/hostap-3.7.0/tests/hwsim/ |
D | test_dbus.py | 99 if type == dbus.exceptions.DBusException and self._expected in str(value): 121 logger.debug("GetAll(fi.w1.wpa.supplicant1, /fi/w1/wpa_supplicant1) ==> " + str(props)) 125 logger.debug("GetAll(%s, %s): %s" % (WPAS_DBUS_IFACE, path, str(props))) 129 logger.debug("GetAll(%s, %s): %s" % (WPAS_DBUS_IFACE_WPS, path, str(props))) 134 raise Exception("Unexpected BSSs entry: " + str(res)) 139 raise Exception("Unexpected Networks entry: " + str(res)) 151 raise Exception("Missing BSSs entry: " + str(res)) 153 raise Exception("Too manu BSSs entries: " + str(res)) 156 logger.debug("GetAll(%s, %s): %s" % (WPAS_DBUS_BSS, res[0], str(props))) 168 raise Exception("Missing Networks entry: " + str(res)) [all …]
|
D | test_wpas_ctrl.py | 29 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id)): 31 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + " name"): 33 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id + 1) + " proto OPEN"): 35 if "FAIL" not in dev[0].request("GET_NETWORK " + str(id)): 37 if "FAIL" not in dev[0].request("GET_NETWORK " + str(id + 1) + " proto"): 40 if "OK" not in dev[0].request("SET_NETWORK " + str(id) + " proto \t WPA2 "): 42 res = dev[0].request("GET_NETWORK " + str(id) + " proto") 46 if "OK" not in dev[0].request("SET_NETWORK " + str(id) + " key_mgmt \t WPA-PSK "): 48 res = dev[0].request("GET_NETWORK " + str(id) + " key_mgmt") 52 if "OK" not in dev[0].request("SET_NETWORK " + str(id) + " auth_alg \t OPEN "): [all …]
|
D | test_he.py | 149 raise Exception("Unexpected SIGNAL_POLL value(1): " + str(sig)) 151 raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig)) 159 logger.info("hostapd STATUS: " + str(status)) 180 logger.info("hostapd STA: " + str(sta)) 189 if isinstance(e, Exception) and str(e) == "AP startup failed": 229 if isinstance(e, Exception) and str(e) == "AP startup failed": 265 "channel": str(channel), 278 scan_freq=str(5000 + 5 * channel)) 281 if isinstance(e, Exception) and str(e) == "AP startup failed": 347 if isinstance(e, Exception) and str(e) == "AP startup failed": [all …]
|
D | test_ap_vht.py | 40 raise Exception("Unexpected SIGNAL_POLL value(1): " + str(sig)) 42 raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig)) 50 logger.info("hostapd STATUS: " + str(status)) 65 logger.info("hostapd STA: " + str(sta)) 76 if isinstance(e, Exception) and str(e) == "AP startup failed": 121 if isinstance(e, Exception) and str(e) == "AP startup failed": 136 "channel": str(channel), 146 scan_freq=str(5000 + 5 * channel)) 149 if isinstance(e, Exception) and str(e) == "AP startup failed": 207 if isinstance(e, Exception) and str(e) == "AP startup failed": [all …]
|
D | p2p_utils.py | 97 logger.debug("i_res: " + str(i_res)) 98 logger.debug("r_res: " + str(r_res)) 198 logger.debug("res: " + str(res)) 233 logger.debug("i_res: " + str(i_res)) 236 logger.info("go_neg_init thread caught an exception from p2p_go_neg_init: " + str(e)) 259 logger.info("go_neg_pin - r_dev.p2p_go_neg_init() exception: " + str(e)) 262 logger.debug("r_res: " + str(r_res)) 268 logger.debug("i_res: " + str(i_res)) 296 logger.debug("i_res: " + str(i_res)) 297 logger.debug("r_res: " + str(r_res)) [all …]
|
D | wpasupplicant.py | 48 self.global_dbg = hostname + "/" + str(global_port) + "/" 89 if str(e) == "DETACH failed": 110 if str(e) == "DETACH failed": 306 states = str(state1) + " " + str(state2) 346 id = self.request("REMOVE_NETWORK " + str(id)) 352 res = self.request("GET_NETWORK " + str(id) + " " + field) 358 res = self.request("SET_NETWORK " + str(id) + " " + field + " " + value) 364 res = self.request("SET_NETWORK " + str(id) + " " + field + ' "' + value + '"') 379 res = self.p2pdev_request("SET_NETWORK " + str(id) + " " + field + " " + value) 385 res = self.p2pdev_request("SET_NETWORK " + str(id) + " " + field + ' "' + value + '"') [all …]
|
D | test_p2ps.py | 34 …if "OK" not in r_dev.global_request("P2P_SERVICE_ADD asp " + str(r_role) + " " + str(advid) + " 1 … 38 …if "OK" not in r_dev.global_request("P2P_SERVICE_ADD asp " + str(r_role) + " " + str(advid) + " 1 … 42 …if "OK" not in r_dev.global_request("P2P_SERVICE_ADD asp " + str(r_role) + " " + str(advid) + " 1 … 46 …if "OK" not in r_dev.global_request("P2P_SERVICE_ADD asp " + str(r_role) + " " + str(adv_id) + " 1… 145 seeker.asp_provision(addr1, adv_id=str(adv_id), adv_mac=addr1, session_id=1, 411 ev0 = dev[0].global_request("P2P_SERVICE_DEL asp " + str(adv_id)) 424 ev0 = dev[0].global_request("P2P_SERVICE_DEL asp " + str(adv_id)) 437 ev0 = dev[0].global_request("P2P_SERVICE_DEL asp " + str(adv_id)) 450 ev0 = dev[0].global_request("P2P_SERVICE_DEL asp " + str(adv_id)) 466 ev0 = dev[0].global_request("P2P_SERVICE_DEL asp " + str(adv_id)) [all …]
|
D | test_ibss.py | 19 dev.select_network(id, freq=str(freq)) 56 dev.set_network(id, "frequency", str(freq)) 58 dev.set_network(id, "max_oper_chwidth", str(chwidth)) 60 dev.set_network(id, "scan_freq", str(scan_freq)) 79 dev.set_network(id, "group_rekey", str(group_rekey)) 80 dev.request("ENABLE_NETWORK " + str(id) + " no-connect") 247 logger.info("Ignoring known connectivity failure: " + str(e)) 251 logger.info("Ignoring known connectivity failure: " + str(e)) 255 logger.info("Ignoring known connectivity failure: " + str(e)) 300 logger.info("Ignoring known connectivity failure: " + str(e)) [all …]
|
D | remotehost.py | 35 logger.debug("thread exit status: " + str(status)) 36 logger.debug("thread exit buf: " + str(buf)) 67 logger.debug("execute: " + str(command)) 78 logger.debug("status: " + str(status)) 79 logger.debug("buf: " + str(buf)) 99 logger.debug(self.name + " status: " + str(status)) 100 logger.debug(self.name + " buf: " + str(buf)) 158 wait_str = str(wait) + "s" 193 … logger.debug(self.name + " proc_wait_event: " + ' '.join(events) + " timeout: " + str(timeout))
|
D | test_ocv.py | 39 if "Failed to set hostapd parameter ocv" in str(e): 77 dev[0].connect(ssid, psk=passphrase, scan_freq="2412", ocv=str(ocv), 99 dev[0].connect(ssid, psk=passphrase, scan_freq="5200", ocv=str(ocv), 114 dev[0].connect(ssid, psk=passphrase, scan_freq="2437", ocv=str(ocv), 116 dev[1].connect(ssid, psk=passphrase, scan_freq="2437", ocv=str(ocv), 150 dev[0].connect(ssid, psk=passphrase, scan_freq=freq, ocv=str(ocv), 152 dev[1].connect(ssid, psk=passphrase, scan_freq=freq, ocv=str(ocv), 191 dev[0].connect(ssid, psk=passphrase, scan_freq=freq, ocv=str(ocv), 193 dev[1].connect(ssid, psk=passphrase, scan_freq=freq, ocv=str(ocv), 195 dev[2].connect(ssid, psk=passphrase, scan_freq=freq, ocv=str(ocv), [all …]
|
/hostap-3.7.0/src/utils/ |
D | common.c | 450 void wpa_unicode2ascii_inplace(TCHAR *str) in wpa_unicode2ascii_inplace() argument 453 char *dst = (char *) str; in wpa_unicode2ascii_inplace() 454 while (*str) in wpa_unicode2ascii_inplace() 455 *dst++ = (char) *str++; in wpa_unicode2ascii_inplace() 461 TCHAR * wpa_strdup_tchar(const char *str) in wpa_strdup_tchar() argument 465 buf = os_malloc((strlen(str) + 1) * sizeof(TCHAR)); in wpa_strdup_tchar() 468 wsprintf(buf, L"%S", str); in wpa_strdup_tchar() 471 return os_strdup(str); in wpa_strdup_tchar() 526 size_t printf_decode(u8 *buf, size_t maxlen, const char *str) in printf_decode() argument 528 const char *pos = str; in printf_decode() [all …]
|
D | json.c | 67 char *str, *spos, *s_end; in json_parse_string() local 75 str = os_malloc(buf_len); in json_parse_string() 76 if (!str) in json_parse_string() 78 spos = str; in json_parse_string() 79 s_end = str + buf_len; in json_parse_string() 86 idx = spos - str; in json_parse_string() 90 tmp = os_realloc(str, buf_len); in json_parse_string() 93 str = tmp; in json_parse_string() 94 spos = str + idx; in json_parse_string() 95 s_end = str + buf_len; in json_parse_string() [all …]
|
D | edit.c | 29 char str[1]; member 176 static void history_add(const char *str) in history_add() argument 181 if (str[0] == '\0') in history_add() 185 if (os_strcmp(str, h->str) == 0) { in history_add() 205 len = os_strlen(str); in history_add() 210 os_strlcpy(h->str, str, len + 1); in history_add() 218 cmdbuf_len = cmdbuf_pos = os_strlen(history_curr->str); in history_use() 219 os_memcpy(cmdbuf, history_curr->str, cmdbuf_len); in history_use() 305 if (filter_cb && filter_cb(edit_cb_ctx, h->str)) in history_write() 307 fprintf(f, "%s\n", h->str); in history_write() [all …]
|
D | uuid.c | 15 int uuid_str2bin(const char *str, u8 *bin) in uuid_str2bin() argument 20 pos = str; in uuid_str2bin() 50 int uuid_bin2str(const u8 *bin, char *str, size_t max_len) in uuid_bin2str() argument 53 len = os_snprintf(str, max_len, "%02x%02x%02x%02x-%02x%02x-%02x%02x-" in uuid_bin2str()
|
/hostap-3.7.0/src/wps/ |
D | wps_dev_attr.c | 260 static int wps_process_manufacturer(struct wps_device_data *dev, const u8 *str, in wps_process_manufacturer() argument 263 if (str == NULL) { in wps_process_manufacturer() 268 wpa_hexdump_ascii(MSG_DEBUG, "WPS: Manufacturer", str, str_len); in wps_process_manufacturer() 271 dev->manufacturer = dup_binstr(str, str_len); in wps_process_manufacturer() 279 static int wps_process_model_name(struct wps_device_data *dev, const u8 *str, in wps_process_model_name() argument 282 if (str == NULL) { in wps_process_model_name() 287 wpa_hexdump_ascii(MSG_DEBUG, "WPS: Model Name", str, str_len); in wps_process_model_name() 290 dev->model_name = dup_binstr(str, str_len); in wps_process_model_name() 298 static int wps_process_model_number(struct wps_device_data *dev, const u8 *str, in wps_process_model_number() argument 301 if (str == NULL) { in wps_process_model_number() [all …]
|
D | wps_common.c | 462 int wps_dev_type_str2bin(const char *str, u8 dev_type[WPS_DEV_TYPE_LEN]) in wps_dev_type_str2bin() argument 467 WPA_PUT_BE16(dev_type, atoi(str)); in wps_dev_type_str2bin() 468 pos = os_strchr(str, '-'); in wps_dev_type_str2bin() 528 u16 wps_config_methods_str2bin(const char *str) in wps_config_methods_str2bin() argument 532 if (str == NULL || str[0] == '\0') { in wps_config_methods_str2bin() 543 if (os_strstr(str, "ethernet")) in wps_config_methods_str2bin() 545 if (os_strstr(str, "label")) in wps_config_methods_str2bin() 547 if (os_strstr(str, "display")) in wps_config_methods_str2bin() 549 if (os_strstr(str, "ext_nfc_token")) in wps_config_methods_str2bin() 551 if (os_strstr(str, "int_nfc_token")) in wps_config_methods_str2bin() [all …]
|
/hostap-3.7.0/wlantest/ |
D | wlantest_cli.c | 22 static int get_prev_arg_pos(const char *str, int pos) in get_prev_arg_pos() argument 24 while (pos > 0 && str[pos - 1] != ' ') in get_prev_arg_pos() 26 while (pos > 0 && str[pos - 1] == ' ') in get_prev_arg_pos() 28 while (pos > 0 && str[pos - 1] != ' ') in get_prev_arg_pos() 75 const char *str) in attr_add_str() argument 77 size_t len = os_strlen(str); in attr_add_str() 85 os_memcpy(pos, str, len); in attr_add_str() 295 static char ** complete_list_sta(int s, const char *str, int pos) in complete_list_sta() argument 297 if (get_cmd_arg_num(str, pos) == 1) in complete_list_sta() 352 static char ** complete_clear_sta_counters(int s, const char *str, int pos) in complete_clear_sta_counters() argument [all …]
|
/hostap-3.7.0/tests/remote/ |
D | run-tests.py | 298 logger.warning("get devices failed: " + str(e)) 311 logger.warning("DUT (apdev): " + str(dut)) 313 logger.warning("DUT: " + str(dut)) 316 logger.warning("REF (dev): " + str(ref)) 318 logger.warning("REF: " + str(ref)) 320 logger.warning("MON: " + str(monitor)) 327 logger.warning("FAILED: " + str(e)) 343 …logger.warning("START - " + setup_params['tc_name'] + " (" + str(test_no) + "/" + str(len(tests_to… 351 logger.warning("PASS (" + res + ") - " + str((end - start).total_seconds()) + "s") 357 logger.warning("SKIP (" + str(e) + ") - " + str((end - start).total_seconds()) + "s") [all …]
|
/hostap-3.7.0/hs20/client/ |
D | osu_client.c | 80 char *str = xml_node_to_str(ctx->xml, node); in debug_dump_node() local 81 wpa_printf(MSG_DEBUG, "[hs20] %s: '%s'", title, str); in debug_dump_node() 82 free(str); in debug_dump_node() 555 char *str; in hs20_add_pps_mo() local 630 str = xml_node_get_text(ctx->xml, add_mo); in hs20_add_pps_mo() 631 if (str == NULL) { in hs20_add_pps_mo() 636 wpa_printf(MSG_DEBUG, "[hs20] addMO text: '%s'", str); in hs20_add_pps_mo() 638 tnds = xml_node_from_buf(ctx->xml, str); in hs20_add_pps_mo() 639 xml_node_get_text_free(ctx->xml, str); in hs20_add_pps_mo() 697 char *str; in update_pps_file() local [all …]
|
/hostap-3.7.0/hs20/server/ |
D | hs20_spp_server.c | 51 char *str; in debug_dump_node() local 55 str = xml_node_to_str(ctx->xml, node); in debug_dump_node() 56 if (str == NULL) in debug_dump_node() 60 fprintf(ctx->debug_log, "%s: '%s'\n", title, str); in debug_dump_node() 61 os_free(str); in debug_dump_node() 69 char *user, *realm, *post, *str; in process() local 135 str = xml_node_to_str(ctx->xml, soap); in process() 137 if (str == NULL) { in process() 141 printf("%s", str); in process() 142 free(str); in process()
|
D | spp_server.c | 146 char *str; in db_add_session_pps() local 149 str = xml_node_to_str(ctx->xml, node); in db_add_session_pps() 150 if (str == NULL) in db_add_session_pps() 154 str, sessionid, user, realm); in db_add_session_pps() 155 free(str); in db_add_session_pps() 170 char *str; in db_add_session_devinfo() local 173 str = xml_node_to_str(ctx->xml, node); in db_add_session_devinfo() 174 if (str == NULL) in db_add_session_devinfo() 177 str, sessionid); in db_add_session_devinfo() 178 free(str); in db_add_session_devinfo() [all …]
|
/hostap-3.7.0/wpadebug/src/w1/fi/wpadebug/ |
D | QrCodeDisplayActivity.java | 48 String str = readFromFile(FILE_NAME); in onCreate() local 52 Bitmap bitmap = (TextUtils.isEmpty(str)) ? null : encodeAsBitmap(str); in onCreate() 56 Log.e(TAG, "Failed to generate bitmap for uri=" + str); in onCreate() 65 private Bitmap encodeAsBitmap(String str) throws WriterException { in encodeAsBitmap() argument 68 … result = new MultiFormatWriter().encode(str, BarcodeFormat.QR_CODE, WIDTH, HEIGHT, null); in encodeAsBitmap()
|
/hostap-3.7.0/wpa_supplicant/examples/ |
D | p2p-nfc.py | 81 cmd = "WPS_NFC_TAG_READ " + str(message).encode("hex") 136 …cmd = "NFC_REPORT_HANDOVER " + type + " P2P " + str(req).encode("hex") + " " + str(sel).encode("he… 147 …cmd = "NFC_REPORT_HANDOVER " + type + " WPS " + str(req).encode("hex") + " " + str(sel).encode("he… 186 print(str(message).encode("hex")) 198 summary("Other exception: " + str(e)) 225 print(str(message).encode("hex")) 360 print(str(sel).encode("hex")) 418 summary("Tag found - writing - " + str(tag)) 420 tag.ndef.message = str(p2p_sel_data) 448 print(str(p2p_sel_data).encode("hex")) [all …]
|
/hostap-3.7.0/hostapd/ |
D | wps-ap-nfc.py | 66 if "FAIL" in wpas.request("WPS_NFC_TAG_READ " + str(message).encode("hex")): 106 str(req).encode("hex") + " " + 107 str(sel).encode("hex")) 139 print(str(request).encode("hex")) 166 print(str(sel).encode("hex")) 192 summary("Tag found - writing - " + str(tag)) 194 tag.ndef.message = str(write_data) 233 summary("Tag connected: " + str(tag))
|
/hostap-3.7.0/wpaspy/ |
D | wpaspy.py | 36 self.local = "/tmp/wpa_ctrl_" + str(os.getpid()) + '-' + str(counter) 60 print("connect exception ", path, str(port)) 84 if type(cmd) == str: 98 r = str(res) 146 r = str(res)
|