()
315 if( (response == RT_NULL) || (resp == RT_NULL) ) in _rndis_init_response()
319 if(response != RT_NULL) in _rndis_init_response()
320 rt_free(response); in _rndis_init_response()
343 response->buffer = resp; in _rndis_init_response()
347 rt_list_insert_before(&((rt_rndis_eth_t)func->user_data)->response_list, &response->list); in _rndis_init_response()
380 rt_uint32_t * response = (rt_uint32_t *)((char *)resp + sizeof(struct rndis_query_cmplt)); in _set_resp() local
381 *response = value; in _set_resp()
387 struct rt_rndis_response * response; in _rndis_query_response() local
[all …]
H A Drndis.h100 /* Response */
140 /* Response */
165 /* Response */
202 /* Response: */
/nrf52832-nimble/rt-thread/components/net/at/include/
H A Dat.h116 AT_RESP_OK = 0, /* AT response end is OK */
117 AT_RESP_ERROR = -1, /* AT response end is ERROR */
118 AT_RESP_TIMEOUT = -2, /* AT response is timeout */
119 AT_RESP_BUFF_FULL= -3, /* AT response buffer is full */
125 /* response buffer */
127 /* the maximum response buffer size */
129 /* the number of setting response lines
130 * == 0: the response data will auto return when received 'OK' or 'ERROR'
131 * != 0: the response data will return when received setting lines number data */
133 /* the count of received response lines */
[all …]
/nrf52832-nimble/rt-thread/components/net/lwip-1.4.1/src/netif/ppp/
H A Dchpms.c62 * Implemented LANManager type password response to MS-CHAP challenges.
102 u_char UseNT; /* If 1, ignore the LANMan response field */
128 u_char *response /* OUT 24 octets */
135 MS_ChapResponse *response
145 u_char *response /* OUT 24 octets */) in ChallengeResponse() argument
156 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); in ChallengeResponse()
157 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); in ChallengeResponse()
158 DesEncrypt(challenge, ZPasswordHash + 14, response + 16); in ChallengeResponse()
161 log_packet(response, 24, "ChallengeResponse - response", LOG_DEBUG); in ChallengeResponse()
309 MS_ChapResponse *response) in ChapMS_NT() argument
[all …]
H A Dchap.h81 #define MS_CHAP_RESPONSE_LEN 49 /* Response length for MS-CHAP */
113 int resp_transmits; /* Number of transmissions of response */
114 u_char response[MAX_RESPONSE_LENGTH]; /* Response to send */ member
115 u_char resp_length; /* length of response */
116 u_char resp_id; /* ID for response messages */
118 char *resp_name; /* Our name to send with response */
129 #define CHAPCS_RESPONSE 4 /* Sent response, waiting for status */
H A Dchap.c252 * ChapResponseTimeout - Timeout expired on sending response.
259 /* if we aren't sending a response, don't worry. */ in ChapResponseTimeout()
264 ChapSendResponse(cstate); /* re-send response */ in ChapResponseTimeout()
276 /* if we aren't sending a response, don't worry. */ in ChapRechallenge()
420 * ChapReceiveChallenge - Receive Challenge and send Response.
480 /* cancel response send timeout if necessary */ in ChapReceiveChallenge()
497 BCOPY(hash, cstate->response, MD5_SIGNATURE_SIZE); in ChapReceiveChallenge()
518 * ChapReceiveResponse - Receive and process response.
545 * If we have received a duplicate or bogus Response, in ChapReceiveResponse()
547 * as we did for the first Response we saw. in ChapReceiveResponse()
[all …]
/nrf52832-nimble/rt-thread/components/net/freemodbus/modbus/include/
H A Dmb.h230 * <em>Report Slave ID</em> response.
234 * bytes of the <em> Report Slave ID</em> response.
250 * the creation of an appropriate response. In case of an error it should return
301 * Modbus response is sent.
304 * <b>ILLEGAL DATA ADDRESS</b> exception frame is sent as a response.
306 * currently not available and the application dependent response
308 * exception is sent as a response.
310 * a <b>SLAVE DEVICE FAILURE</b> exception is sent as a response.
336 * Modbus response is sent.
339 * <b>ILLEGAL DATA ADDRESS</b> exception frame is sent as a response.
[all …]
/nrf52832-nimble/rt-thread/components/net/lwip-2.1.0/src/core/ipv6/
H A Dicmp6.c212 * This function must be used only in direct response to a packet that is being
228 * This function must be used only in direct response to a packet that is being
244 * This function must be used only in direct response to a packet that is being
261 * This function may be used to send a response sometime after receiving the
262 * packet for which this response is meant. The provided source and destination
282 * This function must be used only in direct response to a packet that is being
299 * Send an ICMPv6 packet in response to an incoming packet.
302 * @param p the input packet for which the response should be sent,
314 LWIP_ASSERT("icmpv6 packet not a direct response", netif != NULL); in icmp6_send_response()
327 * Send an ICMPv6 packet in response to an incoming packet.
[all …]
/nrf52832-nimble/packages/NimBLE-latest/nimble/controller/src/
H A Dble_ll_hci.c300 * @param rspbuf Pointer to response buffer
301 * @param rsplen Length of response buffer
405 * @param rspbuf Pointer to response buffer
406 * @param rsplen Length of response buffer
448 * @param rspbuf Pointer to response buffer
449 * @param rsplen Length of response buffer
467 * @param rspbuf Pointer to response buffer
468 * @param rsplen Length of response buffer
489 * @param rspbuf Pointer to response buffer
490 * @param rsplen Length of response buffer
[all …]
/nrf52832-nimble/packages/NimBLE-latest/apps/blecsc/src/
H A Dgatt_svr.c174 uint8_t response = SC_CP_RESPONSE_OP_NOT_SUPPORTED; in gatt_svr_chr_access_sc_control_point() local
193 /* Allocate response buffer */ in gatt_svr_chr_access_sc_control_point()
213 response = SC_CP_RESPONSE_SUCCESS; in gatt_svr_chr_access_sc_control_point()
229 response = SC_CP_RESPONSE_INVALID_PARAM; in gatt_svr_chr_access_sc_control_point()
233 response = SC_CP_RESPONSE_SUCCESS; in gatt_svr_chr_access_sc_control_point()
240 response = SC_CP_RESPONSE_SUCCESS; in gatt_svr_chr_access_sc_control_point()
248 /* Append response value */ in gatt_svr_chr_access_sc_control_point()
249 rc = os_mbuf_append(om_indication, &response, sizeof(response)); in gatt_svr_chr_access_sc_control_point()
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/src/
H A Dble_att_svr.c38 * Both of these handlers attempt to allocate a new buffer for the response
41 * "insufficient resources" ATT error response. These handlers don't reuse the
42 * request mbuf for an affirmative response because the buffer contains the
357 * Allocates an mbuf to be used for an ATT response. If an mbuf cannot be
358 * allocated, the received request mbuf is reused for the error response.
369 /* Allocation failure. Reuse receive buffer for response. */ in ble_att_svr_pkt()
585 * Transmits a response or error message over the specified connection.
588 * o If rc == 0: tx an affirmative response.
589 * o Else if err_status != 0: tx an error response.
592 * In addition, if transmission of an affirmative response fails, an error is
[all …]
H A Dble_gattc.c68 * The maximum time to wait for a single ATT response. The spec defines this
215 * Error functions - these handle an incoming ATT error response and apply it
291 * timed out while waiting for a response.
1051 * op code of the incoming response.
1260 * Handles an incoming ATT error response for the specified mtu-exchange proc.
1410 * Handles an incoming ATT error response for the specified
1428 * Handles an incoming attribute data entry from a read-group-type response for
1480 * Handles a notification that an incoming read-group-type response has been
1638 * Handles an incoming ATT error response for the specified
1656 * Handles an incoming "handles info" entry from a find-type-value response for
[all …]
/nrf52832-nimble/rt-thread/components/net/lwip-2.0.2/src/include/netif/ppp/
H A Dchap-new.h62 * Semi-arbitrary limits on challenge and response fields.
68 * These limits apply to challenge and response packets we send.
132 * Note: challenge and response arguments below are formatted as
133 * a length byte followed by the actual challenge/response data.
138 const unsigned char *challenge, const unsigned char *response,
141 void (*make_response)(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name,
176 unsigned char *challenge, unsigned char *response,
/nrf52832-nimble/rt-thread/components/net/lwip-2.1.0/src/include/netif/ppp/
H A Dchap-new.h66 * Semi-arbitrary limits on challenge and response fields.
72 * These limits apply to challenge and response packets we send.
136 * Note: challenge and response arguments below are formatted as
137 * a length byte followed by the actual challenge/response data.
142 const unsigned char *challenge, const unsigned char *response,
145 void (*make_response)(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name,
180 unsigned char *challenge, unsigned char *response,
/nrf52832-nimble/packages/NimBLE-latest/nimble/host/test/src/
H A Dble_gatt_write_test.c153 /* Receive Prep Write response. */ in ble_gatt_write_test_misc_long_good()
166 /* Receive Exec Write response. */ in ble_gatt_write_test_misc_long_good()
209 /* Receive Prep Write response. */ in ble_gatt_write_test_misc_long_bad()
338 /* Receive Prep Write response. */ in ble_gatt_write_test_misc_reliable_good()
355 /* Receive Exec Write response. */ in ble_gatt_write_test_misc_reliable_good()
385 /* No response expected; verify callback not called. */ in TEST_CASE()
405 /* Response not received yet; verify callback not called. */ in TEST_CASE()
408 /* Receive write response. */ in TEST_CASE()
583 /* Receive Prep Write response. */ in TEST_CASE()
644 /* Exhaust the msys pool. Leave one mbuf for the forthcoming response. */ in TEST_CASE()
[all …]
H A Dble_att_clt_test.c113 /* Receive response with attribute mapping. */ in TEST_CASE()
129 /* Receive response with attribute mapping. */ in TEST_CASE()
145 /* Receive response with attribute mappings. */ in TEST_CASE()
305 /*** Larger response. */ in TEST_CASE()
310 /*** Zero-length response. */ in TEST_CASE()
347 /*** Larger response. */ in TEST_CASE()
352 /*** Zero-length response. */ in TEST_CASE()
400 /*** Larger response. */ in TEST_CASE()
409 /*** Zero-length response. */ in TEST_CASE()
/nrf52832-nimble/rt-thread/components/net/lwip-2.0.2/src/include/lwip/apps/
H A Dsntp_opts.h95 * - >= 1 to check address and port of the response packet to ensure the
96 * response comes from the server we sent the request to.
98 * sent to the server (to ensure response to older request).
143 * to send in request and compare in response.
149 /** Default retry timeout (in milliseconds) if the response

12345678910