Home
last modified time | relevance | path

Searched refs:attr (Results 1 – 25 of 88) sorted by relevance

1234

/hostap-latest/src/wps/
Dwps_validate.c1030 struct wps_parse_attr attr; in wps_validate_cred() local
1036 if (wps_parse_msg(&buf, &attr) < 0) { in wps_validate_cred()
1041 if (wps_validate_network_idx(attr.network_idx, 1) || in wps_validate_cred()
1042 wps_validate_ssid(attr.ssid, attr.ssid_len, 1) || in wps_validate_cred()
1043 wps_validate_auth_type(attr.auth_type, 1) || in wps_validate_cred()
1044 wps_validate_encr_type(attr.encr_type, 1) || in wps_validate_cred()
1045 wps_validate_network_key_index(attr.network_key_idx, 0) || in wps_validate_cred()
1046 wps_validate_network_key(attr.network_key, attr.network_key_len, in wps_validate_cred()
1047 attr.encr_type, 1) || in wps_validate_cred()
1048 wps_validate_mac_addr(attr.mac_addr, 1) || in wps_validate_cred()
[all …]
Dwps_attr_parse.c20 static int wps_set_vendor_ext_wfa_subelem(struct wps_parse_attr *attr, in wps_set_vendor_ext_wfa_subelem() argument
32 attr->version2 = pos; in wps_set_vendor_ext_wfa_subelem()
35 attr->authorized_macs = pos; in wps_set_vendor_ext_wfa_subelem()
36 attr->authorized_macs_len = len; in wps_set_vendor_ext_wfa_subelem()
44 attr->network_key_shareable = pos; in wps_set_vendor_ext_wfa_subelem()
52 attr->request_to_enroll = pos; in wps_set_vendor_ext_wfa_subelem()
60 attr->settings_delay_time = pos; in wps_set_vendor_ext_wfa_subelem()
68 attr->registrar_configuration_methods = pos; in wps_set_vendor_ext_wfa_subelem()
77 attr->multi_ap_ext = *pos; in wps_set_vendor_ext_wfa_subelem()
79 attr->multi_ap_ext); in wps_set_vendor_ext_wfa_subelem()
[all …]
Dwps.c105 struct wps_parse_attr attr; in wps_init() local
108 if (wps_parse_msg(cfg->assoc_wps_ie, &attr) < 0) { in wps_init()
111 } else if (attr.request_type == NULL) { in wps_init()
117 *attr.request_type); in wps_init()
118 data->request_type = *attr.request_type; in wps_init()
238 struct wps_parse_attr attr; in wps_is_selected_pbc_registrar() local
247 if (wps_parse_msg(msg, &attr) < 0 || in wps_is_selected_pbc_registrar()
248 !attr.selected_registrar || *attr.selected_registrar == 0 || in wps_is_selected_pbc_registrar()
249 !attr.dev_password_id || in wps_is_selected_pbc_registrar()
250 WPA_GET_BE16(attr.dev_password_id) != DEV_PW_PUSHBUTTON) in wps_is_selected_pbc_registrar()
[all …]
Dwps_enrollee.c707 struct wps_parse_attr attr; in wps_process_cred_e() local
714 if (wps_parse_msg(&msg, &attr) < 0 || in wps_process_cred_e()
715 wps_process_cred(&attr, &wps->cred)) in wps_process_cred_e()
802 struct wps_parse_attr *attr, in wps_process_ap_settings_e() argument
811 if (wps_process_ap_settings(attr, &cred) < 0) in wps_process_ap_settings_e()
961 struct wps_parse_attr *attr) in wps_process_m2() argument
972 if (wps_process_registrar_nonce(wps, attr->registrar_nonce) || in wps_process_m2()
973 wps_process_enrollee_nonce(wps, attr->enrollee_nonce) || in wps_process_m2()
974 wps_process_uuid_r(wps, attr->uuid_r) || in wps_process_m2()
975 wps_process_dev_pw_id(wps, attr->dev_password_id)) { in wps_process_m2()
[all …]
Dwps_module_tests.c266 struct wps_parse_attr attr; in wps_attr_parse_tests() local
286 if (wps_parse_msg(buf, &attr) != test->result) { in wps_attr_parse_tests()
293 if (!attr.network_key || !attr.ap_setup_locked) in wps_attr_parse_tests()
297 if (attr.num_cred != MAX_CRED_COUNT) in wps_attr_parse_tests()
301 if (!attr.network_key_idx) in wps_attr_parse_tests()
305 if (attr.num_req_dev_type != MAX_REQ_DEV_TYPE_COUNT) in wps_attr_parse_tests()
309 if (attr.num_vendor_ext != MAX_WPS_PARSE_VENDOR_EXT) in wps_attr_parse_tests()
313 if (!attr.version2 || in wps_attr_parse_tests()
314 !attr.authorized_macs || in wps_attr_parse_tests()
315 !attr.network_key_shareable || in wps_attr_parse_tests()
[all …]
Dwps_attr_process.c247 int wps_process_cred(struct wps_parse_attr *attr, in wps_process_cred() argument
253 if (wps_process_cred_network_idx(cred, attr->network_idx) || in wps_process_cred()
254 wps_process_cred_ssid(cred, attr->ssid, attr->ssid_len) || in wps_process_cred()
255 wps_process_cred_auth_type(cred, attr->auth_type) || in wps_process_cred()
256 wps_process_cred_encr_type(cred, attr->encr_type) || in wps_process_cred()
257 wps_process_cred_network_key_idx(cred, attr->network_key_idx) || in wps_process_cred()
258 wps_process_cred_network_key(cred, attr->network_key, in wps_process_cred()
259 attr->network_key_len) || in wps_process_cred()
260 wps_process_cred_mac_addr(cred, attr->mac_addr)) in wps_process_cred()
267 int wps_process_ap_settings(struct wps_parse_attr *attr, in wps_process_ap_settings() argument
[all …]
Dwps_upnp_ap.c33 struct wps_parse_attr attr; in upnp_er_set_selected_registrar() local
38 wps_parse_msg(msg, &attr) < 0) in upnp_er_set_selected_registrar()
45 if (attr.selected_registrar == NULL || *attr.selected_registrar == 0) { in upnp_er_set_selected_registrar()
51 s->dev_password_id = attr.dev_password_id ? in upnp_er_set_selected_registrar()
52 WPA_GET_BE16(attr.dev_password_id) : DEV_PW_DEFAULT; in upnp_er_set_selected_registrar()
53 s->config_methods = attr.sel_reg_config_methods ? in upnp_er_set_selected_registrar()
54 WPA_GET_BE16(attr.sel_reg_config_methods) : -1; in upnp_er_set_selected_registrar()
55 if (attr.authorized_macs) { in upnp_er_set_selected_registrar()
56 int count = attr.authorized_macs_len / ETH_ALEN; in upnp_er_set_selected_registrar()
59 os_memcpy(s->authorized_macs, attr.authorized_macs, in upnp_er_set_selected_registrar()
[all …]
Dwps_registrar.c1150 struct wps_parse_attr attr; in wps_registrar_probe_req_rx() local
1157 if (wps_parse_msg(wps_data, &attr) < 0) in wps_registrar_probe_req_rx()
1160 if (attr.config_methods == NULL) { in wps_registrar_probe_req_rx()
1166 if (attr.dev_password_id == NULL) { in wps_registrar_probe_req_rx()
1172 if (reg->enrollee_seen_cb && attr.uuid_e && in wps_registrar_probe_req_rx()
1173 attr.primary_dev_type && attr.request_type && !p2p_wildcard) { in wps_registrar_probe_req_rx()
1175 if (attr.dev_name) { in wps_registrar_probe_req_rx()
1176 dev_name = os_zalloc(attr.dev_name_len + 1); in wps_registrar_probe_req_rx()
1178 os_memcpy(dev_name, attr.dev_name, in wps_registrar_probe_req_rx()
1179 attr.dev_name_len); in wps_registrar_probe_req_rx()
[all …]
Dwps_dev_attr.c377 struct wps_parse_attr *attr) in wps_process_device_attrs() argument
379 if (wps_process_manufacturer(dev, attr->manufacturer, in wps_process_device_attrs()
380 attr->manufacturer_len) || in wps_process_device_attrs()
381 wps_process_model_name(dev, attr->model_name, in wps_process_device_attrs()
382 attr->model_name_len) || in wps_process_device_attrs()
383 wps_process_model_number(dev, attr->model_number, in wps_process_device_attrs()
384 attr->model_number_len) || in wps_process_device_attrs()
385 wps_process_serial_number(dev, attr->serial_number, in wps_process_device_attrs()
386 attr->serial_number_len) || in wps_process_device_attrs()
387 wps_process_primary_dev_type(dev, attr->primary_dev_type) || in wps_process_device_attrs()
[all …]
Dwps_er.c476 struct wps_parse_attr attr; in wps_er_ap_get_m1() local
478 if (wps_parse_msg(m1, &attr) < 0) { in wps_er_ap_get_m1()
482 if (attr.primary_dev_type) in wps_er_ap_get_m1()
483 os_memcpy(ap->pri_dev_type, attr.primary_dev_type, 8); in wps_er_ap_get_m1()
484 if (attr.wps_state) in wps_er_ap_get_m1()
485 ap->wps_state = *attr.wps_state; in wps_er_ap_get_m1()
486 if (attr.mac_addr) in wps_er_ap_get_m1()
487 os_memcpy(ap->mac_addr, attr.mac_addr, ETH_ALEN); in wps_er_ap_get_m1()
758 struct wps_parse_attr *attr, in wps_er_add_sta_data() argument
765 m1 = !probe_req && attr->msg_type && *attr->msg_type == WPS_M1; in wps_er_add_sta_data()
[all …]
/hostap-latest/src/radius/
Dradius.c319 const struct radius_attr_type *attr; in radius_msg_dump_attr() local
339 attr = radius_get_attr_type((ext->type << 8) | ext->ext_type); in radius_msg_dump_attr()
342 attr ? attr->name : "?Unknown?", ext->length); in radius_msg_dump_attr()
346 attr = radius_get_attr_type(hdr->type); in radius_msg_dump_attr()
348 hdr->type, attr ? attr->name : "?Unknown?", in radius_msg_dump_attr()
354 if (!attr) in radius_msg_dump_attr()
357 switch (attr->data_type) { in radius_msg_dump_attr()
420 struct radius_attr_hdr *attr = radius_get_attr_hdr(msg, i); in radius_msg_dump() local
421 radius_msg_dump_attr(attr); in radius_msg_dump()
429 struct radius_attr_hdr *attr; in radius_msg_add_msg_auth() local
[all …]
/hostap-latest/src/eap_peer/
Deap_aka.c405 struct eap_sim_attrs *attr) in eap_aka_learn_ids() argument
407 if (attr->next_pseudonym) { in eap_aka_learn_ids()
415 attr->next_pseudonym, in eap_aka_learn_ids()
416 attr->next_pseudonym_len); in eap_aka_learn_ids()
427 data->pseudonym = os_malloc(attr->next_pseudonym_len + in eap_aka_learn_ids()
435 os_memcpy(data->pseudonym, attr->next_pseudonym, in eap_aka_learn_ids()
436 attr->next_pseudonym_len); in eap_aka_learn_ids()
438 os_memcpy(data->pseudonym + attr->next_pseudonym_len, in eap_aka_learn_ids()
441 data->pseudonym_len = attr->next_pseudonym_len + realm_len; in eap_aka_learn_ids()
447 if (attr->next_reauth_id) { in eap_aka_learn_ids()
[all …]
Deap_sim.c431 struct eap_sim_attrs *attr) in eap_sim_learn_ids() argument
433 if (attr->next_pseudonym) { in eap_sim_learn_ids()
441 attr->next_pseudonym, in eap_sim_learn_ids()
442 attr->next_pseudonym_len); in eap_sim_learn_ids()
453 data->pseudonym = os_malloc(attr->next_pseudonym_len + in eap_sim_learn_ids()
461 os_memcpy(data->pseudonym, attr->next_pseudonym, in eap_sim_learn_ids()
462 attr->next_pseudonym_len); in eap_sim_learn_ids()
464 os_memcpy(data->pseudonym + attr->next_pseudonym_len, in eap_sim_learn_ids()
467 data->pseudonym_len = attr->next_pseudonym_len + realm_len; in eap_sim_learn_ids()
473 if (attr->next_reauth_id) { in eap_sim_learn_ids()
[all …]
Deap_sake.c147 struct eap_sake_parse_attr attr; in eap_sake_process_identity() local
157 if (eap_sake_parse_attributes(payload, payload_len, &attr)) in eap_sake_process_identity()
160 if (!attr.perm_id_req && !attr.any_id_req) { in eap_sake_process_identity()
190 struct eap_sake_parse_attr attr; in eap_sake_process_challenge() local
206 if (eap_sake_parse_attributes(payload, payload_len, &attr)) in eap_sake_process_challenge()
209 if (!attr.rand_s) { in eap_sake_process_challenge()
215 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge()
229 if (attr.serverid) { in eap_sake_process_challenge()
231 attr.serverid, attr.serverid_len); in eap_sake_process_challenge()
232 data->serverid = os_memdup(attr.serverid, attr.serverid_len); in eap_sake_process_challenge()
[all …]
/hostap-latest/src/eap_common/
Deap_sake_common.c18 static int eap_sake_parse_add_attr(struct eap_sake_parse_attr *attr, in eap_sake_parse_add_attr() argument
31 attr->rand_s = data; in eap_sake_parse_add_attr()
40 attr->rand_p = data; in eap_sake_parse_add_attr()
49 attr->mic_s = data; in eap_sake_parse_add_attr()
58 attr->mic_p = data; in eap_sake_parse_add_attr()
62 attr->serverid = data; in eap_sake_parse_add_attr()
63 attr->serverid_len = len; in eap_sake_parse_add_attr()
67 attr->peerid = data; in eap_sake_parse_add_attr()
68 attr->peerid_len = len; in eap_sake_parse_add_attr()
72 attr->spi_s = data; in eap_sake_parse_add_attr()
[all …]
Deap_sim_common.c496 struct eap_sim_attrs *attr, int aka, int encr) in eap_sim_parse_attr() argument
501 os_memset(attr, 0, sizeof(*attr)); in eap_sim_parse_attr()
502 attr->id_req = NO_ID_REQ; in eap_sim_parse_attr()
503 attr->notification = -1; in eap_sim_parse_attr()
504 attr->counter = -1; in eap_sim_parse_attr()
505 attr->selected_version = -1; in eap_sim_parse_attr()
506 attr->client_error_code = -1; in eap_sim_parse_attr()
542 attr->rand = apos; in eap_sim_parse_attr()
543 attr->num_chal = alen / GSM_RAND_LEN; in eap_sim_parse_attr()
560 attr->autn = apos; in eap_sim_parse_attr()
[all …]
/hostap-latest/tests/hwsim/
Dradius_das.py19 attr = b''
22 attr += self._PktEncodeAttribute(code, data)
27 header = struct.pack('!BBH', self.code, self.id, (20 + len(attr)))
28 self.authenticator = hashlib.md5(header[0:4] + 16 * b'\x00' + attr
30 return header + self.authenticator + attr
39 attr = self._PktEncodeAttributes()
44 header = struct.pack('!BBH', self.code, self.id, (20 + len(attr)))
45 self.authenticator = hashlib.md5(header[0:4] + 16 * b'\x00' + attr
47 return header + self.authenticator + attr
Dnl80211.py323 attr = struct.pack("@HH", 4 + len(val), nl80211_attr[id]) + val
324 if len(attr) % 4 != 0:
325 attr += b'\x00' * (4 - (len(attr) % 4))
326 return attr
348 alen, attr = struct.unpack("@HH", msg[0:4])
355 attrs[attr] = msg[0:alen]
/hostap-latest/src/eap_server/
Deap_server_aka.c982 struct eap_sim_attrs *attr) in eap_aka_process_identity() argument
988 if (attr->mac || attr->iv || attr->encr_data) { in eap_aka_process_identity()
1000 if (!attr->identity || attr->identity_len == 0) { in eap_aka_process_identity()
1008 new_identity = os_malloc(attr->identity_len); in eap_aka_process_identity()
1016 os_memcpy(sm->identity, attr->identity, attr->identity_len); in eap_aka_process_identity()
1017 sm->identity_len = attr->identity_len; in eap_aka_process_identity()
1042 struct eap_sim_attrs *attr) in eap_aka_process_challenge() argument
1051 attr->kdf_count == 1 && attr->mac == NULL) { in eap_aka_process_challenge()
1052 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { in eap_aka_process_challenge()
1061 data->kdf = attr->kdf[0]; in eap_aka_process_challenge()
[all …]
Deap_server_sim.c451 struct eap_sim_attrs *attr) in eap_sim_process_start() argument
470 (!attr->identity || attr->identity_len == 0)) in eap_sim_process_start()
477 if (!attr->identity || attr->identity_len == 0) { in eap_sim_process_start()
483 new_identity = os_malloc(attr->identity_len); in eap_sim_process_start()
488 os_memcpy(sm->identity, attr->identity, attr->identity_len); in eap_sim_process_start()
489 sm->identity_len = attr->identity_len; in eap_sim_process_start()
646 if (attr->nonce_mt == NULL || attr->selected_version < 0) { in eap_sim_process_start()
652 if (!eap_sim_supported_ver(data, attr->selected_version)) { in eap_sim_process_start()
654 "version %d", attr->selected_version); in eap_sim_process_start()
688 os_memcpy(data->nonce_mt, attr->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_process_start()
[all …]
Deap_server_sake.c306 struct eap_sake_parse_attr attr; in eap_sake_process_challenge() local
314 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) in eap_sake_process_challenge()
317 if (!attr.rand_p || !attr.mic_p) { in eap_sake_process_challenge()
323 os_memcpy(data->rand_p, attr.rand_p, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge()
328 if (attr.peerid) { in eap_sake_process_challenge()
329 data->peerid = os_memdup(attr.peerid, attr.peerid_len); in eap_sake_process_challenge()
332 data->peerid_len = attr.peerid_len; in eap_sake_process_challenge()
357 attr.mic_p, mic_p) < 0) { in eap_sake_process_challenge()
362 if (os_memcmp_const(attr.mic_p, mic_p, EAP_SAKE_MIC_LEN) != 0) { in eap_sake_process_challenge()
377 struct eap_sake_parse_attr attr; in eap_sake_process_confirm() local
[all …]
/hostap-latest/src/p2p/
Dp2p_parse.c477 struct wps_parse_attr attr; in p2p_parse_wps_ie() local
481 if (wps_parse_msg(buf, &attr)) in p2p_parse_wps_ie()
483 if (attr.dev_name && attr.dev_name_len < sizeof(msg->device_name) && in p2p_parse_wps_ie()
485 os_memcpy(msg->device_name, attr.dev_name, attr.dev_name_len); in p2p_parse_wps_ie()
486 if (attr.config_methods) { in p2p_parse_wps_ie()
488 WPA_GET_BE16(attr.config_methods); in p2p_parse_wps_ie()
492 if (attr.dev_password_id) { in p2p_parse_wps_ie()
493 msg->dev_password_id = WPA_GET_BE16(attr.dev_password_id); in p2p_parse_wps_ie()
498 if (attr.primary_dev_type) { in p2p_parse_wps_ie()
500 msg->wps_pri_dev_type = attr.primary_dev_type; in p2p_parse_wps_ie()
[all …]
/hostap-latest/src/ap/
Dap_config.c579 hostapd_config_get_radius_attr(struct hostapd_radius_attr *attr, u8 type) in hostapd_config_get_radius_attr() argument
581 for (; attr; attr = attr->next) { in hostapd_config_get_radius_attr()
582 if (attr->type == type) in hostapd_config_get_radius_attr()
583 return attr; in hostapd_config_get_radius_attr()
593 struct hostapd_radius_attr *attr; in hostapd_parse_radius_attr() local
596 attr = os_zalloc(sizeof(*attr)); in hostapd_parse_radius_attr()
597 if (!attr) in hostapd_parse_radius_attr()
600 attr->type = atoi(value); in hostapd_parse_radius_attr()
604 attr->val = wpabuf_alloc(1); in hostapd_parse_radius_attr()
605 if (!attr->val) { in hostapd_parse_radius_attr()
[all …]
Dpmksa_cache_auth.c211 if (eapol->radius_class.attr) { in pmksa_cache_to_eapol_data()
573 struct radius_das_attrs *attr) in das_attr_match() argument
577 if (attr->sta_addr) { in das_attr_match()
578 if (!ether_addr_equal(attr->sta_addr, entry->spa)) in das_attr_match()
583 if (attr->acct_multi_session_id) { in das_attr_match()
586 if (attr->acct_multi_session_id_len != 16) in das_attr_match()
590 if (os_memcmp(attr->acct_multi_session_id, buf, 16) != 0) in das_attr_match()
595 if (attr->cui) { in das_attr_match()
597 attr->cui_len != wpabuf_len(entry->cui) || in das_attr_match()
598 os_memcmp(attr->cui, wpabuf_head(entry->cui), in das_attr_match()
[all …]
/hostap-latest/wpa_supplicant/
Dwps_supplicant.c154 struct wps_parse_attr attr; in wpas_wps_eapol_cb() local
157 if (wps && wps_parse_msg(wps, &attr) == 0 && in wpas_wps_eapol_cb()
158 attr.wps_state && in wpas_wps_eapol_cb()
159 *attr.wps_state == WPS_STATE_CONFIGURED) in wpas_wps_eapol_cb()
2460 struct wps_parse_attr *attr) in wpas_wps_use_cred() argument
2471 if (wps_oob_use_cred(wpa_s->wps, attr) < 0) in wpas_wps_use_cred()
2477 if (attr->ap_channel) { in wpas_wps_use_cred()
2478 u16 chan = WPA_GET_BE16(attr->ap_channel); in wpas_wps_use_cred()
2512 struct wps_parse_attr *attr) in wpas_wps_add_nfc_password_token() argument
2515 wpa_s->wps->registrar, attr->oob_dev_password, in wpas_wps_add_nfc_password_token()
[all …]

1234