/hostap-latest/src/rsn_supp/ |
D | wpa_ft.c | 590 struct wpa_ft_ies parse; in wpa_ft_process_response() local 598 os_memset(&parse, 0, sizeof(parse)); in wpa_ft_process_response() 624 if (wpa_ft_parse_ies(ies, ies_len, &parse, sm->key_mgmt, in wpa_ft_process_response() 630 mdie = (struct rsn_mdie *) parse.mdie; in wpa_ft_process_response() 631 if (mdie == NULL || parse.mdie_len < sizeof(*mdie) || in wpa_ft_process_response() 638 if (!parse.ftie || !parse.fte_anonce || !parse.fte_snonce) { in wpa_ft_process_response() 643 if (os_memcmp(parse.fte_snonce, sm->snonce, WPA_NONCE_LEN) != 0) { in wpa_ft_process_response() 646 parse.fte_snonce, WPA_NONCE_LEN); in wpa_ft_process_response() 652 if (parse.r0kh_id == NULL) { in wpa_ft_process_response() 657 if (parse.r0kh_id_len != sm->r0kh_id_len || in wpa_ft_process_response() [all …]
|
D | wpa.c | 5941 struct wpa_ft_ies parse; in fils_process_auth() local 5943 os_memset(&parse, 0, sizeof(parse)); in fils_process_auth() 6028 if (wpa_ft_parse_ies(pos, end - pos, &parse, in fils_process_auth() 6034 if (!parse.r0kh_id) { in fils_process_auth() 6039 os_memcpy(sm->r0kh_id, parse.r0kh_id, parse.r0kh_id_len); in fils_process_auth() 6040 sm->r0kh_id_len = parse.r0kh_id_len; in fils_process_auth() 6044 if (!parse.r1kh_id) { in fils_process_auth() 6049 os_memcpy(sm->r1kh_id, parse.r1kh_id, FT_R1KH_ID_LEN); in fils_process_auth() 6234 wpa_ft_parse_ies_free(&parse); in fils_process_auth() 6241 wpa_ft_parse_ies_free(&parse); in fils_process_auth()
|
/hostap-latest/src/eap_server/ |
D | eap_server_ttls.c | 178 static int eap_ttls_avp_parse(struct wpabuf *buf, struct eap_ttls_avp *parse) in eap_ttls_avp_parse() argument 186 os_memset(parse, 0, sizeof(*parse)); in eap_ttls_avp_parse() 230 if (parse->eap == NULL) { in eap_ttls_avp_parse() 231 parse->eap = os_memdup(dpos, dlen); in eap_ttls_avp_parse() 232 if (parse->eap == NULL) { in eap_ttls_avp_parse() 238 parse->eap_len = dlen; in eap_ttls_avp_parse() 240 u8 *neweap = os_realloc(parse->eap, in eap_ttls_avp_parse() 241 parse->eap_len + dlen); in eap_ttls_avp_parse() 248 os_memcpy(neweap + parse->eap_len, dpos, dlen); in eap_ttls_avp_parse() 249 parse->eap = neweap; in eap_ttls_avp_parse() [all …]
|
D | eap_server.c | 809 struct erp_tlvs parse; in SM_STATE() local 845 if (erp_parse_tlvs(tlvs, end, &parse, 1) < 0) in SM_STATE() 848 if (!parse.keyname) { in SM_STATE() 855 parse.keyname, parse.keyname_len); in SM_STATE() 856 if (parse.keyname_len > 253) { in SM_STATE() 861 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE() 862 nai[parse.keyname_len] = '\0'; in SM_STATE() 874 sm->identity = (u8 *) dup_binstr(parse.keyname, in SM_STATE() 875 parse.keyname_len); in SM_STATE() 878 sm->identity_len = parse.keyname_len; in SM_STATE() [all …]
|
/hostap-latest/wlantest/ |
D | rx_mgmt.c | 719 struct wpa_ft_ies parse; in process_ft_auth() local 739 if (wpa_ft_parse_ies(ie, ie_len, &parse, 0, false)) { in process_ft_auth() 752 sta->key_mgmt = parse.key_mgmt; in process_ft_auth() 753 sta->pairwise_cipher = parse.pairwise_cipher; in process_ft_auth() 754 if (parse.fte_snonce) in process_ft_auth() 755 os_memcpy(sta->snonce, parse.fte_snonce, WPA_NONCE_LEN); in process_ft_auth() 765 if (!parse.fte_snonce || in process_ft_auth() 766 os_memcmp(sta->snonce, parse.fte_snonce, WPA_NONCE_LEN) != 0) { in process_ft_auth() 769 parse.fte_snonce, WPA_NONCE_LEN); in process_ft_auth() 774 if (parse.fte_anonce) in process_ft_auth() [all …]
|
/hostap-latest/src/eap_peer/ |
D | eap_ttls.c | 941 struct ttls_parse_avp *parse) in eap_ttls_parse_attr_eap() argument 944 if (parse->eapdata == NULL) { in eap_ttls_parse_attr_eap() 945 parse->eapdata = os_memdup(dpos, dlen); in eap_ttls_parse_attr_eap() 946 if (parse->eapdata == NULL) { in eap_ttls_parse_attr_eap() 951 parse->eap_len = dlen; in eap_ttls_parse_attr_eap() 953 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen); in eap_ttls_parse_attr_eap() 959 os_memcpy(neweap + parse->eap_len, dpos, dlen); in eap_ttls_parse_attr_eap() 960 parse->eapdata = neweap; in eap_ttls_parse_attr_eap() 961 parse->eap_len += dlen; in eap_ttls_parse_attr_eap() 969 struct ttls_parse_avp *parse) in eap_ttls_parse_avp() argument [all …]
|
D | eap.c | 1810 struct erp_tlvs parse; in eap_peer_initiate() local 1834 if (erp_parse_tlvs(pos, end, &parse, 0) < 0) in eap_peer_initiate() 1837 if (parse.domain) { in eap_peer_initiate() 1840 parse.domain, parse.domain_len); in eap_peer_initiate() 1861 struct erp_tlvs parse; in eap_peer_finish() local 1907 if (erp_parse_tlvs(pos, end, &parse, 1) < 0) in eap_peer_finish() 1910 if (!parse.keyname) { in eap_peer_finish() 1917 parse.keyname, parse.keyname_len); in eap_peer_finish() 1918 if (parse.keyname_len > 253) { in eap_peer_finish() 1923 os_memcpy(nai, parse.keyname, parse.keyname_len); in eap_peer_finish() [all …]
|
/hostap-latest/src/common/ |
D | wpa_common.c | 1029 struct wpa_ft_ies *parse, const u8 *opt) in wpa_ft_parse_ftie() argument 1056 parse->r1kh_id = pos; in wpa_ft_parse_ftie() 1058 parse->r1kh_id, FT_R1KH_ID_LEN); in wpa_ft_parse_ftie() 1062 parse->gtk = pos; in wpa_ft_parse_ftie() 1063 parse->gtk_len = len; in wpa_ft_parse_ftie() 1072 parse->r0kh_id = pos; in wpa_ft_parse_ftie() 1073 parse->r0kh_id_len = len; in wpa_ft_parse_ftie() 1075 parse->r0kh_id, parse->r0kh_id_len); in wpa_ft_parse_ftie() 1079 parse->igtk = pos; in wpa_ft_parse_ftie() 1080 parse->igtk_len = len; in wpa_ft_parse_ftie() [all …]
|
D | wpa_common.h | 655 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, struct wpa_ft_ies *parse, 657 void wpa_ft_parse_ies_free(struct wpa_ft_ies *parse);
|
/hostap-latest/src/ap/ |
D | wpa_auth_ft.c | 2431 struct ieee802_11_elems parse; in wpa_ft_process_rdie() local 2452 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) == in wpa_ft_process_rdie() 2460 if (parse.wmm_tspec) { in wpa_ft_process_rdie() 2463 if (parse.wmm_tspec_len + 2 < (int) sizeof(*tspec)) { in wpa_ft_process_rdie() 2465 "(%d)", (int) parse.wmm_tspec_len); in wpa_ft_process_rdie() 2478 os_memcpy(tspec, parse.wmm_tspec - 2, sizeof(*tspec)); in wpa_ft_process_rdie() 2482 if (parse.wmm_tspec && sm->wpa_auth->conf.ap_mlme) { in wpa_ft_process_rdie() 2502 if (parse.wmm_tspec && !sm->wpa_auth->conf.ap_mlme) { in wpa_ft_process_rdie() 2571 struct wpa_ft_ies parse; in wpa_sm_write_assoc_resp_ies() local 2808 if (wpa_ft_parse_ies(req_ies, req_ies_len, &parse, in wpa_sm_write_assoc_resp_ies() [all …]
|
/hostap-latest/wpa_supplicant/ |
D | defconfig | 587 # TODO: Extend parser to be able to parse "channel=acs_survey" as an alternative
|
/hostap-latest/tests/hwsim/ |
D | test_ap_wps.py | 30 from urllib.parse import urlparse, urljoin 3000 tree = ET.parse(conn)
|