Lines Matching refs:string
4496 wpa_printf(MSG_DEBUG, "DPP: Enrollee name = '%s'", token->string); in dpp_conf_req_rx()
4503 wpa_printf(MSG_DEBUG, "DPP: wi-fi_tech = '%s'", token->string); in dpp_conf_req_rx()
4504 if (os_strcmp(token->string, "infra") != 0) { in dpp_conf_req_rx()
4506 token->string); in dpp_conf_req_rx()
4516 wpa_printf(MSG_DEBUG, "DPP: netRole = '%s'", token->string); in dpp_conf_req_rx()
4517 if (os_strcmp(token->string, "sta") == 0) { in dpp_conf_req_rx()
4519 } else if (os_strcmp(token->string, "ap") == 0) { in dpp_conf_req_rx()
4521 } else if (os_strcmp(token->string, "configurator") == 0) { in dpp_conf_req_rx()
4525 token->string); in dpp_conf_req_rx()
4532 wpa_printf(MSG_DEBUG, "DPP: mudurl = '%s'", token->string); in dpp_conf_req_rx()
4584 token->string); in dpp_parse_jws_prot_hdr()
4585 if (os_strcmp(token->string, "dppCon") != 0) { in dpp_parse_jws_prot_hdr()
4588 token->string); in dpp_parse_jws_prot_hdr()
4598 token->string); in dpp_parse_jws_prot_hdr()
4599 if (os_strcmp(token->string, curve->jws_alg) != 0) { in dpp_parse_jws_prot_hdr()
4602 token->string, curve->jws_alg); in dpp_parse_jws_prot_hdr()
4631 size_t len = os_strlen(pass->string); in dpp_parse_cred_legacy()
4634 (u8 *)pass->string, len); in dpp_parse_cred_legacy()
4637 os_strlcpy(conf->passphrase, pass->string, in dpp_parse_cred_legacy()
4645 if (os_strlen(psk_hex->string) != PMK_LEN * 2 || in dpp_parse_cred_legacy()
4646 hexstr2bin(psk_hex->string, conf->psk, PMK_LEN) < 0) { in dpp_parse_cred_legacy()
4683 if (os_strcmp(token->string, "EC") != 0) { in dpp_parse_jwk()
4685 token->string); in dpp_parse_jwk()
4694 curve = dpp_get_curve_jwk_crv(token->string); in dpp_parse_jwk()
4697 token->string); in dpp_parse_jwk()
4870 id->string, role->string); in dpp_parse_connector()
4886 wpa_printf(MSG_DEBUG, "DPP: expiry = %s", token->string); in dpp_parse_connector()
4887 if (dpp_key_expired(token->string, in dpp_parse_connector()
5150 (u8 *)token->string, os_strlen(token->string)); in dpp_parse_cred_dpp()
5151 signed_connector = token->string; in dpp_parse_cred_dpp()
5300 if (os_strcmp(token->string, "infra") != 0) { in dpp_parse_conf_obj()
5302 token->string); in dpp_parse_conf_obj()
5329 (u8 *)token->string, os_strlen(token->string)); in dpp_parse_conf_obj()
5330 if (os_strlen(token->string) > SSID_MAX_LEN) { in dpp_parse_conf_obj()
5349 conf->ssid_len = os_strlen(token->string); in dpp_parse_conf_obj()
5350 os_memcpy(conf->ssid, token->string, conf->ssid_len); in dpp_parse_conf_obj()
5371 conf->akm = dpp_akm_from_str(token->string); in dpp_parse_conf_obj()
5381 token->string); in dpp_parse_conf_obj()
5665 if (os_strcmp(id->string, "*") != 0 && in dpp_connector_compatible_group()
5667 os_strcmp(id->string, group_id) != 0) in dpp_connector_compatible_group()
5670 if (dpp_compatible_netrole(role->string, net_role)) in dpp_connector_compatible_group()
5706 id->string, role->string); in dpp_connector_match_groups()
5707 if (dpp_connector_compatible_group(own_root, id->string, in dpp_connector_match_groups()
5708 role->string)) { in dpp_connector_match_groups()
5886 wpa_printf(MSG_DEBUG, "DPP: expiry = %s", token->string); in dpp_peer_intro()
5887 if (dpp_key_expired(token->string, expiry)) { in dpp_peer_intro()