Home
last modified time | relevance | path

Searched refs:req (Results 1 – 25 of 148) sorted by relevance

123456

/hostap-latest/src/wps/
Dhttp_server.c30 void (*cb)(void *ctx, struct http_request *req);
44 struct http_request *req = cookie; in http_request_cb() local
45 struct http_server *srv = req->srv; in http_request_cb()
49 inet_ntoa(req->cli.sin_addr), in http_request_cb()
50 ntohs(req->cli.sin_port)); in http_request_cb()
51 srv->cb(srv->cb_ctx, req); in http_request_cb()
55 "completely", inet_ntoa(req->cli.sin_addr), in http_request_cb()
56 ntohs(req->cli.sin_port)); in http_request_cb()
57 http_request_deinit(req); in http_request_cb()
64 struct http_request *req; in http_request_init() local
[all …]
Dhttp_server.h15 void http_request_deinit(struct http_request *req);
16 void http_request_send(struct http_request *req, struct wpabuf *resp);
17 void http_request_send_and_deinit(struct http_request *req,
19 enum httpread_hdr_type http_request_get_type(struct http_request *req);
20 char * http_request_get_uri(struct http_request *req);
21 char * http_request_get_hdr(struct http_request *req);
22 char * http_request_get_data(struct http_request *req);
23 char * http_request_get_hdr_line(struct http_request *req, const char *tag);
24 struct sockaddr_in * http_request_get_cli_addr(struct http_request *req);
28 struct http_request *req),
Dhttp_client.c24 struct wpabuf *req; member
90 send_len = wpabuf_len(c->req) - c->req_pos; in http_client_tx_ready()
94 (unsigned long) wpabuf_len(c->req), in http_client_tx_ready()
97 res = send(c->sd, wpabuf_head_u8(c->req) + c->req_pos, send_len, 0); in http_client_tx_ready()
109 res, (unsigned long) wpabuf_len(c->req), in http_client_tx_ready()
118 wpabuf_free(c->req); in http_client_tx_ready()
119 c->req = NULL; in http_client_tx_ready()
131 struct wpabuf *req, size_t max_response, in http_client_addr() argument
177 c->req = req; in http_client_addr()
237 struct wpabuf *req, size_t max_response, in http_client_url() argument
[all …]
Dwps_upnp_web.c312 } req; in web_connection_parse_get() local
331 req = GET_DEVICE_XML_FILE; in web_connection_parse_get()
345 req = GET_SCPD_XML_FILE; in web_connection_parse_get()
394 switch (req) { in web_connection_parse_get()
755 static void web_connection_send_reply(struct http_request *req, in web_connection_send_reply() argument
784 http_request_deinit(req); in web_connection_send_reply()
857 http_request_send_and_deinit(req, buf); in web_connection_send_reply()
861 static const char * web_get_action(struct http_request *req, in web_get_action() argument
871 b = http_request_get_hdr_line(req, "SOAPAction:"); in web_get_action()
920 struct http_request *req, in web_connection_parse_post() argument
[all …]
/hostap-latest/src/eap_peer/
Deap_pax.c93 static struct wpabuf * eap_pax_alloc_resp(const struct eap_pax_hdr *req, in eap_pax_alloc_resp() argument
107 pax->mac_id = req->mac_id; in eap_pax_alloc_resp()
108 pax->dh_group_id = req->dh_group_id; in eap_pax_alloc_resp()
109 pax->public_key_id = req->public_key_id; in eap_pax_alloc_resp()
117 const struct eap_pax_hdr *req, in eap_pax_process_std_1() argument
134 if (req->flags & EAP_PAX_FLAGS_CE) { in eap_pax_process_std_1()
141 left = req_plen - sizeof(*req); in eap_pax_process_std_1()
150 pos = (const u8 *) (req + 1); in eap_pax_process_std_1()
180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e, in eap_pax_process_std_1()
191 resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); in eap_pax_process_std_1()
[all …]
/hostap-latest/src/drivers/
Dnetlink.c178 } req; in netlink_send_oper_ifla() local
183 os_memset(&req, 0, sizeof(req)); in netlink_send_oper_ifla()
185 req.hdr.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg)); in netlink_send_oper_ifla()
186 req.hdr.nlmsg_type = RTM_SETLINK; in netlink_send_oper_ifla()
187 req.hdr.nlmsg_flags = NLM_F_REQUEST; in netlink_send_oper_ifla()
188 req.hdr.nlmsg_seq = ++nl_seq; in netlink_send_oper_ifla()
189 req.hdr.nlmsg_pid = 0; in netlink_send_oper_ifla()
191 req.ifinfo.ifi_family = AF_UNSPEC; in netlink_send_oper_ifla()
192 req.ifinfo.ifi_type = 0; in netlink_send_oper_ifla()
193 req.ifinfo.ifi_index = ifindex; in netlink_send_oper_ifla()
[all …]
/hostap-latest/tests/hwsim/
Dtest_nfc_wps.py227 req = dev[0].request("NFC_GET_HANDOVER_REQ NDEF WPS-CR").rstrip()
228 if "FAIL" in req:
233 res = hapd.request("NFC_REPORT_HANDOVER RESP WPS " + req + " " + sel)
237 res = dev[0].request("NFC_REPORT_HANDOVER INIT WPS " + req + " " + sel)
303 req = dev[0].request("NFC_GET_HANDOVER_REQ NDEF WPS-CR").rstrip()
304 if "FAIL" in req:
309 res = hapd.request("NFC_REPORT_HANDOVER RESP WPS " + req + " " + sel)
313 res = dev[0].request("NFC_REPORT_HANDOVER INIT WPS " + req + " " + sel)
331 req = dev[0].request("NFC_GET_HANDOVER_REQ NDEF WPS-CR").rstrip()
332 if "FAIL" in req:
[all …]
Dtest_sae.py787 req = hapd.mgmt_rx()
788 if req is None:
790 if req['subtype'] == 11:
792 req = None
793 if not req:
798 resp['fc'] = req['fc']
799 resp['da'] = req['sa']
800 resp['sa'] = req['da']
801 resp['bssid'] = req['bssid']
808 req = hapd.mgmt_rx()
[all …]
Dtest_radius.py413 def send_and_check_reply(srv, req, code, error_cause=0): argument
414 reply = srv.SendPacket(req)
510 req = radius_das.DisconnectPacket(dict=dict, secret=b"incorrect",
514 logger.debug(req)
516 reply = srv.SendPacket(req)
522 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret",
524 logger.debug(req)
526 reply = srv.SendPacket(req)
532 req = radius_das.DisconnectPacket(dict=dict, secret=b"secret",
535 logger.debug(req)
[all …]
Dtest_nfc_p2p.py56 req = dev[0].global_request("NFC_GET_HANDOVER_REQ NDEF P2P-CR").rstrip()
57 if "FAIL" in req:
64 res = dev[1].global_request("NFC_REPORT_HANDOVER RESP P2P " + req + " " + sel)
67 res = dev[0].global_request("NFC_REPORT_HANDOVER INIT P2P " + req + " " + sel)
107 req = dev[0].global_request("NFC_GET_HANDOVER_REQ NDEF P2P-CR").rstrip()
108 if "FAIL" in req:
117 res = dev[1].global_request("NFC_REPORT_HANDOVER RESP P2P " + req + " " + sel)
120 res = dev[0].global_request("NFC_REPORT_HANDOVER INIT P2P " + req + " " + sel)
156 req = dev[0].global_request("NFC_GET_HANDOVER_REQ NDEF P2P-CR").rstrip()
157 if "FAIL" in req:
[all …]
Dtest_rrm.py820 req = struct.pack("<BBHHB", opclass, chan, rand_int, duration, mode)
821 return binascii.hexlify(req).decode() + bssid.replace(':', '')
872 req = build_beacon_request(mode=2)
873 token, resp = run_req_beacon(hapd, addr, req)
916 req = build_beacon_request(mode=2)
917 token, resp = run_req_beacon(hapd, addr, req)
963 req = build_beacon_request(mode=2)
964 token, resp = run_req_beacon(hapd, addr, req + "a40101")
992 req = build_beacon_request(mode=2)
993 token, resp = run_req_beacon(hapd, addr, req)
[all …]
Dtest_owe.py839 req = hapd.mgmt_rx()
840 if req is None:
842 if req['subtype'] == 11:
844 req = None
845 if not req:
849 resp['fc'] = req['fc']
850 resp['da'] = req['sa']
851 resp['sa'] = req['da']
852 resp['bssid'] = req['bssid']
858 req = hapd.mgmt_rx()
[all …]
/hostap-latest/src/fst/
Dfst_session.c361 const struct fst_setup_req *req; in fst_session_handle_setup_request() local
367 if (frame_len < IEEE80211_HDRLEN + 1 + sizeof(*req)) { in fst_session_handle_setup_request()
371 IEEE80211_HDRLEN + 1 + sizeof(*req)); in fst_session_handle_setup_request()
375 req = (const struct fst_setup_req *) in fst_session_handle_setup_request()
377 if (req->stie.element_id != WLAN_EID_SESSION_TRANSITION || in fst_session_handle_setup_request()
378 req->stie.length < 11) { in fst_session_handle_setup_request()
384 if (req->stie.new_band_id == req->stie.old_band_id) { in fst_session_handle_setup_request()
392 if (plen > sizeof(*req)) { in fst_session_handle_setup_request()
393 fst_iface_update_mb_ie(iface, mgmt->sa, (const u8 *) (req + 1), in fst_session_handle_setup_request()
394 plen - sizeof(*req)); in fst_session_handle_setup_request()
[all …]
/hostap-latest/src/eap_server/
Deap_server_mschapv2.c106 struct wpabuf *req; in eap_mschapv2_build_challenge() local
119 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MSCHAPV2, ms_len, in eap_mschapv2_build_challenge()
121 if (req == NULL) { in eap_mschapv2_build_challenge()
128 ms = wpabuf_put(req, sizeof(*ms)); in eap_mschapv2_build_challenge()
133 wpabuf_put_u8(req, CHALLENGE_LEN); in eap_mschapv2_build_challenge()
135 wpabuf_put_data(req, data->auth_challenge, CHALLENGE_LEN); in eap_mschapv2_build_challenge()
137 wpabuf_put(req, CHALLENGE_LEN); in eap_mschapv2_build_challenge()
140 wpabuf_put_data(req, sm->cfg->server_id, sm->cfg->server_id_len); in eap_mschapv2_build_challenge()
142 return req; in eap_mschapv2_build_challenge()
149 struct wpabuf *req; in eap_mschapv2_build_success_req() local
[all …]
Deap_server_tnc.c107 struct wpabuf *req; in eap_tnc_build_start() local
109 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TNC, 1, EAP_CODE_REQUEST, in eap_tnc_build_start()
111 if (req == NULL) { in eap_tnc_build_start()
118 wpabuf_put_u8(req, EAP_TNC_FLAGS_START | EAP_TNC_VERSION); in eap_tnc_build_start()
122 return req; in eap_tnc_build_start()
129 struct wpabuf *req; in eap_tnc_build() local
150 req = wpabuf_alloc(rlen); in eap_tnc_build()
151 if (req == NULL) { in eap_tnc_build()
157 wpabuf_put_data(req, start_buf, start_len); in eap_tnc_build()
160 rpos1 = wpabuf_put(req, 0); in eap_tnc_build()
[all …]
Deap_server_gpsk.c108 struct wpabuf *req; in eap_gpsk_build_gpsk_1() local
122 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len, in eap_gpsk_build_gpsk_1()
124 if (req == NULL) { in eap_gpsk_build_gpsk_1()
131 wpabuf_put_u8(req, EAP_GPSK_OPCODE_GPSK_1); in eap_gpsk_build_gpsk_1()
132 wpabuf_put_be16(req, sm->cfg->server_id_len); in eap_gpsk_build_gpsk_1()
133 wpabuf_put_data(req, sm->cfg->server_id, sm->cfg->server_id_len); in eap_gpsk_build_gpsk_1()
134 wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN); in eap_gpsk_build_gpsk_1()
135 wpabuf_put_be16(req, in eap_gpsk_build_gpsk_1()
137 wpabuf_put_data(req, data->csuite_list, in eap_gpsk_build_gpsk_1()
140 return req; in eap_gpsk_build_gpsk_1()
[all …]
Deap_server_pax.c75 struct wpabuf *req; in eap_pax_build_std_1() local
87 req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, in eap_pax_build_std_1()
90 if (req == NULL) { in eap_pax_build_std_1()
97 pax = wpabuf_put(req, sizeof(*pax)); in eap_pax_build_std_1()
104 wpabuf_put_be16(req, EAP_PAX_RAND_LEN); in eap_pax_build_std_1()
105 wpabuf_put_data(req, data->rand.r.x, EAP_PAX_RAND_LEN); in eap_pax_build_std_1()
109 pos = wpabuf_put(req, EAP_PAX_MAC_LEN); in eap_pax_build_std_1()
111 wpabuf_mhead(req), wpabuf_len(req) - EAP_PAX_ICV_LEN, in eap_pax_build_std_1()
115 wpabuf_free(req); in eap_pax_build_std_1()
120 return req; in eap_pax_build_std_1()
[all …]
/hostap-latest/wpa_supplicant/
Drrm.c309 const struct rrm_measurement_request_element *req, in wpas_rrm_build_lci_report() argument
317 const u8 *request = req->variable; in wpas_rrm_build_lci_report()
318 size_t len = req->len - 3; in wpas_rrm_build_lci_report()
354 if (wpas_rrm_report_elem(buf, req->token, in wpas_rrm_build_lci_report()
355 MEASUREMENT_REPORT_MODE_ACCEPT, req->type, in wpas_rrm_build_lci_report()
366 wpas_rrm_report_elem(buf, req->token, in wpas_rrm_build_lci_report()
368 req->type, NULL, 0) < 0) { in wpas_rrm_build_lci_report()
1198 const struct rrm_measurement_beacon_request *req, in wpas_rm_handle_beacon_req() argument
1211 if (len < sizeof(*req)) in wpas_rm_handle_beacon_req()
1214 if (req->mode != BEACON_REPORT_MODE_PASSIVE && in wpas_rm_handle_beacon_req()
[all …]
/hostap-latest/tests/hwsim/auth_serv/
Drsa3072-generate.sh26 …$OPENSSL req -config rsa3072-ca-openssl.cnf.tmp -batch -x509 -new -newkey rsa:3072 -nodes -keyout …
41 if [ ! -r rsa3072-server.req ]; then
42 …$OPENSSL req -config rsa3072-ca-openssl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout rsa307…
44 …file rsa3072-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-server.req -out rsa3072-server…
56 if [ ! -r rsa3072-user.req ]; then
57 …$OPENSSL req -config rsa3072-ca-openssl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout rsa307…
59 …eyfile rsa3072-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-user.req -out rsa3072-user.p…
71 if [ ! -r rsa3072-user-rsa2048.req ]; then
72 …OPENSSL req -config rsa3072-ca-openssl.cnf.tmp -batch -new -newkey rsa:2048 -nodes -keyout rsa3072…
74 …sa3072-ca.key -cert rsa3072-ca.pem -create_serial -in rsa3072-user-rsa2048.req -out rsa3072-user-r…
Dsha512-generate.sh15 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -x509 -new -newkey rsa:4096 -nodes -keyout sha512…
28 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -newkey rsa:3500 -nodes -keyout sha512-serve…
29 …keyfile sha512-ca.key -cert sha512-ca.pem -create_serial -in sha512-server.req -out sha512-server.…
40 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -newkey rsa:3072 -nodes -keyout sha384-serve…
41 …keyfile sha512-ca.key -cert sha512-ca.pem -create_serial -in sha384-server.req -out sha384-server.…
52 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -newkey rsa:3400 -nodes -keyout sha512-user.…
53 … -keyfile sha512-ca.key -cert sha512-ca.pem -create_serial -in sha512-user.req -out sha512-user.pe…
64 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -newkey rsa:2900 -nodes -keyout sha384-user.…
65 … -keyfile sha512-ca.key -cert sha512-ca.pem -create_serial -in sha384-user.req -out sha384-user.pe…
Dec2-generate.sh17 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -x509 -new -key ec2-ca.key -out ec2-ca.pem -outfo…
31 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-server.key -out ec2-server.r…
32 … -batch -keyfile ec2-ca.key -cert ec2-ca.pem -create_serial -in ec2-server.req -out ec2-server.pem…
44 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-user.key -out ec2-user.req -…
45 …mp -batch -keyfile ec2-ca.key -cert ec2-ca.pem -create_serial -in ec2-user.req -out ec2-user.pem -…
57 $OPENSSL req -config ec-ca-openssl.cnf.tmp -batch -new -nodes -key ec2-user-p256.key -out ec2-user-…
58 …atch -keyfile ec2-ca.key -cert ec2-ca.pem -create_serial -in ec2-user-p256.req -out ec2-user-p256.…
/hostap-latest/hs20/client/
Dest.c369 X509_REQ *req = NULL; in generate_csr() local
411 req = X509_REQ_new(); in generate_csr()
412 if (req == NULL) in generate_csr()
428 res = X509_REQ_set_subject_name(req, in generate_csr()
441 !X509_REQ_set_subject_name(req, subj)) in generate_csr()
447 if (!X509_REQ_set_pubkey(req, pkey)) in generate_csr()
474 if (!X509_REQ_add_extensions(req, exts)) in generate_csr()
479 if (!X509_REQ_sign(req, pkey, EVP_sha256())) in generate_csr()
488 X509_REQ_print(out, req); in generate_csr()
509 X509_REQ_print_fp(f, req); in generate_csr()
[all …]
/hostap-latest/tests/fuzzing/eap-sim-peer/
Deap-sim-peer.c77 void eap_sm_request_sim(struct eap_sm *sm, const char *req) in eap_sm_request_sim() argument
104 struct wpabuf *buf, *req; in LLVMFuzzerTestOneInput() local
110 req = wpabuf_alloc_copy(pos, flen); in LLVMFuzzerTestOneInput()
111 if (!req) in LLVMFuzzerTestOneInput()
113 wpa_hexdump_buf(MSG_MSGDUMP, "fuzzer - request", req); in LLVMFuzzerTestOneInput()
114 buf = registered_eap_method->process(sm, priv, &ret, req); in LLVMFuzzerTestOneInput()
116 wpabuf_free(req); in LLVMFuzzerTestOneInput()
/hostap-latest/tests/fuzzing/eap-aka-peer/
Deap-aka-peer.c83 void eap_sm_request_sim(struct eap_sm *sm, const char *req) in eap_sm_request_sim() argument
110 struct wpabuf *buf, *req; in LLVMFuzzerTestOneInput() local
116 req = wpabuf_alloc_copy(pos, flen); in LLVMFuzzerTestOneInput()
117 if (!req) in LLVMFuzzerTestOneInput()
119 wpa_hexdump_buf(MSG_MSGDUMP, "fuzzer - request", req); in LLVMFuzzerTestOneInput()
120 buf = registered_eap_method->process(sm, priv, &ret, req); in LLVMFuzzerTestOneInput()
122 wpabuf_free(req); in LLVMFuzzerTestOneInput()
/hostap-latest/src/ap/
Dgas_query_ap.c48 struct wpabuf *req; member
137 wpabuf_free(query->req); in gas_query_free()
262 struct wpabuf *req, unsigned int wait_time) in gas_query_tx() argument
268 MAC2STR(query->addr), (unsigned int) wpabuf_len(req), in gas_query_tx()
271 u8 *categ = wpabuf_mhead_u8(req); in gas_query_tx()
276 query->addr, wpabuf_head(req), in gas_query_tx()
277 wpabuf_len(req)); in gas_query_tx()
285 struct wpabuf *req; in gas_query_tx_comeback_req() local
288 req = gas_build_comeback_req(query->dialog_token); in gas_query_tx_comeback_req()
289 if (req == NULL) { in gas_query_tx_comeback_req()
[all …]

123456