Home
last modified time | relevance | path

Searched refs:id (Results 1 – 25 of 287) sorted by relevance

12345678910>>...12

/hostap-3.7.0/tests/hwsim/
Dtest_wpas_ap.py40 id = dev[0].add_network()
41 dev[0].set_network(id, "mode", "2")
42 dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
43 dev[0].set_network(id, "key_mgmt", "NONE")
44 dev[0].set_network(id, "frequency", "2412")
45 dev[0].set_network(id, "scan_freq", "2412")
46 dev[0].select_network(id)
94 id = dev[0].add_network()
95 dev[0].set_network(id, "mode", "2")
96 dev[0].set_network_quoted(id, "ssid", "wpas-ap-open")
[all …]
Dtest_wpas_ctrl.py27 id = dev[0].add_network()
29 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id)):
31 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + " name"):
33 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id + 1) + " proto OPEN"):
35 if "FAIL" not in dev[0].request("GET_NETWORK " + str(id)):
37 if "FAIL" not in dev[0].request("GET_NETWORK " + str(id + 1) + " proto"):
40 if "OK" not in dev[0].request("SET_NETWORK " + str(id) + " proto \t WPA2 "):
42 res = dev[0].request("GET_NETWORK " + str(id) + " proto")
46 if "OK" not in dev[0].request("SET_NETWORK " + str(id) + " key_mgmt \t WPA-PSK "):
48 res = dev[0].request("GET_NETWORK " + str(id) + " key_mgmt")
[all …]
Dtest_ibss.py17 def connect_ibss_cmd(dev, id, freq=2412): argument
19 dev.select_network(id, freq=str(freq))
54 id = dev.add_network()
55 dev.set_network(id, "mode", "1")
56 dev.set_network(id, "frequency", str(freq))
58 dev.set_network(id, "max_oper_chwidth", str(chwidth))
60 dev.set_network(id, "scan_freq", str(scan_freq))
61 dev.set_network_quoted(id, "ssid", ssid)
63 dev.set_network_quoted(id, "psk", psk)
65 dev.set_network(id, "proto", proto)
[all …]
Dtest_wpas_mesh.py33 id = dev.request("SCAN " + params)
34 if "FAIL" in id:
36 id = int(id)
42 if "id=" + str(id) in ev:
48 if "id=" + str(id) in ev:
55 if "id=" + str(id) not in ev:
61 if "id=" + str(id) not in ev:
147 id = dev[0].add_network()
148 dev[0].set_network(id, "mode", "5")
149 dev[0].remove_network(id)
[all …]
Dtest_wpas_config.py205 id = wpas.add_network()
206 wpas.set_network_quoted(id, "ssid", "foo")
207 wpas.set_network_quoted(id, "psk", "12345678")
208 wpas.set_network(id, "bssid", "00:11:22:33:44:55")
209 wpas.set_network(id, "proto", "RSN")
210 wpas.set_network(id, "key_mgmt", "WPA-PSK-SHA256")
211 wpas.set_network(id, "pairwise", "CCMP")
212 wpas.set_network(id, "group", "CCMP")
213 wpas.set_network(id, "auth_alg", "OPEN")
215 id = wpas.add_cred()
[all …]
Dtest_monitor_interface.py22 id = wpas.add_network()
23 wpas.set_network(id, "mode", "2")
24 wpas.set_network_quoted(id, "ssid", "monitor-iface")
25 wpas.set_network(id, "key_mgmt", "NONE")
26 wpas.set_network(id, "frequency", "2412")
27 wpas.connect_network(id)
35 id = wpas.add_network()
36 wpas.set_network(id, "mode", "2")
37 wpas.set_network_quoted(id, "ssid", "monitor-iface-wpa2")
38 wpas.set_network(id, "proto", "WPA2")
[all …]
Dnl80211.py322 def build_nl80211_attr(id, val): argument
323 attr = struct.pack("@HH", 4 + len(val), nl80211_attr[id]) + val
328 def build_nl80211_attr_u32(id, val): argument
329 return build_nl80211_attr(id, struct.pack("@I", val))
331 def build_nl80211_attr_u16(id, val): argument
332 return build_nl80211_attr(id, struct.pack("@H", val))
334 def build_nl80211_attr_u8(id, val): argument
335 return build_nl80211_attr(id, struct.pack("@B", val))
337 def build_nl80211_attr_flag(id): argument
338 return build_nl80211_attr(id, b'')
[all …]
Dradius_das.py13 def __init__(self, code=pyrad.packet.DisconnectRequest, id=None, argument
15 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator,
24 if self.id is None:
25 self.id = random.randrange(0, 256)
27 header = struct.pack('!BBH', self.code, self.id, (20 + len(attr)))
33 def __init__(self, code=pyrad.packet.CoARequest, id=None, argument
35 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator,
41 if self.id is None:
42 self.id = random.randrange(0, 256)
44 header = struct.pack('!BBH', self.code, self.id, (20 + len(attr)))
Dwpasupplicant.py340 id = self.request("ADD_NETWORK")
341 if "FAIL" in id:
343 return int(id)
345 def remove_network(self, id): argument
346 id = self.request("REMOVE_NETWORK " + str(id))
347 if "FAIL" in id:
351 def get_network(self, id, field): argument
352 res = self.request("GET_NETWORK " + str(id) + " " + field)
357 def set_network(self, id, field, value): argument
358 res = self.request("SET_NETWORK " + str(id) + " " + field + " " + value)
[all …]
Dtest_p2p_persistent.py24 id = None
27 id = n['id']
29 if id is None:
31 clients = dev[0].global_request("GET_NETWORK " + id + " p2p_client_list").rstrip()
34 if "FAIL" not in dev[1].request("SELECT_NETWORK " + str(id)):
38 if "FAIL" not in dev[1].request("ENABLE_NETWORK " + str(id)):
42 if "FAIL" not in dev[1].request("DISABLE_NETWORK " + str(id)):
57 clients = dev[0].request("GET_NETWORK " + id + " p2p_client_list").rstrip()
239 [tmp, id] = ev.split('=', 1)
245 dev[1].global_request("REMOVE_NETWORK " + id)
[all …]
/hostap-3.7.0/hs20/server/www/
Dusers.php11 $id = $_GET["id"]; variable
12 if (!is_numeric($id))
13 $id = 0; variable
15 $id = 0; variable
21 if ($cmd == 'eventlog' && $id > 0) {
22 $row = $db->query("SELECT dump FROM eventlog WHERE rowid=$id")->fetch();
35 if ($cmd == 'mo' && $id > 0) {
41 $row = $db->query("SELECT $mo FROM users WHERE rowid=$id")->fetch();
48 if ($cmd == 'cert' && $id > 0) {
49 $row = $db->query("SELECT cert_pem FROM users WHERE rowid=$id")->fetch();
[all …]
/hostap-3.7.0/wpa_supplicant/
Deapol_test.py32 id = self.request("ADD_NETWORK")
33 if "FAIL" in id:
35 return int(id)
37 def remove_network(self, id): argument
38 id = self.request("REMOVE_NETWORK " + str(id))
39 if "FAIL" in id:
43 def set_network(self, id, field, value): argument
44 res = self.request("SET_NETWORK " + str(id) + " " + field + " " + value)
49 def set_network_quoted(self, id, field, value): argument
50 res = self.request("SET_NETWORK " + str(id) + " " + field + ' "' + value + '"')
[all …]
Dnotify.c115 wpa_s->current_ssid ? wpa_s->current_ssid->id : -1, in wpas_notify_state_changed()
240 wpas_dbus_signal_network_selected(wpa_s, ssid->id); in wpas_notify_network_selected()
357 ssid->id); in wpas_notify_network_added()
375 wpas_dbus_unregister_persistent_group(wpa_s, ssid->id); in wpas_notify_persistent_group_removed()
393 wpas_dbus_unregister_network(wpa_s, ssid->id); in wpas_notify_network_removed()
395 ssid->id); in wpas_notify_network_removed()
410 u8 bssid[], unsigned int id) in wpas_notify_bss_added() argument
415 wpas_dbus_register_bss(wpa_s, bssid, id); in wpas_notify_bss_added()
417 id, MAC2STR(bssid)); in wpas_notify_bss_added()
422 u8 bssid[], unsigned int id) in wpas_notify_bss_removed() argument
[all …]
Dnotify.h62 unsigned int id);
64 unsigned int id);
66 unsigned int id);
68 unsigned int id);
70 unsigned int id);
72 unsigned int id);
74 unsigned int id);
76 unsigned int id);
78 unsigned int id);
80 unsigned int id);
[all …]
/hostap-3.7.0/src/eap_peer/
Deap_aka.c355 struct eap_aka_data *data, int id) in eap_aka_clear_identities() argument
357 if ((id & CLEAR_PSEUDONYM) && data->pseudonym) { in eap_aka_clear_identities()
365 if ((id & CLEAR_REAUTH_ID) && data->reauth_id) { in eap_aka_clear_identities()
371 if ((id & CLEAR_EAP_ID) && data->last_eap_identity) { in eap_aka_clear_identities()
557 static struct wpabuf * eap_aka_client_error(struct eap_aka_data *data, u8 id, in eap_aka_client_error() argument
568 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method, in eap_aka_client_error()
576 u8 id) in eap_aka_authentication_reject() argument
585 "(id=%d)", id); in eap_aka_authentication_reject()
586 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method, in eap_aka_authentication_reject()
593 struct eap_aka_data *data, u8 id, struct eap_sim_attrs *attr) in eap_aka_synchronization_failure() argument
[all …]
Deap_sim.c377 struct eap_sim_data *data, int id) in eap_sim_clear_identities() argument
379 if ((id & CLEAR_PSEUDONYM) && data->pseudonym) { in eap_sim_clear_identities()
387 if ((id & CLEAR_REAUTH_ID) && data->reauth_id) { in eap_sim_clear_identities()
393 if ((id & CLEAR_EAP_ID) && data->last_eap_identity) { in eap_sim_clear_identities()
466 static struct wpabuf * eap_sim_client_error(struct eap_sim_data *data, u8 id, in eap_sim_client_error() argument
477 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, EAP_TYPE_SIM, in eap_sim_client_error()
485 struct eap_sim_data *data, u8 id, in eap_sim_response_start() argument
520 wpa_printf(MSG_DEBUG, "Generating EAP-SIM Start (id=%d)", id); in eap_sim_response_start()
521 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, in eap_sim_response_start()
548 u8 id) in eap_sim_response_challenge() argument
[all …]
Deap_eke.c144 static struct wpabuf * eap_eke_build_msg(struct eap_eke_data *data, int id, in eap_eke_build_msg() argument
153 EAP_CODE_RESPONSE, id); in eap_eke_build_msg()
197 u8 id, u32 failure_code) in eap_eke_build_fail() argument
204 resp = eap_eke_build_msg(data, id, 4, EAP_EKE_FAILURE); in eap_eke_build_fail()
231 u8 id = eap_get_id(reqData); in eap_eke_process_id() local
234 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id()
242 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id()
255 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id()
295 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id()
303 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id()
[all …]
Deap_sake.c115 int id, size_t length, u8 subtype) in eap_sake_build_msg() argument
124 EAP_CODE_RESPONSE, id); in eap_sake_build_msg()
143 u8 id, in eap_sake_process_identity() argument
168 resp = eap_sake_build_msg(data, id, 2 + data->peerid_len, in eap_sake_process_identity()
186 u8 id, in eap_sake_process_challenge() argument
251 resp = eap_sake_build_msg(data, id, rlen, EAP_SAKE_SUBTYPE_CHALLENGE); in eap_sake_process_challenge()
288 u8 id, in eap_sake_process_confirm() argument
325 return eap_sake_build_msg(data, id, 0, in eap_sake_process_confirm()
336 return eap_sake_build_msg(data, id, 0, in eap_sake_process_confirm()
342 resp = eap_sake_build_msg(data, id, 2 + EAP_SAKE_MIC_LEN, in eap_sake_process_confirm()
[all …]
/hostap-3.7.0/wlantest/
Drx_eapol.c470 int id; in learn_kde_keys() local
471 id = ie.gtk[0] & 0x03; in learn_kde_keys()
473 id, !!(ie.gtk[0] & 0x04)); in learn_kde_keys()
481 bss->gtk_len[id] = ie.gtk_len - 2; in learn_kde_keys()
483 os_memcpy(bss->gtk[id], ie.gtk + 2, ie.gtk_len - 2); in learn_kde_keys()
485 bss->rsc[id][0] = rsc[5]; in learn_kde_keys()
486 bss->rsc[id][1] = rsc[4]; in learn_kde_keys()
487 bss->rsc[id][2] = rsc[3]; in learn_kde_keys()
488 bss->rsc[id][3] = rsc[2]; in learn_kde_keys()
489 bss->rsc[id][4] = rsc[1]; in learn_kde_keys()
[all …]
/hostap-3.7.0/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.cpp189 int id; in addNetwork() local
237 id = atoi(reply); in addNetwork()
239 id = edit_network_id; in addNetwork()
241 setNetworkParam(id, "ssid", ssidEdit->text().toLocal8Bit().constData(), in addNetwork()
273 setNetworkParam(id, "auth_alg", "SHARED", false); in addNetwork()
275 setNetworkParam(id, "auth_alg", "OPEN", false); in addNetwork()
287 setNetworkParam(id, "proto", proto, false); in addNetwork()
289 setNetworkParam(id, "key_mgmt", key_mgmt, false); in addNetwork()
291 setNetworkParam(id, "pairwise", pairwise, false); in addNetwork()
292 setNetworkParam(id, "group", "TKIP CCMP WEP104 WEP40", false); in addNetwork()
[all …]
/hostap-3.7.0/wpadebug/src/w1/fi/wpadebug/
DWpaCredActivity.java32 int id; field in Credential
41 id = Integer.parseInt(fields[0]); in Credential()
63 id = _id; in Credential()
74 String res = id + " - " + username + "@" + realm; in toString()
156 int id = -1; in onActivityResult() local
160 id = Integer.parseInt(line); in onActivityResult()
165 if (id < 0) { in onActivityResult()
171 if (!set_cred_quoted(id, "username", username) || in onActivityResult()
172 !set_cred_quoted(id, "realm", realm) || in onActivityResult()
174 !set_cred_quoted(id, "password", password)) || in onActivityResult()
[all …]
/hostap-3.7.0/hs20/client/
Dosu_client.c785 static void set_pps_cred_policy_spe(struct hs20_osu_client *ctx, int id, in set_pps_cred_policy_spe() argument
798 if (set_cred_quoted(ctx->ifname, id, "excluded_ssid", txt) < 0) in set_pps_cred_policy_spe()
804 static void set_pps_cred_policy_spel(struct hs20_osu_client *ctx, int id, in set_pps_cred_policy_spel() argument
811 set_pps_cred_policy_spe(ctx, id, child); in set_pps_cred_policy_spel()
816 static void set_pps_cred_policy_prp(struct hs20_osu_client *ctx, int id, in set_pps_cred_policy_prp() argument
864 if (set_cred_quoted(ctx->ifname, id, "roaming_partner", val) < 0) in set_pps_cred_policy_prp()
872 static void set_pps_cred_policy_prpl(struct hs20_osu_client *ctx, int id, in set_pps_cred_policy_prpl() argument
879 set_pps_cred_policy_prp(ctx, id, child); in set_pps_cred_policy_prpl()
884 static void set_pps_cred_policy_min_backhaul(struct hs20_osu_client *ctx, int id, in set_pps_cred_policy_min_backhaul() argument
935 set_cred(ctx->ifname, id, "min_dl_bandwidth_home", dl) < 0) in set_pps_cred_policy_min_backhaul()
[all …]
/hostap-3.7.0/src/ap/
Dtaxonomy.c60 u16 id, elen; in get_wps_name() local
62 id = WPA_GET_BE16(data); in get_wps_name()
70 if (id == 0x1023) { in get_wps_name()
124 u8 id, elen; in ie_to_string() local
127 id = *ie++; in ie_to_string()
134 if (id == WLAN_EID_VENDOR_SPECIFIC && elen >= 4) { in ie_to_string()
152 sep, id, ie[0], ie[1], ie[2], ie[3]); in ie_to_string()
154 if (id == WLAN_EID_HT_CAP && elen >= 2) { in ie_to_string()
160 if (id == WLAN_EID_HT_CAP && elen >= 3) { in ie_to_string()
166 if (id == WLAN_EID_HT_CAP && elen >= 7) { in ie_to_string()
[all …]
/hostap-3.7.0/src/fst/
Dfst_ctrl_iface.c19 static struct fst_group * get_fst_group_by_id(const char *id) in get_fst_group_by_id() argument
26 if (os_strncmp(group_id, id, os_strlen(group_id)) == 0) in get_fst_group_by_id()
176 u32 id; in session_get() local
178 id = strtoul(session_id, NULL, 0); in session_get()
180 s = fst_session_get_by_id(id); in session_get()
182 fst_printf(MSG_WARNING, "CTRL: Cannot find session %u", id); in session_get()
214 u32 id; in session_set() local
217 id = strtoul(session_id, &p, 0); in session_set()
219 s = fst_session_get_by_id(id); in session_set()
221 fst_printf(MSG_WARNING, "CTRL: Cannot find session %u", id); in session_set()
[all …]
/hostap-3.7.0/src/crypto/
Ddh_groups.c1150 #define DH_GROUP(id,safe) \ argument
1151 { id, dh_group ## id ## _generator, sizeof(dh_group ## id ## _generator), \
1152 dh_group ## id ## _prime, sizeof(dh_group ## id ## _prime), \
1153 dh_group ## id ## _order, sizeof(dh_group ## id ## _order), safe }
1175 const struct dh_group * dh_groups_get(int id) in dh_groups_get() argument
1180 if (dh_groups[i].id == id) in dh_groups_get()

12345678910>>...12