Lines Matching full:pps

227 	wpa_printf(MSG_INFO, "PPS for certificate credential - fqdn=%s", fqdn);  in process_est_cert()
234 write_result(ctx, "Invalid client certificate SHA256 hash value in PPS"); in process_est_cert()
254 wpa_printf(MSG_INFO, "Client certificate from EST does not match fingerprint from PPS MO"); in process_est_cert()
255 write_result(ctx, "Client certificate from EST does not match fingerprint from PPS MO"); in process_est_cert()
259 wpa_printf(MSG_INFO, "Client certificate from EST matches PPS MO"); in process_est_cert()
398 xml_node_t *pps, *node; in cmd_dl_osu_ca() local
401 pps = node_from_file(ctx->xml, pps_fname); in cmd_dl_osu_ca()
402 if (pps == NULL) { in cmd_dl_osu_ca()
407 node = get_child_node(ctx->xml, pps, in cmd_dl_osu_ca()
410 wpa_printf(MSG_INFO, "No SubscriptionUpdate/TrustRoot/CertURL found from PPS"); in cmd_dl_osu_ca()
411 xml_node_free(ctx->xml, pps); in cmd_dl_osu_ca()
416 xml_node_free(ctx->xml, pps); in cmd_dl_osu_ca()
425 xml_node_t *pps, *node; in cmd_dl_polupd_ca() local
428 pps = node_from_file(ctx->xml, pps_fname); in cmd_dl_polupd_ca()
429 if (pps == NULL) { in cmd_dl_polupd_ca()
434 node = get_child_node(ctx->xml, pps, in cmd_dl_polupd_ca()
437 wpa_printf(MSG_INFO, "No Policy/PolicyUpdate/TrustRoot/CertURL found from PPS"); in cmd_dl_polupd_ca()
438 xml_node_free(ctx->xml, pps); in cmd_dl_polupd_ca()
443 xml_node_free(ctx->xml, pps); in cmd_dl_polupd_ca()
452 xml_node_t *pps, *node, *aaa; in cmd_dl_aaa_ca() local
455 pps = node_from_file(ctx->xml, pps_fname); in cmd_dl_aaa_ca()
456 if (pps == NULL) { in cmd_dl_aaa_ca()
461 node = get_child_node(ctx->xml, pps, in cmd_dl_aaa_ca()
464 wpa_printf(MSG_INFO, "No AAAServerTrustRoot/CertURL found from PPS"); in cmd_dl_aaa_ca()
465 xml_node_free(ctx->xml, pps); in cmd_dl_aaa_ca()
471 wpa_printf(MSG_INFO, "No AAAServerTrustRoot/CertURL found from PPS"); in cmd_dl_aaa_ca()
472 xml_node_free(ctx->xml, pps); in cmd_dl_aaa_ca()
477 xml_node_free(ctx->xml, pps); in cmd_dl_aaa_ca()
562 wpa_printf(MSG_INFO, "Unsupported location for addMO to add PPS MO: '%s'", in hs20_add_pps_mo()
564 write_result(ctx, "Unsupported location for addMO to add PPS MO: '%s'", in hs20_add_pps_mo()
575 wpa_printf(MSG_INFO, "Unsupported location for addMO to add PPS MO (extra directory): '%s'", in hs20_add_pps_mo()
578 "add PPS MO (extra directory): '%s'", uri); in hs20_add_pps_mo()
582 *pos = '\0'; /* remove trailing slash and PPS node name */ in hs20_add_pps_mo()
588 "FQDN '%s' for new PPS MO did not have suffix match with server's dNSName values, count: %d", in hs20_add_pps_mo()
590 …write_result(ctx, "FQDN '%s' for new PPS MO did not have suffix match with server's dNSName values… in hs20_add_pps_mo()
618 snprintf(fname, fname_len, "SP/%s/pps.xml", fqdn); in hs20_add_pps_mo()
621 wpa_printf(MSG_INFO, "PPS file '%s' exists - reject addMO", in hs20_add_pps_mo()
623 write_result(ctx, "PPS file '%s' exists - reject addMO", in hs20_add_pps_mo()
628 wpa_printf(MSG_INFO, "Using PPS file: %s", fname); in hs20_add_pps_mo()
657 wpa_printf(MSG_INFO, "[hs20] Unexpected PPS MO root node name '%s'", in hs20_add_pps_mo()
680 wpa_printf(MSG_INFO, "A new PPS MO added as '%s'", fname); in hs20_add_pps_mo()
681 write_summary(ctx, "A new PPS MO added as '%s'", fname); in hs20_add_pps_mo()
685 wpa_printf(MSG_INFO, "Remove invalid PPS MO file"); in hs20_add_pps_mo()
686 write_summary(ctx, "Remove invalid PPS MO file"); in hs20_add_pps_mo()
695 xml_node_t *pps) in update_pps_file() argument
703 cert = get_child_node(ctx->xml, pps, in update_pps_file()
708 wpa_printf(MSG_INFO, "EST certificate update processing failed on PPS MO update"); in update_pps_file()
713 wpa_printf(MSG_INFO, "Updating PPS MO %s", pps_fname); in update_pps_file()
715 str = xml_node_to_str(ctx->xml, pps); in update_pps_file()
720 wpa_printf(MSG_MSGDUMP, "[hs20] Updated PPS: '%s'", str); in update_pps_file()
726 wpa_printf(MSG_INFO, "Could not write PPS"); in update_pps_file()
740 void get_user_pw(struct hs20_osu_client *ctx, xml_node_t *pps, in get_user_pw() argument
745 node = get_child_node(ctx->xml, pps, in get_user_pw()
750 node = get_child_node(ctx->xml, pps, in get_user_pw()
755 node = get_child_node(ctx->xml, pps, alt_loc); in get_user_pw()
1828 static void set_pps(struct hs20_osu_client *ctx, xml_node_t *pps, in set_pps() argument
1843 xml_node_for_each_child(ctx->xml, child, pps) { in set_pps()
1856 xml_node_for_each_child(ctx->xml, child, pps) { in set_pps()
1886 xml_node_t *pps; in cmd_set_pps() local
1890 pps = node_from_file(ctx->xml, pps_fname); in cmd_set_pps()
1891 if (pps == NULL) { in cmd_set_pps()
1908 wpa_printf(MSG_INFO, "Set PPS MO info to wpa_supplicant - SP FQDN %s", in cmd_set_pps()
1910 set_pps(ctx, pps, fqdn); in cmd_set_pps()
1913 xml_node_free(ctx->xml, pps); in cmd_set_pps()
1919 xml_node_t *pps, *node; in cmd_get_fqdn() local
1922 pps = node_from_file(ctx->xml, pps_fname); in cmd_get_fqdn()
1923 if (pps == NULL) { in cmd_get_fqdn()
1928 node = get_child_node(ctx->xml, pps, "HomeSP/FQDN"); in cmd_get_fqdn()
1932 xml_node_free(ctx->xml, pps); in cmd_get_fqdn()
1935 FILE *f = fopen("pps-fqdn", "w"); in cmd_get_fqdn()
2592 xml_node_t *pps, *node; in cmd_sub_rem() local
2609 wpa_printf(MSG_INFO, "Determining PPS file based on Home SP information"); in cmd_sub_rem()
2626 "SP/%s/pps.xml", ctx->fqdn); in cmd_sub_rem()
2635 wpa_printf(MSG_INFO, "PPS file '%s' does not exist or is not accessible", in cmd_sub_rem()
2639 wpa_printf(MSG_INFO, "Using PPS file: %s", pps_fname); in cmd_sub_rem()
2649 pps = node_from_file(ctx->xml, pps_fname); in cmd_sub_rem()
2650 if (pps == NULL) { in cmd_sub_rem()
2651 wpa_printf(MSG_INFO, "Could not read PPS MO"); in cmd_sub_rem()
2657 node = get_child_node(ctx->xml, pps, "HomeSP/FQDN"); in cmd_sub_rem()
2659 wpa_printf(MSG_INFO, "No HomeSP/FQDN found from PPS"); in cmd_sub_rem()
2664 wpa_printf(MSG_INFO, "No HomeSP/FQDN text found from PPS"); in cmd_sub_rem()
2675 node = get_child_node(ctx->xml, pps, in cmd_sub_rem()
2689 get_user_pw(ctx, pps, "SubscriptionUpdate/UsernamePassword", in cmd_sub_rem()
2697 get_child_node(ctx->xml, pps, "Credential/DigitalCertificate")) { in cmd_sub_rem()
2708 node = get_child_node(ctx->xml, pps, "SubscriptionUpdate/URI"); in cmd_sub_rem()
2713 wpa_printf(MSG_INFO, "Override sub rem URI based on PPS: %s", in cmd_sub_rem()
2733 cred_username, cred_password, pps); in cmd_sub_rem()
2737 cred_username, cred_password, pps); in cmd_sub_rem()
2742 xml_node_free(ctx->xml, pps); in cmd_sub_rem()
2750 xml_node_t *pps; in cmd_pol_upd() local
2769 wpa_printf(MSG_INFO, "Determining PPS file based on Home SP information"); in cmd_pol_upd()
2786 "SP/%s/pps.xml", ctx->fqdn); in cmd_pol_upd()
2800 wpa_printf(MSG_INFO, "PPS file '%s' does not exist or is not accessible", in cmd_pol_upd()
2804 wpa_printf(MSG_INFO, "Using PPS file: %s", pps_fname); in cmd_pol_upd()
2814 pps = node_from_file(ctx->xml, pps_fname); in cmd_pol_upd()
2815 if (pps == NULL) { in cmd_pol_upd()
2816 wpa_printf(MSG_INFO, "Could not read PPS MO"); in cmd_pol_upd()
2822 node = get_child_node(ctx->xml, pps, "HomeSP/FQDN"); in cmd_pol_upd()
2824 wpa_printf(MSG_INFO, "No HomeSP/FQDN found from PPS"); in cmd_pol_upd()
2829 wpa_printf(MSG_INFO, "No HomeSP/FQDN text found from PPS"); in cmd_pol_upd()
2840 node = get_child_node(ctx->xml, pps, in cmd_pol_upd()
2854 get_user_pw(ctx, pps, "Policy/PolicyUpdate/UsernamePassword", in cmd_pol_upd()
2862 get_child_node(ctx->xml, pps, "Credential/DigitalCertificate")) { in cmd_pol_upd()
2873 node = get_child_node(ctx->xml, pps, "Policy/PolicyUpdate/URI"); in cmd_pol_upd()
2876 wpa_printf(MSG_INFO, "URI based on PPS: %s", uri); in cmd_pol_upd()
2888 cred_username, cred_password, pps); in cmd_pol_upd()
2892 cred_username, cred_password, pps); in cmd_pol_upd()
2897 xml_node_free(ctx->xml, pps); in cmd_pol_upd()
3212 "- pol_upd [Server URL] [PPS] [CA cert]\n" in usage()
3213 "- sub_rem <Server URL> [PPS] [CA cert]\n" in usage()
3219 "- dl_osu_ca <PPS> <CA file>\n" in usage()
3220 "- dl_polupd_ca <PPS> <CA file>\n" in usage()
3221 "- dl_aaa_ca <PPS> <CA file>\n" in usage()