/hostap-3.6.0/tests/hwsim/ |
D | test_connect_cmd.py | 24 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 25 wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") 26 wpas.connect("sta-connect", key_mgmt="NONE", scan_freq="2412", 28 wpas.dump_monitor() 29 wpas.request("DISCONNECT") 30 wpas.wait_disconnected() 31 wpas.dump_monitor() 35 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 36 wpas.interface_add("wlan5", drv_params="force_connect_cmd=1") 37 check_wep_capa(wpas) [all …]
|
D | test_sta_dynamic.py | 22 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 23 wpas.interface_add("wlan5") 25 wpas.connect("sta-dynamic", psk="12345678", scan_freq="2412") 33 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 34 wpas.interface_add("wlan5") 36 if "OK" not in wpas.request("AP_SCAN 0"): 39 id = wpas.connect("", key_mgmt="NONE", bssid=bssid, 41 wpas.request("ENABLE_NETWORK " + str(id) + " no-connect") 42 wpas.request("SCAN") 44 subprocess.call(['iw', wpas.ifname, 'connect', 'test', '2412']) [all …]
|
D | test_p2p_device.py | 22 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 23 wpas.interface_add(iface) 25 r_dev=wpas, r_intent=0) 27 wpas.dump_monitor() 28 remove_group(dev[0], wpas) 29 wpas.dump_monitor() 33 res = wpas.global_request("IFNAME=p2p-dev-" + iface + " STATUS-DRIVER") 50 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 51 wpas.interface_add(iface) 52 [i_res, r_res] = go_neg_pin_authorized(i_dev=wpas, i_intent=15, [all …]
|
D | test_wpas_config.py | 175 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 177 wpas.interface_add("wlan5", config=config) 200 wpas.interface_add("wlan5", config=config) 202 capa['mesh'] = "MESH" in wpas.get_capability("modes") 203 capa['sae'] = "SAE" in wpas.get_capability("auth_alg") 205 id = wpas.add_network() 206 wpas.set_network_quoted(id, "ssid", "foo") 207 wpas.set_network_quoted(id, "psk", "12345678") 208 wpas.set_network(id, "bssid", "00:11:22:33:44:55") 209 wpas.set_network(id, "proto", "RSN") [all …]
|
D | test_wext.py | 21 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 23 wpas.interface_add("wlan5", driver="wext") 25 wpas.close_ctrl() 27 return wpas 31 wpas = get_wext_interface() 36 wpas.connect("wext-open", key_mgmt="NONE") 37 hwsim_utils.test_connectivity(wpas, hapd) 41 wpas = get_wext_interface() 46 wpas.connect("wext-wpa2-psk", psk="12345678") 47 hwsim_utils.test_connectivity(wpas, hapd) [all …]
|
D | test_p2p_channel.py | 325 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 326 wpas.interface_add(iface) 328 wpas.global_request("SET p2p_no_group_iface 0") 330 if wpas.get_mcc() < 2: 336 wpas.global_request("P2P_SET disallow_freq 2412") 337 wpas.connect("bss-2.4ghz", key_mgmt="NONE", scan_freq="2412") 338 res = autogo(wpas) 341 hwsim_utils.test_connectivity(wpas, hapd) 343 wpas.global_request("P2P_SET disallow_freq ") 349 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') [all …]
|
D | test_monitor_interface.py | 20 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 21 wpas.interface_add("wlan5", drv_params="use_monitor=1") 22 id = wpas.add_network() 23 wpas.set_network(id, "mode", "2") 24 wpas.set_network_quoted(id, "ssid", "monitor-iface") 25 wpas.set_network(id, "key_mgmt", "NONE") 26 wpas.set_network(id, "frequency", "2412") 27 wpas.connect_network(id) 33 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 34 wpas.interface_add("wlan5", drv_params="use_monitor=1") [all …]
|
D | test_offchannel_tx.py | 21 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 22 wpas.interface_add("wlan5", drv_params="no_offchannel_tx=1") 23 wpas.flush_scan_cache() 24 wpas.scan_for_bss(bssid, freq=2412) 25 anqp_get(wpas, bssid, 263) 26 ev = wpas.wait_event(["GAS-QUERY-DONE"], timeout=10) 34 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 35 wpas.interface_add("wlan5", drv_params="no_offchannel_tx=1") 38 r_dev=wpas, r_freq=2412) 40 remove_group(dev[0], wpas) [all …]
|
D | test_p2p_discovery.py | 260 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 261 wpas.interface_add("wlan5") 262 wpas.request("P2P_LISTEN 1") 263 status = wpas.global_request("STATUS") 278 status = wpas.global_request("STATUS") 283 status = wpas.global_request("STATUS") 551 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 552 wpas.interface_add("wlan5") 553 addr1 = wpas.p2p_dev_addr() 555 if "OK" not in wpas.request("SET config_methods keypad virtual_push_button"): [all …]
|
D | test_p2p_autogo.py | 169 wpas = WpaSupplicant(ifname=iface) 170 ev = wpas.wait_event(["WPS-M2D"], timeout=10) 390 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 391 wpas.interface_add("wlan5") 392 res = autogo(wpas) 393 wpas.dump_monitor() 394 wpas.interface_remove("wlan5") 395 wpas.interface_add("wlan5") 396 res = autogo(wpas) 397 wpas.dump_monitor() [all …]
|
D | test_wpas_ap.py | 566 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 567 wpas.interface_add("wlan5") 568 wpas.request("SET manufacturer test") 569 wpas.request("SET model_name test") 570 wpas.request("SET model_number test") 571 wpas.request("SET serial_number test") 572 wpas.request("SET serial_number test") 573 wpas.request("SET serial_number test") 574 wpas.request("SET ap_vendor_elements dd0411223301") 575 id = wpas.add_network() [all …]
|
D | test_ap_pmf.py | 417 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 418 wpas.interface_add("wlan5", drv_params="use_monitor=1") 419 id = wpas.add_network() 420 wpas.set_network(id, "mode", "2") 421 wpas.set_network_quoted(id, "ssid", ssid) 422 wpas.set_network(id, "proto", "WPA2") 423 wpas.set_network(id, "key_mgmt", "WPA-PSK-SHA256") 424 wpas.set_network(id, "ieee80211w", "2") 425 wpas.set_network_quoted(id, "psk", "12345678") 426 wpas.set_network(id, "pairwise", "CCMP") [all …]
|
D | test_ap_roam.py | 149 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 150 wpas.interface_add("wlan5", 152 wpas.flush_scan_cache() 158 wpas.scan_for_bss(bssid0, freq=2412) 159 id = wpas.connect("test-wpa2-psk", psk="12345678", scan_freq="2412") 161 hwsim_utils.test_connectivity(wpas, hapd0) 166 wpas.request("BSSID_IGNORE " + bssid0) 168 wpas.scan_for_bss(bssid1, freq=2412) 169 wpas.request("DISCONNECT") 170 if "OK" not in wpas.request("SET ignore_auth_resp 1"): [all …]
|
D | test_fst_module.py | 2354 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 2355 wpas.interface_add("wlan5") 2356 fst_attach_sta(wpas, wpas.ifname, sgroup) 2358 wpas.interface_add("wlan6", set_ifname=False) 2360 fst_attach_sta(wpas, wpas2.ifname, sgroup) 2362 wpas.connect("fst_11a", key_mgmt="NONE", scan_freq="5180", 2364 wpas.wait_connected() 2366 fst_wait_event_peer_sta(wpas, "connected", wpas.ifname, apdev[0]['bssid']) 2368 wpas.own_addr()) 2374 fst_wait_event_peer_sta(wpas, "connected", wpas2.ifname, apdev[1]['bssid']) [all …]
|
D | test_wpas_ctrl.py | 1237 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 1238 wpas.interface_add("wlan5") 1239 if "OK" not in wpas.global_request("SUSPEND"): 1242 if "OK" not in wpas.global_request("RESUME"): 1244 if "OK" not in wpas.request("SUSPEND"): 1246 if "OK" not in wpas.request("RESUME"): 1248 ev = wpas.wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=10) 1254 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 1255 wpas.interface_add("wlan5") 1257 if "PONG" not in wpas.global_request("PING"): [all …]
|
D | test_pasn.py | 209 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 210 wpas.interface_add(iface) 212 if wpas.get_mcc() < 2: 219 wpas.connect("test-wpa2-psk", psk="12345678", scan_freq="2437") 224 check_pasn_akmp_cipher(wpas, hapd2, "PASN", "CCMP") 453 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 454 wpas.interface_add(iface) 456 if wpas.get_mcc() < 2: 465 wpas.set("sae_pwe", "2") 466 wpas.connect("test-pasn-wpa2-psk", psk="12345678", scan_freq="2437") [all …]
|
D | test_gas.py | 316 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 317 wpas.interface_add(iface) 318 gas_fragment_and_comeback(wpas, apdev[0], frag_limit=50) 328 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 329 wpas.interface_add(iface) 330 gas_fragment_and_comeback(wpas, apdev[0], frag_limit=50, 1011 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 1012 wpas.interface_add("wlan5") 1013 if "OK" not in wpas.request("P2P_SET listen_channel 1"): 1015 if "OK" not in wpas.p2p_listen(): [all …]
|
D | test_rfkill.py | 180 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 181 wpas.interface_add(iface) 182 _test_rfkill_p2p_discovery(dev[0], wpas) 183 _test_rfkill_p2p_discovery(wpas, dev[1]) 225 wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5') 226 wpas.interface_add("wlan5") 227 rfk = get_rfkill(wpas) 228 wpas.interface_remove("wlan5") 231 wpas.interface_add("wlan5") 233 state = wpas.get_status_field("wpa_state") [all …]
|
/hostap-3.6.0/wpa_supplicant/examples/ |
D | dpp-qrcode.py | 37 wpas = wpaspy.Ctrl(ctrl) 38 return wpas 60 wpas = wpas_connect() 61 if not wpas: 65 res = wpas.request("DPP_QR_CODE " + uri); 72 print(wpas.request("DPP_BOOTSTRAP_INFO %d" % id)) 73 del wpas 76 wpas = wpas_connect() 77 if not wpas: 80 res = wpas.request("STATUS") [all …]
|
D | wps-nfc.py | 59 wpas = wpaspy.Ctrl(ctrl) 60 return wpas 67 wpas = wpas_connect() 68 if (wpas == None): 70 if "FAIL" in wpas.request("WPS_NFC_TAG_READ " + str(message).encode("hex")): 75 wpas = wpas_connect() 76 if (wpas == None): 79 ret = wpas.request("WPS_NFC_CONFIG_TOKEN NDEF " + id) 81 ret = wpas.request("WPS_NFC_CONFIG_TOKEN NDEF") 88 wpas = wpas_connect() [all …]
|
D | dpp-nfc.py | 87 wpas = wpaspy.Ctrl(ctrl) 88 return wpas 95 wpas = wpas_connect() 96 if wpas is None: 98 peer_id = wpas.request("DPP_NFC_URI " + uri) 113 res = wpas.request(cmd) 121 wpas = wpas_connect() 122 if wpas is None: 143 def get_status(wpas, extra=None): argument 148 res = wpas.request("STATUS" + extra) [all …]
|
D | p2p-nfc.py | 70 wpas = wpaspy.Ctrl(ctrl) 71 return wpas 78 wpas = wpas_connect() 79 if (wpas == None): 85 if "FAIL" in wpas.request(cmd): 91 wpas = wpas_connect() 92 if (wpas == None): 94 res = wpas.request("NFC_GET_HANDOVER_REQ NDEF P2P-CR").rstrip() 100 wpas = wpas_connect() 101 if (wpas == None): [all …]
|
/hostap-3.6.0/wpaspy/ |
D | test.py | 21 wpas = wpaspy.Ctrl(host, port) 22 return wpas 40 wpas = wpaspy.Ctrl(ctrl) 41 return wpas 49 wpas = wpas_connect(host, port) 50 if wpas is None: 53 print(wpas.request('PING')) 62 print(wpas.request('SCAN')) 73 print(wpas.request('SCAN_RESULTS'))
|
/hostap-3.6.0/hostapd/ |
D | wps-ap-nfc.py | 55 wpas = wpaspy.Ctrl(ctrl) 56 return wpas 63 wpas = wpas_connect() 64 if (wpas == None): 66 if "FAIL" in wpas.request("WPS_NFC_TAG_READ " + str(message).encode("hex")): 72 wpas = wpas_connect() 73 if (wpas == None): 75 ret = wpas.request("WPS_NFC_CONFIG_TOKEN NDEF") 82 wpas = wpas_connect() 83 if (wpas == None): [all …]
|
/hostap-3.6.0/tests/remote/ |
D | hwsim_wrapper.py | 61 wpas = WpaSupplicant(hostname=ref_host.host, global_iface="udp", 63 wpas.interface_add(ref_host.ifname) 64 dev.append(wpas) 81 for wpas in dev: 82 wpas.interface_remove(wpas.host.ifname) 83 wpas.terminate() 105 for wpas in dev: 107 wpas.interface_remove(wpas.host.ifname) 108 wpas.terminate()
|