/hostap-latest/src/crypto/ |
D | tls_openssl_ocsp.c | 25 static void tls_show_errors(int level, const char *func, const char *txt) in tls_show_errors() argument 30 func, txt, ERR_error_string(ERR_get_error(), NULL)); in tls_show_errors() 223 char *txt; in DEFINE_STACK_OF() local 228 txt = os_malloc(rlen + 1); in DEFINE_STACK_OF() 229 if (!txt) { in DEFINE_STACK_OF() 234 res = BIO_read(out, txt, rlen); in DEFINE_STACK_OF() 237 os_free(txt); in DEFINE_STACK_OF() 241 txt[res] = '\0'; in DEFINE_STACK_OF() 242 return txt; in DEFINE_STACK_OF() 397 char *txt; in issuer_match() local [all …]
|
/hostap-latest/src/common/ |
D | cli.c | 54 os_free(e->txt); in cli_txt_list_free() 69 const char *txt) in cli_txt_list_get() argument 74 if (os_strcmp(e->txt, txt) == 0) in cli_txt_list_get() 81 void cli_txt_list_del(struct dl_list *txt_list, const char *txt) in cli_txt_list_del() argument 85 e = cli_txt_list_get(txt_list, txt); in cli_txt_list_del() 91 void cli_txt_list_del_addr(struct dl_list *txt_list, const char *txt) in cli_txt_list_del_addr() argument 96 if (hwaddr_aton(txt, addr) < 0) in cli_txt_list_del_addr() 103 void cli_txt_list_del_word(struct dl_list *txt_list, const char *txt, in cli_txt_list_del_word() argument 109 end = os_strchr(txt, separator); in cli_txt_list_del_word() 111 end = txt + os_strlen(txt); in cli_txt_list_del_word() [all …]
|
D | cli.h | 19 char *txt; member 26 cli_txt_list_get(struct dl_list *txt_list, const char *txt); 28 void cli_txt_list_del(struct dl_list *txt_list, const char *txt); 29 void cli_txt_list_del_addr(struct dl_list *txt_list, const char *txt); 30 void cli_txt_list_del_word(struct dl_list *txt_list, const char *txt, 33 int cli_txt_list_add(struct dl_list *txt_list, const char *txt); 34 int cli_txt_list_add_addr(struct dl_list *txt_list, const char *txt); 35 int cli_txt_list_add_word(struct dl_list *txt_list, const char *txt,
|
D | dpp_backup.c | 865 char txt[80]; in dpp_parse_one_asymmetric_key() local 904 asn1_oid_to_str(&oid, txt, sizeof(txt)); in dpp_parse_one_asymmetric_key() 907 txt); in dpp_parse_one_asymmetric_key() 923 asn1_oid_to_str(&oid, txt, sizeof(txt)); in dpp_parse_one_asymmetric_key() 924 wpa_printf(MSG_MSGDUMP, "DPP: namedCurve %s", txt); in dpp_parse_one_asymmetric_key() 1009 asn1_oid_to_str(&oid, txt, sizeof(txt)); in dpp_parse_one_asymmetric_key() 1011 "DPP: Unexpected Attribute identifier %s", txt); in dpp_parse_one_asymmetric_key()
|
D | dpp_tcp.c | 142 char txt[100]; in dpp_relay_add_controller() local 159 hostapd_ip_txt(&ctrl->ipaddr, txt, sizeof(txt))); in dpp_relay_add_controller() 455 char txt[100]; in dpp_relay_new_conn() local 482 conn->sock, hostapd_ip_txt(&ctrl->ipaddr, txt, sizeof(txt))); in dpp_relay_new_conn() 1924 char txt[100]; in dpp_tcp_pkex_init() local 1927 hostapd_ip_txt(addr, txt, sizeof(txt)), port); in dpp_tcp_pkex_init() 2023 char txt[100]; in dpp_tcp_init() local 2026 hostapd_ip_txt(addr, txt, sizeof(txt)), port); in dpp_tcp_init() 2363 char txt[100]; in dpp_relay_controller_free() local 2366 hostapd_ip_txt(&ctrl->ipaddr, txt, sizeof(txt))); in dpp_relay_controller_free() [all …]
|
/hostap-latest/hs20/client/ |
D | est.c | 249 char txt[100]; in add_csrattrs_oid() local 255 res = OBJ_obj2txt(txt, sizeof(txt), oid, 1); in add_csrattrs_oid() 256 if (res < 0 || res >= (int) sizeof(txt)) in add_csrattrs_oid() 259 if (os_strcmp(txt, "1.2.840.113549.1.9.7") == 0) { in add_csrattrs_oid() 261 } else if (os_strcmp(txt, "1.2.840.113549.1.1.11") == 0) { in add_csrattrs_oid() 264 wpa_printf(MSG_INFO, "Ignore unsupported csrattr oid %s", txt); in add_csrattrs_oid() 273 char txt[100]; in add_csrattrs_ext_req() local 280 res = OBJ_obj2txt(txt, sizeof(txt), oid, 1); in add_csrattrs_ext_req() 281 if (res < 0 || res >= (int) sizeof(txt)) in add_csrattrs_ext_req() 284 if (os_strcmp(txt, "1.3.6.1.1.1.1.22") == 0) { in add_csrattrs_ext_req() [all …]
|
D | osu_client.c | 789 char *txt; in set_pps_cred_policy_spe() local 794 txt = xml_node_get_text(ctx->xml, ssid); in set_pps_cred_policy_spe() 795 if (txt == NULL) in set_pps_cred_policy_spe() 797 wpa_printf(MSG_DEBUG, "- Policy/SPExclusionList/<X+>/SSID = %s", txt); in set_pps_cred_policy_spe() 798 if (set_cred_quoted(ctx->ifname, id, "excluded_ssid", txt) < 0) in set_pps_cred_policy_spe() 800 xml_node_get_text_free(ctx->xml, txt); in set_pps_cred_policy_spe() 820 char *txt = NULL, *pos; in set_pps_cred_policy_prp() local 852 txt = xml_node_get_text(ctx->xml, node); in set_pps_cred_policy_prp() 853 if (txt == NULL) in set_pps_cred_policy_prp() 856 txt); in set_pps_cred_policy_prp() [all …]
|
/hostap-latest/src/utils/ |
D | common.c | 41 static const char * hwaddr_parse(const char *txt, u8 *addr) in hwaddr_parse() argument 48 a = hex2byte(txt); in hwaddr_parse() 51 txt += 2; in hwaddr_parse() 53 if (i < ETH_ALEN - 1 && *txt++ != ':') in hwaddr_parse() 56 return txt; in hwaddr_parse() 66 int hwaddr_aton(const char *txt, u8 *addr) in hwaddr_aton() argument 68 return hwaddr_parse(txt, addr) ? 0 : -1; in hwaddr_aton() 80 int hwaddr_masked_aton(const char *txt, u8 *addr, u8 *mask, u8 maskable) in hwaddr_masked_aton() argument 85 r = hwaddr_parse(txt, addr); in hwaddr_masked_aton() 114 int hwaddr_compact_aton(const char *txt, u8 *addr) in hwaddr_compact_aton() argument [all …]
|
D | json.c | 19 void json_escape_string(char *txt, size_t maxlen, const char *data, size_t len) in json_escape_string() argument 21 char *end = txt + maxlen; in json_escape_string() 25 if (txt + 4 >= end) in json_escape_string() 30 *txt++ = '\\'; in json_escape_string() 31 *txt++ = '\"'; in json_escape_string() 34 *txt++ = '\\'; in json_escape_string() 35 *txt++ = '\\'; in json_escape_string() 38 *txt++ = '\\'; in json_escape_string() 39 *txt++ = 'n'; in json_escape_string() 42 *txt++ = '\\'; in json_escape_string() [all …]
|
D | http_curl.c | 97 char *txt; in debug_dump() local 108 txt = os_malloc(len + 1); in debug_dump() 109 if (txt == NULL) in debug_dump() 111 os_memcpy(txt, buf, len); in debug_dump() 112 txt[len] = '\0'; in debug_dump() 115 if (txt[len] == '\n' || txt[len] == '\r') in debug_dump() 116 txt[len] = '\0'; in debug_dump() 120 wpa_printf(MSG_MSGDUMP, "%s[%s]", title, txt); in debug_dump() 121 os_free(txt); in debug_dump() 183 char *txt; in debug_dump_cert() local [all …]
|
D | xml_libxml2.c | 404 char *txt; in xml_node_get_base64_text() local 408 txt = xml_node_get_text(ctx, node); in xml_node_get_base64_text() 409 if (txt == NULL) in xml_node_get_base64_text() 412 ret = hostap_base64_decode(txt, strlen(txt), &len); in xml_node_get_base64_text() 415 xml_node_get_text_free(ctx, txt); in xml_node_get_base64_text() 418 txt = os_malloc(len + 1); in xml_node_get_base64_text() 419 if (txt == NULL) { in xml_node_get_base64_text() 423 os_memcpy(txt, ret, len); in xml_node_get_base64_text() 424 txt[len] = '\0'; in xml_node_get_base64_text() 425 return txt; in xml_node_get_base64_text()
|
D | ip_addr.c | 36 int hostapd_parse_ip_addr(const char *txt, struct hostapd_ip_addr *addr) in hostapd_parse_ip_addr() argument 39 if (inet_aton(txt, &addr->u.v4)) { in hostapd_parse_ip_addr() 45 if (inet_pton(AF_INET6, txt, &addr->u.v6) > 0) { in hostapd_parse_ip_addr()
|
/hostap-latest/tests/fuzzing/json/ |
D | json.c | 18 char *txt; in LLVMFuzzerTestOneInput() local 29 txt = os_zalloc(buflen); in LLVMFuzzerTestOneInput() 30 if (txt) { in LLVMFuzzerTestOneInput() 31 json_print_tree(root, txt, buflen); in LLVMFuzzerTestOneInput() 32 wpa_printf(MSG_DEBUG, "%s", txt); in LLVMFuzzerTestOneInput() 33 os_free(txt); in LLVMFuzzerTestOneInput()
|
/hostap-latest/wpa_supplicant/ |
D | nfc_pw_token.c | 42 char txt[1000]; in main() local 61 wpa_snprintf_hex_uppercase(txt, sizeof(txt), wpabuf_head(buf), in main() 63 printf("#WPS=%s\n", txt); in main() 65 wpa_snprintf_hex_uppercase(txt, sizeof(txt), wpabuf_head(ndef), in main() 67 printf("#NDEF=%s\n", txt); in main()
|
D | ctrl_iface_unix.c | 58 const char *txt; member 332 msg->txt, msg->len, NULL, gpriv); in wpas_ctrl_msg_send_pending_global() 353 msg->txt, msg->len, priv, NULL); in wpas_ctrl_msg_send_pending_iface() 391 const char *txt, size_t len) in wpas_ctrl_msg_queue() argument 402 os_memcpy(msg + 1, txt, len); in wpas_ctrl_msg_queue() 403 msg->txt = (const char *) (msg + 1); in wpas_ctrl_msg_queue() 430 const char *txt, size_t len) in wpa_supplicant_ctrl_iface_msg_cb() argument 454 type, txt, len); in wpa_supplicant_ctrl_iface_msg_cb() 467 txt, len, NULL, gpriv); in wpa_supplicant_ctrl_iface_msg_cb() 485 type, txt, len); in wpa_supplicant_ctrl_iface_msg_cb() [all …]
|
D | ctrl_iface_zephyr.c | 97 const char *txt, size_t len) in wpa_supplicant_ctrl_iface_msg_cb() argument 111 &priv->ctrl_dst, level, txt, len); in wpa_supplicant_ctrl_iface_msg_cb() 120 level, txt, len); in wpa_supplicant_ctrl_iface_msg_cb() 379 const char *txt, size_t len) in wpa_supplicant_msg_send() argument 381 wpa_supplicant_ctrl_iface_msg_cb(ctx, level, type, txt, len); in wpa_supplicant_msg_send()
|
D | wpas_glue.c | 916 const char **txt) in wpa_supplicant_ctrl_req_to_string() argument 920 *txt = default_txt; in wpa_supplicant_ctrl_req_to_string() 924 *txt = "Identity"; in wpa_supplicant_ctrl_req_to_string() 928 *txt = "Password"; in wpa_supplicant_ctrl_req_to_string() 932 *txt = "New Password"; in wpa_supplicant_ctrl_req_to_string() 936 *txt = "PIN"; in wpa_supplicant_ctrl_req_to_string() 943 *txt = "Private key passphrase"; in wpa_supplicant_ctrl_req_to_string() 950 *txt = "PSK or passphrase"; in wpa_supplicant_ctrl_req_to_string() 954 *txt = "External server certificate validation"; in wpa_supplicant_ctrl_req_to_string() 962 if (*txt == NULL) { in wpa_supplicant_ctrl_req_to_string() [all …]
|
D | wpas_glue.h | 23 const char **txt); 28 const char *field_name, const char *txt);
|
/hostap-latest/src/eap_peer/ |
D | eap_tls_common.c | 59 const char *txt) in eap_tls_params_flags() argument 61 if (txt == NULL) in eap_tls_params_flags() 63 if (os_strstr(txt, "tls_allow_md5=1")) in eap_tls_params_flags() 65 if (os_strstr(txt, "tls_disable_time_checks=1")) in eap_tls_params_flags() 67 if (os_strstr(txt, "tls_disable_session_ticket=1")) in eap_tls_params_flags() 69 if (os_strstr(txt, "tls_disable_session_ticket=0")) in eap_tls_params_flags() 71 if (os_strstr(txt, "tls_disable_tlsv1_0=1")) in eap_tls_params_flags() 73 if (os_strstr(txt, "tls_disable_tlsv1_0=0")) { in eap_tls_params_flags() 77 if (os_strstr(txt, "tls_disable_tlsv1_1=1")) in eap_tls_params_flags() 79 if (os_strstr(txt, "tls_disable_tlsv1_1=0")) { in eap_tls_params_flags() [all …]
|
/hostap-latest/hostapd/ |
D | wps-ap-nfc.py | 28 def summary(txt): argument 29 print(txt) 32 f.write(txt + "\n") 34 def success_report(txt): argument 35 summary(txt) 38 f.write(txt + "\n")
|
/hostap-latest/tests/hwsim/auth_serv/ |
D | update.sh | 36 touch test-ca/index.txt 156 $OPENSSL ocsp -index test-ca/index.txt -rsigner test-ca/cacert.pem -rkey test-ca/private/cakey.pem … 176 grep -v CN=server.w1.fi index.txt > index.txt.new 177 grep CN=server.w1.fi test-ca/index.txt | tail -1 >> index.txt.new 178 mv index.txt.new index.txt 182 SERIAL=`grep CN=server.w1.fi test-ca/index.txt | tail -1 | cut -f4`
|
/hostap-latest/wpa_supplicant/examples/ |
D | wps-nfc.py | 32 def summary(txt): argument 33 print(txt) 36 f.write(txt + "\n") 38 def success_report(txt): argument 39 summary(txt) 42 f.write(txt + "\n")
|
D | p2p-nfc.py | 39 def summary(txt): argument 40 print(txt) 43 f.write(txt + "\n") 45 def success_report(txt): argument 46 summary(txt) 49 f.write(txt + "\n")
|
/hostap-latest/src/tls/ |
D | pkcs1.c | 295 char txt[100], txt2[100]; in pkcs1_v15_sig_ver() local 296 asn1_oid_to_str(&oid, txt, sizeof(txt)); in pkcs1_v15_sig_ver() 300 txt, txt2); in pkcs1_v15_sig_ver()
|
/hostap-latest/radius_example/ |
D | radius_example.c | 25 int level, const char *txt, size_t len) in hostapd_logger_cb() argument 27 printf("%s\n", txt); in hostapd_logger_cb()
|