/hostap-latest/src/utils/ |
D | json.c | 191 static int json_check_tree_state(struct json_token *token) in json_check_tree_state() argument 193 if (!token) in json_check_tree_state() 195 if (json_check_tree_state(token->child) < 0 || in json_check_tree_state() 196 json_check_tree_state(token->sibling) < 0) in json_check_tree_state() 198 if (token->state != JSON_COMPLETED) { in json_check_tree_state() 201 token->state, token->name ? token->name : "N/A", in json_check_tree_state() 202 token->type); in json_check_tree_state() 222 struct json_token *root = NULL, *curr_token = NULL, *token = NULL; in json_parse() local 237 token = json_alloc_token(&tokens); in json_parse() 238 if (!token) in json_parse() [all …]
|
D | common.c | 1063 const char *end, *token = str; in cstr_token() local 1069 token = *last; in cstr_token() 1071 while (*token && os_strchr(delim, *token)) in cstr_token() 1072 token++; in cstr_token() 1074 if (!*token) in cstr_token() 1077 end = token + 1; in cstr_token() 1083 return token; in cstr_token() 1097 char *token = (char *) cstr_token(str, delim, (const char **) context); in str_token() local 1099 if (token && **context) in str_token() 1102 return token; in str_token()
|
D | os_unix.c | 658 char *token, *context = NULL; in testing_set_fail_pattern() local 667 while ((token = str_token(patterns, " \n\r\t", &context)) && in testing_set_fail_pattern() 669 wpa_trace_test_fail[is_alloc][idx].fail_after = atoi(token); in testing_set_fail_pattern() 670 token = os_strchr(token, ':'); in testing_set_fail_pattern() 671 if (!token) { in testing_set_fail_pattern() 678 token + 1, in testing_set_fail_pattern()
|
/hostap-latest/src/ap/ |
D | comeback_token.c | 35 const u8 *token, size_t token_len) in check_comeback_token() argument 47 if (token_idx == 0 || token_idx != WPA_GET_BE16(token)) { in check_comeback_token() 51 MAC2STR(addr), WPA_GET_BE16(token), token_idx); in check_comeback_token() 57 addrs[1] = token; in check_comeback_token() 61 os_memcmp_const(token + 2, &mac[2], SHA256_MAC_LEN - 2) != 0) in check_comeback_token() 77 u8 *token; in auth_build_token_req() local 124 token = wpabuf_put(buf, SHA256_MAC_LEN); in auth_build_token_req() 130 2, addrs, len, token) < 0) { in auth_build_token_req() 134 WPA_PUT_BE16(token, token_idx); in auth_build_token_req()
|
D | rrm.c | 35 static void hostapd_handle_lci_report(struct hostapd_data *hapd, u8 token, in hostapd_handle_lci_report() argument 38 if (!hapd->lci_req_active || hapd->lci_req_token != token) { in hostapd_handle_lci_report() 39 wpa_printf(MSG_DEBUG, "Unexpected LCI report, token %u", token); in hostapd_handle_lci_report() 45 wpa_printf(MSG_DEBUG, "LCI report token %u len %zu", token, len); in hostapd_handle_lci_report() 59 static void hostapd_handle_range_report(struct hostapd_data *hapd, u8 token, in hostapd_handle_range_report() argument 62 if (!hapd->range_req_active || hapd->range_req_token != token) { in hostapd_handle_range_report() 64 token); in hostapd_handle_range_report() 70 wpa_printf(MSG_DEBUG, "Range report token %u len %zu", token, len); in hostapd_handle_range_report() 75 const u8 *addr, u8 token, u8 rep_mode, in hostapd_handle_beacon_report() argument 81 token, len, MAC2STR(addr)); in hostapd_handle_beacon_report() [all …]
|
D | ap_config.c | 330 char *token; in hostapd_config_read_wpa_psk() local 367 while ((token = str_token(buf, " ", &context))) { in hostapd_config_read_wpa_psk() 368 if (!os_strchr(token, '=')) in hostapd_config_read_wpa_psk() 371 name = str_token(token, "=", &context2); in hostapd_config_read_wpa_psk() 374 value = str_token(token, "", &context2); in hostapd_config_read_wpa_psk() 395 if (!token) in hostapd_config_read_wpa_psk() 396 token = ""; in hostapd_config_read_wpa_psk() 397 if (hwaddr_aton(token, addr)) { in hostapd_config_read_wpa_psk() 400 token, line, fname); in hostapd_config_read_wpa_psk()
|
D | comeback_token.h | 14 const u8 *token, size_t token_len);
|
/hostap-latest/src/common/ |
D | dpp.c | 2285 struct json_token *root = NULL, *token; in dpp_conf_req_rx() local 2415 token = json_get_member(root, "name"); in dpp_conf_req_rx() 2416 if (!token || token->type != JSON_STRING) { in dpp_conf_req_rx() 2420 wpa_printf(MSG_DEBUG, "DPP: Enrollee name = '%s'", token->string); in dpp_conf_req_rx() 2422 auth->e_name = os_strdup(token->string); in dpp_conf_req_rx() 2424 token = json_get_member(root, "wi-fi_tech"); in dpp_conf_req_rx() 2425 if (!token || token->type != JSON_STRING) { in dpp_conf_req_rx() 2429 wpa_printf(MSG_DEBUG, "DPP: wi-fi_tech = '%s'", token->string); in dpp_conf_req_rx() 2430 if (os_strcmp(token->string, "infra") != 0) { in dpp_conf_req_rx() 2432 token->string); in dpp_conf_req_rx() [all …]
|
D | dpp_reconfig.c | 450 struct json_token *root = NULL, *own_root = NULL, *token; in dpp_reconfig_auth_req_rx() local 506 token = json_get_member(root, "expiry"); in dpp_reconfig_auth_req_rx() 507 if (token && token->type == JSON_STRING && in dpp_reconfig_auth_req_rx() 508 dpp_key_expired(token->string, NULL)) { in dpp_reconfig_auth_req_rx() 514 token = json_get_member(root, "netAccessKey"); in dpp_reconfig_auth_req_rx() 515 if (!token || token->type != JSON_OBJECT) { in dpp_reconfig_auth_req_rx() 538 net_access_key_len, token) < 0) in dpp_reconfig_auth_req_rx() 675 struct json_token *root = NULL, *token, *conn_status_json = NULL; in dpp_reconfig_auth_resp_rx() local 769 token = json_get_member(root, "netAccessKey"); in dpp_reconfig_auth_resp_rx() 770 if (!token || token->type != JSON_OBJECT) { in dpp_reconfig_auth_resp_rx() [all …]
|
D | dpp_crypto.c | 612 struct json_token *root, *token; in dpp_parse_jws_prot_hdr() local 628 token = json_get_member(root, "typ"); in dpp_parse_jws_prot_hdr() 629 if (!token || token->type != JSON_STRING) { in dpp_parse_jws_prot_hdr() 634 token->string); in dpp_parse_jws_prot_hdr() 635 if (os_strcmp(token->string, "dppCon") != 0) { in dpp_parse_jws_prot_hdr() 638 token->string); in dpp_parse_jws_prot_hdr() 642 token = json_get_member(root, "alg"); in dpp_parse_jws_prot_hdr() 643 if (!token || token->type != JSON_STRING) { in dpp_parse_jws_prot_hdr() 648 token->string); in dpp_parse_jws_prot_hdr() 649 if (os_strcmp(token->string, curve->jws_alg) != 0) { in dpp_parse_jws_prot_hdr() [all …]
|
D | sae.c | 1681 const struct wpabuf *token, const char *identifier) in sae_write_commit() argument 1689 if (!sae->h2e && token) { in sae_write_commit() 1690 wpabuf_put_buf(buf, token); in sae_write_commit() 1692 wpabuf_head(token), wpabuf_len(token)); in sae_write_commit() 1740 if (sae->h2e && token) { in sae_write_commit() 1742 wpabuf_put_u8(buf, 1 + wpabuf_len(token)); in sae_write_commit() 1744 wpabuf_put_buf(buf, token); in sae_write_commit() 1747 token); in sae_write_commit() 1848 const u8 *end, const u8 **token, in sae_parse_commit_token() argument 1853 if (token) in sae_parse_commit_token() [all …]
|
D | sae.h | 138 const struct wpabuf *token, const char *identifier); 140 const u8 **token, size_t *token_len, int *allowed_groups,
|
/hostap-latest/tests/hwsim/ |
D | test_rrm.py | 824 token = hapd.request("REQ_BEACON " + addr + " " + request) 825 if "FAIL" in token: 842 if fields[2] != token: 843 …raise Exception("Unexpected dialog token in TX status: " + fields[2] + " (expected " + token + ")") 846 return token, resp 873 token, resp = run_req_beacon(hapd, addr, req) 885 if fields[2] != token: 886 …on("Unexpected dialog token in beacon report response: " + fields[2] + " (expected " + token + ")") 917 token, resp = run_req_beacon(hapd, addr, req) 930 if fields[2] != token: [all …]
|
/hostap-latest/tests/fuzzing/sae/ |
D | sae.c | 20 const u8 *token = NULL; in LLVMFuzzerTestOneInput() local 30 res = sae_parse_commit(&sae, data, size, &token, &token_len, groups, 0, in LLVMFuzzerTestOneInput() 34 res = sae_parse_commit(&sae, data, size, &token, &token_len, groups, 1, in LLVMFuzzerTestOneInput()
|
/hostap-latest/hostapd/ |
D | ctrl_iface.c | 3227 char *token, *context = NULL; in hostapd_ctrl_iface_req_range() local 3232 token = str_token(cmd, " ", &context); in hostapd_ctrl_iface_req_range() 3233 if (!token || hwaddr_aton(token, addr)) { in hostapd_ctrl_iface_req_range() 3239 token = str_token(cmd, " ", &context); in hostapd_ctrl_iface_req_range() 3240 if (!token) in hostapd_ctrl_iface_req_range() 3243 random_interval = atoi(token); in hostapd_ctrl_iface_req_range() 3247 token = str_token(cmd, " ", &context); in hostapd_ctrl_iface_req_range() 3248 if (!token) in hostapd_ctrl_iface_req_range() 3251 min_ap = atoi(token); in hostapd_ctrl_iface_req_range() 3256 while ((token = str_token(cmd, " ", &context))) { in hostapd_ctrl_iface_req_range() [all …]
|
D | README-WPS | 300 containing a password token from the Enrollee can be used to 302 with a configuration token can be used to transfer AP settings without 305 When the AP acts as an Enrollee, a local NFC tag with a password token 307 wps_nfc_token command is used to manage use of the NFC password token 309 password token (in place of AP PIN) and "wps_nfc_token disable" disables 310 the NFC password token. 312 The NFC password token that is either pre-configured in the 320 NFC configuration token. The output value from this command is a hexdump 324 tag with an external program. Once written, the NFC configuration token 335 If the NFC tag contains a password token, the token is added to the [all …]
|
/hostap-latest/wpa_supplicant/ |
D | ctrl_iface.c | 1292 char *token, *context = NULL; in wmm_ac_ctrl_addts() local 1298 while ((token = str_token(cmd, " ", &context))) { in wmm_ac_ctrl_addts() 1299 if (sscanf(token, "tsid=%i", ¶ms.tsid) == 1 || in wmm_ac_ctrl_addts() 1300 sscanf(token, "up=%i", ¶ms.user_priority) == 1 || in wmm_ac_ctrl_addts() 1301 sscanf(token, "nominal_msdu_size=%i", in wmm_ac_ctrl_addts() 1303 sscanf(token, "mean_data_rate=%i", in wmm_ac_ctrl_addts() 1305 sscanf(token, "min_phy_rate=%i", in wmm_ac_ctrl_addts() 1307 sscanf(token, "sba=%i", in wmm_ac_ctrl_addts() 1311 if (os_strcasecmp(token, "downlink") == 0) { in wmm_ac_ctrl_addts() 1313 } else if (os_strcasecmp(token, "uplink") == 0) { in wmm_ac_ctrl_addts() [all …]
|
D | rrm.c | 288 static int wpas_rrm_report_elem(struct wpabuf **buf, u8 token, u8 mode, u8 type, in wpas_rrm_report_elem() argument 296 wpabuf_put_u8(*buf, token); in wpas_rrm_report_elem() 354 if (wpas_rrm_report_elem(buf, req->token, in wpas_rrm_build_lci_report() 366 wpas_rrm_report_elem(buf, req->token, in wpas_rrm_build_lci_report() 387 wpabuf_put_u8(report, wpa_s->rrm.token); in wpas_rrm_send_msr_report_mpdu() 924 ret = wpas_rrm_report_elem(wpa_buf, data->token, in wpas_add_beacon_rep_elem() 983 return wpas_rrm_report_elem(buf, wpa_s->beacon_rep_data.token, in wpas_beacon_rep_no_results() 1012 if (wpas_rrm_report_elem(&buf, wpa_s->beacon_rep_data.token, in wpas_rrm_refuse_request() 1226 data->token = elem_token; in wpas_rm_handle_beacon_req() 1312 req->type, req->token); in wpas_rrm_handle_msr_req_element() [all …]
|
D | README-WPS | 315 containing a password token from the Enrollee can be used to 317 with a configuration token can be used to transfer AP settings without 321 token can be used by touching the NFC interface of a Registrar. 324 the Enrollee using the NFC password token that is either pre-configured 333 NFC configuration token when wpa_supplicant is controlling an AP 338 tag with an external program. Once written, the NFC configuration token 343 to build an NFC configuration token based on a locally configured 353 If the NFC tag contains a configuration token, the network is added to 354 wpa_supplicant configuration. If the NFC tag contains a password token, 355 the token is added to the WPS Registrar component. This information can [all …]
|
D | mbo.c | 365 char *cmd, *token, *context = NULL; in wpas_mbo_update_non_pref_chan() local 384 while ((token = str_token(cmd, " ", &context))) { in wpas_mbo_update_non_pref_chan() 406 ret = sscanf(token, "%u:%u:%u:%u", &_oper_class, in wpas_mbo_update_non_pref_chan() 412 token); in wpas_mbo_update_non_pref_chan()
|
/hostap-latest/src/wps/ |
D | wps_registrar.c | 43 static void wps_remove_nfc_pw_token(struct wps_nfc_pw_token *token) in wps_remove_nfc_pw_token() argument 45 dl_list_del(&token->list); in wps_remove_nfc_pw_token() 46 bin_clear_free(token, sizeof(*token)); in wps_remove_nfc_pw_token() 52 struct wps_nfc_pw_token *token, *prev; in wps_free_nfc_pw_tokens() local 53 dl_list_for_each_safe(token, prev, tokens, struct wps_nfc_pw_token, in wps_free_nfc_pw_tokens() 55 if (pw_id == 0 || pw_id == token->pw_id) in wps_free_nfc_pw_tokens() 56 wps_remove_nfc_pw_token(token); in wps_free_nfc_pw_tokens() 64 struct wps_nfc_pw_token *token; in wps_get_nfc_pw_token() local 65 dl_list_for_each(token, tokens, struct wps_nfc_pw_token, list) { in wps_get_nfc_pw_token() 66 if (pw_id == token->pw_id) in wps_get_nfc_pw_token() [all …]
|
/hostap-latest/src/eap_common/ |
D | eap_pwd_common.h | 45 u8 token[4]; member 61 const u8 *token);
|
/hostap-latest/src/eap_server/ |
D | eap_server_pwd.c | 32 u32 token; member 185 if (os_get_random((u8 *) &data->token, sizeof(data->token)) < 0) { in eap_pwd_build_id_req() 229 wpabuf_put_data(data->outbuf, &data->token, sizeof(data->token)); in eap_pwd_build_id_req() 597 (os_memcmp(id->token, (u8 *)&data->token, sizeof(data->token))) || in eap_pwd_process_id_resp() 645 (u8 *) &data->token); in eap_pwd_process_id_resp()
|
/hostap-latest/src/eap_peer/ |
D | eap_ttls.c | 116 const char *token, *last = NULL; in eap_ttls_init() local 118 while ((token = cstr_token(config->phase2, " \t", &last))) { in eap_ttls_init() 119 if (os_strncmp(token, "auth=", 5) != 0) in eap_ttls_init() 121 token += 5; in eap_ttls_init() 123 if (last - token == 8 && in eap_ttls_init() 124 os_strncmp(token, "MSCHAPV2", 8) == 0) { in eap_ttls_init() 127 } else if (last - token == 6 && in eap_ttls_init() 128 os_strncmp(token, "MSCHAP", 6) == 0) { in eap_ttls_init() 131 } else if (last - token == 3 && in eap_ttls_init() 132 os_strncmp(token, "PAP", 3) == 0) { in eap_ttls_init() [all …]
|
D | eap_pwd.c | 36 u8 token[4]; member 308 os_memcpy(data->token, id->token, sizeof(id->token)); in eap_pwd_perform_id_exchange() 344 wpabuf_put_data(data->outbuf, id->token, sizeof(id->token)); in eap_pwd_perform_id_exchange() 563 data->token); in eap_pwd_perform_commit_exchange()
|