Home
last modified time | relevance | path

Searched refs:req (Results 1 – 25 of 144) sorted by relevance

123456

/hostap-3.7.0/src/wps/
Dhttp_server.c30 void (*cb)(void *ctx, struct http_request *req);
44 struct http_request *req = cookie; in http_request_cb() local
45 struct http_server *srv = req->srv; in http_request_cb()
49 inet_ntoa(req->cli.sin_addr), in http_request_cb()
50 ntohs(req->cli.sin_port)); in http_request_cb()
51 srv->cb(srv->cb_ctx, req); in http_request_cb()
55 "completely", inet_ntoa(req->cli.sin_addr), in http_request_cb()
56 ntohs(req->cli.sin_port)); in http_request_cb()
57 http_request_deinit(req); in http_request_cb()
64 struct http_request *req; in http_request_init() local
[all …]
Dhttp_server.h15 void http_request_deinit(struct http_request *req);
16 void http_request_send(struct http_request *req, struct wpabuf *resp);
17 void http_request_send_and_deinit(struct http_request *req,
19 enum httpread_hdr_type http_request_get_type(struct http_request *req);
20 char * http_request_get_uri(struct http_request *req);
21 char * http_request_get_hdr(struct http_request *req);
22 char * http_request_get_data(struct http_request *req);
23 char * http_request_get_hdr_line(struct http_request *req, const char *tag);
24 struct sockaddr_in * http_request_get_cli_addr(struct http_request *req);
28 struct http_request *req),
Dhttp_client.c24 struct wpabuf *req; member
90 send_len = wpabuf_len(c->req) - c->req_pos; in http_client_tx_ready()
94 (unsigned long) wpabuf_len(c->req), in http_client_tx_ready()
97 res = send(c->sd, wpabuf_head_u8(c->req) + c->req_pos, send_len, 0); in http_client_tx_ready()
109 res, (unsigned long) wpabuf_len(c->req), in http_client_tx_ready()
118 wpabuf_free(c->req); in http_client_tx_ready()
119 c->req = NULL; in http_client_tx_ready()
131 struct wpabuf *req, size_t max_response, in http_client_addr() argument
177 c->req = req; in http_client_addr()
237 struct wpabuf *req, size_t max_response, in http_client_url() argument
[all …]
Dwps_upnp_web.c312 } req; in web_connection_parse_get() local
331 req = GET_DEVICE_XML_FILE; in web_connection_parse_get()
345 req = GET_SCPD_XML_FILE; in web_connection_parse_get()
394 switch (req) { in web_connection_parse_get()
755 static void web_connection_send_reply(struct http_request *req, in web_connection_send_reply() argument
784 http_request_deinit(req); in web_connection_send_reply()
857 http_request_send_and_deinit(req, buf); in web_connection_send_reply()
861 static const char * web_get_action(struct http_request *req, in web_get_action() argument
871 b = http_request_get_hdr_line(req, "SOAPAction:"); in web_get_action()
920 struct http_request *req, in web_connection_parse_post() argument
[all …]
/hostap-3.7.0/src/eap_peer/
Deap_pax.c93 static struct wpabuf * eap_pax_alloc_resp(const struct eap_pax_hdr *req, in eap_pax_alloc_resp() argument
107 pax->mac_id = req->mac_id; in eap_pax_alloc_resp()
108 pax->dh_group_id = req->dh_group_id; in eap_pax_alloc_resp()
109 pax->public_key_id = req->public_key_id; in eap_pax_alloc_resp()
117 const struct eap_pax_hdr *req, in eap_pax_process_std_1() argument
134 if (req->flags & EAP_PAX_FLAGS_CE) { in eap_pax_process_std_1()
141 left = req_plen - sizeof(*req); in eap_pax_process_std_1()
150 pos = (const u8 *) (req + 1); in eap_pax_process_std_1()
180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e, in eap_pax_process_std_1()
191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); in eap_pax_process_std_1()
[all …]
/hostap-3.7.0/src/drivers/
Dnetlink.c176 } req; in netlink_send_oper_ifla() local
181 os_memset(&req, 0, sizeof(req)); in netlink_send_oper_ifla()
183 req.hdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)); in netlink_send_oper_ifla()
184 req.hdr.nlmsg_type = RTM_SETLINK; in netlink_send_oper_ifla()
185 req.hdr.nlmsg_flags = NLM_F_REQUEST; in netlink_send_oper_ifla()
186 req.hdr.nlmsg_seq = ++nl_seq; in netlink_send_oper_ifla()
187 req.hdr.nlmsg_pid = 0; in netlink_send_oper_ifla()
189 req.ifinfo.ifi_family = AF_UNSPEC; in netlink_send_oper_ifla()
190 req.ifinfo.ifi_type = 0; in netlink_send_oper_ifla()
191 req.ifinfo.ifi_index = ifindex; in netlink_send_oper_ifla()
[all …]
/hostap-3.7.0/tests/hwsim/
Dtest_nfc_wps.py227 req = dev[0].request("NFC_GET_HANDOVER_REQ NDEF WPS-CR").rstrip()
228 if "FAIL" in req:
233 res = hapd.request("NFC_REPORT_HANDOVER RESP WPS " + req + " " + sel)
237 res = dev[0].request("NFC_REPORT_HANDOVER INIT WPS " + req + " " + sel)
303 req = dev[0].request("NFC_GET_HANDOVER_REQ NDEF WPS-CR").rstrip()
304 if "FAIL" in req:
309 res = hapd.request("NFC_REPORT_HANDOVER RESP WPS " + req + " " + sel)
313 res = dev[0].request("NFC_REPORT_HANDOVER INIT WPS " + req + " " + sel)
331 req = dev[0].request("NFC_GET_HANDOVER_REQ NDEF WPS-CR").rstrip()
332 if "FAIL" in req:
[all …]
Dtest_sae.py719 req = hapd.mgmt_rx()
720 if req is None:
722 if req['subtype'] == 11:
724 req = None
725 if not req:
730 resp['fc'] = req['fc']
731 resp['da'] = req['sa']
732 resp['sa'] = req['da']
733 resp['bssid'] = req['bssid']
740 req = hapd.mgmt_rx()
[all …]
Dtest_radius.py411 def send_and_check_reply(srv, req, code, error_cause=0): argument
412 reply = srv.SendPacket(req)
506 req = radius_das.DisconnectPacket(dict=dict, secret=b"incorrect",
510 logger.debug(req)
512 reply = srv.SendPacket(req)
518 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret",
520 logger.debug(req)
522 reply = srv.SendPacket(req)
528 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret",
531 logger.debug(req)
[all …]
Dtest_nfc_p2p.py56 req = dev[0].global_request("NFC_GET_HANDOVER_REQ NDEF P2P-CR").rstrip()
57 if "FAIL" in req:
64 res = dev[1].global_request("NFC_REPORT_HANDOVER RESP P2P " + req + " " + sel)
67 res = dev[0].global_request("NFC_REPORT_HANDOVER INIT P2P " + req + " " + sel)
107 req = dev[0].global_request("NFC_GET_HANDOVER_REQ NDEF P2P-CR").rstrip()
108 if "FAIL" in req:
117 res = dev[1].global_request("NFC_REPORT_HANDOVER RESP P2P " + req + " " + sel)
120 res = dev[0].global_request("NFC_REPORT_HANDOVER INIT P2P " + req + " " + sel)
156 req = dev[0].global_request("NFC_GET_HANDOVER_REQ NDEF P2P-CR").rstrip()
157 if "FAIL" in req:
[all …]
/hostap-3.7.0/src/fst/
Dfst_session.c363 const struct fst_setup_req *req; in fst_session_handle_setup_request() local
369 if (frame_len < IEEE80211_HDRLEN + 1 + sizeof(*req)) { in fst_session_handle_setup_request()
373 IEEE80211_HDRLEN + 1 + sizeof(*req)); in fst_session_handle_setup_request()
377 req = (const struct fst_setup_req *) in fst_session_handle_setup_request()
379 if (req->stie.element_id != WLAN_EID_SESSION_TRANSITION || in fst_session_handle_setup_request()
380 req->stie.length < 11) { in fst_session_handle_setup_request()
386 if (req->stie.new_band_id == req->stie.old_band_id) { in fst_session_handle_setup_request()
394 if (plen > sizeof(*req)) { in fst_session_handle_setup_request()
395 fst_iface_update_mb_ie(iface, mgmt->sa, (const u8 *) (req + 1), in fst_session_handle_setup_request()
396 plen - sizeof(*req)); in fst_session_handle_setup_request()
[all …]
/hostap-3.7.0/src/eap_server/
Deap_server_mschapv2.c100 struct wpabuf *req; in eap_mschapv2_build_challenge() local
113 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_build_challenge()
115 if (req == NULL) { in eap_mschapv2_build_challenge()
122 ms = wpabuf_put(req, sizeof(*ms)); in eap_mschapv2_build_challenge()
127 wpabuf_put_u8(req, CHALLENGE_LEN); in eap_mschapv2_build_challenge()
129 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); in eap_mschapv2_build_challenge()
131 wpabuf_put(req, CHALLENGE_LEN); in eap_mschapv2_build_challenge()
134 wpabuf_put_data(req, sm->cfg->server_id, sm->cfg->server_id_len); in eap_mschapv2_build_challenge()
136 return req; in eap_mschapv2_build_challenge()
143 struct wpabuf *req; in eap_mschapv2_build_success_req() local
[all …]
Deap_server_tnc.c107 struct wpabuf *req; in eap_tnc_build_start() local
109 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, EAP_CODE_REQUEST, in eap_tnc_build_start()
111 if (req == NULL) { in eap_tnc_build_start()
118 wpabuf_put_u8(req, EAP_TNC_FLAGS_START | EAP_TNC_VERSION); in eap_tnc_build_start()
122 return req; in eap_tnc_build_start()
129 struct wpabuf *req; in eap_tnc_build() local
150 req = wpabuf_alloc(rlen); in eap_tnc_build()
151 if (req == NULL) { in eap_tnc_build()
157 wpabuf_put_data(req, start_buf, start_len); in eap_tnc_build()
160 rpos1 = wpabuf_put(req, 0); in eap_tnc_build()
[all …]
Deap_server_gpsk.c108 struct wpabuf *req; in eap_gpsk_build_gpsk_1() local
122 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, in eap_gpsk_build_gpsk_1()
124 if (req == NULL) { in eap_gpsk_build_gpsk_1()
131 wpabuf_put_u8(req, EAP_GPSK_OPCODE_GPSK_1); in eap_gpsk_build_gpsk_1()
132 wpabuf_put_be16(req, sm->cfg->server_id_len); in eap_gpsk_build_gpsk_1()
133 wpabuf_put_data(req, sm->cfg->server_id, sm->cfg->server_id_len); in eap_gpsk_build_gpsk_1()
134 wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN); in eap_gpsk_build_gpsk_1()
135 wpabuf_put_be16(req, in eap_gpsk_build_gpsk_1()
137 wpabuf_put_data(req, data->csuite_list, in eap_gpsk_build_gpsk_1()
140 return req; in eap_gpsk_build_gpsk_1()
[all …]
Deap_server_pax.c75 struct wpabuf *req; in eap_pax_build_std_1() local
87 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, in eap_pax_build_std_1()
90 if (req == NULL) { in eap_pax_build_std_1()
97 pax = wpabuf_put(req, sizeof(*pax)); in eap_pax_build_std_1()
104 wpabuf_put_be16(req, EAP_PAX_RAND_LEN); in eap_pax_build_std_1()
105 wpabuf_put_data(req, data->rand.r.x, EAP_PAX_RAND_LEN); in eap_pax_build_std_1()
109 pos = wpabuf_put(req, EAP_PAX_MAC_LEN); in eap_pax_build_std_1()
111 wpabuf_mhead(req), wpabuf_len(req) - EAP_PAX_ICV_LEN, in eap_pax_build_std_1()
115 wpabuf_free(req); in eap_pax_build_std_1()
120 return req; in eap_pax_build_std_1()
[all …]
Deap_server_wsc.c170 struct wpabuf *req; in eap_wsc_build_start() local
172 req = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, 2, in eap_wsc_build_start()
174 if (req == NULL) { in eap_wsc_build_start()
181 wpabuf_put_u8(req, WSC_Start); /* Op-Code */ in eap_wsc_build_start()
182 wpabuf_put_u8(req, 0); /* Flags */ in eap_wsc_build_start()
184 return req; in eap_wsc_build_start()
190 struct wpabuf *req; in eap_wsc_build_msg() local
207 req = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen, in eap_wsc_build_msg()
209 if (req == NULL) { in eap_wsc_build_msg()
215 wpabuf_put_u8(req, data->out_op_code); /* Op-Code */ in eap_wsc_build_msg()
[all …]
/hostap-3.7.0/wpa_supplicant/
Drrm.c309 const struct rrm_measurement_request_element *req, in wpas_rrm_build_lci_report() argument
317 const u8 *request = req->variable; in wpas_rrm_build_lci_report()
318 size_t len = req->len - 3; in wpas_rrm_build_lci_report()
354 if (wpas_rrm_report_elem(buf, req->token, in wpas_rrm_build_lci_report()
355 MEASUREMENT_REPORT_MODE_ACCEPT, req->type, in wpas_rrm_build_lci_report()
366 wpas_rrm_report_elem(buf, req->token, in wpas_rrm_build_lci_report()
368 req->type, NULL, 0) < 0) { in wpas_rrm_build_lci_report()
1161 const struct rrm_measurement_beacon_request *req, in wpas_rm_handle_beacon_req() argument
1174 if (len < sizeof(*req)) in wpas_rm_handle_beacon_req()
1177 if (req->mode != BEACON_REPORT_MODE_PASSIVE && in wpas_rm_handle_beacon_req()
[all …]
/hostap-3.7.0/tests/hwsim/auth_serv/
Drsa3072-generate.sh26 …$OPENSSL req -config rsa3072-ca-openssl.cnf.tmp -batch -x509 -new -newkey rsa:3072 -nodes -keyout …
41 if [ ! -r rsa3072-server.req ]; then
42 …$OPENSSL req -config rsa3072-ca-openssl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout rsa307…
44 …file rsa3072-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-server.req -out rsa3072-server…
56 if [ ! -r rsa3072-user.req ]; then
57 …$OPENSSL req -config rsa3072-ca-openssl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout rsa307…
59 …eyfile rsa3072-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-user.req -out rsa3072-user.p…
71 if [ ! -r rsa3072-user-rsa2048.req ]; then
72 …OPENSSL req -config rsa3072-ca-openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout rsa3072…
74 …sa3072-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-user-rsa2048.req -out rsa3072-user-r…
Dsha512-generate.sh15 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -x509 -new -newkey rsa:4096 -nodes -keyout sha512…
28 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -newkey rsa:3500 -nodes -keyout sha512-serve…
29 …keyfile sha512-ca.key -cert sha512-ca.pem -create_serial -in sha512-server.req -out sha512-server.…
40 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout sha384-serve…
41 …keyfile sha512-ca.key -cert sha512-ca.pem -create_serial -in sha384-server.req -out sha384-server.…
52 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -newkey rsa:3400 -nodes -keyout sha512-user.…
53 … -keyfile sha512-ca.key -cert sha512-ca.pem -create_serial -in sha512-user.req -out sha512-user.pe…
64 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -newkey rsa:2900 -nodes -keyout sha384-user.…
65 … -keyfile sha512-ca.key -cert sha512-ca.pem -create_serial -in sha384-user.req -out sha384-user.pe…
Dec2-generate.sh17 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -x509 -new -key ec2-ca.key -out ec2-ca.pem -outfo…
31 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-server.key -out ec2-server.r…
32 … -batch -keyfile ec2-ca.key -cert ec2-ca.pem -create_serial -in ec2-server.req -out ec2-server.pem…
44 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-user.key -out ec2-user.req -…
45 …mp -batch -keyfile ec2-ca.key -cert ec2-ca.pem -create_serial -in ec2-user.req -out ec2-user.pem -…
57 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-user-p256.key -out ec2-user-…
58 …atch -keyfile ec2-ca.key -cert ec2-ca.pem -create_serial -in ec2-user-p256.req -out ec2-user-p256.…
Dec-generate.sh17 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -x509 -new -key ec-ca.key -out ec-ca.pem -outform…
31 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec-server.key -out ec-server.req
32 …tmp -batch -keyfile ec-ca.key -cert ec-ca.pem -create_serial -in ec-server.req -out ec-server.pem …
44 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec-user.key -out ec-user.req -ou…
45 …f.tmp -batch -keyfile ec-ca.key -cert ec-ca.pem -create_serial -in ec-user.req -out ec-user.pem -e…
/hostap-3.7.0/hs20/client/
Dest.c391 X509_REQ *req = NULL; in generate_csr() local
438 req = X509_REQ_new(); in generate_csr()
439 if (req == NULL) in generate_csr()
455 res = X509_REQ_set_subject_name(req, in generate_csr()
468 !X509_REQ_set_subject_name(req, subj)) in generate_csr()
474 if (!X509_REQ_set_pubkey(req, pkey)) in generate_csr()
501 if (!X509_REQ_add_extensions(req, exts)) in generate_csr()
506 if (!X509_REQ_sign(req, pkey, EVP_sha256())) in generate_csr()
515 X509_REQ_print(out, req); in generate_csr()
536 X509_REQ_print_fp(f, req); in generate_csr()
[all …]
/hostap-3.7.0/tests/fuzzing/eap-sim-peer/
Deap-sim-peer.c77 void eap_sm_request_sim(struct eap_sm *sm, const char *req) in eap_sm_request_sim() argument
104 struct wpabuf *buf, *req; in LLVMFuzzerTestOneInput() local
110 req = wpabuf_alloc_copy(pos, flen); in LLVMFuzzerTestOneInput()
111 if (!req) in LLVMFuzzerTestOneInput()
113 wpa_hexdump_buf(MSG_MSGDUMP, "fuzzer - request", req); in LLVMFuzzerTestOneInput()
114 buf = registered_eap_method->process(sm, priv, &ret, req); in LLVMFuzzerTestOneInput()
116 wpabuf_free(req); in LLVMFuzzerTestOneInput()
/hostap-3.7.0/tests/fuzzing/eap-aka-peer/
Deap-aka-peer.c83 void eap_sm_request_sim(struct eap_sm *sm, const char *req) in eap_sm_request_sim() argument
110 struct wpabuf *buf, *req; in LLVMFuzzerTestOneInput() local
116 req = wpabuf_alloc_copy(pos, flen); in LLVMFuzzerTestOneInput()
117 if (!req) in LLVMFuzzerTestOneInput()
119 wpa_hexdump_buf(MSG_MSGDUMP, "fuzzer - request", req); in LLVMFuzzerTestOneInput()
120 buf = registered_eap_method->process(sm, priv, &ret, req); in LLVMFuzzerTestOneInput()
122 wpabuf_free(req); in LLVMFuzzerTestOneInput()
/hostap-3.7.0/src/ap/
Dgas_query_ap.c46 struct wpabuf *req; member
135 wpabuf_free(query->req); in gas_query_free()
260 struct wpabuf *req, unsigned int wait_time) in gas_query_tx() argument
266 MAC2STR(query->addr), (unsigned int) wpabuf_len(req), in gas_query_tx()
269 u8 *categ = wpabuf_mhead_u8(req); in gas_query_tx()
274 query->addr, wpabuf_head(req), in gas_query_tx()
275 wpabuf_len(req)); in gas_query_tx()
283 struct wpabuf *req; in gas_query_tx_comeback_req() local
286 req = gas_build_comeback_req(query->dialog_token); in gas_query_tx_comeback_req()
287 if (req == NULL) { in gas_query_tx_comeback_req()
[all …]

123456