/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | tncs.c | 961 static struct tnc_if_imv * tncs_parse_imv(int id, char *start, char *end, argument 967 if (id >= TNC_MAX_IMV_ID) { 978 imv->imvID = id; 1024 int id = 0; local 1046 imv = tncs_parse_imv(id++, pos + 4, line_end, &error);
|
/external/wpa_supplicant_8/hostapd/src/eapol_supp/ |
H A D | eapol_supp_sm.c | 1971 static void eapol_sm_set_anon_id(void *ctx, const u8 *id, size_t len) argument 1976 sm->ctx->set_anon_id(sm->ctx->ctx, id, len);
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p.c | 617 u8 id, len; local 625 id = *pos++; 631 if (id != WLAN_EID_VENDOR_SPECIFIC || len < 3) 4839 p2p_dbg(p2p, "NFC OOB Password (id=%u) authorized for static handover",
|
H A D | p2p_group.c | 300 u8 id; local 303 id = *pos++; 309 switch (id) {
|
H A D | p2p_parse.c | 18 static int p2p_parse_attribute(u8 id, const u8 *data, u16 len, argument 25 switch (id) { 286 "(length %d)", id, len);
|
/external/wpa_supplicant_8/hostapd/src/pae/ |
H A D | ieee802_1x_kay_i.h | 150 u8 id[CS_ID_LEN]; member in struct:macsec_ciphersuite 393 * for other cipher suite: octet 9-16: cipher suite id, octet 17-: SAK
|
/external/wpa_supplicant_8/hostapd/src/radius/ |
H A D | radius_client.c | 359 HOSTAPD_LEVEL_DEBUG, "Resending RADIUS message (id=%d)", 795 "id=%d) - dropping packet", 844 "(type=%d code=%d id=%d)%s - dropping packet", 866 u8 id = radius->next_radius_identifier++; local 868 /* remove entries with matching id from retransmit list to avoid 873 if (radius_msg_get_hdr(entry->msg)->identifier == id) { 878 "since its id (%d) is reused", id); 894 return id;
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | x509v3.c | 182 struct x509_algorithm_identifier *id, const u8 **next) 210 if (asn1_get_oid(pos, end - pos, &id->oid, &pos)) 380 /* id-at ::= 2.5.4 */ 716 /* id-ce arc from X.509 for standard X.509v3 extensions */ 720 oid->oid[2] == 29 /* id-ce */; 966 * type-id OBJECT IDENTIFIER, 967 * value [0] EXPLICIT ANY DEFINED BY type-id } 1092 case 15: /* id-ce-keyUsage */ 1094 case 17: /* id-ce-subjectAltName */ 1096 case 18: /* id 180 x509_parse_algorithm_identifier( const u8 *buf, size_t len, struct x509_algorithm_identifier *id, const u8 **next) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | http_curl.c | 915 "id-wfa-hotspot-friendlyName: %s", 920 "id-wfa-hotspot-friendlyName", 1040 OCSP_CERTID *id; local 1142 id = OCSP_cert_to_id(NULL, ctx->peer_cert, ctx->peer_issuer); 1143 if (!id) { 1151 if (!OCSP_resp_find_status(basic, id, &status, &reason, &produced_at,
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | ndef.c | 24 const u8 *id; member in struct:ndef_record 64 record->id = record->id_length == 0 ? NULL : pos; 101 u8 type_length, void *id, 143 wpabuf_put_data(record, id, id_length); 100 ndef_build_record(u8 flags, void *type, u8 type_length, void *id, u8 id_length, const struct wpabuf *payload) argument
|
H A D | wps_attr_build.c | 138 int wps_build_dev_password_id(struct wpabuf *msg, u16 id) argument 140 wpa_printf(MSG_DEBUG, "WPS: * Device Password ID (%d)", id); 143 wpabuf_put_be16(msg, id);
|
H A D | wps_attr_parse.c | 21 u8 id, u8 len, const u8 *pos) 23 wpa_printf(MSG_EXCESSIVE, "WPS: WFA subelement id=%u len=%u", 24 id, len); 25 switch (id) { 72 "Extension subelement %u", id); 84 u8 id, elen; local 87 id = *pos++; 91 if (wps_set_vendor_ext_wfa_subelem(attr, id, elen, pos) < 0) 20 wps_set_vendor_ext_wfa_subelem(struct wps_parse_attr *attr, u8 id, u8 len, const u8 *pos) argument
|
H A D | wps_common.c | 618 struct wpabuf * wps_nfc_token_build(int ndef, int id, struct wpabuf *pubkey, argument 626 ret = wps_build_nfc_pw_token(id, pubkey, dev_pw); 665 struct wpabuf * wps_nfc_token_gen(int ndef, int *id, struct wpabuf **pubkey, argument 688 *id = 0x10 + val % 0xfff0; 692 return wps_nfc_token_build(ndef, *id, *pubkey, *dev_pw);
|
H A D | wps_enrollee.c | 863 u16 id; local 870 id = WPA_GET_BE16(dev_pw_id); 871 if (wps->dev_pw_id == id) { 872 wpa_printf(MSG_DEBUG, "WPS: Device Password ID %u", id); 877 if ((id == DEV_PW_DEFAULT && 879 (id == DEV_PW_REGISTRAR_SPECIFIED && 895 "ID from %u to %u", wps->dev_pw_id, id); 897 if (wps->dev_pw_id == DEV_PW_PUSHBUTTON && id == DEV_PW_DEFAULT) { 903 if (wps->alt_dev_password && wps->alt_dev_pw_id == id) {
|
H A D | wps_er.c | 116 static struct wps_er_ap * wps_er_ap_get_id(struct wps_er *er, unsigned int id) argument 120 if (ap->id == id) 463 ap->er->event_id, ap->id, 1800); 656 ap->id = ++er->next_ap_id; 1160 wpa_printf(MSG_DEBUG, "WPS ER: HTTP event from unknown AP id " 1165 wpa_printf(MSG_MSGDUMP, "WPS ER: HTTP event from AP id %u: %s", 1198 "unknown event id %u", event_id);
|
H A D | wps_er.h | 63 unsigned int id; member in struct:wps_er_ap
|
H A D | wps_registrar.c | 511 u16 id = reg->pbc ? DEV_PW_PUSHBUTTON : DEV_PW_DEFAULT; local 515 id = reg->sel_reg_dev_password_id_override; 516 wpa_printf(MSG_DEBUG, "WPS: * Device Password ID (%d)", id); 519 wpabuf_put_be16(msg, id); 527 u16 id = reg->pbc ? DEV_PW_PUSHBUTTON : DEV_PW_DEFAULT; local 531 id = reg->sel_reg_dev_password_id_override; 532 if (id != DEV_PW_PUSHBUTTON || !reg->dualband) 2589 wpa_printf(MSG_DEBUG, "WPS: Searching for NFC token match for id=%d (ctx %p registrar %p)", 3606 u16 id; local 3616 id [all...] |
/external/wpa_supplicant_8/hs20/client/ |
H A D | osu_client.c | 737 static void set_pps_cred_policy_spe(struct hs20_osu_client *ctx, int id, argument 750 if (set_cred_quoted(ctx->ifname, id, "excluded_ssid", txt) < 0) 756 static void set_pps_cred_policy_spel(struct hs20_osu_client *ctx, int id, argument 763 set_pps_cred_policy_spe(ctx, id, child); 768 static void set_pps_cred_policy_prp(struct hs20_osu_client *ctx, int id, argument 816 if (set_cred_quoted(ctx->ifname, id, "roaming_partner", val) < 0) 824 static void set_pps_cred_policy_prpl(struct hs20_osu_client *ctx, int id, argument 831 set_pps_cred_policy_prp(ctx, id, child); 836 static void set_pps_cred_policy_min_backhaul(struct hs20_osu_client *ctx, int id, argument 887 set_cred(ctx->ifname, id, "min_dl_bandwidth_hom 908 set_pps_cred_policy_min_backhaul_list(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 922 set_pps_cred_policy_update(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 930 set_pps_cred_policy_required_proto_port(struct hs20_osu_client *ctx, int id, xml_node_t *tuple) argument 980 set_pps_cred_policy_required_proto_ports(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 994 set_pps_cred_policy_max_bss_load(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1007 set_pps_cred_policy(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1036 set_pps_cred_priority(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1049 set_pps_cred_aaa_server_trust_root(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1056 set_pps_cred_sub_update(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1064 set_pps_cred_home_sp_network_id(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1095 set_pps_cred_home_sp_network_ids(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1109 set_pps_cred_home_sp_friendly_name(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1121 set_pps_cred_home_sp_icon_url(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1133 set_pps_cred_home_sp_fqdn(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1148 set_pps_cred_home_sp_oi(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1199 set_pps_cred_home_sp_oi_list(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1213 set_pps_cred_home_sp_other_partner(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1244 set_pps_cred_home_sp_other_partners(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1259 set_pps_cred_home_sp_roaming_consortium_oi( struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1271 set_pps_cred_home_sp(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1303 set_pps_cred_sub_params(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1311 set_pps_cred_creation_date(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1323 set_pps_cred_expiration_date(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1335 set_pps_cred_username(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1349 set_pps_cred_password(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1380 set_pps_cred_machine_managed(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1393 set_pps_cred_soft_token_app(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1406 set_pps_cred_able_to_share(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1419 set_pps_cred_eap_method(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1426 set_pps_cred_username_password(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1456 set_pps_cred_digital_cert(struct hs20_osu_client *ctx, int id, xml_node_t *node, const char *fqdn) argument 1487 set_pps_cred_realm(struct hs20_osu_client *ctx, int id, xml_node_t *node, const char *fqdn, int sim) argument 1515 set_pps_cred_check_aaa_cert_status(struct hs20_osu_client *ctx, int id, xml_node_t *node) argument 1531 set_pps_cred_sim(struct hs20_osu_client *ctx, int id, xml_node_t *sim, xml_node_t *realm) argument 1621 set_pps_cred_credential(struct hs20_osu_client *ctx, int id, xml_node_t *node, const char *fqdn) argument 1656 set_pps_credential(struct hs20_osu_client *ctx, int id, xml_node_t *cred, const char *fqdn) argument 1691 int id; local 1850 int id; member in struct:osu_icon 2005 int id; local [all...] |
H A D | spp_client.c | 511 char *id = strdup(session_id); local 513 if (id == NULL) 527 free(id); 538 free(id); 547 id); 549 *ret_node = hs20_spp_user_input_completed(ctx, id); 550 free(id); 556 ctx, id, "Error occurred", "Other"); 557 free(id); 566 *ret_node = hs20_spp_upload_mo(ctx, cmd, id, [all...] |
/external/wpa_supplicant_8/hs20/server/www/ |
H A D | add-free.php | 10 if (isset($_POST["id"])) 11 $id = preg_replace("/[^a-fA-F0-9]/", "", $_POST["id"]); variable 13 die("Missing session id"); 14 if (strlen($id) < 32) 15 die("Invalid session id"); 17 $row = $db->query("SELECT rowid,* FROM sessions WHERE id='$id'")->fetch(); 44 "VALUES ('$user', '$realm', '$id', " .
|
H A D | add-mo.php | 10 if (isset($_POST["id"])) 11 $id = preg_replace("/[^a-fA-F0-9]/", "", $_POST["id"]); variable 13 die("Missing session id"); 17 if (strlen($id) < 32 || !isset($user) || !isset($pw)) { 23 echo "<a href=\"signup.php?session_id=$id\">Try again</a>\n"; 28 $row = $db->query("SELECT rowid,* FROM sessions WHERE id='$id'")->fetch(); 37 echo "<a href=\"signup.php?session_id=$id\">Try again</a>\n"; 50 "VALUES ('$user', '$realm', '$id', " [all...] |
H A D | cert-enroll.php | 10 if (isset($_GET["id"])) 11 $id = preg_replace("/[^a-fA-F0-9]/", "", $_GET["id"]); variable 13 die("Missing session id"); 14 if (strlen($id) < 32) 15 die("Invalid session id"); 17 $row = $db->query("SELECT rowid,* FROM sessions WHERE id='$id'")->fetch(); 33 "VALUES ('', '$realm', '$id', " .
|
H A D | free.php | 9 $id = $_GET["session_id"]; variable 14 echo "<input type=\"hidden\" name=\"id\" value=\"$id\">\n";
|
H A D | redirect.php | 10 if (isset($_GET["id"])) 11 $id = preg_replace("/[^a-fA-F0-9]/", "", $_GET["id"]); variable 13 $id = 0; variable 15 $row = $db->query("SELECT rowid,* FROM sessions WHERE id='$id'")->fetch(); 28 "VALUES ('$user', '$realm', '$id', " .
|
H A D | signup.php | 9 $id = $_GET["session_id"]; variable 18 $row = $db->query("SELECT realm FROM sessions WHERE id='$id'")->fetch(); 28 echo "<p><a href=\"free.php?session_id=$id\">Sign up for free access</a></p>\n"; 32 echo "<input type=\"hidden\" name=\"id\" value=\"$id\">\n"; 42 echo "<p><a href=\"cert-enroll.php?id=$id\">Enroll a client certificate</a></p>\n"
|