Home
last modified time | relevance | path

Searched refs:token (Results 1 – 24 of 24) sorted by relevance

/hal_espressif-latest/components/wpa_supplicant/src/utils/
Djson.c191 static int json_check_tree_state(struct json_token *token) in json_check_tree_state() argument
193 if (!token) in json_check_tree_state()
195 if (json_check_tree_state(token->child) < 0 || in json_check_tree_state()
196 json_check_tree_state(token->sibling) < 0) in json_check_tree_state()
198 if (token->state != JSON_COMPLETED) { in json_check_tree_state()
201 token->state, token->name ? token->name : "N/A", in json_check_tree_state()
202 token->type); in json_check_tree_state()
222 struct json_token *root = NULL, *curr_token = NULL, *token = NULL; in json_parse() local
237 token = json_alloc_token(&tokens); in json_parse()
238 if (!token) in json_parse()
[all …]
/hal_espressif-latest/tools/esptool_py/ci/
Dsetup_softhsm2.sh4 softhsm2-util --init-token --label softhsm-test-token --pin 1234 --so-pin 123456 --slot 0
5 softhsm2-util --init-token --label softhsm-test-token-1 --pin 1234 --so-pin 123456 --slot 1
6 softhsm2-util --init-token --label softhsm-test-token-2 --pin 1234 --so-pin 123456 --slot 2
7 softhsm2-util --init-token --label softhsm-test-token-3 --pin 1234 --so-pin 123456 --slot 3
/hal_espressif-latest/components/wpa_supplicant/src/ap/
Dcomeback_token.c34 const u8 *token, size_t token_len) in check_comeback_token() argument
47 if (token_idx == 0 || token_idx != WPA_GET_BE16(token)) { in check_comeback_token()
51 MAC2STR(addr), WPA_GET_BE16(token), token_idx); in check_comeback_token()
57 addrs[1] = token; in check_comeback_token()
61 os_memcmp_const(token + 2, &mac[2], SHA256_MAC_LEN - 2) != 0) { in check_comeback_token()
78 u8 *token; in auth_build_token_req() local
127 token = wpabuf_put(buf, SHA256_MAC_LEN); in auth_build_token_req()
133 2, addrs, len, token) < 0) { in auth_build_token_req()
137 WPA_PUT_BE16(token, token_idx); in auth_build_token_req()
Dcomeback_token.h14 const u8 *token, size_t token_len);
Dieee802_11.c496 const u8 *token = NULL; in handle_auth_sae() local
530 resp = sae_parse_commit(sta->sae, buf, len, &token, &token_len, default_group, in handle_auth_sae()
546 if (token && in handle_auth_sae()
549 token, token_len) < 0) { in handle_auth_sae()
566 if (!token && use_sae_anti_clogging(hapd) && !allow_reuse) { in handle_auth_sae()
/hal_espressif-latest/components/esp_hw_support/
Desp_hmac.c147 esp_err_t esp_hmac_jtag_enable(hmac_key_id_t key_id, const uint8_t *token) in esp_hmac_jtag_enable() argument
152 if ((!token) || (key_id >= HMAC_KEY_MAX)) in esp_hmac_jtag_enable()
163 ets_status = ets_jtag_enable_temporarily(token, convert_key_type(key_id)); in esp_hmac_jtag_enable()
222 esp_err_t esp_hmac_jtag_enable(hmac_key_id_t key_id, const uint8_t *token) in esp_hmac_jtag_enable() argument
227 if ((!token) || (key_id >= HMAC_KEY_MAX)) in esp_hmac_jtag_enable()
243 memcpy(&key_word, &token[i], 4); in esp_hmac_jtag_enable()
/hal_espressif-latest/components/wpa_supplicant/src/common/
Ddpp.c4419 struct json_token *root = NULL, *token; in dpp_conf_req_rx() local
4491 token = json_get_member(root, "name"); in dpp_conf_req_rx()
4492 if (!token || token->type != JSON_STRING) { in dpp_conf_req_rx()
4496 wpa_printf(MSG_DEBUG, "DPP: Enrollee name = '%s'", token->string); in dpp_conf_req_rx()
4498 token = json_get_member(root, "wi-fi_tech"); in dpp_conf_req_rx()
4499 if (!token || token->type != JSON_STRING) { in dpp_conf_req_rx()
4503 wpa_printf(MSG_DEBUG, "DPP: wi-fi_tech = '%s'", token->string); in dpp_conf_req_rx()
4504 if (os_strcmp(token->string, "infra") != 0) { in dpp_conf_req_rx()
4506 token->string); in dpp_conf_req_rx()
4511 token = json_get_member(root, "netRole"); in dpp_conf_req_rx()
[all …]
Drrm.c269 static int wpas_rrm_report_elem(struct wpabuf **buf, u8 token, u8 mode, u8 type, in wpas_rrm_report_elem() argument
277 wpabuf_put_u8(*buf, token); in wpas_rrm_report_elem()
297 wpabuf_put_u8(report, wpa_s->rrm.token); in wpas_rrm_send_msr_report_mpdu()
550 ret = wpas_rrm_report_elem(wpa_buf, data->token, in wpas_add_beacon_rep_elem()
610 return wpas_rrm_report_elem(buf, wpa_s->beacon_rep_data.token, in wpas_beacon_rep_no_results()
639 if (wpas_rrm_report_elem(&buf, wpa_s->beacon_rep_data.token, in wpas_rrm_refuse_request()
818 data->token = elem_token; in wpas_rm_handle_beacon_req()
900 req->type, req->token); in wpas_rrm_handle_msr_req_element()
921 return wpas_rm_handle_beacon_req(wpa_s, req->token, in wpas_rrm_handle_msr_req_element()
934 wpas_rrm_report_elem(buf, req->token, in wpas_rrm_handle_msr_req_element()
[all …]
Dwpa_supplicant_i.h38 u8 token; member
54 u8 token; member
Dsae.c1610 const struct wpabuf *token, const char *identifier) in sae_write_commit() argument
1618 if (!sae->h2e && token) { in sae_write_commit()
1619 wpabuf_put_buf(buf, token); in sae_write_commit()
1621 wpabuf_head(token), wpabuf_len(token)); in sae_write_commit()
1673 if (sae->h2e && token) { in sae_write_commit()
1675 wpabuf_put_u8(buf, 1 + wpabuf_len(token)); in sae_write_commit()
1677 wpabuf_put_buf(buf, token); in sae_write_commit()
1680 token); in sae_write_commit()
1759 const u8 *end, const u8 **token, in sae_parse_commit_token() argument
1764 if (token) in sae_parse_commit_token()
[all …]
Dsae.h137 const struct wpabuf *token, const char *identifier);
139 const u8 **token, size_t *token_len, int *allowed_groups,
Dmbo.c357 char *cmd, *token, *context = NULL; in wpas_mbo_update_non_pref_chan() local
376 while ((token = str_token(cmd, " ", &context))) { in wpas_mbo_update_non_pref_chan()
398 ret = sscanf(token, "%u:%u:%u:%u", &_oper_class, in wpas_mbo_update_non_pref_chan()
404 token); in wpas_mbo_update_non_pref_chan()
Dieee802_11_defs.h812 u8 token; /* Measurement Token */ member
875 u8 token; /* Measurement Token */ member
/hal_espressif-latest/components/esp_wifi/src/
Dsmartconfig_ack.c45 uint8_t token; /*!< Smartconfig token from the cellphone */ member
88 uint8_t port_bit = ack->ctx.token; in sc_ack_send_task()
209 esp_err_t sc_send_ack_start(smartconfig_type_t type, uint8_t token, uint8_t *cellphone_ip) in sc_send_ack_start() argument
224 ack->ctx.token = token; in sc_send_ack_start()
Dsmartconfig.c44 err = sc_send_ack_start(evt->type, evt->token, evt->cellphone_ip); in handler_got_ssid_passwd()
/hal_espressif-latest/components/esp_wifi/include/
Dsmartconfig_ack.h30 esp_err_t sc_send_ack_start(smartconfig_type_t type, uint8_t token, uint8_t *cellphone_ip);
Desp_smartconfig.h44 uint8_t token; /**< Token from cellphone which is used to send ACK to cellphone. */ member
/hal_espressif-latest/tools/esptool_py/test/
Dtest_espsecure_hsm.py70 token = lib.get_token(token_label=token_label)
71 slot = token.slot.slot_id
72 session = token.open(rw=True, user_pin=TOKEN_PIN)
/hal_espressif-latest/components/esp_hw_support/include/
Desp_hmac.h81 esp_err_t esp_hmac_jtag_enable(hmac_key_id_t key_id, const uint8_t *token);
/hal_espressif-latest/components/wpa_supplicant/src/wps/
Dwps_registrar.c41 static void wps_remove_nfc_pw_token(struct wps_nfc_pw_token *token) in wps_remove_nfc_pw_token() argument
43 dl_list_del(&token->list); in wps_remove_nfc_pw_token()
44 bin_clear_free(token, sizeof(*token)); in wps_remove_nfc_pw_token()
50 struct wps_nfc_pw_token *token, *prev; in wps_free_nfc_pw_tokens() local
51 dl_list_for_each_safe(token, prev, tokens, struct wps_nfc_pw_token, in wps_free_nfc_pw_tokens()
53 if (pw_id == 0 || pw_id == token->pw_id) in wps_free_nfc_pw_tokens()
54 wps_remove_nfc_pw_token(token); in wps_free_nfc_pw_tokens()
62 struct wps_nfc_pw_token *token; in wps_get_nfc_pw_token() local
63 dl_list_for_each(token, tokens, struct wps_nfc_pw_token, list) { in wps_get_nfc_pw_token()
64 if (pw_id == token->pw_id) in wps_get_nfc_pw_token()
[all …]
Dwps_i.h221 struct wps_nfc_pw_token *token);
/hal_espressif-latest/tools/esptool_py/espsecure/esp_hsm_sign/
D__init__.py61 token = slot.get_token()
62 session = token.open(rw=True, user_pin=config["credentials"])
/hal_espressif-latest/tools/esptool_py/docs/en/espsecure/
Dindex.rst53 To access an HSM token of a selected slot, you will also need to pass in the token User PIN and thu…
/hal_espressif-latest/tools/esptool_py/
DCHANGELOG.md145 - **danger-github**: Fir Danger GitHub token permission
150 - **dangerGH**: Update token permissions - allow Danger to add comments to PR