Lines Matching refs:token

2285 	struct json_token *root = NULL, *token;  in dpp_conf_req_rx()  local
2415 token = json_get_member(root, "name"); in dpp_conf_req_rx()
2416 if (!token || token->type != JSON_STRING) { in dpp_conf_req_rx()
2420 wpa_printf(MSG_DEBUG, "DPP: Enrollee name = '%s'", token->string); in dpp_conf_req_rx()
2422 auth->e_name = os_strdup(token->string); in dpp_conf_req_rx()
2424 token = json_get_member(root, "wi-fi_tech"); in dpp_conf_req_rx()
2425 if (!token || token->type != JSON_STRING) { in dpp_conf_req_rx()
2429 wpa_printf(MSG_DEBUG, "DPP: wi-fi_tech = '%s'", token->string); in dpp_conf_req_rx()
2430 if (os_strcmp(token->string, "infra") != 0) { in dpp_conf_req_rx()
2432 token->string); in dpp_conf_req_rx()
2437 token = json_get_member(root, "netRole"); in dpp_conf_req_rx()
2438 if (!token || token->type != JSON_STRING) { in dpp_conf_req_rx()
2442 wpa_printf(MSG_DEBUG, "DPP: netRole = '%s'", token->string); in dpp_conf_req_rx()
2443 if (os_strcmp(token->string, "sta") == 0) { in dpp_conf_req_rx()
2445 } else if (os_strcmp(token->string, "ap") == 0) { in dpp_conf_req_rx()
2447 } else if (os_strcmp(token->string, "configurator") == 0) { in dpp_conf_req_rx()
2451 token->string); in dpp_conf_req_rx()
2457 token = json_get_member(root, "mudurl"); in dpp_conf_req_rx()
2458 if (token && token->type == JSON_STRING) { in dpp_conf_req_rx()
2459 wpa_printf(MSG_DEBUG, "DPP: mudurl = '%s'", token->string); in dpp_conf_req_rx()
2461 token->string); in dpp_conf_req_rx()
2463 auth->e_mud_url = os_strdup(token->string); in dpp_conf_req_rx()
2466 token = json_get_member(root, "bandSupport"); in dpp_conf_req_rx()
2467 if (token && token->type == JSON_ARRAY) { in dpp_conf_req_rx()
2473 token = token->child; in dpp_conf_req_rx()
2474 while (token) { in dpp_conf_req_rx()
2475 if (token->type != JSON_NUMBER) { in dpp_conf_req_rx()
2481 token->number); in dpp_conf_req_rx()
2482 int_array_add_unique(&opclass, token->number); in dpp_conf_req_rx()
2484 token = token->sibling; in dpp_conf_req_rx()
2599 struct json_token *token; in dpp_parse_jwk() local
2604 token = json_get_member(jwk, "kty"); in dpp_parse_jwk()
2605 if (!token || token->type != JSON_STRING) { in dpp_parse_jwk()
2609 if (os_strcmp(token->string, "EC") != 0) { in dpp_parse_jwk()
2611 token->string); in dpp_parse_jwk()
2615 token = json_get_member(jwk, "crv"); in dpp_parse_jwk()
2616 if (!token || token->type != JSON_STRING) { in dpp_parse_jwk()
2620 curve = dpp_get_curve_jwk_crv(token->string); in dpp_parse_jwk()
2623 token->string); in dpp_parse_jwk()
2754 struct json_token *root, *groups, *netkey, *token; in dpp_parse_connector() local
2771 for (token = groups->child; token; token = token->sibling) { in dpp_parse_connector()
2774 id = json_get_member(token, "groupId"); in dpp_parse_connector()
2780 role = json_get_member(token, "netRole"); in dpp_parse_connector()
2798 token = json_get_member(root, "expiry"); in dpp_parse_connector()
2799 if (!token || token->type != JSON_STRING) { in dpp_parse_connector()
2803 wpa_printf(MSG_DEBUG, "DPP: expiry = %s", token->string); in dpp_parse_connector()
2804 if (dpp_key_expired(token->string, in dpp_parse_connector()
2901 struct json_token *token, *csign, *ppkey; in dpp_parse_cred_dpp() local
2946 token = json_get_member(cred, "signedConnector"); in dpp_parse_cred_dpp()
2947 if (!token || token->type != JSON_STRING) { in dpp_parse_cred_dpp()
2952 token->string, os_strlen(token->string)); in dpp_parse_cred_dpp()
2953 signed_connector = token->string; in dpp_parse_cred_dpp()
3153 struct json_token *root, *token, *discovery, *cred; in dpp_parse_conf_obj() local
3166 token = json_get_member(root, "wi-fi_tech"); in dpp_parse_conf_obj()
3167 if (!token || token->type != JSON_STRING) { in dpp_parse_conf_obj()
3171 if (os_strcmp(token->string, "infra") != 0) { in dpp_parse_conf_obj()
3173 token->string); in dpp_parse_conf_obj()
3193 token = json_get_member(discovery, "ssid"); in dpp_parse_conf_obj()
3194 if (!token || token->type != JSON_STRING) { in dpp_parse_conf_obj()
3200 token->string, os_strlen(token->string)); in dpp_parse_conf_obj()
3201 if (os_strlen(token->string) > SSID_MAX_LEN) { in dpp_parse_conf_obj()
3220 conf->ssid_len = os_strlen(token->string); in dpp_parse_conf_obj()
3221 os_memcpy(conf->ssid, token->string, conf->ssid_len); in dpp_parse_conf_obj()
3224 token = json_get_member(discovery, "ssid_charset"); in dpp_parse_conf_obj()
3225 if (token && token->type == JSON_NUMBER) { in dpp_parse_conf_obj()
3226 conf->ssid_charset = token->number; in dpp_parse_conf_obj()
3237 token = json_get_member(cred, "akm"); in dpp_parse_conf_obj()
3238 if (!token || token->type != JSON_STRING) { in dpp_parse_conf_obj()
3242 conf->akm = dpp_akm_from_str(token->string); in dpp_parse_conf_obj()
3269 token->string); in dpp_parse_conf_obj()
3677 struct json_token *root = NULL, *token; in dpp_conn_status_result_rx() local
3760 token = json_get_member(root, "channelList"); in dpp_conn_status_result_rx()
3761 if (token && token->type == JSON_STRING && in dpp_conn_status_result_rx()
3762 valid_channel_list(token->string)) in dpp_conn_status_result_rx()
3763 *channel_list = os_strdup(token->string); in dpp_conn_status_result_rx()
3765 token = json_get_member(root, "result"); in dpp_conn_status_result_rx()
3766 if (!token || token->type != JSON_NUMBER) { in dpp_conn_status_result_rx()
3770 wpa_printf(MSG_DEBUG, "DPP: result %d", token->number); in dpp_conn_status_result_rx()
3771 ret = token->number; in dpp_conn_status_result_rx()
4037 struct json_token *groups, *token; in dpp_connector_compatible_group() local
4043 for (token = groups->child; token; token = token->sibling) { in dpp_connector_compatible_group()
4046 id = json_get_member(token, "groupId"); in dpp_connector_compatible_group()
4050 role = json_get_member(token, "netRole"); in dpp_connector_compatible_group()
4072 struct json_token *groups, *token; in dpp_connector_match_groups() local
4080 for (token = groups->child; token; token = token->sibling) { in dpp_connector_match_groups()
4083 id = json_get_member(token, "groupId"); in dpp_connector_match_groups()
4090 role = json_get_member(token, "netRole"); in dpp_connector_match_groups()
4152 struct json_token *root = NULL, *netkey, *token; in dpp_peer_intro() local
4199 token = json_get_member(root, "expiry"); in dpp_peer_intro()
4200 if (!token || token->type != JSON_STRING) { in dpp_peer_intro()
4204 wpa_printf(MSG_DEBUG, "DPP: expiry = %s", token->string); in dpp_peer_intro()
4205 if (dpp_key_expired(token->string, expiry)) { in dpp_peer_intro()
4214 token = json_get_member(root, "version"); in dpp_peer_intro()
4215 if (token && token->type == JSON_NUMBER) { in dpp_peer_intro()
4216 wpa_printf(MSG_DEBUG, "DPP: version = %d", token->number); in dpp_peer_intro()
4217 intro->peer_version = token->number; in dpp_peer_intro()
4303 struct json_token *root, *token; in dpp_get_connector_version() local
4310 token = json_get_member(root, "version"); in dpp_get_connector_version()
4311 if (token && token->type == JSON_NUMBER) in dpp_get_connector_version()
4312 ver = token->number; in dpp_get_connector_version()
4401 char *token, *context = NULL; in dpp_parse_supported_curves_list() local
4407 while ((token = str_token(txt, ":", &context))) { in dpp_parse_supported_curves_list()
4408 if (os_strcmp(token, "P-256") == 0) { in dpp_parse_supported_curves_list()
4410 } else if (os_strcmp(token, "P-384") == 0) { in dpp_parse_supported_curves_list()
4412 } else if (os_strcmp(token, "P-521") == 0) { in dpp_parse_supported_curves_list()
4414 } else if (os_strcmp(token, "BP-256") == 0) { in dpp_parse_supported_curves_list()
4416 } else if (os_strcmp(token, "BP-384") == 0) { in dpp_parse_supported_curves_list()
4418 } else if (os_strcmp(token, "BP-512") == 0) { in dpp_parse_supported_curves_list()
4422 token); in dpp_parse_supported_curves_list()