Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching refs:cred

143 					 const struct wps_credential *cred)
164 bss = wpa_bss_get(wpa_s, cred->mac_addr, ssid->ssid, ssid->ssid_len);
223 const struct wps_credential *cred)
234 wpa_s->conf->wps_cred_processing == 2) && cred->cred_attr) {
235 size_t blen = cred->cred_attr_len * 2 + 1;
239 cred->cred_attr, cred->cred_attr_len);
245 wpas_notify_wps_credential(wpa_s, cred);
250 cred->cred_attr, cred->cred_attr_len);
255 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", cred->ssid, cred->ssid_len);
257 cred->auth_type);
258 wpa_printf(MSG_DEBUG, "WPS: Encryption Type 0x%x", cred->encr_type);
259 wpa_printf(MSG_DEBUG, "WPS: Network Key Index %d", cred->key_idx);
261 cred->key, cred->key_len);
263 MAC2STR(cred->mac_addr));
265 auth_type = cred->auth_type;
283 if (cred->key_len < 8 || cred->key_len > 2 * PMK_LEN) {
286 (unsigned long) cred->key_len);
327 ssid->ssid = os_malloc(cred->ssid_len);
329 os_memcpy(ssid->ssid, cred->ssid, cred->ssid_len);
330 ssid->ssid_len = cred->ssid_len;
333 switch (cred->encr_type) {
337 if (cred->key_len <= 0)
339 if (cred->key_len != 5 && cred->key_len != 13 &&
340 cred->key_len != 10 && cred->key_len != 26) {
342 "%lu", (unsigned long) cred->key_len);
345 if (cred->key_idx > NUM_WEP_KEYS) {
347 cred->key_idx);
350 if (cred->key_idx)
351 key_idx = cred->key_idx - 1;
352 if (cred->key_len == 10 || cred->key_len == 26) {
353 if (hexstr2bin((char *) cred->key,
355 cred->key_len / 2) < 0) {
360 ssid->wep_key_len[key_idx] = cred->key_len / 2;
362 os_memcpy(ssid->wep_key[key_idx], cred->key,
363 cred->key_len);
364 ssid->wep_key_len[key_idx] = cred->key_len;
410 if (cred->key_len == 2 * PMK_LEN) {
411 if (hexstr2bin((const char *) cred->key, ssid->psk,
419 } else if (cred->key_len >= 8 && cred->key_len < 2 * PMK_LEN) {
421 ssid->passphrase = os_malloc(cred->key_len + 1);
424 os_memcpy(ssid->passphrase, cred->key, cred->key_len);
425 ssid->passphrase[cred->key_len] = '\0';
431 (unsigned long) cred->key_len);
436 wpas_wps_security_workaround(wpa_s, ssid, cred);
438 if (cred->ap_channel)
439 wpa_s->wps_ap_channel = cred->ap_channel;
666 const struct wps_credential *cred = ap_settings->cred;
669 if (cred->auth_type & (WPS_AUTH_WPAPSK | WPS_AUTH_WPA2PSK)) {
670 if (cred->key_len >= 8 && cred->key_len <= 64) {
671 os_memcpy(key_str, cred->key, cred->key_len);
672 key_str[cred->key_len] = '\0';
681 uuid_str, wpa_ssid_txt(cred->ssid, cred->ssid_len),
682 cred->auth_type, cred->encr_type, key_str);
1660 struct wps_credential *cred)
1662 os_memset(cred, 0, sizeof(*cred));
1665 os_memcpy(cred->ssid, ssid->ssid, ssid->ssid_len);
1666 cred->ssid_len = ssid->ssid_len;
1668 cred->auth_type = (ssid->proto & WPA_PROTO_RSN) ?
1671 cred->encr_type = WPS_ENCR_AES;
1673 cred->encr_type = WPS_ENCR_TKIP;
1675 cred->key_len = os_strlen(ssid->passphrase);
1676 if (cred->key_len >= 64)
1678 os_memcpy(cred->key, ssid->passphrase, cred->key_len);
1680 cred->key_len = 32;
1681 os_memcpy(cred->key, ssid->psk, 32);
1685 cred->auth_type = WPS_AUTH_OPEN;
1686 cred->encr_type = WPS_ENCR_NONE;
1699 struct wps_credential cred;
1711 if (wpas_wps_network_to_cred(ssid, &cred) < 0)
1713 return wps_er_set_config(wpa_s->wps_er, use_uuid, use_addr, &cred);
1722 struct wps_credential cred;
1735 os_memset(&cred, 0, sizeof(cred));
1737 if ((len & 1) || len > 2 * sizeof(cred.ssid) ||
1738 hexstr2bin(settings->ssid_hex, cred.ssid, len / 2))
1740 cred.ssid_len = len / 2;
1743 if ((len & 1) || len > 2 * sizeof(cred.key) ||
1744 hexstr2bin(settings->key_hex, cred.key, len / 2))
1746 cred.key_len = len / 2;
1749 cred.auth_type = WPS_AUTH_OPEN;
1751 cred.auth_type = WPS_AUTH_WPAPSK;
1753 cred.auth_type = WPS_AUTH_WPA2PSK;
1758 cred.encr_type = WPS_ENCR_NONE;
1760 cred.encr_type = WPS_ENCR_WEP;
1762 cred.encr_type = WPS_ENCR_TKIP;
1764 cred.encr_type = WPS_ENCR_AES;
1769 (const u8 *) pin, os_strlen(pin), &cred);
1905 struct wps_credential cred;
1907 if (wpas_wps_network_to_cred(ssid, &cred) < 0)
1910 ret = wps_er_config_token_from_cred(wpa_s->wps, &cred);