Home
last modified time | relevance | path

Searched refs:parse (Results 1 – 12 of 12) sorted by relevance

/hostap-latest/src/rsn_supp/
Dwpa_ft.c590 struct wpa_ft_ies parse; in wpa_ft_process_response() local
598 os_memset(&parse, 0, sizeof(parse)); in wpa_ft_process_response()
624 if (wpa_ft_parse_ies(ies, ies_len, &parse, sm->key_mgmt, in wpa_ft_process_response()
630 mdie = (struct rsn_mdie *) parse.mdie; in wpa_ft_process_response()
631 if (mdie == NULL || parse.mdie_len < sizeof(*mdie) || in wpa_ft_process_response()
638 if (!parse.ftie || !parse.fte_anonce || !parse.fte_snonce) { in wpa_ft_process_response()
643 if (os_memcmp(parse.fte_snonce, sm->snonce, WPA_NONCE_LEN) != 0) { in wpa_ft_process_response()
646 parse.fte_snonce, WPA_NONCE_LEN); in wpa_ft_process_response()
652 if (parse.r0kh_id == NULL) { in wpa_ft_process_response()
657 if (parse.r0kh_id_len != sm->r0kh_id_len || in wpa_ft_process_response()
[all …]
Dwpa.c5941 struct wpa_ft_ies parse; in fils_process_auth() local
5943 os_memset(&parse, 0, sizeof(parse)); in fils_process_auth()
6028 if (wpa_ft_parse_ies(pos, end - pos, &parse, in fils_process_auth()
6034 if (!parse.r0kh_id) { in fils_process_auth()
6039 os_memcpy(sm->r0kh_id, parse.r0kh_id, parse.r0kh_id_len); in fils_process_auth()
6040 sm->r0kh_id_len = parse.r0kh_id_len; in fils_process_auth()
6044 if (!parse.r1kh_id) { in fils_process_auth()
6049 os_memcpy(sm->r1kh_id, parse.r1kh_id, FT_R1KH_ID_LEN); in fils_process_auth()
6234 wpa_ft_parse_ies_free(&parse); in fils_process_auth()
6241 wpa_ft_parse_ies_free(&parse); in fils_process_auth()
/hostap-latest/src/eap_server/
Deap_server_ttls.c178 static int eap_ttls_avp_parse(struct wpabuf *buf, struct eap_ttls_avp *parse) in eap_ttls_avp_parse() argument
186 os_memset(parse, 0, sizeof(*parse)); in eap_ttls_avp_parse()
230 if (parse->eap == NULL) { in eap_ttls_avp_parse()
231 parse->eap = os_memdup(dpos, dlen); in eap_ttls_avp_parse()
232 if (parse->eap == NULL) { in eap_ttls_avp_parse()
238 parse->eap_len = dlen; in eap_ttls_avp_parse()
240 u8 *neweap = os_realloc(parse->eap, in eap_ttls_avp_parse()
241 parse->eap_len + dlen); in eap_ttls_avp_parse()
248 os_memcpy(neweap + parse->eap_len, dpos, dlen); in eap_ttls_avp_parse()
249 parse->eap = neweap; in eap_ttls_avp_parse()
[all …]
Deap_server.c809 struct erp_tlvs parse; in SM_STATE() local
845 if (erp_parse_tlvs(tlvs, end, &parse, 1) < 0) in SM_STATE()
848 if (!parse.keyname) { in SM_STATE()
855 parse.keyname, parse.keyname_len); in SM_STATE()
856 if (parse.keyname_len > 253) { in SM_STATE()
861 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE()
862 nai[parse.keyname_len] = '\0'; in SM_STATE()
874 sm->identity = (u8 *) dup_binstr(parse.keyname, in SM_STATE()
875 parse.keyname_len); in SM_STATE()
878 sm->identity_len = parse.keyname_len; in SM_STATE()
[all …]
/hostap-latest/wlantest/
Drx_mgmt.c719 struct wpa_ft_ies parse; in process_ft_auth() local
739 if (wpa_ft_parse_ies(ie, ie_len, &parse, 0, false)) { in process_ft_auth()
752 sta->key_mgmt = parse.key_mgmt; in process_ft_auth()
753 sta->pairwise_cipher = parse.pairwise_cipher; in process_ft_auth()
754 if (parse.fte_snonce) in process_ft_auth()
755 os_memcpy(sta->snonce, parse.fte_snonce, WPA_NONCE_LEN); in process_ft_auth()
765 if (!parse.fte_snonce || in process_ft_auth()
766 os_memcmp(sta->snonce, parse.fte_snonce, WPA_NONCE_LEN) != 0) { in process_ft_auth()
769 parse.fte_snonce, WPA_NONCE_LEN); in process_ft_auth()
774 if (parse.fte_anonce) in process_ft_auth()
[all …]
/hostap-latest/src/eap_peer/
Deap_ttls.c941 struct ttls_parse_avp *parse) in eap_ttls_parse_attr_eap() argument
944 if (parse->eapdata == NULL) { in eap_ttls_parse_attr_eap()
945 parse->eapdata = os_memdup(dpos, dlen); in eap_ttls_parse_attr_eap()
946 if (parse->eapdata == NULL) { in eap_ttls_parse_attr_eap()
951 parse->eap_len = dlen; in eap_ttls_parse_attr_eap()
953 u8 *neweap = os_realloc(parse->eapdata, parse->eap_len + dlen); in eap_ttls_parse_attr_eap()
959 os_memcpy(neweap + parse->eap_len, dpos, dlen); in eap_ttls_parse_attr_eap()
960 parse->eapdata = neweap; in eap_ttls_parse_attr_eap()
961 parse->eap_len += dlen; in eap_ttls_parse_attr_eap()
969 struct ttls_parse_avp *parse) in eap_ttls_parse_avp() argument
[all …]
Deap.c1810 struct erp_tlvs parse; in eap_peer_initiate() local
1834 if (erp_parse_tlvs(pos, end, &parse, 0) < 0) in eap_peer_initiate()
1837 if (parse.domain) { in eap_peer_initiate()
1840 parse.domain, parse.domain_len); in eap_peer_initiate()
1861 struct erp_tlvs parse; in eap_peer_finish() local
1907 if (erp_parse_tlvs(pos, end, &parse, 1) < 0) in eap_peer_finish()
1910 if (!parse.keyname) { in eap_peer_finish()
1917 parse.keyname, parse.keyname_len); in eap_peer_finish()
1918 if (parse.keyname_len > 253) { in eap_peer_finish()
1923 os_memcpy(nai, parse.keyname, parse.keyname_len); in eap_peer_finish()
[all …]
/hostap-latest/src/common/
Dwpa_common.c1029 struct wpa_ft_ies *parse, const u8 *opt) in wpa_ft_parse_ftie() argument
1056 parse->r1kh_id = pos; in wpa_ft_parse_ftie()
1058 parse->r1kh_id, FT_R1KH_ID_LEN); in wpa_ft_parse_ftie()
1062 parse->gtk = pos; in wpa_ft_parse_ftie()
1063 parse->gtk_len = len; in wpa_ft_parse_ftie()
1072 parse->r0kh_id = pos; in wpa_ft_parse_ftie()
1073 parse->r0kh_id_len = len; in wpa_ft_parse_ftie()
1075 parse->r0kh_id, parse->r0kh_id_len); in wpa_ft_parse_ftie()
1079 parse->igtk = pos; in wpa_ft_parse_ftie()
1080 parse->igtk_len = len; in wpa_ft_parse_ftie()
[all …]
Dwpa_common.h655 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, struct wpa_ft_ies *parse,
657 void wpa_ft_parse_ies_free(struct wpa_ft_ies *parse);
/hostap-latest/src/ap/
Dwpa_auth_ft.c2431 struct ieee802_11_elems parse; in wpa_ft_process_rdie() local
2452 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) == in wpa_ft_process_rdie()
2460 if (parse.wmm_tspec) { in wpa_ft_process_rdie()
2463 if (parse.wmm_tspec_len + 2 < (int) sizeof(*tspec)) { in wpa_ft_process_rdie()
2465 "(%d)", (int) parse.wmm_tspec_len); in wpa_ft_process_rdie()
2478 os_memcpy(tspec, parse.wmm_tspec - 2, sizeof(*tspec)); in wpa_ft_process_rdie()
2482 if (parse.wmm_tspec && sm->wpa_auth->conf.ap_mlme) { in wpa_ft_process_rdie()
2502 if (parse.wmm_tspec && !sm->wpa_auth->conf.ap_mlme) { in wpa_ft_process_rdie()
2571 struct wpa_ft_ies parse; in wpa_sm_write_assoc_resp_ies() local
2808 if (wpa_ft_parse_ies(req_ies, req_ies_len, &parse, in wpa_sm_write_assoc_resp_ies()
[all …]
/hostap-latest/wpa_supplicant/
Ddefconfig587 # TODO: Extend parser to be able to parse "channel=acs_survey" as an alternative
/hostap-latest/tests/hwsim/
Dtest_ap_wps.py30 from urllib.parse import urlparse, urljoin
3000 tree = ET.parse(conn)