Lines Matching refs:resp
795 unsigned char resp[3];
822 len = sizeof(resp);
823 ret = scard_transmit(scard, cmd, cmdlen, resp, &len);
831 wpa_printf(MSG_WARNING, "SCARD: unexpected resp len "
836 if (resp[0] == 0x98 && resp[1] == 0x04) {
843 if (resp[0] == 0x6e) {
848 if (resp[0] != 0x6c && resp[0] != 0x9f && resp[0] != 0x61) {
850 "(expected 0x61, 0x6c, or 0x9f)", resp[0]);
853 /* Normal ending of command; resp[1] bytes available */
854 get_resp[4] = resp[1];
856 resp[1]);
861 *buf_len = resp[1] < rlen ? resp[1] : rlen;
1007 unsigned char resp[3];
1021 len = sizeof(resp);
1022 ret = scard_transmit(scard, cmd, sizeof(cmd), resp, &len);
1026 if (len != 2 || resp[0] != 0x90 || resp[1] != 0x00) {
1039 unsigned char resp[3];
1050 len = sizeof(resp);
1051 ret = scard_transmit(scard, cmd, sizeof(cmd), resp, &len);
1061 val = WPA_GET_BE16(resp);
1230 unsigned char resp
1249 len = sizeof(resp);
1250 ret = scard_transmit(scard, cmd, cmdlen, resp, &len);
1255 (len != 2 || resp[0] != 0x9f || resp[1] != 0x0c)) ||
1257 (len != 2 || resp[0] != 0x61 || resp[1] != 0x0e))) {
1259 "auth request (len=%ld resp=%02x %02x)",
1260 (long) len, resp[0], resp[1]);
1263 get_resp[4] = resp[1];
1330 unsigned char resp[3], buf[64], *pos, *end;
1350 len = sizeof(resp);
1351 ret = scard_transmit(scard, cmd, sizeof(cmd), resp, &len);
1355 if (len <= sizeof(resp))
1356 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS alg response", resp, len);
1358 if (len == 2 && resp[0] == 0x98 && resp[1] == 0x62) {
1362 } else if (len != 2 || resp[0] != 0x61) {
1364 "auth request (len=%ld resp=%02x %02x)",
1365 (long) len, resp[0], resp[1]);
1368 get_resp[4] = resp[1];