| /hostap-latest/src/wps/ |
| D | wps_validate.c | 1030 struct wps_parse_attr attr; in wps_validate_cred() local 1036 if (wps_parse_msg(&buf, &attr) < 0) { in wps_validate_cred() 1041 if (wps_validate_network_idx(attr.network_idx, 1) || in wps_validate_cred() 1042 wps_validate_ssid(attr.ssid, attr.ssid_len, 1) || in wps_validate_cred() 1043 wps_validate_auth_type(attr.auth_type, 1) || in wps_validate_cred() 1044 wps_validate_encr_type(attr.encr_type, 1) || in wps_validate_cred() 1045 wps_validate_network_key_index(attr.network_key_idx, 0) || in wps_validate_cred() 1046 wps_validate_network_key(attr.network_key, attr.network_key_len, in wps_validate_cred() 1047 attr.encr_type, 1) || in wps_validate_cred() 1048 wps_validate_mac_addr(attr.mac_addr, 1) || in wps_validate_cred() [all …]
|
| D | wps_attr_parse.c | 20 static int wps_set_vendor_ext_wfa_subelem(struct wps_parse_attr *attr, in wps_set_vendor_ext_wfa_subelem() argument 32 attr->version2 = pos; in wps_set_vendor_ext_wfa_subelem() 35 attr->authorized_macs = pos; in wps_set_vendor_ext_wfa_subelem() 36 attr->authorized_macs_len = len; in wps_set_vendor_ext_wfa_subelem() 44 attr->network_key_shareable = pos; in wps_set_vendor_ext_wfa_subelem() 52 attr->request_to_enroll = pos; in wps_set_vendor_ext_wfa_subelem() 60 attr->settings_delay_time = pos; in wps_set_vendor_ext_wfa_subelem() 68 attr->registrar_configuration_methods = pos; in wps_set_vendor_ext_wfa_subelem() 77 attr->multi_ap_ext = *pos; in wps_set_vendor_ext_wfa_subelem() 79 attr->multi_ap_ext); in wps_set_vendor_ext_wfa_subelem() [all …]
|
| D | wps.c | 105 struct wps_parse_attr attr; in wps_init() local 108 if (wps_parse_msg(cfg->assoc_wps_ie, &attr) < 0) { in wps_init() 111 } else if (attr.request_type == NULL) { in wps_init() 117 *attr.request_type); in wps_init() 118 data->request_type = *attr.request_type; in wps_init() 238 struct wps_parse_attr attr; in wps_is_selected_pbc_registrar() local 247 if (wps_parse_msg(msg, &attr) < 0 || in wps_is_selected_pbc_registrar() 248 !attr.selected_registrar || *attr.selected_registrar == 0 || in wps_is_selected_pbc_registrar() 249 !attr.dev_password_id || in wps_is_selected_pbc_registrar() 250 WPA_GET_BE16(attr.dev_password_id) != DEV_PW_PUSHBUTTON) in wps_is_selected_pbc_registrar() [all …]
|
| D | wps_enrollee.c | 707 struct wps_parse_attr attr; in wps_process_cred_e() local 714 if (wps_parse_msg(&msg, &attr) < 0 || in wps_process_cred_e() 715 wps_process_cred(&attr, &wps->cred)) in wps_process_cred_e() 802 struct wps_parse_attr *attr, in wps_process_ap_settings_e() argument 811 if (wps_process_ap_settings(attr, &cred) < 0) in wps_process_ap_settings_e() 961 struct wps_parse_attr *attr) in wps_process_m2() argument 972 if (wps_process_registrar_nonce(wps, attr->registrar_nonce) || in wps_process_m2() 973 wps_process_enrollee_nonce(wps, attr->enrollee_nonce) || in wps_process_m2() 974 wps_process_uuid_r(wps, attr->uuid_r) || in wps_process_m2() 975 wps_process_dev_pw_id(wps, attr->dev_password_id)) { in wps_process_m2() [all …]
|
| D | wps_module_tests.c | 266 struct wps_parse_attr attr; in wps_attr_parse_tests() local 286 if (wps_parse_msg(buf, &attr) != test->result) { in wps_attr_parse_tests() 293 if (!attr.network_key || !attr.ap_setup_locked) in wps_attr_parse_tests() 297 if (attr.num_cred != MAX_CRED_COUNT) in wps_attr_parse_tests() 301 if (!attr.network_key_idx) in wps_attr_parse_tests() 305 if (attr.num_req_dev_type != MAX_REQ_DEV_TYPE_COUNT) in wps_attr_parse_tests() 309 if (attr.num_vendor_ext != MAX_WPS_PARSE_VENDOR_EXT) in wps_attr_parse_tests() 313 if (!attr.version2 || in wps_attr_parse_tests() 314 !attr.authorized_macs || in wps_attr_parse_tests() 315 !attr.network_key_shareable || in wps_attr_parse_tests() [all …]
|
| D | wps_attr_process.c | 247 int wps_process_cred(struct wps_parse_attr *attr, in wps_process_cred() argument 253 if (wps_process_cred_network_idx(cred, attr->network_idx) || in wps_process_cred() 254 wps_process_cred_ssid(cred, attr->ssid, attr->ssid_len) || in wps_process_cred() 255 wps_process_cred_auth_type(cred, attr->auth_type) || in wps_process_cred() 256 wps_process_cred_encr_type(cred, attr->encr_type) || in wps_process_cred() 257 wps_process_cred_network_key_idx(cred, attr->network_key_idx) || in wps_process_cred() 258 wps_process_cred_network_key(cred, attr->network_key, in wps_process_cred() 259 attr->network_key_len) || in wps_process_cred() 260 wps_process_cred_mac_addr(cred, attr->mac_addr)) in wps_process_cred() 267 int wps_process_ap_settings(struct wps_parse_attr *attr, in wps_process_ap_settings() argument [all …]
|
| D | wps_upnp_ap.c | 33 struct wps_parse_attr attr; in upnp_er_set_selected_registrar() local 38 wps_parse_msg(msg, &attr) < 0) in upnp_er_set_selected_registrar() 45 if (attr.selected_registrar == NULL || *attr.selected_registrar == 0) { in upnp_er_set_selected_registrar() 51 s->dev_password_id = attr.dev_password_id ? in upnp_er_set_selected_registrar() 52 WPA_GET_BE16(attr.dev_password_id) : DEV_PW_DEFAULT; in upnp_er_set_selected_registrar() 53 s->config_methods = attr.sel_reg_config_methods ? in upnp_er_set_selected_registrar() 54 WPA_GET_BE16(attr.sel_reg_config_methods) : -1; in upnp_er_set_selected_registrar() 55 if (attr.authorized_macs) { in upnp_er_set_selected_registrar() 56 int count = attr.authorized_macs_len / ETH_ALEN; in upnp_er_set_selected_registrar() 59 os_memcpy(s->authorized_macs, attr.authorized_macs, in upnp_er_set_selected_registrar() [all …]
|
| D | wps_registrar.c | 1150 struct wps_parse_attr attr; in wps_registrar_probe_req_rx() local 1157 if (wps_parse_msg(wps_data, &attr) < 0) in wps_registrar_probe_req_rx() 1160 if (attr.config_methods == NULL) { in wps_registrar_probe_req_rx() 1166 if (attr.dev_password_id == NULL) { in wps_registrar_probe_req_rx() 1172 if (reg->enrollee_seen_cb && attr.uuid_e && in wps_registrar_probe_req_rx() 1173 attr.primary_dev_type && attr.request_type && !p2p_wildcard) { in wps_registrar_probe_req_rx() 1175 if (attr.dev_name) { in wps_registrar_probe_req_rx() 1176 dev_name = os_zalloc(attr.dev_name_len + 1); in wps_registrar_probe_req_rx() 1178 os_memcpy(dev_name, attr.dev_name, in wps_registrar_probe_req_rx() 1179 attr.dev_name_len); in wps_registrar_probe_req_rx() [all …]
|
| D | wps_dev_attr.c | 377 struct wps_parse_attr *attr) in wps_process_device_attrs() argument 379 if (wps_process_manufacturer(dev, attr->manufacturer, in wps_process_device_attrs() 380 attr->manufacturer_len) || in wps_process_device_attrs() 381 wps_process_model_name(dev, attr->model_name, in wps_process_device_attrs() 382 attr->model_name_len) || in wps_process_device_attrs() 383 wps_process_model_number(dev, attr->model_number, in wps_process_device_attrs() 384 attr->model_number_len) || in wps_process_device_attrs() 385 wps_process_serial_number(dev, attr->serial_number, in wps_process_device_attrs() 386 attr->serial_number_len) || in wps_process_device_attrs() 387 wps_process_primary_dev_type(dev, attr->primary_dev_type) || in wps_process_device_attrs() [all …]
|
| D | wps_er.c | 476 struct wps_parse_attr attr; in wps_er_ap_get_m1() local 478 if (wps_parse_msg(m1, &attr) < 0) { in wps_er_ap_get_m1() 482 if (attr.primary_dev_type) in wps_er_ap_get_m1() 483 os_memcpy(ap->pri_dev_type, attr.primary_dev_type, 8); in wps_er_ap_get_m1() 484 if (attr.wps_state) in wps_er_ap_get_m1() 485 ap->wps_state = *attr.wps_state; in wps_er_ap_get_m1() 486 if (attr.mac_addr) in wps_er_ap_get_m1() 487 os_memcpy(ap->mac_addr, attr.mac_addr, ETH_ALEN); in wps_er_ap_get_m1() 758 struct wps_parse_attr *attr, in wps_er_add_sta_data() argument 765 m1 = !probe_req && attr->msg_type && *attr->msg_type == WPS_M1; in wps_er_add_sta_data() [all …]
|
| /hostap-latest/src/radius/ |
| D | radius.c | 319 const struct radius_attr_type *attr; in radius_msg_dump_attr() local 339 attr = radius_get_attr_type((ext->type << 8) | ext->ext_type); in radius_msg_dump_attr() 342 attr ? attr->name : "?Unknown?", ext->length); in radius_msg_dump_attr() 346 attr = radius_get_attr_type(hdr->type); in radius_msg_dump_attr() 348 hdr->type, attr ? attr->name : "?Unknown?", in radius_msg_dump_attr() 354 if (!attr) in radius_msg_dump_attr() 357 switch (attr->data_type) { in radius_msg_dump_attr() 420 struct radius_attr_hdr *attr = radius_get_attr_hdr(msg, i); in radius_msg_dump() local 421 radius_msg_dump_attr(attr); in radius_msg_dump() 429 struct radius_attr_hdr *attr; in radius_msg_add_msg_auth() local [all …]
|
| /hostap-latest/src/eap_peer/ |
| D | eap_aka.c | 405 struct eap_sim_attrs *attr) in eap_aka_learn_ids() argument 407 if (attr->next_pseudonym) { in eap_aka_learn_ids() 415 attr->next_pseudonym, in eap_aka_learn_ids() 416 attr->next_pseudonym_len); in eap_aka_learn_ids() 427 data->pseudonym = os_malloc(attr->next_pseudonym_len + in eap_aka_learn_ids() 435 os_memcpy(data->pseudonym, attr->next_pseudonym, in eap_aka_learn_ids() 436 attr->next_pseudonym_len); in eap_aka_learn_ids() 438 os_memcpy(data->pseudonym + attr->next_pseudonym_len, in eap_aka_learn_ids() 441 data->pseudonym_len = attr->next_pseudonym_len + realm_len; in eap_aka_learn_ids() 447 if (attr->next_reauth_id) { in eap_aka_learn_ids() [all …]
|
| D | eap_sim.c | 431 struct eap_sim_attrs *attr) in eap_sim_learn_ids() argument 433 if (attr->next_pseudonym) { in eap_sim_learn_ids() 441 attr->next_pseudonym, in eap_sim_learn_ids() 442 attr->next_pseudonym_len); in eap_sim_learn_ids() 453 data->pseudonym = os_malloc(attr->next_pseudonym_len + in eap_sim_learn_ids() 461 os_memcpy(data->pseudonym, attr->next_pseudonym, in eap_sim_learn_ids() 462 attr->next_pseudonym_len); in eap_sim_learn_ids() 464 os_memcpy(data->pseudonym + attr->next_pseudonym_len, in eap_sim_learn_ids() 467 data->pseudonym_len = attr->next_pseudonym_len + realm_len; in eap_sim_learn_ids() 473 if (attr->next_reauth_id) { in eap_sim_learn_ids() [all …]
|
| D | eap_sake.c | 147 struct eap_sake_parse_attr attr; in eap_sake_process_identity() local 157 if (eap_sake_parse_attributes(payload, payload_len, &attr)) in eap_sake_process_identity() 160 if (!attr.perm_id_req && !attr.any_id_req) { in eap_sake_process_identity() 190 struct eap_sake_parse_attr attr; in eap_sake_process_challenge() local 206 if (eap_sake_parse_attributes(payload, payload_len, &attr)) in eap_sake_process_challenge() 209 if (!attr.rand_s) { in eap_sake_process_challenge() 215 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge() 229 if (attr.serverid) { in eap_sake_process_challenge() 231 attr.serverid, attr.serverid_len); in eap_sake_process_challenge() 232 data->serverid = os_memdup(attr.serverid, attr.serverid_len); in eap_sake_process_challenge() [all …]
|
| /hostap-latest/src/eap_common/ |
| D | eap_sake_common.c | 18 static int eap_sake_parse_add_attr(struct eap_sake_parse_attr *attr, in eap_sake_parse_add_attr() argument 31 attr->rand_s = data; in eap_sake_parse_add_attr() 40 attr->rand_p = data; in eap_sake_parse_add_attr() 49 attr->mic_s = data; in eap_sake_parse_add_attr() 58 attr->mic_p = data; in eap_sake_parse_add_attr() 62 attr->serverid = data; in eap_sake_parse_add_attr() 63 attr->serverid_len = len; in eap_sake_parse_add_attr() 67 attr->peerid = data; in eap_sake_parse_add_attr() 68 attr->peerid_len = len; in eap_sake_parse_add_attr() 72 attr->spi_s = data; in eap_sake_parse_add_attr() [all …]
|
| D | eap_sim_common.c | 496 struct eap_sim_attrs *attr, int aka, int encr) in eap_sim_parse_attr() argument 501 os_memset(attr, 0, sizeof(*attr)); in eap_sim_parse_attr() 502 attr->id_req = NO_ID_REQ; in eap_sim_parse_attr() 503 attr->notification = -1; in eap_sim_parse_attr() 504 attr->counter = -1; in eap_sim_parse_attr() 505 attr->selected_version = -1; in eap_sim_parse_attr() 506 attr->client_error_code = -1; in eap_sim_parse_attr() 542 attr->rand = apos; in eap_sim_parse_attr() 543 attr->num_chal = alen / GSM_RAND_LEN; in eap_sim_parse_attr() 560 attr->autn = apos; in eap_sim_parse_attr() [all …]
|
| /hostap-latest/tests/hwsim/ |
| D | radius_das.py | 19 attr = b'' 22 attr += self._PktEncodeAttribute(code, data) 27 header = struct.pack('!BBH', self.code, self.id, (20 + len(attr))) 28 self.authenticator = hashlib.md5(header[0:4] + 16 * b'\x00' + attr 30 return header + self.authenticator + attr 39 attr = self._PktEncodeAttributes() 44 header = struct.pack('!BBH', self.code, self.id, (20 + len(attr))) 45 self.authenticator = hashlib.md5(header[0:4] + 16 * b'\x00' + attr 47 return header + self.authenticator + attr
|
| D | nl80211.py | 323 attr = struct.pack("@HH", 4 + len(val), nl80211_attr[id]) + val 324 if len(attr) % 4 != 0: 325 attr += b'\x00' * (4 - (len(attr) % 4)) 326 return attr 348 alen, attr = struct.unpack("@HH", msg[0:4]) 355 attrs[attr] = msg[0:alen]
|
| /hostap-latest/src/eap_server/ |
| D | eap_server_aka.c | 982 struct eap_sim_attrs *attr) in eap_aka_process_identity() argument 988 if (attr->mac || attr->iv || attr->encr_data) { in eap_aka_process_identity() 1000 if (!attr->identity || attr->identity_len == 0) { in eap_aka_process_identity() 1008 new_identity = os_malloc(attr->identity_len); in eap_aka_process_identity() 1016 os_memcpy(sm->identity, attr->identity, attr->identity_len); in eap_aka_process_identity() 1017 sm->identity_len = attr->identity_len; in eap_aka_process_identity() 1042 struct eap_sim_attrs *attr) in eap_aka_process_challenge() argument 1051 attr->kdf_count == 1 && attr->mac == NULL) { in eap_aka_process_challenge() 1052 if (attr->kdf[0] != EAP_AKA_PRIME_KDF) { in eap_aka_process_challenge() 1061 data->kdf = attr->kdf[0]; in eap_aka_process_challenge() [all …]
|
| D | eap_server_sim.c | 451 struct eap_sim_attrs *attr) in eap_sim_process_start() argument 470 (!attr->identity || attr->identity_len == 0)) in eap_sim_process_start() 477 if (!attr->identity || attr->identity_len == 0) { in eap_sim_process_start() 483 new_identity = os_malloc(attr->identity_len); in eap_sim_process_start() 488 os_memcpy(sm->identity, attr->identity, attr->identity_len); in eap_sim_process_start() 489 sm->identity_len = attr->identity_len; in eap_sim_process_start() 646 if (attr->nonce_mt == NULL || attr->selected_version < 0) { in eap_sim_process_start() 652 if (!eap_sim_supported_ver(data, attr->selected_version)) { in eap_sim_process_start() 654 "version %d", attr->selected_version); in eap_sim_process_start() 688 os_memcpy(data->nonce_mt, attr->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_process_start() [all …]
|
| D | eap_server_sake.c | 306 struct eap_sake_parse_attr attr; in eap_sake_process_challenge() local 314 if (eap_sake_parse_attributes(payload, payloadlen, &attr)) in eap_sake_process_challenge() 317 if (!attr.rand_p || !attr.mic_p) { in eap_sake_process_challenge() 323 os_memcpy(data->rand_p, attr.rand_p, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge() 328 if (attr.peerid) { in eap_sake_process_challenge() 329 data->peerid = os_memdup(attr.peerid, attr.peerid_len); in eap_sake_process_challenge() 332 data->peerid_len = attr.peerid_len; in eap_sake_process_challenge() 357 attr.mic_p, mic_p) < 0) { in eap_sake_process_challenge() 362 if (os_memcmp_const(attr.mic_p, mic_p, EAP_SAKE_MIC_LEN) != 0) { in eap_sake_process_challenge() 377 struct eap_sake_parse_attr attr; in eap_sake_process_confirm() local [all …]
|
| /hostap-latest/src/p2p/ |
| D | p2p_parse.c | 477 struct wps_parse_attr attr; in p2p_parse_wps_ie() local 481 if (wps_parse_msg(buf, &attr)) in p2p_parse_wps_ie() 483 if (attr.dev_name && attr.dev_name_len < sizeof(msg->device_name) && in p2p_parse_wps_ie() 485 os_memcpy(msg->device_name, attr.dev_name, attr.dev_name_len); in p2p_parse_wps_ie() 486 if (attr.config_methods) { in p2p_parse_wps_ie() 488 WPA_GET_BE16(attr.config_methods); in p2p_parse_wps_ie() 492 if (attr.dev_password_id) { in p2p_parse_wps_ie() 493 msg->dev_password_id = WPA_GET_BE16(attr.dev_password_id); in p2p_parse_wps_ie() 498 if (attr.primary_dev_type) { in p2p_parse_wps_ie() 500 msg->wps_pri_dev_type = attr.primary_dev_type; in p2p_parse_wps_ie() [all …]
|
| /hostap-latest/src/ap/ |
| D | ap_config.c | 579 hostapd_config_get_radius_attr(struct hostapd_radius_attr *attr, u8 type) in hostapd_config_get_radius_attr() argument 581 for (; attr; attr = attr->next) { in hostapd_config_get_radius_attr() 582 if (attr->type == type) in hostapd_config_get_radius_attr() 583 return attr; in hostapd_config_get_radius_attr() 593 struct hostapd_radius_attr *attr; in hostapd_parse_radius_attr() local 596 attr = os_zalloc(sizeof(*attr)); in hostapd_parse_radius_attr() 597 if (!attr) in hostapd_parse_radius_attr() 600 attr->type = atoi(value); in hostapd_parse_radius_attr() 604 attr->val = wpabuf_alloc(1); in hostapd_parse_radius_attr() 605 if (!attr->val) { in hostapd_parse_radius_attr() [all …]
|
| D | pmksa_cache_auth.c | 211 if (eapol->radius_class.attr) { in pmksa_cache_to_eapol_data() 573 struct radius_das_attrs *attr) in das_attr_match() argument 577 if (attr->sta_addr) { in das_attr_match() 578 if (!ether_addr_equal(attr->sta_addr, entry->spa)) in das_attr_match() 583 if (attr->acct_multi_session_id) { in das_attr_match() 586 if (attr->acct_multi_session_id_len != 16) in das_attr_match() 590 if (os_memcmp(attr->acct_multi_session_id, buf, 16) != 0) in das_attr_match() 595 if (attr->cui) { in das_attr_match() 597 attr->cui_len != wpabuf_len(entry->cui) || in das_attr_match() 598 os_memcmp(attr->cui, wpabuf_head(entry->cui), in das_attr_match() [all …]
|
| /hostap-latest/wpa_supplicant/ |
| D | wps_supplicant.c | 154 struct wps_parse_attr attr; in wpas_wps_eapol_cb() local 157 if (wps && wps_parse_msg(wps, &attr) == 0 && in wpas_wps_eapol_cb() 158 attr.wps_state && in wpas_wps_eapol_cb() 159 *attr.wps_state == WPS_STATE_CONFIGURED) in wpas_wps_eapol_cb() 2460 struct wps_parse_attr *attr) in wpas_wps_use_cred() argument 2471 if (wps_oob_use_cred(wpa_s->wps, attr) < 0) in wpas_wps_use_cred() 2477 if (attr->ap_channel) { in wpas_wps_use_cred() 2478 u16 chan = WPA_GET_BE16(attr->ap_channel); in wpas_wps_use_cred() 2512 struct wps_parse_attr *attr) in wpas_wps_add_nfc_password_token() argument 2515 wpa_s->wps->registrar, attr->oob_dev_password, in wpas_wps_add_nfc_password_token() [all …]
|