Lines Matching refs:request
50 dev[0].request("ROAM " + bssid2)
64 dev[0].request("ROAM " + bssid)
78 if "FAIL" in dev[0].request("PMKSA_FLUSH"):
109 dev[0].request("ROAM " + bssid2)
118 dev[0].request("ROAM " + bssid)
127 hapd.request("EAPOL_REAUTH " + dev[0].own_addr())
160 dev[0].request("ROAM " + bssid2)
169 dev[0].request("ROAM " + bssid)
203 dev[0].request("ROAM " + bssid2)
217 dev[0].request("ROAM " + bssid)
252 dev[0].request("ROAM " + bssid2)
266 dev[0].request("ROAM " + bssid)
304 wpas.request("ROAM " + bssid2)
318 wpas.request("ROAM " + bssid)
337 dev[0].request("SET dot11RSNAConfigPMKLifetime 10")
364 dev[0].request("SET dot11RSNAConfigPMKLifetime 2")
365 dev[0].request("SET dot11RSNAConfigPMKReauthThreshold 100")
373 hapd.request("SET auth_server_shared_secret incorrect")
381 hapd.request("SET auth_server_shared_secret radius")
411 dev[0].request("DISCONNECT")
413 dev[0].request("RECONNECT")
427 dev[0].request("REAUTHENTICATE")
509 status = dev[0].request("STATUS")
524 if "[WPA2-EAP-CCMP-preauth]" not in dev[0].request("SCAN_RESULTS"):
526 dev[0].request("ROAM " + bssid1)
549 dev[0].request("DISCONNECT")
550 hapd.request("DISABLE")
644 dev[0].request("ROAM " + bssid2)
653 dev[0].request("ROAM " + bssid)
681 dev[0].request("DISCONNECT")
692 dev[0].request("RECONNECT")
753 if "OK" not in sta.request("ROAM " + bssid2):
766 sta.request("ROAM " + bssid)
777 sta.request("ROAM " + bssid2)
805 if "OK" not in sta.request("ROAM " + bssid2):
822 sta.request("ROAM " + bssid)
861 hapd.request("DEAUTHENTICATE ff:ff:ff:ff:ff:ff")
864 if "OK" not in dev[0].request("PREAUTH " + bssid1):
875 state = hapd.request('GET_ALLOC_FAIL')
882 dev[0].request("PMKSA_FLUSH")
914 dev[0].request("BSS_FLUSH 0")
918 dev[0].request("DISCONNECT")
921 entries = len(dev[0].request("PMKSA").splitlines()) - 1
937 dev[0].request("SET dot11RSNAConfigSATimeout 60")
940 dev[0].request("SET dot11RSNAConfigSATimeout 1")
946 if "OK" not in dev[0].request("PREAUTH f2:11:22:33:44:55"):
963 res = dev[0].request("PREAUTH f2:11:22:33:44:55").strip()
966 state = dev[0].request('GET_ALLOC_FAIL')
993 if "OK" not in hapd.request("PMKSA_FLUSH"):
999 dev[0].request("DISCONNECT")
1001 dev[0].request("RECONNECT")
1037 dev[0].request("PMKSA_FLUSH")
1042 dev[0].request("DISCONNECT")
1060 res1 = dev[0].request("PMKSA_GET %d" % id)
1070 dev[0].request("ROAM " + bssid2)
1073 res2 = dev[0].request("PMKSA_GET %d" % id)
1080 dev[0].request("REMOVE_NETWORK all")
1082 dev[0].request("PMKSA_FLUSH")
1088 res3 = dev[0].request("PMKSA_GET %d" % id)
1091 res4 = dev[0].request("PMKSA_GET %d" % (id + 1234))
1096 if "OK" not in dev[0].request("PMKSA_ADD %d %s" % (id, entry)):
1123 res1 = dev[0].request("PMKSA_GET %d" % id)
1130 dev[0].request("REMOVE_NETWORK all")
1133 dev[0].request("PMKSA_FLUSH")
1141 res3 = dev[0].request("PMKSA_GET %d" % id)
1146 if "OK" not in dev[0].request("PMKSA_ADD %d %s" % (id, entry)):
1157 dev[0].request("DISCONNECT")
1160 dev[0].request("PMKSA_FLUSH")
1166 if "OK" not in dev[0].request("PMKSA_ADD %d %s" % (id, entry)):
1243 hapd.request("DISABLE")
1251 if "FAIL" not in hapd.request("ENABLE"):
1255 if "FAIL" not in hapd.request("ENABLE"):
1258 if "OK" not in hapd.request("ENABLE"):