/hostap-3.7.0/tests/hwsim/ |
D | test_wpas_ap.py | 40 id = dev[0].add_network() 41 dev[0].set_network(id, "mode", "2") 42 dev[0].set_network_quoted(id, "ssid", "wpas-ap-open") 43 dev[0].set_network(id, "key_mgmt", "NONE") 44 dev[0].set_network(id, "frequency", "2412") 45 dev[0].set_network(id, "scan_freq", "2412") 46 dev[0].select_network(id) 94 id = dev[0].add_network() 95 dev[0].set_network(id, "mode", "2") 96 dev[0].set_network_quoted(id, "ssid", "wpas-ap-open") [all …]
|
D | test_wpas_ctrl.py | 27 id = dev[0].add_network() 29 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id)): 31 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + " name"): 33 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id + 1) + " proto OPEN"): 35 if "FAIL" not in dev[0].request("GET_NETWORK " + str(id)): 37 if "FAIL" not in dev[0].request("GET_NETWORK " + str(id + 1) + " proto"): 40 if "OK" not in dev[0].request("SET_NETWORK " + str(id) + " proto \t WPA2 "): 42 res = dev[0].request("GET_NETWORK " + str(id) + " proto") 46 if "OK" not in dev[0].request("SET_NETWORK " + str(id) + " key_mgmt \t WPA-PSK "): 48 res = dev[0].request("GET_NETWORK " + str(id) + " key_mgmt") [all …]
|
D | test_ibss.py | 17 def connect_ibss_cmd(dev, id, freq=2412): argument 19 dev.select_network(id, freq=str(freq)) 54 id = dev.add_network() 55 dev.set_network(id, "mode", "1") 56 dev.set_network(id, "frequency", str(freq)) 58 dev.set_network(id, "max_oper_chwidth", str(chwidth)) 60 dev.set_network(id, "scan_freq", str(scan_freq)) 61 dev.set_network_quoted(id, "ssid", ssid) 63 dev.set_network_quoted(id, "psk", psk) 65 dev.set_network(id, "proto", proto) [all …]
|
D | test_wpas_mesh.py | 33 id = dev.request("SCAN " + params) 34 if "FAIL" in id: 36 id = int(id) 42 if "id=" + str(id) in ev: 48 if "id=" + str(id) in ev: 55 if "id=" + str(id) not in ev: 61 if "id=" + str(id) not in ev: 147 id = dev[0].add_network() 148 dev[0].set_network(id, "mode", "5") 149 dev[0].remove_network(id) [all …]
|
D | test_wpas_config.py | 205 id = wpas.add_network() 206 wpas.set_network_quoted(id, "ssid", "foo") 207 wpas.set_network_quoted(id, "psk", "12345678") 208 wpas.set_network(id, "bssid", "00:11:22:33:44:55") 209 wpas.set_network(id, "proto", "RSN") 210 wpas.set_network(id, "key_mgmt", "WPA-PSK-SHA256") 211 wpas.set_network(id, "pairwise", "CCMP") 212 wpas.set_network(id, "group", "CCMP") 213 wpas.set_network(id, "auth_alg", "OPEN") 215 id = wpas.add_cred() [all …]
|
D | test_monitor_interface.py | 22 id = wpas.add_network() 23 wpas.set_network(id, "mode", "2") 24 wpas.set_network_quoted(id, "ssid", "monitor-iface") 25 wpas.set_network(id, "key_mgmt", "NONE") 26 wpas.set_network(id, "frequency", "2412") 27 wpas.connect_network(id) 35 id = wpas.add_network() 36 wpas.set_network(id, "mode", "2") 37 wpas.set_network_quoted(id, "ssid", "monitor-iface-wpa2") 38 wpas.set_network(id, "proto", "WPA2") [all …]
|
D | nl80211.py | 322 def build_nl80211_attr(id, val): argument 323 attr = struct.pack("@HH", 4 + len(val), nl80211_attr[id]) + val 328 def build_nl80211_attr_u32(id, val): argument 329 return build_nl80211_attr(id, struct.pack("@I", val)) 331 def build_nl80211_attr_u16(id, val): argument 332 return build_nl80211_attr(id, struct.pack("@H", val)) 334 def build_nl80211_attr_u8(id, val): argument 335 return build_nl80211_attr(id, struct.pack("@B", val)) 337 def build_nl80211_attr_flag(id): argument 338 return build_nl80211_attr(id, b'') [all …]
|
D | radius_das.py | 13 def __init__(self, code=pyrad.packet.DisconnectRequest, id=None, argument 15 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator, 24 if self.id is None: 25 self.id = random.randrange(0, 256) 27 header = struct.pack('!BBH', self.code, self.id, (20 + len(attr))) 33 def __init__(self, code=pyrad.packet.CoARequest, id=None, argument 35 pyrad.packet.Packet.__init__(self, code, id, secret, authenticator, 41 if self.id is None: 42 self.id = random.randrange(0, 256) 44 header = struct.pack('!BBH', self.code, self.id, (20 + len(attr)))
|
D | wpasupplicant.py | 340 id = self.request("ADD_NETWORK") 341 if "FAIL" in id: 343 return int(id) 345 def remove_network(self, id): argument 346 id = self.request("REMOVE_NETWORK " + str(id)) 347 if "FAIL" in id: 351 def get_network(self, id, field): argument 352 res = self.request("GET_NETWORK " + str(id) + " " + field) 357 def set_network(self, id, field, value): argument 358 res = self.request("SET_NETWORK " + str(id) + " " + field + " " + value) [all …]
|
D | test_p2p_persistent.py | 24 id = None 27 id = n['id'] 29 if id is None: 31 clients = dev[0].global_request("GET_NETWORK " + id + " p2p_client_list").rstrip() 34 if "FAIL" not in dev[1].request("SELECT_NETWORK " + str(id)): 38 if "FAIL" not in dev[1].request("ENABLE_NETWORK " + str(id)): 42 if "FAIL" not in dev[1].request("DISABLE_NETWORK " + str(id)): 57 clients = dev[0].request("GET_NETWORK " + id + " p2p_client_list").rstrip() 239 [tmp, id] = ev.split('=', 1) 245 dev[1].global_request("REMOVE_NETWORK " + id) [all …]
|
/hostap-3.7.0/hs20/server/www/ |
D | users.php | 11 $id = $_GET["id"]; variable 12 if (!is_numeric($id)) 13 $id = 0; variable 15 $id = 0; variable 21 if ($cmd == 'eventlog' && $id > 0) { 22 $row = $db->query("SELECT dump FROM eventlog WHERE rowid=$id")->fetch(); 35 if ($cmd == 'mo' && $id > 0) { 41 $row = $db->query("SELECT $mo FROM users WHERE rowid=$id")->fetch(); 48 if ($cmd == 'cert' && $id > 0) { 49 $row = $db->query("SELECT cert_pem FROM users WHERE rowid=$id")->fetch(); [all …]
|
/hostap-3.7.0/wpa_supplicant/ |
D | eapol_test.py | 32 id = self.request("ADD_NETWORK") 33 if "FAIL" in id: 35 return int(id) 37 def remove_network(self, id): argument 38 id = self.request("REMOVE_NETWORK " + str(id)) 39 if "FAIL" in id: 43 def set_network(self, id, field, value): argument 44 res = self.request("SET_NETWORK " + str(id) + " " + field + " " + value) 49 def set_network_quoted(self, id, field, value): argument 50 res = self.request("SET_NETWORK " + str(id) + " " + field + ' "' + value + '"') [all …]
|
D | notify.c | 115 wpa_s->current_ssid ? wpa_s->current_ssid->id : -1, in wpas_notify_state_changed() 240 wpas_dbus_signal_network_selected(wpa_s, ssid->id); in wpas_notify_network_selected() 357 ssid->id); in wpas_notify_network_added() 375 wpas_dbus_unregister_persistent_group(wpa_s, ssid->id); in wpas_notify_persistent_group_removed() 393 wpas_dbus_unregister_network(wpa_s, ssid->id); in wpas_notify_network_removed() 395 ssid->id); in wpas_notify_network_removed() 410 u8 bssid[], unsigned int id) in wpas_notify_bss_added() argument 415 wpas_dbus_register_bss(wpa_s, bssid, id); in wpas_notify_bss_added() 417 id, MAC2STR(bssid)); in wpas_notify_bss_added() 422 u8 bssid[], unsigned int id) in wpas_notify_bss_removed() argument [all …]
|
D | notify.h | 62 unsigned int id); 64 unsigned int id); 66 unsigned int id); 68 unsigned int id); 70 unsigned int id); 72 unsigned int id); 74 unsigned int id); 76 unsigned int id); 78 unsigned int id); 80 unsigned int id); [all …]
|
/hostap-3.7.0/src/eap_peer/ |
D | eap_aka.c | 355 struct eap_aka_data *data, int id) in eap_aka_clear_identities() argument 357 if ((id & CLEAR_PSEUDONYM) && data->pseudonym) { in eap_aka_clear_identities() 365 if ((id & CLEAR_REAUTH_ID) && data->reauth_id) { in eap_aka_clear_identities() 371 if ((id & CLEAR_EAP_ID) && data->last_eap_identity) { in eap_aka_clear_identities() 557 static struct wpabuf * eap_aka_client_error(struct eap_aka_data *data, u8 id, in eap_aka_client_error() argument 568 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method, in eap_aka_client_error() 576 u8 id) in eap_aka_authentication_reject() argument 585 "(id=%d)", id); in eap_aka_authentication_reject() 586 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method, in eap_aka_authentication_reject() 593 struct eap_aka_data *data, u8 id, struct eap_sim_attrs *attr) in eap_aka_synchronization_failure() argument [all …]
|
D | eap_sim.c | 377 struct eap_sim_data *data, int id) in eap_sim_clear_identities() argument 379 if ((id & CLEAR_PSEUDONYM) && data->pseudonym) { in eap_sim_clear_identities() 387 if ((id & CLEAR_REAUTH_ID) && data->reauth_id) { in eap_sim_clear_identities() 393 if ((id & CLEAR_EAP_ID) && data->last_eap_identity) { in eap_sim_clear_identities() 466 static struct wpabuf * eap_sim_client_error(struct eap_sim_data *data, u8 id, in eap_sim_client_error() argument 477 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, EAP_TYPE_SIM, in eap_sim_client_error() 485 struct eap_sim_data *data, u8 id, in eap_sim_response_start() argument 520 wpa_printf(MSG_DEBUG, "Generating EAP-SIM Start (id=%d)", id); in eap_sim_response_start() 521 msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, in eap_sim_response_start() 548 u8 id) in eap_sim_response_challenge() argument [all …]
|
D | eap_eke.c | 144 static struct wpabuf * eap_eke_build_msg(struct eap_eke_data *data, int id, in eap_eke_build_msg() argument 153 EAP_CODE_RESPONSE, id); in eap_eke_build_msg() 197 u8 id, u32 failure_code) in eap_eke_build_fail() argument 204 resp = eap_eke_build_msg(data, id, 4, EAP_EKE_FAILURE); in eap_eke_build_fail() 231 u8 id = eap_get_id(reqData); in eap_eke_process_id() local 234 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id() 242 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id() 255 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id() 295 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id() 303 return eap_eke_build_fail(data, ret, id, in eap_eke_process_id() [all …]
|
D | eap_sake.c | 115 int id, size_t length, u8 subtype) in eap_sake_build_msg() argument 124 EAP_CODE_RESPONSE, id); in eap_sake_build_msg() 143 u8 id, in eap_sake_process_identity() argument 168 resp = eap_sake_build_msg(data, id, 2 + data->peerid_len, in eap_sake_process_identity() 186 u8 id, in eap_sake_process_challenge() argument 251 resp = eap_sake_build_msg(data, id, rlen, EAP_SAKE_SUBTYPE_CHALLENGE); in eap_sake_process_challenge() 288 u8 id, in eap_sake_process_confirm() argument 325 return eap_sake_build_msg(data, id, 0, in eap_sake_process_confirm() 336 return eap_sake_build_msg(data, id, 0, in eap_sake_process_confirm() 342 resp = eap_sake_build_msg(data, id, 2 + EAP_SAKE_MIC_LEN, in eap_sake_process_confirm() [all …]
|
/hostap-3.7.0/wlantest/ |
D | rx_eapol.c | 470 int id; in learn_kde_keys() local 471 id = ie.gtk[0] & 0x03; in learn_kde_keys() 473 id, !!(ie.gtk[0] & 0x04)); in learn_kde_keys() 481 bss->gtk_len[id] = ie.gtk_len - 2; in learn_kde_keys() 483 os_memcpy(bss->gtk[id], ie.gtk + 2, ie.gtk_len - 2); in learn_kde_keys() 485 bss->rsc[id][0] = rsc[5]; in learn_kde_keys() 486 bss->rsc[id][1] = rsc[4]; in learn_kde_keys() 487 bss->rsc[id][2] = rsc[3]; in learn_kde_keys() 488 bss->rsc[id][3] = rsc[2]; in learn_kde_keys() 489 bss->rsc[id][4] = rsc[1]; in learn_kde_keys() [all …]
|
/hostap-3.7.0/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 189 int id; in addNetwork() local 237 id = atoi(reply); in addNetwork() 239 id = edit_network_id; in addNetwork() 241 setNetworkParam(id, "ssid", ssidEdit->text().toLocal8Bit().constData(), in addNetwork() 273 setNetworkParam(id, "auth_alg", "SHARED", false); in addNetwork() 275 setNetworkParam(id, "auth_alg", "OPEN", false); in addNetwork() 287 setNetworkParam(id, "proto", proto, false); in addNetwork() 289 setNetworkParam(id, "key_mgmt", key_mgmt, false); in addNetwork() 291 setNetworkParam(id, "pairwise", pairwise, false); in addNetwork() 292 setNetworkParam(id, "group", "TKIP CCMP WEP104 WEP40", false); in addNetwork() [all …]
|
/hostap-3.7.0/wpadebug/src/w1/fi/wpadebug/ |
D | WpaCredActivity.java | 32 int id; field in Credential 41 id = Integer.parseInt(fields[0]); in Credential() 63 id = _id; in Credential() 74 String res = id + " - " + username + "@" + realm; in toString() 156 int id = -1; in onActivityResult() local 160 id = Integer.parseInt(line); in onActivityResult() 165 if (id < 0) { in onActivityResult() 171 if (!set_cred_quoted(id, "username", username) || in onActivityResult() 172 !set_cred_quoted(id, "realm", realm) || in onActivityResult() 174 !set_cred_quoted(id, "password", password)) || in onActivityResult() [all …]
|
/hostap-3.7.0/hs20/client/ |
D | osu_client.c | 785 static void set_pps_cred_policy_spe(struct hs20_osu_client *ctx, int id, in set_pps_cred_policy_spe() argument 798 if (set_cred_quoted(ctx->ifname, id, "excluded_ssid", txt) < 0) in set_pps_cred_policy_spe() 804 static void set_pps_cred_policy_spel(struct hs20_osu_client *ctx, int id, in set_pps_cred_policy_spel() argument 811 set_pps_cred_policy_spe(ctx, id, child); in set_pps_cred_policy_spel() 816 static void set_pps_cred_policy_prp(struct hs20_osu_client *ctx, int id, in set_pps_cred_policy_prp() argument 864 if (set_cred_quoted(ctx->ifname, id, "roaming_partner", val) < 0) in set_pps_cred_policy_prp() 872 static void set_pps_cred_policy_prpl(struct hs20_osu_client *ctx, int id, in set_pps_cred_policy_prpl() argument 879 set_pps_cred_policy_prp(ctx, id, child); in set_pps_cred_policy_prpl() 884 static void set_pps_cred_policy_min_backhaul(struct hs20_osu_client *ctx, int id, in set_pps_cred_policy_min_backhaul() argument 935 set_cred(ctx->ifname, id, "min_dl_bandwidth_home", dl) < 0) in set_pps_cred_policy_min_backhaul() [all …]
|
/hostap-3.7.0/src/ap/ |
D | taxonomy.c | 60 u16 id, elen; in get_wps_name() local 62 id = WPA_GET_BE16(data); in get_wps_name() 70 if (id == 0x1023) { in get_wps_name() 124 u8 id, elen; in ie_to_string() local 127 id = *ie++; in ie_to_string() 134 if (id == WLAN_EID_VENDOR_SPECIFIC && elen >= 4) { in ie_to_string() 152 sep, id, ie[0], ie[1], ie[2], ie[3]); in ie_to_string() 154 if (id == WLAN_EID_HT_CAP && elen >= 2) { in ie_to_string() 160 if (id == WLAN_EID_HT_CAP && elen >= 3) { in ie_to_string() 166 if (id == WLAN_EID_HT_CAP && elen >= 7) { in ie_to_string() [all …]
|
/hostap-3.7.0/src/fst/ |
D | fst_ctrl_iface.c | 19 static struct fst_group * get_fst_group_by_id(const char *id) in get_fst_group_by_id() argument 26 if (os_strncmp(group_id, id, os_strlen(group_id)) == 0) in get_fst_group_by_id() 176 u32 id; in session_get() local 178 id = strtoul(session_id, NULL, 0); in session_get() 180 s = fst_session_get_by_id(id); in session_get() 182 fst_printf(MSG_WARNING, "CTRL: Cannot find session %u", id); in session_get() 214 u32 id; in session_set() local 217 id = strtoul(session_id, &p, 0); in session_set() 219 s = fst_session_get_by_id(id); in session_set() 221 fst_printf(MSG_WARNING, "CTRL: Cannot find session %u", id); in session_set() [all …]
|
/hostap-3.7.0/src/crypto/ |
D | dh_groups.c | 1150 #define DH_GROUP(id,safe) \ argument 1151 { id, dh_group ## id ## _generator, sizeof(dh_group ## id ## _generator), \ 1152 dh_group ## id ## _prime, sizeof(dh_group ## id ## _prime), \ 1153 dh_group ## id ## _order, sizeof(dh_group ## id ## _order), safe } 1175 const struct dh_group * dh_groups_get(int id) in dh_groups_get() argument 1180 if (dh_groups[i].id == id) in dh_groups_get()
|