/hostap-3.7.0/src/wps/ |
D | http_server.c | 30 void (*cb)(void *ctx, struct http_request *req); 44 struct http_request *req = cookie; in http_request_cb() local 45 struct http_server *srv = req->srv; in http_request_cb() 49 inet_ntoa(req->cli.sin_addr), in http_request_cb() 50 ntohs(req->cli.sin_port)); in http_request_cb() 51 srv->cb(srv->cb_ctx, req); in http_request_cb() 55 "completely", inet_ntoa(req->cli.sin_addr), in http_request_cb() 56 ntohs(req->cli.sin_port)); in http_request_cb() 57 http_request_deinit(req); in http_request_cb() 64 struct http_request *req; in http_request_init() local [all …]
|
D | http_server.h | 15 void http_request_deinit(struct http_request *req); 16 void http_request_send(struct http_request *req, struct wpabuf *resp); 17 void http_request_send_and_deinit(struct http_request *req, 19 enum httpread_hdr_type http_request_get_type(struct http_request *req); 20 char * http_request_get_uri(struct http_request *req); 21 char * http_request_get_hdr(struct http_request *req); 22 char * http_request_get_data(struct http_request *req); 23 char * http_request_get_hdr_line(struct http_request *req, const char *tag); 24 struct sockaddr_in * http_request_get_cli_addr(struct http_request *req); 28 struct http_request *req),
|
D | http_client.c | 24 struct wpabuf *req; member 90 send_len = wpabuf_len(c->req) - c->req_pos; in http_client_tx_ready() 94 (unsigned long) wpabuf_len(c->req), in http_client_tx_ready() 97 res = send(c->sd, wpabuf_head_u8(c->req) + c->req_pos, send_len, 0); in http_client_tx_ready() 109 res, (unsigned long) wpabuf_len(c->req), in http_client_tx_ready() 118 wpabuf_free(c->req); in http_client_tx_ready() 119 c->req = NULL; in http_client_tx_ready() 131 struct wpabuf *req, size_t max_response, in http_client_addr() argument 177 c->req = req; in http_client_addr() 237 struct wpabuf *req, size_t max_response, in http_client_url() argument [all …]
|
D | wps_upnp_web.c | 312 } req; in web_connection_parse_get() local 331 req = GET_DEVICE_XML_FILE; in web_connection_parse_get() 345 req = GET_SCPD_XML_FILE; in web_connection_parse_get() 394 switch (req) { in web_connection_parse_get() 755 static void web_connection_send_reply(struct http_request *req, in web_connection_send_reply() argument 784 http_request_deinit(req); in web_connection_send_reply() 857 http_request_send_and_deinit(req, buf); in web_connection_send_reply() 861 static const char * web_get_action(struct http_request *req, in web_get_action() argument 871 b = http_request_get_hdr_line(req, "SOAPAction:"); in web_get_action() 920 struct http_request *req, in web_connection_parse_post() argument [all …]
|
/hostap-3.7.0/src/eap_peer/ |
D | eap_pax.c | 93 static struct wpabuf * eap_pax_alloc_resp(const struct eap_pax_hdr *req, in eap_pax_alloc_resp() argument 107 pax->mac_id = req->mac_id; in eap_pax_alloc_resp() 108 pax->dh_group_id = req->dh_group_id; in eap_pax_alloc_resp() 109 pax->public_key_id = req->public_key_id; in eap_pax_alloc_resp() 117 const struct eap_pax_hdr *req, in eap_pax_process_std_1() argument 134 if (req->flags & EAP_PAX_FLAGS_CE) { in eap_pax_process_std_1() 141 left = req_plen - sizeof(*req); in eap_pax_process_std_1() 150 pos = (const u8 *) (req + 1); in eap_pax_process_std_1() 180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e, in eap_pax_process_std_1() 191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); in eap_pax_process_std_1() [all …]
|
/hostap-3.7.0/src/drivers/ |
D | netlink.c | 176 } req; in netlink_send_oper_ifla() local 181 os_memset(&req, 0, sizeof(req)); in netlink_send_oper_ifla() 183 req.hdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)); in netlink_send_oper_ifla() 184 req.hdr.nlmsg_type = RTM_SETLINK; in netlink_send_oper_ifla() 185 req.hdr.nlmsg_flags = NLM_F_REQUEST; in netlink_send_oper_ifla() 186 req.hdr.nlmsg_seq = ++nl_seq; in netlink_send_oper_ifla() 187 req.hdr.nlmsg_pid = 0; in netlink_send_oper_ifla() 189 req.ifinfo.ifi_family = AF_UNSPEC; in netlink_send_oper_ifla() 190 req.ifinfo.ifi_type = 0; in netlink_send_oper_ifla() 191 req.ifinfo.ifi_index = ifindex; in netlink_send_oper_ifla() [all …]
|
/hostap-3.7.0/tests/hwsim/ |
D | test_nfc_wps.py | 227 req = dev[0].request("NFC_GET_HANDOVER_REQ NDEF WPS-CR").rstrip() 228 if "FAIL" in req: 233 res = hapd.request("NFC_REPORT_HANDOVER RESP WPS " + req + " " + sel) 237 res = dev[0].request("NFC_REPORT_HANDOVER INIT WPS " + req + " " + sel) 303 req = dev[0].request("NFC_GET_HANDOVER_REQ NDEF WPS-CR").rstrip() 304 if "FAIL" in req: 309 res = hapd.request("NFC_REPORT_HANDOVER RESP WPS " + req + " " + sel) 313 res = dev[0].request("NFC_REPORT_HANDOVER INIT WPS " + req + " " + sel) 331 req = dev[0].request("NFC_GET_HANDOVER_REQ NDEF WPS-CR").rstrip() 332 if "FAIL" in req: [all …]
|
D | test_sae.py | 719 req = hapd.mgmt_rx() 720 if req is None: 722 if req['subtype'] == 11: 724 req = None 725 if not req: 730 resp['fc'] = req['fc'] 731 resp['da'] = req['sa'] 732 resp['sa'] = req['da'] 733 resp['bssid'] = req['bssid'] 740 req = hapd.mgmt_rx() [all …]
|
D | test_radius.py | 411 def send_and_check_reply(srv, req, code, error_cause=0): argument 412 reply = srv.SendPacket(req) 506 req = radius_das.DisconnectPacket(dict=dict, secret=b"incorrect", 510 logger.debug(req) 512 reply = srv.SendPacket(req) 518 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret", 520 logger.debug(req) 522 reply = srv.SendPacket(req) 528 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret", 531 logger.debug(req) [all …]
|
D | test_nfc_p2p.py | 56 req = dev[0].global_request("NFC_GET_HANDOVER_REQ NDEF P2P-CR").rstrip() 57 if "FAIL" in req: 64 res = dev[1].global_request("NFC_REPORT_HANDOVER RESP P2P " + req + " " + sel) 67 res = dev[0].global_request("NFC_REPORT_HANDOVER INIT P2P " + req + " " + sel) 107 req = dev[0].global_request("NFC_GET_HANDOVER_REQ NDEF P2P-CR").rstrip() 108 if "FAIL" in req: 117 res = dev[1].global_request("NFC_REPORT_HANDOVER RESP P2P " + req + " " + sel) 120 res = dev[0].global_request("NFC_REPORT_HANDOVER INIT P2P " + req + " " + sel) 156 req = dev[0].global_request("NFC_GET_HANDOVER_REQ NDEF P2P-CR").rstrip() 157 if "FAIL" in req: [all …]
|
/hostap-3.7.0/src/fst/ |
D | fst_session.c | 363 const struct fst_setup_req *req; in fst_session_handle_setup_request() local 369 if (frame_len < IEEE80211_HDRLEN + 1 + sizeof(*req)) { in fst_session_handle_setup_request() 373 IEEE80211_HDRLEN + 1 + sizeof(*req)); in fst_session_handle_setup_request() 377 req = (const struct fst_setup_req *) in fst_session_handle_setup_request() 379 if (req->stie.element_id != WLAN_EID_SESSION_TRANSITION || in fst_session_handle_setup_request() 380 req->stie.length < 11) { in fst_session_handle_setup_request() 386 if (req->stie.new_band_id == req->stie.old_band_id) { in fst_session_handle_setup_request() 394 if (plen > sizeof(*req)) { in fst_session_handle_setup_request() 395 fst_iface_update_mb_ie(iface, mgmt->sa, (const u8 *) (req + 1), in fst_session_handle_setup_request() 396 plen - sizeof(*req)); in fst_session_handle_setup_request() [all …]
|
/hostap-3.7.0/src/eap_server/ |
D | eap_server_mschapv2.c | 100 struct wpabuf *req; in eap_mschapv2_build_challenge() local 113 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_build_challenge() 115 if (req == NULL) { in eap_mschapv2_build_challenge() 122 ms = wpabuf_put(req, sizeof(*ms)); in eap_mschapv2_build_challenge() 127 wpabuf_put_u8(req, CHALLENGE_LEN); in eap_mschapv2_build_challenge() 129 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); in eap_mschapv2_build_challenge() 131 wpabuf_put(req, CHALLENGE_LEN); in eap_mschapv2_build_challenge() 134 wpabuf_put_data(req, sm->cfg->server_id, sm->cfg->server_id_len); in eap_mschapv2_build_challenge() 136 return req; in eap_mschapv2_build_challenge() 143 struct wpabuf *req; in eap_mschapv2_build_success_req() local [all …]
|
D | eap_server_tnc.c | 107 struct wpabuf *req; in eap_tnc_build_start() local 109 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, EAP_CODE_REQUEST, in eap_tnc_build_start() 111 if (req == NULL) { in eap_tnc_build_start() 118 wpabuf_put_u8(req, EAP_TNC_FLAGS_START | EAP_TNC_VERSION); in eap_tnc_build_start() 122 return req; in eap_tnc_build_start() 129 struct wpabuf *req; in eap_tnc_build() local 150 req = wpabuf_alloc(rlen); in eap_tnc_build() 151 if (req == NULL) { in eap_tnc_build() 157 wpabuf_put_data(req, start_buf, start_len); in eap_tnc_build() 160 rpos1 = wpabuf_put(req, 0); in eap_tnc_build() [all …]
|
D | eap_server_gpsk.c | 108 struct wpabuf *req; in eap_gpsk_build_gpsk_1() local 122 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, in eap_gpsk_build_gpsk_1() 124 if (req == NULL) { in eap_gpsk_build_gpsk_1() 131 wpabuf_put_u8(req, EAP_GPSK_OPCODE_GPSK_1); in eap_gpsk_build_gpsk_1() 132 wpabuf_put_be16(req, sm->cfg->server_id_len); in eap_gpsk_build_gpsk_1() 133 wpabuf_put_data(req, sm->cfg->server_id, sm->cfg->server_id_len); in eap_gpsk_build_gpsk_1() 134 wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN); in eap_gpsk_build_gpsk_1() 135 wpabuf_put_be16(req, in eap_gpsk_build_gpsk_1() 137 wpabuf_put_data(req, data->csuite_list, in eap_gpsk_build_gpsk_1() 140 return req; in eap_gpsk_build_gpsk_1() [all …]
|
D | eap_server_pax.c | 75 struct wpabuf *req; in eap_pax_build_std_1() local 87 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, in eap_pax_build_std_1() 90 if (req == NULL) { in eap_pax_build_std_1() 97 pax = wpabuf_put(req, sizeof(*pax)); in eap_pax_build_std_1() 104 wpabuf_put_be16(req, EAP_PAX_RAND_LEN); in eap_pax_build_std_1() 105 wpabuf_put_data(req, data->rand.r.x, EAP_PAX_RAND_LEN); in eap_pax_build_std_1() 109 pos = wpabuf_put(req, EAP_PAX_MAC_LEN); in eap_pax_build_std_1() 111 wpabuf_mhead(req), wpabuf_len(req) - EAP_PAX_ICV_LEN, in eap_pax_build_std_1() 115 wpabuf_free(req); in eap_pax_build_std_1() 120 return req; in eap_pax_build_std_1() [all …]
|
D | eap_server_wsc.c | 170 struct wpabuf *req; in eap_wsc_build_start() local 172 req = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, 2, in eap_wsc_build_start() 174 if (req == NULL) { in eap_wsc_build_start() 181 wpabuf_put_u8(req, WSC_Start); /* Op-Code */ in eap_wsc_build_start() 182 wpabuf_put_u8(req, 0); /* Flags */ in eap_wsc_build_start() 184 return req; in eap_wsc_build_start() 190 struct wpabuf *req; in eap_wsc_build_msg() local 207 req = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen, in eap_wsc_build_msg() 209 if (req == NULL) { in eap_wsc_build_msg() 215 wpabuf_put_u8(req, data->out_op_code); /* Op-Code */ in eap_wsc_build_msg() [all …]
|
/hostap-3.7.0/wpa_supplicant/ |
D | rrm.c | 309 const struct rrm_measurement_request_element *req, in wpas_rrm_build_lci_report() argument 317 const u8 *request = req->variable; in wpas_rrm_build_lci_report() 318 size_t len = req->len - 3; in wpas_rrm_build_lci_report() 354 if (wpas_rrm_report_elem(buf, req->token, in wpas_rrm_build_lci_report() 355 MEASUREMENT_REPORT_MODE_ACCEPT, req->type, in wpas_rrm_build_lci_report() 366 wpas_rrm_report_elem(buf, req->token, in wpas_rrm_build_lci_report() 368 req->type, NULL, 0) < 0) { in wpas_rrm_build_lci_report() 1161 const struct rrm_measurement_beacon_request *req, in wpas_rm_handle_beacon_req() argument 1174 if (len < sizeof(*req)) in wpas_rm_handle_beacon_req() 1177 if (req->mode != BEACON_REPORT_MODE_PASSIVE && in wpas_rm_handle_beacon_req() [all …]
|
/hostap-3.7.0/tests/hwsim/auth_serv/ |
D | rsa3072-generate.sh | 26 …$OPENSSL req -config rsa3072-ca-openssl.cnf.tmp -batch -x509 -new -newkey rsa:3072 -nodes -keyout … 41 if [ ! -r rsa3072-server.req ]; then 42 …$OPENSSL req -config rsa3072-ca-openssl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout rsa307… 44 …file rsa3072-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-server.req -out rsa3072-server… 56 if [ ! -r rsa3072-user.req ]; then 57 …$OPENSSL req -config rsa3072-ca-openssl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout rsa307… 59 …eyfile rsa3072-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-user.req -out rsa3072-user.p… 71 if [ ! -r rsa3072-user-rsa2048.req ]; then 72 …OPENSSL req -config rsa3072-ca-openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout rsa3072… 74 …sa3072-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-user-rsa2048.req -out rsa3072-user-r…
|
D | sha512-generate.sh | 15 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -x509 -new -newkey rsa:4096 -nodes -keyout sha512… 28 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -newkey rsa:3500 -nodes -keyout sha512-serve… 29 …keyfile sha512-ca.key -cert sha512-ca.pem -create_serial -in sha512-server.req -out sha512-server.… 40 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout sha384-serve… 41 …keyfile sha512-ca.key -cert sha512-ca.pem -create_serial -in sha384-server.req -out sha384-server.… 52 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -newkey rsa:3400 -nodes -keyout sha512-user.… 53 … -keyfile sha512-ca.key -cert sha512-ca.pem -create_serial -in sha512-user.req -out sha512-user.pe… 64 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -newkey rsa:2900 -nodes -keyout sha384-user.… 65 … -keyfile sha512-ca.key -cert sha512-ca.pem -create_serial -in sha384-user.req -out sha384-user.pe…
|
D | ec2-generate.sh | 17 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -x509 -new -key ec2-ca.key -out ec2-ca.pem -outfo… 31 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-server.key -out ec2-server.r… 32 … -batch -keyfile ec2-ca.key -cert ec2-ca.pem -create_serial -in ec2-server.req -out ec2-server.pem… 44 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-user.key -out ec2-user.req -… 45 …mp -batch -keyfile ec2-ca.key -cert ec2-ca.pem -create_serial -in ec2-user.req -out ec2-user.pem -… 57 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-user-p256.key -out ec2-user-… 58 …atch -keyfile ec2-ca.key -cert ec2-ca.pem -create_serial -in ec2-user-p256.req -out ec2-user-p256.…
|
D | ec-generate.sh | 17 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -x509 -new -key ec-ca.key -out ec-ca.pem -outform… 31 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec-server.key -out ec-server.req… 32 …tmp -batch -keyfile ec-ca.key -cert ec-ca.pem -create_serial -in ec-server.req -out ec-server.pem … 44 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec-user.key -out ec-user.req -ou… 45 …f.tmp -batch -keyfile ec-ca.key -cert ec-ca.pem -create_serial -in ec-user.req -out ec-user.pem -e…
|
/hostap-3.7.0/hs20/client/ |
D | est.c | 391 X509_REQ *req = NULL; in generate_csr() local 438 req = X509_REQ_new(); in generate_csr() 439 if (req == NULL) in generate_csr() 455 res = X509_REQ_set_subject_name(req, in generate_csr() 468 !X509_REQ_set_subject_name(req, subj)) in generate_csr() 474 if (!X509_REQ_set_pubkey(req, pkey)) in generate_csr() 501 if (!X509_REQ_add_extensions(req, exts)) in generate_csr() 506 if (!X509_REQ_sign(req, pkey, EVP_sha256())) in generate_csr() 515 X509_REQ_print(out, req); in generate_csr() 536 X509_REQ_print_fp(f, req); in generate_csr() [all …]
|
/hostap-3.7.0/tests/fuzzing/eap-sim-peer/ |
D | eap-sim-peer.c | 77 void eap_sm_request_sim(struct eap_sm *sm, const char *req) in eap_sm_request_sim() argument 104 struct wpabuf *buf, *req; in LLVMFuzzerTestOneInput() local 110 req = wpabuf_alloc_copy(pos, flen); in LLVMFuzzerTestOneInput() 111 if (!req) in LLVMFuzzerTestOneInput() 113 wpa_hexdump_buf(MSG_MSGDUMP, "fuzzer - request", req); in LLVMFuzzerTestOneInput() 114 buf = registered_eap_method->process(sm, priv, &ret, req); in LLVMFuzzerTestOneInput() 116 wpabuf_free(req); in LLVMFuzzerTestOneInput()
|
/hostap-3.7.0/tests/fuzzing/eap-aka-peer/ |
D | eap-aka-peer.c | 83 void eap_sm_request_sim(struct eap_sm *sm, const char *req) in eap_sm_request_sim() argument 110 struct wpabuf *buf, *req; in LLVMFuzzerTestOneInput() local 116 req = wpabuf_alloc_copy(pos, flen); in LLVMFuzzerTestOneInput() 117 if (!req) in LLVMFuzzerTestOneInput() 119 wpa_hexdump_buf(MSG_MSGDUMP, "fuzzer - request", req); in LLVMFuzzerTestOneInput() 120 buf = registered_eap_method->process(sm, priv, &ret, req); in LLVMFuzzerTestOneInput() 122 wpabuf_free(req); in LLVMFuzzerTestOneInput()
|
/hostap-3.7.0/src/ap/ |
D | gas_query_ap.c | 46 struct wpabuf *req; member 135 wpabuf_free(query->req); in gas_query_free() 260 struct wpabuf *req, unsigned int wait_time) in gas_query_tx() argument 266 MAC2STR(query->addr), (unsigned int) wpabuf_len(req), in gas_query_tx() 269 u8 *categ = wpabuf_mhead_u8(req); in gas_query_tx() 274 query->addr, wpabuf_head(req), in gas_query_tx() 275 wpabuf_len(req)); in gas_query_tx() 283 struct wpabuf *req; in gas_query_tx_comeback_req() local 286 req = gas_build_comeback_req(query->dialog_token); in gas_query_tx_comeback_req() 287 if (req == NULL) { in gas_query_tx_comeback_req() [all …]
|