Lines Matching defs:info
787 void dpp_bootstrap_info_free(struct dpp_bootstrap_info *info)
789 if (!info)
791 os_free(info->uri);
792 os_free(info->info);
793 EVP_PKEY_free(info->pubkey);
794 os_free(info);
810 static int dpp_uri_valid_info(const char *info)
812 while (*info) {
813 unsigned char val = *info++;
898 int dpp_parse_uri_info(struct dpp_bootstrap_info *bi, const char *info)
902 if (!info)
905 end = os_strchr(info, ';');
907 end = info + os_strlen(info);
908 bi->info = os_malloc(end - info + 1);
909 if (!bi->info)
911 os_memcpy(bi->info, info, end - info);
912 bi->info[end - info] = '\0';
913 wpa_printf(MSG_DEBUG, "DPP: URI(information): %s", bi->info);
914 if (!dpp_uri_valid_info(bi->info)) {
953 static int dpp_parse_uri_pk(struct dpp_bootstrap_info *bi, const char *info)
978 end = os_strchr(info, ';');
982 data = base64_decode((const unsigned char *) info, end - info,
1097 const char *chan_list = NULL, *mac = NULL, *info = NULL, *pk = NULL;
1124 else if (pos[0] == 'I' && pos[1] == ':' && !info)
1125 info = pos + 2;
1147 dpp_parse_uri_info(bi, info) < 0 ||
1523 const char *info = "first intermediate key";
1535 /* HKDF-Expand(PRK, info, L) */
1536 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k1, hash_len);
1541 wpa_hexdump_key(MSG_DEBUG, "DPP: k1 = HKDF-Expand(PRK, info, L)",
1551 const char *info = "second intermediate key";
1564 /* HKDF-Expand(PRK, info, L) */
1565 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k2, hash_len);
1570 wpa_hexdump_key(MSG_DEBUG, "DPP: k2 = HKDF-Expand(PRK, info, L)",
1623 /* HKDF-Expand(PRK, info, L) */
1629 wpa_hexdump_key(MSG_DEBUG, "DPP: ke = HKDF-Expand(PRK, info, L)",
2205 "DPP: Auto-generated own bootstrapping key info: URI %s",
3291 "DPP: Mutual authentication required with QR Codes, but peer info is not yet available - request more time");
5555 dpp_process_signed_connector(struct dpp_signed_connector_info *info,
5586 os_memset(info, 0, sizeof(*info));
5628 info->payload = base64_url_decode((const unsigned char *) pos,
5629 end - pos, &info->payload_len);
5630 if (!info->payload) {
5638 info->payload, info->payload_len);
5723 struct dpp_signed_connector_info info;
5730 os_memset(&info, 0, sizeof(info));
5770 if (dpp_process_signed_connector(&info, csign_pub,
5774 if (dpp_parse_connector(auth, info.payload, info.payload_len) < 0) {
5788 os_free(info.payload);
6380 const char *info = "DPP PMK";
6392 /* HKDF-Expand(PRK, info, L) */
6393 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, pmk, hash_len);
6398 wpa_hexdump_key(MSG_DEBUG, "DPP: PMK = HKDF-Expand(PRK, info, L)",
6457 struct dpp_signed_connector_info info;
6468 os_memset(&info, 0, sizeof(info));
6520 res = dpp_process_signed_connector(&info, csign, signed_connector);
6526 root = json_parse((const char *) info.payload, info.payload_len);
6603 os_free(info.payload);
7176 u8 *info, *pos;
7189 info = os_malloc(info_len);
7190 if (!info)
7192 pos = info;
7203 /* HKDF-Expand(PRK, info, L) */
7205 res = hmac_sha256_kdf(prk, hash_len, NULL, info, info_len,
7208 res = hmac_sha384_kdf(prk, hash_len, NULL, info, info_len,
7211 res = hmac_sha512_kdf(prk, hash_len, NULL, info, info_len,
7215 os_free(info);
7220 wpa_hexdump_key(MSG_DEBUG, "DPP: z = HKDF-Expand(PRK, info, L)",
7495 /* {A, u, [bootstrapping info]}z */
7796 /* {B, v [bootstrapping info]}z */
8403 char *chan = NULL, *mac = NULL, *info = NULL, *pk = NULL, *curve = NULL;
8427 info = get_param(cmd, " info=");
8454 if (info) {
8455 if (dpp_parse_uri_info(bi, info) < 0)
8457 len += 3 + os_strlen(info); /* I:...; */
8466 info ? "I:" : "", info ? info : "", info ? ";" : "",
8477 os_free(info);
8568 "info=%s\n"
8574 bi->info ? bi->info : "",