Lines Matching refs:decode

86              "DPP:K:" + base64.b64encode(b"hello").decode() + ";;",
393 …d=%s pass=%s" % (binascii.hexlify(ssid.encode()).decode(), binascii.hexlify(passphrase.encode()).d…
924 … init_extra="conf=sta-psk pass=%s" % binascii.hexlify(b"passphrase").decode(),
940 ssid1h = binascii.hexlify(ssid1.encode()).decode()
941 pass1h = binascii.hexlify(pass1.encode()).decode()
942 ssid2h = binascii.hexlify(ssid2.encode()).decode()
943 pass2h = binascii.hexlify(pass2.encode()).decode()
994 ssid1h = binascii.hexlify(ssid1.encode()).decode()
995 ssid2h = binascii.hexlify(ssid2.encode()).decode()
996 pass2h = binascii.hexlify(pass2.encode()).decode()
1046 ssid1h = binascii.hexlify(ssid1.encode()).decode()
1047 pass1h = binascii.hexlify(pass1.encode()).decode()
1048 ssid2h = binascii.hexlify(ssid2.encode()).decode()
1049 pass2h = binascii.hexlify(pass2.encode()).decode()
1201 extra += binascii.hexlify(json.encode()).decode()
1266 conn = base64.urlsafe_b64encode(prot_hdr.encode()).decode().rstrip('=') + '.'
1267 conn += base64.urlsafe_b64encode(payload.encode()).decode().rstrip('=') + '.'
1515 logger.debug("sign=" + binascii.hexlify(sign).decode())
1528 logger.info("r=" + binascii.hexlify(r).decode())
1529 logger.info("s=" + binascii.hexlify(s).decode())
1531 return base64.urlsafe_b64encode(raw_sign).decode().rstrip('=')
1548 x = base64.urlsafe_b64encode(p256_pub_key_x).decode().rstrip('=')
1549 y = base64.urlsafe_b64encode(p256_pub_key_y).decode().rstrip('=')
1552 kid = base64.urlsafe_b64encode(hashlib.sha256(pubkey).digest()).decode().rstrip('=')
1561 conn = base64.urlsafe_b64encode(prot_hdr.encode()).decode().rstrip('=') + '.'
1562 conn += base64.urlsafe_b64encode(payload.encode()).decode().rstrip('=')
1670 msg['freq'], msg['datarate'], msg['ssi_signal'], binascii.hexlify(msg['frame']).decode())):
1676 msg['freq'], msg['datarate'], msg['ssi_signal'], binascii.hexlify(msg['frame']).decode())):
1684 msg['freq'], msg['datarate'], msg['ssi_signal'], binascii.hexlify(msg['frame']).decode())):
2055 hapd.set("sae_password", binascii.unhexlify(password).decode())
3225 …}".format(msg['freq'], msg['datarate'], msg['ssi_signal'], binascii.hexlify(msg['frame']).decode())
3303 action = binascii.hexlify(hdr).decode() + adv_proto + "0300" + "001001"
3322 action = binascii.hexlify(hdr).decode() + adv_proto + "0300" + "001001"
3328 action = binascii.hexlify(hdr).decode() + adv_proto + "0300" + "001001"
3346 action = binascii.hexlify(hdr).decode() + adv_proto + "0300" + "001001"
3352 action = binascii.hexlify(hdr).decode() + adv_proto + "0300" + "001001"
3357 action = binascii.hexlify(hdr).decode() + adv_proto + "0300" + "001001"
3375 action = binascii.hexlify(hdr).decode() + adv_proto + "0300" + "001001"
3381 action = binascii.hexlify(hdr).decode() + adv_proto + "0300" + "001001" + "ff"
3386 action = binascii.hexlify(hdr).decode() + adv_proto + "0300" + "001001"
3391 action = binascii.hexlify(hdr).decode() + adv_proto + "0300" + "0010"
3396 action = binascii.hexlify(hdr).decode() + adv_proto + "03"
3402 action = binascii.hexlify(hdr).decode() + adv_proto_broken + "0300" + "001001"
3408 action = binascii.hexlify(hdr).decode() + adv_proto_broken + "0300" + "001001"
3413 action = binascii.hexlify(hdr).decode()
3418 action = binascii.hexlify(hdr).decode()
3423 action = binascii.hexlify(hdr).decode() + adv_proto + "0300" + "001001"
3442 action = binascii.hexlify(hdr).decode() + adv_proto + "0300" + "001001"
3447 action = binascii.hexlify(hdr).decode() + adv_proto + "0300" + "001001"
4882 msg['freq'], msg['datarate'], msg['ssi_signal'], binascii.hexlify(msg['frame']).decode())):
5009 frame = binascii.hexlify(msg['frame']).decode()
5047 frame = frame.decode()
5052 frame = binascii.hexlify(msg['frame']).decode()
5058 frame = binascii.hexlify(msg['frame']).decode()
5065 frame = binascii.hexlify(msg['frame']).decode() + "00"
5095 frame1 = binascii.hexlify(frame[0:36]).decode()
5103 frame2 = binascii.hexlify(frame).decode() + "000000"
5169 " conf=sta-psk ssid=%s" % (binascii.hexlify(b"dpp-legacy").decode()))
5484 …R_SIGN conf=sta-psk pass=%s configurator=%d" % (binascii.hexlify(b"passphrase").decode(), conf_id)
5576 frame = binascii.hexlify(msg['frame']).decode()
5623 ….format(msg['freq'], msg['datarate'], msg['ssi_signal'], binascii.hexlify(msg['frame']).decode())):
5851 …T_RX_PROCESS freq=2462 datarate=0 ssi_signal=-30 frame=" + binascii.hexlify(msg['frame']).decode())
5854 …T_RX_PROCESS freq=2462 datarate=0 ssi_signal=-30 frame=" + binascii.hexlify(msg['frame']).decode())
6060 …uest("MGMT_RX_PROCESS freq=2412 datarate=0 ssi_signal=-30 frame=" + binascii.hexlify(tmp).decode())
7241 …onn_status=1" % (binascii.hexlify(ssid.encode()).decode(), binascii.hexlify(passphrase2.encode()).
7314 …TOR_SIGN conf=ap-dpp configurator=%d ssid=%s" % (conf_id, binascii.hexlify(ssid.encode()).decode())
7352 … "conf=sta-dpp configurator=%d ssid=%s" % (conf_id, binascii.hexlify(ssid.encode()).decode()))
7458 logger.info("CSR: " + binascii.hexlify(csr).decode())
7481 certbag = base64.b64encode(pkcs7_der).decode()
7614 logger.info("CSR: " + binascii.hexlify(csr).decode())
7627 certbag = base64.b64encode(pkcs7_der).decode()
7734 conf += " ssid=" + binascii.hexlify(ssid.encode()).decode()
7735 conf += " pass=" + binascii.hexlify(password.encode()).decode()
7760 …id=%s pass=%s" % (binascii.hexlify(ssid.encode()).decode(), binascii.hexlify(password.encode()).de…
7801 conf += " ssid=" + binascii.hexlify(ssid.encode()).decode()
7802 conf += " pass=" + binascii.hexlify(password.encode()).decode()
7835 conf += " ssid=" + binascii.hexlify(ssid.encode()).decode()
7836 conf += " pass=" + binascii.hexlify(password.encode()).decode()