Home
last modified time | relevance | path

Searched refs:token (Results 1 – 25 of 45) sorted by relevance

12

/hostap-latest/src/utils/
Djson.c191 static int json_check_tree_state(struct json_token *token) in json_check_tree_state() argument
193 if (!token) in json_check_tree_state()
195 if (json_check_tree_state(token->child) < 0 || in json_check_tree_state()
196 json_check_tree_state(token->sibling) < 0) in json_check_tree_state()
198 if (token->state != JSON_COMPLETED) { in json_check_tree_state()
201 token->state, token->name ? token->name : "N/A", in json_check_tree_state()
202 token->type); in json_check_tree_state()
222 struct json_token *root = NULL, *curr_token = NULL, *token = NULL; in json_parse() local
237 token = json_alloc_token(&tokens); in json_parse()
238 if (!token) in json_parse()
[all …]
Dcommon.c1063 const char *end, *token = str; in cstr_token() local
1069 token = *last; in cstr_token()
1071 while (*token && os_strchr(delim, *token)) in cstr_token()
1072 token++; in cstr_token()
1074 if (!*token) in cstr_token()
1077 end = token + 1; in cstr_token()
1083 return token; in cstr_token()
1097 char *token = (char *) cstr_token(str, delim, (const char **) context); in str_token() local
1099 if (token && **context) in str_token()
1102 return token; in str_token()
Dos_unix.c658 char *token, *context = NULL; in testing_set_fail_pattern() local
667 while ((token = str_token(patterns, " \n\r\t", &context)) && in testing_set_fail_pattern()
669 wpa_trace_test_fail[is_alloc][idx].fail_after = atoi(token); in testing_set_fail_pattern()
670 token = os_strchr(token, ':'); in testing_set_fail_pattern()
671 if (!token) { in testing_set_fail_pattern()
678 token + 1, in testing_set_fail_pattern()
/hostap-latest/src/ap/
Dcomeback_token.c35 const u8 *token, size_t token_len) in check_comeback_token() argument
47 if (token_idx == 0 || token_idx != WPA_GET_BE16(token)) { in check_comeback_token()
51 MAC2STR(addr), WPA_GET_BE16(token), token_idx); in check_comeback_token()
57 addrs[1] = token; in check_comeback_token()
61 os_memcmp_const(token + 2, &mac[2], SHA256_MAC_LEN - 2) != 0) in check_comeback_token()
77 u8 *token; in auth_build_token_req() local
124 token = wpabuf_put(buf, SHA256_MAC_LEN); in auth_build_token_req()
130 2, addrs, len, token) < 0) { in auth_build_token_req()
134 WPA_PUT_BE16(token, token_idx); in auth_build_token_req()
Drrm.c35 static void hostapd_handle_lci_report(struct hostapd_data *hapd, u8 token, in hostapd_handle_lci_report() argument
38 if (!hapd->lci_req_active || hapd->lci_req_token != token) { in hostapd_handle_lci_report()
39 wpa_printf(MSG_DEBUG, "Unexpected LCI report, token %u", token); in hostapd_handle_lci_report()
45 wpa_printf(MSG_DEBUG, "LCI report token %u len %zu", token, len); in hostapd_handle_lci_report()
59 static void hostapd_handle_range_report(struct hostapd_data *hapd, u8 token, in hostapd_handle_range_report() argument
62 if (!hapd->range_req_active || hapd->range_req_token != token) { in hostapd_handle_range_report()
64 token); in hostapd_handle_range_report()
70 wpa_printf(MSG_DEBUG, "Range report token %u len %zu", token, len); in hostapd_handle_range_report()
75 const u8 *addr, u8 token, u8 rep_mode, in hostapd_handle_beacon_report() argument
81 token, len, MAC2STR(addr)); in hostapd_handle_beacon_report()
[all …]
Dap_config.c330 char *token; in hostapd_config_read_wpa_psk() local
367 while ((token = str_token(buf, " ", &context))) { in hostapd_config_read_wpa_psk()
368 if (!os_strchr(token, '=')) in hostapd_config_read_wpa_psk()
371 name = str_token(token, "=", &context2); in hostapd_config_read_wpa_psk()
374 value = str_token(token, "", &context2); in hostapd_config_read_wpa_psk()
395 if (!token) in hostapd_config_read_wpa_psk()
396 token = ""; in hostapd_config_read_wpa_psk()
397 if (hwaddr_aton(token, addr)) { in hostapd_config_read_wpa_psk()
400 token, line, fname); in hostapd_config_read_wpa_psk()
Dcomeback_token.h14 const u8 *token, size_t token_len);
/hostap-latest/src/common/
Ddpp.c2285 struct json_token *root = NULL, *token; in dpp_conf_req_rx() local
2415 token = json_get_member(root, "name"); in dpp_conf_req_rx()
2416 if (!token || token->type != JSON_STRING) { in dpp_conf_req_rx()
2420 wpa_printf(MSG_DEBUG, "DPP: Enrollee name = '%s'", token->string); in dpp_conf_req_rx()
2422 auth->e_name = os_strdup(token->string); in dpp_conf_req_rx()
2424 token = json_get_member(root, "wi-fi_tech"); in dpp_conf_req_rx()
2425 if (!token || token->type != JSON_STRING) { in dpp_conf_req_rx()
2429 wpa_printf(MSG_DEBUG, "DPP: wi-fi_tech = '%s'", token->string); in dpp_conf_req_rx()
2430 if (os_strcmp(token->string, "infra") != 0) { in dpp_conf_req_rx()
2432 token->string); in dpp_conf_req_rx()
[all …]
Ddpp_reconfig.c450 struct json_token *root = NULL, *own_root = NULL, *token; in dpp_reconfig_auth_req_rx() local
506 token = json_get_member(root, "expiry"); in dpp_reconfig_auth_req_rx()
507 if (token && token->type == JSON_STRING && in dpp_reconfig_auth_req_rx()
508 dpp_key_expired(token->string, NULL)) { in dpp_reconfig_auth_req_rx()
514 token = json_get_member(root, "netAccessKey"); in dpp_reconfig_auth_req_rx()
515 if (!token || token->type != JSON_OBJECT) { in dpp_reconfig_auth_req_rx()
538 net_access_key_len, token) < 0) in dpp_reconfig_auth_req_rx()
675 struct json_token *root = NULL, *token, *conn_status_json = NULL; in dpp_reconfig_auth_resp_rx() local
769 token = json_get_member(root, "netAccessKey"); in dpp_reconfig_auth_resp_rx()
770 if (!token || token->type != JSON_OBJECT) { in dpp_reconfig_auth_resp_rx()
[all …]
Ddpp_crypto.c612 struct json_token *root, *token; in dpp_parse_jws_prot_hdr() local
628 token = json_get_member(root, "typ"); in dpp_parse_jws_prot_hdr()
629 if (!token || token->type != JSON_STRING) { in dpp_parse_jws_prot_hdr()
634 token->string); in dpp_parse_jws_prot_hdr()
635 if (os_strcmp(token->string, "dppCon") != 0) { in dpp_parse_jws_prot_hdr()
638 token->string); in dpp_parse_jws_prot_hdr()
642 token = json_get_member(root, "alg"); in dpp_parse_jws_prot_hdr()
643 if (!token || token->type != JSON_STRING) { in dpp_parse_jws_prot_hdr()
648 token->string); in dpp_parse_jws_prot_hdr()
649 if (os_strcmp(token->string, curve->jws_alg) != 0) { in dpp_parse_jws_prot_hdr()
[all …]
Dsae.c1681 const struct wpabuf *token, const char *identifier) in sae_write_commit() argument
1689 if (!sae->h2e && token) { in sae_write_commit()
1690 wpabuf_put_buf(buf, token); in sae_write_commit()
1692 wpabuf_head(token), wpabuf_len(token)); in sae_write_commit()
1740 if (sae->h2e && token) { in sae_write_commit()
1742 wpabuf_put_u8(buf, 1 + wpabuf_len(token)); in sae_write_commit()
1744 wpabuf_put_buf(buf, token); in sae_write_commit()
1747 token); in sae_write_commit()
1848 const u8 *end, const u8 **token, in sae_parse_commit_token() argument
1853 if (token) in sae_parse_commit_token()
[all …]
Dsae.h138 const struct wpabuf *token, const char *identifier);
140 const u8 **token, size_t *token_len, int *allowed_groups,
/hostap-latest/tests/hwsim/
Dtest_rrm.py824 token = hapd.request("REQ_BEACON " + addr + " " + request)
825 if "FAIL" in token:
842 if fields[2] != token:
843 …raise Exception("Unexpected dialog token in TX status: " + fields[2] + " (expected " + token + ")")
846 return token, resp
873 token, resp = run_req_beacon(hapd, addr, req)
885 if fields[2] != token:
886 …on("Unexpected dialog token in beacon report response: " + fields[2] + " (expected " + token + ")")
917 token, resp = run_req_beacon(hapd, addr, req)
930 if fields[2] != token:
[all …]
/hostap-latest/tests/fuzzing/sae/
Dsae.c20 const u8 *token = NULL; in LLVMFuzzerTestOneInput() local
30 res = sae_parse_commit(&sae, data, size, &token, &token_len, groups, 0, in LLVMFuzzerTestOneInput()
34 res = sae_parse_commit(&sae, data, size, &token, &token_len, groups, 1, in LLVMFuzzerTestOneInput()
/hostap-latest/hostapd/
Dctrl_iface.c3227 char *token, *context = NULL; in hostapd_ctrl_iface_req_range() local
3232 token = str_token(cmd, " ", &context); in hostapd_ctrl_iface_req_range()
3233 if (!token || hwaddr_aton(token, addr)) { in hostapd_ctrl_iface_req_range()
3239 token = str_token(cmd, " ", &context); in hostapd_ctrl_iface_req_range()
3240 if (!token) in hostapd_ctrl_iface_req_range()
3243 random_interval = atoi(token); in hostapd_ctrl_iface_req_range()
3247 token = str_token(cmd, " ", &context); in hostapd_ctrl_iface_req_range()
3248 if (!token) in hostapd_ctrl_iface_req_range()
3251 min_ap = atoi(token); in hostapd_ctrl_iface_req_range()
3256 while ((token = str_token(cmd, " ", &context))) { in hostapd_ctrl_iface_req_range()
[all …]
DREADME-WPS300 containing a password token from the Enrollee can be used to
302 with a configuration token can be used to transfer AP settings without
305 When the AP acts as an Enrollee, a local NFC tag with a password token
307 wps_nfc_token command is used to manage use of the NFC password token
309 password token (in place of AP PIN) and "wps_nfc_token disable" disables
310 the NFC password token.
312 The NFC password token that is either pre-configured in the
320 NFC configuration token. The output value from this command is a hexdump
324 tag with an external program. Once written, the NFC configuration token
335 If the NFC tag contains a password token, the token is added to the
[all …]
/hostap-latest/wpa_supplicant/
Dctrl_iface.c1292 char *token, *context = NULL; in wmm_ac_ctrl_addts() local
1298 while ((token = str_token(cmd, " ", &context))) { in wmm_ac_ctrl_addts()
1299 if (sscanf(token, "tsid=%i", &params.tsid) == 1 || in wmm_ac_ctrl_addts()
1300 sscanf(token, "up=%i", &params.user_priority) == 1 || in wmm_ac_ctrl_addts()
1301 sscanf(token, "nominal_msdu_size=%i", in wmm_ac_ctrl_addts()
1303 sscanf(token, "mean_data_rate=%i", in wmm_ac_ctrl_addts()
1305 sscanf(token, "min_phy_rate=%i", in wmm_ac_ctrl_addts()
1307 sscanf(token, "sba=%i", in wmm_ac_ctrl_addts()
1311 if (os_strcasecmp(token, "downlink") == 0) { in wmm_ac_ctrl_addts()
1313 } else if (os_strcasecmp(token, "uplink") == 0) { in wmm_ac_ctrl_addts()
[all …]
Drrm.c288 static int wpas_rrm_report_elem(struct wpabuf **buf, u8 token, u8 mode, u8 type, in wpas_rrm_report_elem() argument
296 wpabuf_put_u8(*buf, token); in wpas_rrm_report_elem()
354 if (wpas_rrm_report_elem(buf, req->token, in wpas_rrm_build_lci_report()
366 wpas_rrm_report_elem(buf, req->token, in wpas_rrm_build_lci_report()
387 wpabuf_put_u8(report, wpa_s->rrm.token); in wpas_rrm_send_msr_report_mpdu()
924 ret = wpas_rrm_report_elem(wpa_buf, data->token, in wpas_add_beacon_rep_elem()
983 return wpas_rrm_report_elem(buf, wpa_s->beacon_rep_data.token, in wpas_beacon_rep_no_results()
1012 if (wpas_rrm_report_elem(&buf, wpa_s->beacon_rep_data.token, in wpas_rrm_refuse_request()
1226 data->token = elem_token; in wpas_rm_handle_beacon_req()
1312 req->type, req->token); in wpas_rrm_handle_msr_req_element()
[all …]
DREADME-WPS315 containing a password token from the Enrollee can be used to
317 with a configuration token can be used to transfer AP settings without
321 token can be used by touching the NFC interface of a Registrar.
324 the Enrollee using the NFC password token that is either pre-configured
333 NFC configuration token when wpa_supplicant is controlling an AP
338 tag with an external program. Once written, the NFC configuration token
343 to build an NFC configuration token based on a locally configured
353 If the NFC tag contains a configuration token, the network is added to
354 wpa_supplicant configuration. If the NFC tag contains a password token,
355 the token is added to the WPS Registrar component. This information can
[all …]
Dmbo.c365 char *cmd, *token, *context = NULL; in wpas_mbo_update_non_pref_chan() local
384 while ((token = str_token(cmd, " ", &context))) { in wpas_mbo_update_non_pref_chan()
406 ret = sscanf(token, "%u:%u:%u:%u", &_oper_class, in wpas_mbo_update_non_pref_chan()
412 token); in wpas_mbo_update_non_pref_chan()
/hostap-latest/src/wps/
Dwps_registrar.c43 static void wps_remove_nfc_pw_token(struct wps_nfc_pw_token *token) in wps_remove_nfc_pw_token() argument
45 dl_list_del(&token->list); in wps_remove_nfc_pw_token()
46 bin_clear_free(token, sizeof(*token)); in wps_remove_nfc_pw_token()
52 struct wps_nfc_pw_token *token, *prev; in wps_free_nfc_pw_tokens() local
53 dl_list_for_each_safe(token, prev, tokens, struct wps_nfc_pw_token, in wps_free_nfc_pw_tokens()
55 if (pw_id == 0 || pw_id == token->pw_id) in wps_free_nfc_pw_tokens()
56 wps_remove_nfc_pw_token(token); in wps_free_nfc_pw_tokens()
64 struct wps_nfc_pw_token *token; in wps_get_nfc_pw_token() local
65 dl_list_for_each(token, tokens, struct wps_nfc_pw_token, list) { in wps_get_nfc_pw_token()
66 if (pw_id == token->pw_id) in wps_get_nfc_pw_token()
[all …]
/hostap-latest/src/eap_common/
Deap_pwd_common.h45 u8 token[4]; member
61 const u8 *token);
/hostap-latest/src/eap_server/
Deap_server_pwd.c32 u32 token; member
185 if (os_get_random((u8 *) &data->token, sizeof(data->token)) < 0) { in eap_pwd_build_id_req()
229 wpabuf_put_data(data->outbuf, &data->token, sizeof(data->token)); in eap_pwd_build_id_req()
597 (os_memcmp(id->token, (u8 *)&data->token, sizeof(data->token))) || in eap_pwd_process_id_resp()
645 (u8 *) &data->token); in eap_pwd_process_id_resp()
/hostap-latest/src/eap_peer/
Deap_ttls.c116 const char *token, *last = NULL; in eap_ttls_init() local
118 while ((token = cstr_token(config->phase2, " \t", &last))) { in eap_ttls_init()
119 if (os_strncmp(token, "auth=", 5) != 0) in eap_ttls_init()
121 token += 5; in eap_ttls_init()
123 if (last - token == 8 && in eap_ttls_init()
124 os_strncmp(token, "MSCHAPV2", 8) == 0) { in eap_ttls_init()
127 } else if (last - token == 6 && in eap_ttls_init()
128 os_strncmp(token, "MSCHAP", 6) == 0) { in eap_ttls_init()
131 } else if (last - token == 3 && in eap_ttls_init()
132 os_strncmp(token, "PAP", 3) == 0) { in eap_ttls_init()
[all …]
Deap_pwd.c36 u8 token[4]; member
308 os_memcpy(data->token, id->token, sizeof(id->token)); in eap_pwd_perform_id_exchange()
344 wpabuf_put_data(data->outbuf, id->token, sizeof(id->token)); in eap_pwd_perform_id_exchange()
563 data->token); in eap_pwd_perform_commit_exchange()

12