/hal_espressif-latest/components/wpa_supplicant/src/utils/ |
D | json.c | 191 static int json_check_tree_state(struct json_token *token) in json_check_tree_state() argument 193 if (!token) in json_check_tree_state() 195 if (json_check_tree_state(token->child) < 0 || in json_check_tree_state() 196 json_check_tree_state(token->sibling) < 0) in json_check_tree_state() 198 if (token->state != JSON_COMPLETED) { in json_check_tree_state() 201 token->state, token->name ? token->name : "N/A", in json_check_tree_state() 202 token->type); in json_check_tree_state() 222 struct json_token *root = NULL, *curr_token = NULL, *token = NULL; in json_parse() local 237 token = json_alloc_token(&tokens); in json_parse() 238 if (!token) in json_parse() [all …]
|
/hal_espressif-latest/tools/esptool_py/ci/ |
D | setup_softhsm2.sh | 4 softhsm2-util --init-token --label softhsm-test-token --pin 1234 --so-pin 123456 --slot 0 5 softhsm2-util --init-token --label softhsm-test-token-1 --pin 1234 --so-pin 123456 --slot 1 6 softhsm2-util --init-token --label softhsm-test-token-2 --pin 1234 --so-pin 123456 --slot 2 7 softhsm2-util --init-token --label softhsm-test-token-3 --pin 1234 --so-pin 123456 --slot 3
|
/hal_espressif-latest/components/wpa_supplicant/src/ap/ |
D | comeback_token.c | 34 const u8 *token, size_t token_len) in check_comeback_token() argument 47 if (token_idx == 0 || token_idx != WPA_GET_BE16(token)) { in check_comeback_token() 51 MAC2STR(addr), WPA_GET_BE16(token), token_idx); in check_comeback_token() 57 addrs[1] = token; in check_comeback_token() 61 os_memcmp_const(token + 2, &mac[2], SHA256_MAC_LEN - 2) != 0) { in check_comeback_token() 78 u8 *token; in auth_build_token_req() local 127 token = wpabuf_put(buf, SHA256_MAC_LEN); in auth_build_token_req() 133 2, addrs, len, token) < 0) { in auth_build_token_req() 137 WPA_PUT_BE16(token, token_idx); in auth_build_token_req()
|
D | comeback_token.h | 14 const u8 *token, size_t token_len);
|
D | ieee802_11.c | 496 const u8 *token = NULL; in handle_auth_sae() local 530 resp = sae_parse_commit(sta->sae, buf, len, &token, &token_len, default_group, in handle_auth_sae() 546 if (token && in handle_auth_sae() 549 token, token_len) < 0) { in handle_auth_sae() 566 if (!token && use_sae_anti_clogging(hapd) && !allow_reuse) { in handle_auth_sae()
|
/hal_espressif-latest/components/esp_hw_support/ |
D | esp_hmac.c | 147 esp_err_t esp_hmac_jtag_enable(hmac_key_id_t key_id, const uint8_t *token) in esp_hmac_jtag_enable() argument 152 if ((!token) || (key_id >= HMAC_KEY_MAX)) in esp_hmac_jtag_enable() 163 ets_status = ets_jtag_enable_temporarily(token, convert_key_type(key_id)); in esp_hmac_jtag_enable() 222 esp_err_t esp_hmac_jtag_enable(hmac_key_id_t key_id, const uint8_t *token) in esp_hmac_jtag_enable() argument 227 if ((!token) || (key_id >= HMAC_KEY_MAX)) in esp_hmac_jtag_enable() 243 memcpy(&key_word, &token[i], 4); in esp_hmac_jtag_enable()
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | dpp.c | 4419 struct json_token *root = NULL, *token; in dpp_conf_req_rx() local 4491 token = json_get_member(root, "name"); in dpp_conf_req_rx() 4492 if (!token || token->type != JSON_STRING) { in dpp_conf_req_rx() 4496 wpa_printf(MSG_DEBUG, "DPP: Enrollee name = '%s'", token->string); in dpp_conf_req_rx() 4498 token = json_get_member(root, "wi-fi_tech"); in dpp_conf_req_rx() 4499 if (!token || token->type != JSON_STRING) { in dpp_conf_req_rx() 4503 wpa_printf(MSG_DEBUG, "DPP: wi-fi_tech = '%s'", token->string); in dpp_conf_req_rx() 4504 if (os_strcmp(token->string, "infra") != 0) { in dpp_conf_req_rx() 4506 token->string); in dpp_conf_req_rx() 4511 token = json_get_member(root, "netRole"); in dpp_conf_req_rx() [all …]
|
D | rrm.c | 269 static int wpas_rrm_report_elem(struct wpabuf **buf, u8 token, u8 mode, u8 type, in wpas_rrm_report_elem() argument 277 wpabuf_put_u8(*buf, token); in wpas_rrm_report_elem() 297 wpabuf_put_u8(report, wpa_s->rrm.token); in wpas_rrm_send_msr_report_mpdu() 550 ret = wpas_rrm_report_elem(wpa_buf, data->token, in wpas_add_beacon_rep_elem() 610 return wpas_rrm_report_elem(buf, wpa_s->beacon_rep_data.token, in wpas_beacon_rep_no_results() 639 if (wpas_rrm_report_elem(&buf, wpa_s->beacon_rep_data.token, in wpas_rrm_refuse_request() 818 data->token = elem_token; in wpas_rm_handle_beacon_req() 900 req->type, req->token); in wpas_rrm_handle_msr_req_element() 921 return wpas_rm_handle_beacon_req(wpa_s, req->token, in wpas_rrm_handle_msr_req_element() 934 wpas_rrm_report_elem(buf, req->token, in wpas_rrm_handle_msr_req_element() [all …]
|
D | wpa_supplicant_i.h | 38 u8 token; member 54 u8 token; member
|
D | sae.c | 1610 const struct wpabuf *token, const char *identifier) in sae_write_commit() argument 1618 if (!sae->h2e && token) { in sae_write_commit() 1619 wpabuf_put_buf(buf, token); in sae_write_commit() 1621 wpabuf_head(token), wpabuf_len(token)); in sae_write_commit() 1673 if (sae->h2e && token) { in sae_write_commit() 1675 wpabuf_put_u8(buf, 1 + wpabuf_len(token)); in sae_write_commit() 1677 wpabuf_put_buf(buf, token); in sae_write_commit() 1680 token); in sae_write_commit() 1759 const u8 *end, const u8 **token, in sae_parse_commit_token() argument 1764 if (token) in sae_parse_commit_token() [all …]
|
D | sae.h | 137 const struct wpabuf *token, const char *identifier); 139 const u8 **token, size_t *token_len, int *allowed_groups,
|
D | mbo.c | 357 char *cmd, *token, *context = NULL; in wpas_mbo_update_non_pref_chan() local 376 while ((token = str_token(cmd, " ", &context))) { in wpas_mbo_update_non_pref_chan() 398 ret = sscanf(token, "%u:%u:%u:%u", &_oper_class, in wpas_mbo_update_non_pref_chan() 404 token); in wpas_mbo_update_non_pref_chan()
|
D | ieee802_11_defs.h | 812 u8 token; /* Measurement Token */ member 875 u8 token; /* Measurement Token */ member
|
/hal_espressif-latest/components/esp_wifi/src/ |
D | smartconfig_ack.c | 45 uint8_t token; /*!< Smartconfig token from the cellphone */ member 88 uint8_t port_bit = ack->ctx.token; in sc_ack_send_task() 209 esp_err_t sc_send_ack_start(smartconfig_type_t type, uint8_t token, uint8_t *cellphone_ip) in sc_send_ack_start() argument 224 ack->ctx.token = token; in sc_send_ack_start()
|
D | smartconfig.c | 44 err = sc_send_ack_start(evt->type, evt->token, evt->cellphone_ip); in handler_got_ssid_passwd()
|
/hal_espressif-latest/components/esp_wifi/include/ |
D | smartconfig_ack.h | 30 esp_err_t sc_send_ack_start(smartconfig_type_t type, uint8_t token, uint8_t *cellphone_ip);
|
D | esp_smartconfig.h | 44 uint8_t token; /**< Token from cellphone which is used to send ACK to cellphone. */ member
|
/hal_espressif-latest/tools/esptool_py/test/ |
D | test_espsecure_hsm.py | 70 token = lib.get_token(token_label=token_label) 71 slot = token.slot.slot_id 72 session = token.open(rw=True, user_pin=TOKEN_PIN)
|
/hal_espressif-latest/components/esp_hw_support/include/ |
D | esp_hmac.h | 81 esp_err_t esp_hmac_jtag_enable(hmac_key_id_t key_id, const uint8_t *token);
|
/hal_espressif-latest/components/wpa_supplicant/src/wps/ |
D | wps_registrar.c | 41 static void wps_remove_nfc_pw_token(struct wps_nfc_pw_token *token) in wps_remove_nfc_pw_token() argument 43 dl_list_del(&token->list); in wps_remove_nfc_pw_token() 44 bin_clear_free(token, sizeof(*token)); in wps_remove_nfc_pw_token() 50 struct wps_nfc_pw_token *token, *prev; in wps_free_nfc_pw_tokens() local 51 dl_list_for_each_safe(token, prev, tokens, struct wps_nfc_pw_token, in wps_free_nfc_pw_tokens() 53 if (pw_id == 0 || pw_id == token->pw_id) in wps_free_nfc_pw_tokens() 54 wps_remove_nfc_pw_token(token); in wps_free_nfc_pw_tokens() 62 struct wps_nfc_pw_token *token; in wps_get_nfc_pw_token() local 63 dl_list_for_each(token, tokens, struct wps_nfc_pw_token, list) { in wps_get_nfc_pw_token() 64 if (pw_id == token->pw_id) in wps_get_nfc_pw_token() [all …]
|
D | wps_i.h | 221 struct wps_nfc_pw_token *token);
|
/hal_espressif-latest/tools/esptool_py/espsecure/esp_hsm_sign/ |
D | __init__.py | 61 token = slot.get_token() 62 session = token.open(rw=True, user_pin=config["credentials"])
|
/hal_espressif-latest/tools/esptool_py/docs/en/espsecure/ |
D | index.rst | 53 To access an HSM token of a selected slot, you will also need to pass in the token User PIN and thu…
|
/hal_espressif-latest/tools/esptool_py/ |
D | CHANGELOG.md | 145 - **danger-github**: Fir Danger GitHub token permission 150 - **dangerGH**: Update token permissions - allow Danger to add comments to PR
|