Home
last modified time | relevance | path

Searched refs:txt (Results 1 – 25 of 114) sorted by relevance

12345

/hostap-latest/src/crypto/
Dtls_openssl_ocsp.c25 static void tls_show_errors(int level, const char *func, const char *txt) in tls_show_errors() argument
30 func, txt, ERR_error_string(ERR_get_error(), NULL)); in tls_show_errors()
223 char *txt; in DEFINE_STACK_OF() local
228 txt = os_malloc(rlen + 1); in DEFINE_STACK_OF()
229 if (!txt) { in DEFINE_STACK_OF()
234 res = BIO_read(out, txt, rlen); in DEFINE_STACK_OF()
237 os_free(txt); in DEFINE_STACK_OF()
241 txt[res] = '\0'; in DEFINE_STACK_OF()
242 return txt; in DEFINE_STACK_OF()
397 char *txt; in issuer_match() local
[all …]
/hostap-latest/src/common/
Dcli.c54 os_free(e->txt); in cli_txt_list_free()
69 const char *txt) in cli_txt_list_get() argument
74 if (os_strcmp(e->txt, txt) == 0) in cli_txt_list_get()
81 void cli_txt_list_del(struct dl_list *txt_list, const char *txt) in cli_txt_list_del() argument
85 e = cli_txt_list_get(txt_list, txt); in cli_txt_list_del()
91 void cli_txt_list_del_addr(struct dl_list *txt_list, const char *txt) in cli_txt_list_del_addr() argument
96 if (hwaddr_aton(txt, addr) < 0) in cli_txt_list_del_addr()
103 void cli_txt_list_del_word(struct dl_list *txt_list, const char *txt, in cli_txt_list_del_word() argument
109 end = os_strchr(txt, separator); in cli_txt_list_del_word()
111 end = txt + os_strlen(txt); in cli_txt_list_del_word()
[all …]
Dcli.h19 char *txt; member
26 cli_txt_list_get(struct dl_list *txt_list, const char *txt);
28 void cli_txt_list_del(struct dl_list *txt_list, const char *txt);
29 void cli_txt_list_del_addr(struct dl_list *txt_list, const char *txt);
30 void cli_txt_list_del_word(struct dl_list *txt_list, const char *txt,
33 int cli_txt_list_add(struct dl_list *txt_list, const char *txt);
34 int cli_txt_list_add_addr(struct dl_list *txt_list, const char *txt);
35 int cli_txt_list_add_word(struct dl_list *txt_list, const char *txt,
Ddpp_backup.c865 char txt[80]; in dpp_parse_one_asymmetric_key() local
904 asn1_oid_to_str(&oid, txt, sizeof(txt)); in dpp_parse_one_asymmetric_key()
907 txt); in dpp_parse_one_asymmetric_key()
923 asn1_oid_to_str(&oid, txt, sizeof(txt)); in dpp_parse_one_asymmetric_key()
924 wpa_printf(MSG_MSGDUMP, "DPP: namedCurve %s", txt); in dpp_parse_one_asymmetric_key()
1009 asn1_oid_to_str(&oid, txt, sizeof(txt)); in dpp_parse_one_asymmetric_key()
1011 "DPP: Unexpected Attribute identifier %s", txt); in dpp_parse_one_asymmetric_key()
Ddpp_tcp.c142 char txt[100]; in dpp_relay_add_controller() local
159 hostapd_ip_txt(&ctrl->ipaddr, txt, sizeof(txt))); in dpp_relay_add_controller()
455 char txt[100]; in dpp_relay_new_conn() local
482 conn->sock, hostapd_ip_txt(&ctrl->ipaddr, txt, sizeof(txt))); in dpp_relay_new_conn()
1924 char txt[100]; in dpp_tcp_pkex_init() local
1927 hostapd_ip_txt(addr, txt, sizeof(txt)), port); in dpp_tcp_pkex_init()
2023 char txt[100]; in dpp_tcp_init() local
2026 hostapd_ip_txt(addr, txt, sizeof(txt)), port); in dpp_tcp_init()
2363 char txt[100]; in dpp_relay_controller_free() local
2366 hostapd_ip_txt(&ctrl->ipaddr, txt, sizeof(txt))); in dpp_relay_controller_free()
[all …]
/hostap-latest/hs20/client/
Dest.c249 char txt[100]; in add_csrattrs_oid() local
255 res = OBJ_obj2txt(txt, sizeof(txt), oid, 1); in add_csrattrs_oid()
256 if (res < 0 || res >= (int) sizeof(txt)) in add_csrattrs_oid()
259 if (os_strcmp(txt, "1.2.840.113549.1.9.7") == 0) { in add_csrattrs_oid()
261 } else if (os_strcmp(txt, "1.2.840.113549.1.1.11") == 0) { in add_csrattrs_oid()
264 wpa_printf(MSG_INFO, "Ignore unsupported csrattr oid %s", txt); in add_csrattrs_oid()
273 char txt[100]; in add_csrattrs_ext_req() local
280 res = OBJ_obj2txt(txt, sizeof(txt), oid, 1); in add_csrattrs_ext_req()
281 if (res < 0 || res >= (int) sizeof(txt)) in add_csrattrs_ext_req()
284 if (os_strcmp(txt, "1.3.6.1.1.1.1.22") == 0) { in add_csrattrs_ext_req()
[all …]
Dosu_client.c789 char *txt; in set_pps_cred_policy_spe() local
794 txt = xml_node_get_text(ctx->xml, ssid); in set_pps_cred_policy_spe()
795 if (txt == NULL) in set_pps_cred_policy_spe()
797 wpa_printf(MSG_DEBUG, "- Policy/SPExclusionList/<X+>/SSID = %s", txt); in set_pps_cred_policy_spe()
798 if (set_cred_quoted(ctx->ifname, id, "excluded_ssid", txt) < 0) in set_pps_cred_policy_spe()
800 xml_node_get_text_free(ctx->xml, txt); in set_pps_cred_policy_spe()
820 char *txt = NULL, *pos; in set_pps_cred_policy_prp() local
852 txt = xml_node_get_text(ctx->xml, node); in set_pps_cred_policy_prp()
853 if (txt == NULL) in set_pps_cred_policy_prp()
856 txt); in set_pps_cred_policy_prp()
[all …]
/hostap-latest/src/utils/
Dcommon.c41 static const char * hwaddr_parse(const char *txt, u8 *addr) in hwaddr_parse() argument
48 a = hex2byte(txt); in hwaddr_parse()
51 txt += 2; in hwaddr_parse()
53 if (i < ETH_ALEN - 1 && *txt++ != ':') in hwaddr_parse()
56 return txt; in hwaddr_parse()
66 int hwaddr_aton(const char *txt, u8 *addr) in hwaddr_aton() argument
68 return hwaddr_parse(txt, addr) ? 0 : -1; in hwaddr_aton()
80 int hwaddr_masked_aton(const char *txt, u8 *addr, u8 *mask, u8 maskable) in hwaddr_masked_aton() argument
85 r = hwaddr_parse(txt, addr); in hwaddr_masked_aton()
114 int hwaddr_compact_aton(const char *txt, u8 *addr) in hwaddr_compact_aton() argument
[all …]
Djson.c19 void json_escape_string(char *txt, size_t maxlen, const char *data, size_t len) in json_escape_string() argument
21 char *end = txt + maxlen; in json_escape_string()
25 if (txt + 4 >= end) in json_escape_string()
30 *txt++ = '\\'; in json_escape_string()
31 *txt++ = '\"'; in json_escape_string()
34 *txt++ = '\\'; in json_escape_string()
35 *txt++ = '\\'; in json_escape_string()
38 *txt++ = '\\'; in json_escape_string()
39 *txt++ = 'n'; in json_escape_string()
42 *txt++ = '\\'; in json_escape_string()
[all …]
Dhttp_curl.c97 char *txt; in debug_dump() local
108 txt = os_malloc(len + 1); in debug_dump()
109 if (txt == NULL) in debug_dump()
111 os_memcpy(txt, buf, len); in debug_dump()
112 txt[len] = '\0'; in debug_dump()
115 if (txt[len] == '\n' || txt[len] == '\r') in debug_dump()
116 txt[len] = '\0'; in debug_dump()
120 wpa_printf(MSG_MSGDUMP, "%s[%s]", title, txt); in debug_dump()
121 os_free(txt); in debug_dump()
183 char *txt; in debug_dump_cert() local
[all …]
Dxml_libxml2.c404 char *txt; in xml_node_get_base64_text() local
408 txt = xml_node_get_text(ctx, node); in xml_node_get_base64_text()
409 if (txt == NULL) in xml_node_get_base64_text()
412 ret = hostap_base64_decode(txt, strlen(txt), &len); in xml_node_get_base64_text()
415 xml_node_get_text_free(ctx, txt); in xml_node_get_base64_text()
418 txt = os_malloc(len + 1); in xml_node_get_base64_text()
419 if (txt == NULL) { in xml_node_get_base64_text()
423 os_memcpy(txt, ret, len); in xml_node_get_base64_text()
424 txt[len] = '\0'; in xml_node_get_base64_text()
425 return txt; in xml_node_get_base64_text()
Dip_addr.c36 int hostapd_parse_ip_addr(const char *txt, struct hostapd_ip_addr *addr) in hostapd_parse_ip_addr() argument
39 if (inet_aton(txt, &addr->u.v4)) { in hostapd_parse_ip_addr()
45 if (inet_pton(AF_INET6, txt, &addr->u.v6) > 0) { in hostapd_parse_ip_addr()
/hostap-latest/tests/fuzzing/json/
Djson.c18 char *txt; in LLVMFuzzerTestOneInput() local
29 txt = os_zalloc(buflen); in LLVMFuzzerTestOneInput()
30 if (txt) { in LLVMFuzzerTestOneInput()
31 json_print_tree(root, txt, buflen); in LLVMFuzzerTestOneInput()
32 wpa_printf(MSG_DEBUG, "%s", txt); in LLVMFuzzerTestOneInput()
33 os_free(txt); in LLVMFuzzerTestOneInput()
/hostap-latest/wpa_supplicant/
Dnfc_pw_token.c42 char txt[1000]; in main() local
61 wpa_snprintf_hex_uppercase(txt, sizeof(txt), wpabuf_head(buf), in main()
63 printf("#WPS=%s\n", txt); in main()
65 wpa_snprintf_hex_uppercase(txt, sizeof(txt), wpabuf_head(ndef), in main()
67 printf("#NDEF=%s\n", txt); in main()
Dctrl_iface_unix.c58 const char *txt; member
332 msg->txt, msg->len, NULL, gpriv); in wpas_ctrl_msg_send_pending_global()
353 msg->txt, msg->len, priv, NULL); in wpas_ctrl_msg_send_pending_iface()
391 const char *txt, size_t len) in wpas_ctrl_msg_queue() argument
402 os_memcpy(msg + 1, txt, len); in wpas_ctrl_msg_queue()
403 msg->txt = (const char *) (msg + 1); in wpas_ctrl_msg_queue()
430 const char *txt, size_t len) in wpa_supplicant_ctrl_iface_msg_cb() argument
454 type, txt, len); in wpa_supplicant_ctrl_iface_msg_cb()
467 txt, len, NULL, gpriv); in wpa_supplicant_ctrl_iface_msg_cb()
485 type, txt, len); in wpa_supplicant_ctrl_iface_msg_cb()
[all …]
Dctrl_iface_zephyr.c97 const char *txt, size_t len) in wpa_supplicant_ctrl_iface_msg_cb() argument
111 &priv->ctrl_dst, level, txt, len); in wpa_supplicant_ctrl_iface_msg_cb()
120 level, txt, len); in wpa_supplicant_ctrl_iface_msg_cb()
379 const char *txt, size_t len) in wpa_supplicant_msg_send() argument
381 wpa_supplicant_ctrl_iface_msg_cb(ctx, level, type, txt, len); in wpa_supplicant_msg_send()
Dwpas_glue.c916 const char **txt) in wpa_supplicant_ctrl_req_to_string() argument
920 *txt = default_txt; in wpa_supplicant_ctrl_req_to_string()
924 *txt = "Identity"; in wpa_supplicant_ctrl_req_to_string()
928 *txt = "Password"; in wpa_supplicant_ctrl_req_to_string()
932 *txt = "New Password"; in wpa_supplicant_ctrl_req_to_string()
936 *txt = "PIN"; in wpa_supplicant_ctrl_req_to_string()
943 *txt = "Private key passphrase"; in wpa_supplicant_ctrl_req_to_string()
950 *txt = "PSK or passphrase"; in wpa_supplicant_ctrl_req_to_string()
954 *txt = "External server certificate validation"; in wpa_supplicant_ctrl_req_to_string()
962 if (*txt == NULL) { in wpa_supplicant_ctrl_req_to_string()
[all …]
Dwpas_glue.h23 const char **txt);
28 const char *field_name, const char *txt);
/hostap-latest/src/eap_peer/
Deap_tls_common.c59 const char *txt) in eap_tls_params_flags() argument
61 if (txt == NULL) in eap_tls_params_flags()
63 if (os_strstr(txt, "tls_allow_md5=1")) in eap_tls_params_flags()
65 if (os_strstr(txt, "tls_disable_time_checks=1")) in eap_tls_params_flags()
67 if (os_strstr(txt, "tls_disable_session_ticket=1")) in eap_tls_params_flags()
69 if (os_strstr(txt, "tls_disable_session_ticket=0")) in eap_tls_params_flags()
71 if (os_strstr(txt, "tls_disable_tlsv1_0=1")) in eap_tls_params_flags()
73 if (os_strstr(txt, "tls_disable_tlsv1_0=0")) { in eap_tls_params_flags()
77 if (os_strstr(txt, "tls_disable_tlsv1_1=1")) in eap_tls_params_flags()
79 if (os_strstr(txt, "tls_disable_tlsv1_1=0")) { in eap_tls_params_flags()
[all …]
/hostap-latest/hostapd/
Dwps-ap-nfc.py28 def summary(txt): argument
29 print(txt)
32 f.write(txt + "\n")
34 def success_report(txt): argument
35 summary(txt)
38 f.write(txt + "\n")
/hostap-latest/tests/hwsim/auth_serv/
Dupdate.sh36 touch test-ca/index.txt
156 $OPENSSL ocsp -index test-ca/index.txt -rsigner test-ca/cacert.pem -rkey test-ca/private/cakey.pem …
176 grep -v CN=server.w1.fi index.txt > index.txt.new
177 grep CN=server.w1.fi test-ca/index.txt | tail -1 >> index.txt.new
178 mv index.txt.new index.txt
182 SERIAL=`grep CN=server.w1.fi test-ca/index.txt | tail -1 | cut -f4`
/hostap-latest/wpa_supplicant/examples/
Dwps-nfc.py32 def summary(txt): argument
33 print(txt)
36 f.write(txt + "\n")
38 def success_report(txt): argument
39 summary(txt)
42 f.write(txt + "\n")
Dp2p-nfc.py39 def summary(txt): argument
40 print(txt)
43 f.write(txt + "\n")
45 def success_report(txt): argument
46 summary(txt)
49 f.write(txt + "\n")
/hostap-latest/src/tls/
Dpkcs1.c295 char txt[100], txt2[100]; in pkcs1_v15_sig_ver() local
296 asn1_oid_to_str(&oid, txt, sizeof(txt)); in pkcs1_v15_sig_ver()
300 txt, txt2); in pkcs1_v15_sig_ver()
/hostap-latest/radius_example/
Dradius_example.c25 int level, const char *txt, size_t len) in hostapd_logger_cb() argument
27 printf("%s\n", txt); in hostapd_logger_cb()

12345