Lines Matching defs:token

4982 	struct json_token *root = NULL, *token;
5054 token = json_get_member(root, "name");
5055 if (!token || token->type != JSON_STRING) {
5059 wpa_printf(MSG_DEBUG, "DPP: Enrollee name = '%s'", token->string);
5061 token = json_get_member(root, "wi-fi_tech");
5062 if (!token || token->type != JSON_STRING) {
5066 wpa_printf(MSG_DEBUG, "DPP: wi-fi_tech = '%s'", token->string);
5067 if (os_strcmp(token->string, "infra") != 0) {
5069 token->string);
5074 token = json_get_member(root, "netRole");
5075 if (!token || token->type != JSON_STRING) {
5079 wpa_printf(MSG_DEBUG, "DPP: netRole = '%s'", token->string);
5080 if (os_strcmp(token->string, "sta") == 0) {
5082 } else if (os_strcmp(token->string, "ap") == 0) {
5086 token->string);
5105 struct json_token *root, *token;
5121 token = json_get_member(root, "typ");
5122 if (!token || token->type != JSON_STRING) {
5127 token->string);
5128 if (os_strcmp(token->string, "dppCon") != 0) {
5131 token->string);
5135 token = json_get_member(root, "alg");
5136 if (!token || token->type != JSON_STRING) {
5141 token->string);
5142 if (os_strcmp(token->string, curve->jws_alg) != 0) {
5145 token->string, curve->jws_alg);
5148 if (os_strcmp(token->string, "ES256") == 0 ||
5149 os_strcmp(token->string, "BS256") == 0)
5151 else if (os_strcmp(token->string, "ES384") == 0 ||
5152 os_strcmp(token->string, "BS384") == 0)
5154 else if (os_strcmp(token->string, "ES512") == 0 ||
5155 os_strcmp(token->string, "BS512") == 0)
5162 token->string);
5230 struct json_token *token;
5236 token = json_get_member(jwk, "kty");
5237 if (!token || token->type != JSON_STRING) {
5241 if (os_strcmp(token->string, "EC") != 0) {
5243 token->string);
5247 token = json_get_member(jwk, "crv");
5248 if (!token || token->type != JSON_STRING) {
5252 curve = dpp_get_curve_jwk_crv(token->string);
5255 token->string);
5389 struct json_token *root, *groups, *netkey, *token;
5406 for (token = groups->child; token; token = token->sibling) {
5409 id = json_get_member(token, "groupId");
5415 role = json_get_member(token, "netRole");
5433 token = json_get_member(root, "expiry");
5434 if (!token || token->type != JSON_STRING) {
5438 wpa_printf(MSG_DEBUG, "DPP: expiry = %s", token->string);
5439 if (dpp_key_expired(token->string,
5724 struct json_token *token, *csign;
5754 token = json_get_member(cred, "signedConnector");
5755 if (!token || token->type != JSON_STRING) {
5760 token->string, os_strlen(token->string));
5761 signed_connector = token->string;
5836 struct json_token *root, *token, *discovery, *cred;
5846 token = json_get_member(root, "wi-fi_tech");
5847 if (!token || token->type != JSON_STRING) {
5851 if (os_strcmp(token->string, "infra") != 0) {
5853 token->string);
5864 token = json_get_member(discovery, "ssid");
5865 if (!token || token->type != JSON_STRING) {
5870 token->string, os_strlen(token->string));
5871 if (os_strlen(token->string) > SSID_MAX_LEN) {
5875 auth->ssid_len = os_strlen(token->string);
5876 os_memcpy(auth->ssid, token->string, auth->ssid_len);
5884 token = json_get_member(cred, "akm");
5885 if (!token || token->type != JSON_STRING) {
5889 auth->akm = dpp_akm_from_str(token->string);
5899 token->string);
6304 struct json_token *groups, *token;
6310 for (token = groups->child; token; token = token->sibling) {
6313 id = json_get_member(token, "groupId");
6317 role = json_get_member(token, "netRole");
6337 struct json_token *groups, *token;
6345 for (token = groups->child; token; token = token->sibling) {
6348 id = json_get_member(token, "groupId");
6355 role = json_get_member(token, "netRole");
6451 struct json_token *root = NULL, *netkey, *token;
6540 token = json_get_member(root, "expiry");
6541 if (!token || token->type != JSON_STRING) {
6545 wpa_printf(MSG_DEBUG, "DPP: expiry = %s", token->string);
6546 if (dpp_key_expired(token->string, expiry)) {