/hostap-latest/tests/hwsim/ |
D | test_nan_usd.py | 25 cmd = "NAN_PUBLISH service_name=_test solicited=0 unsolicited=0" 26 id0 = dev[0].request(cmd) 33 cmd = "NAN_PUBLISH service_name=_test srv_proto_type=2 ssi=6677" 34 id0 = dev[0].request(cmd) 38 cmd = "NAN_UPDATE_PUBLISH publish_id=" + id0 + " ssi=1122334455" 39 if "FAIL" in dev[0].request(cmd): 42 cmd = "NAN_CANCEL_PUBLISH publish_id=" + id0 43 if "FAIL" in dev[0].request(cmd): 54 cmd = "NAN_PUBLISH service_name=_test" 57 if "FAIL" in dev[0].request(cmd): [all …]
|
D | wpasupplicant.py | 141 cmd = ' '.join(cmd_array) 143 cmd = cmd_array 144 proc = subprocess.Popen(cmd, stderr=subprocess.STDOUT, 212 …cmd = "INTERFACE_ADD " + ifname + "\t" + config + "\t" + driver + "\tDIR=/var/run/wpa_supplicant G… 214 cmd = cmd + '\t' + drv_params 217 cmd += '\t' 218 cmd += '\t' + br_ifname 221 cmd += '\t' 223 cmd += '\t' 224 cmd += '\tcreate' [all …]
|
D | test_mscs.py | 114 cmd = "MSCS add up_bitmap=F0 up_limit=7 stream_timeout=12345 frame_classifier=045F" 115 if "OK" not in dev[0].request(cmd): 120 cmd = "MSCS change up_bitmap=F0 up_limit=7 stream_timeout=12345 frame_classifier=045F" 121 if "FAIL" not in dev[0].request(cmd): 124 cmd = "MSCS add up_bitmap=F0 up_limit=7 stream_timeout=12345 frame_classifier=045F" 125 if "FAIL" not in dev[0].request(cmd): 140 cmd = "MSCS change up_bitmap=F0 up_limit=7 stream_timeout=12345 frame_classifier=045F" 141 if "FAIL" not in dev[0].request(cmd): 144 cmd = "MSCS add up_bitmap=F0 up_limit=7 stream_timeout=12345 frame_classifier=045F" 145 if "OK" not in dev[0].request(cmd): [all …]
|
D | test_scs.py | 120 …cmd = "SCS scs_id=1 add scs_up=7 classifier_type=10 prot_instance=1 prot_number=udp filter_value=1… 121 if "OK" not in dev[0].request(cmd): 127 …cmd = "SCS scs_id=2 add scs_up=5 classifier_type=10 prot_instance=1 prot_number=udp filter_value=1… 128 if "OK" not in dev[0].request(cmd): 138 …cmd = "SCS scs_id=1 add scs_up=5 classifier_type=10 prot_instance=1 prot_number=udp filter_value=1… 139 if "FAIL" not in dev[0].request(cmd): 142 cmd = "SCS scs_id=1 remove" 143 if "OK" not in dev[0].request(cmd): 163 cmd = "SCS scs_id=1 change " + t 164 if "OK" not in dev[0].request(cmd): [all …]
|
D | test_macsec.py | 187 cmd = subprocess.Popen(["ip", "macsec", "show"], 190 res = cmd.stdout.read().decode() 191 cmd.stdout.close() 195 cmd = subprocess.Popen(["ip", "link", "show"], 197 res = cmd.stdout.read().decode() 198 cmd.stdout.close() 295 cmd = {} 296 cmd[0] = WlantestCapture('veth0', cap_veth0) 297 cmd[1] = WlantestCapture('veth1', cap_veth1) 321 for i in range(len(cmd)): [all …]
|
D | hostapd.py | 53 cmd = ' '.join(cmd_array) 55 cmd = cmd_array 56 proc = subprocess.Popen(cmd, stderr=subprocess.STDOUT, 64 def request(self, cmd, timeout=10): argument 65 logger.debug(self.dbg + ": CTRL(global): " + cmd) 66 return self.ctrl.request(cmd, timeout) 86 cmd = "ADD " + ifname + " " + hapd_ctrl 88 cmd += " " + driver 89 res = self.request(cmd) 170 cmd = ' '.join(cmd_array) [all …]
|
D | test_sigma_dut.py | 90 def run_cmd(self, cmd, port=9000, timeout=2, dump_dev=None): argument 91 if cmd.startswith('ap_config_commit'): 98 sock.send(cmd.encode() + b"\r\n") 137 logger.debug("sigma_dut: '%s' --> '%s'" % (cmd, res)) 141 def cmd_check(self, cmd, port=9000, timeout=2): argument 142 res = self.run_cmd(cmd, port=port, timeout=timeout) 144 raise Exception("sigma_dut command failed: " + cmd) 151 cmd = ['./sigma_dut', 160 cmd += ['-H', hostapd_logdir] 162 cmd += ['-C', cert_path] [all …]
|
D | hwsim_utils.py | 33 cmd = "DATA_TEST_CONFIG 1" 35 cmd = cmd + " ifname=" + ifname1 37 res = dev1.group_request(cmd) 39 res = dev1.request(cmd) 45 cmd = "DATA_TEST_CONFIG 1" 47 cmd = cmd + " ifname=" + ifname2 49 res = dev2.group_request(cmd) 51 res = dev2.request(cmd) 69 cmd = "DATA_TEST_TX ff:ff:ff:ff:ff:ff {} {}".format(addr1, tos) 71 cmd += " len=" + str(send_len) [all …]
|
D | remotehost.py | 22 cmd = ' '.join(command) 23 logger.debug("thread run: " + cmd) 34 logger.debug("thread cmd: " + cmd) 86 cmd = ["ssh", self.user + "@" + self.host, ' '.join(command)] 87 _cmd = self.name + " execute: " + ' '.join(cmd) 92 buf = subprocess.check_output(cmd, stderr=err) 115 cmd = _command 117 cmd = ["ssh", self.user + "@" + self.host, ' '.join(_command)] 118 _cmd = self.name + " thread_run: " + ' '.join(cmd) 120 t = threading.Thread(target=execute_thread, name=filename, args=(cmd, res)) [all …]
|
D | test_dscp.py | 144 cmd = "DSCP_QUERY wildcard" 145 if "OK" not in dev[0].request(cmd): 151 cmd = "DSCP_QUERY domain_name=example.com" 152 if "OK" not in dev[0].request(cmd): 159 cmd = "DSCP_QUERY domain_name=" + 250*'a' + ".example.com" 160 if "FAIL" not in dev[0].request(cmd): 170 cmd = "DSCP_QUERY wildcard" 171 if "FAIL" not in dev[0].request(cmd): 348 cmd = "DSCP_RESP solicited policy_id=1 status=0 policy_id=4 status=0" 349 if "OK" not in dev[0].request(cmd): [all …]
|
/hostap-latest/wpa_supplicant/ |
D | wpa_cli_zephyr.c | 44 static int _wpa_ctrl_command(struct wpa_ctrl *ctrl, const char *cmd, int print, char *resp) in _wpa_ctrl_command() argument 56 os_snprintf(buf, sizeof(buf), "IFNAME=%s %s", ifname_prefix, cmd); in _wpa_ctrl_command() 58 cmd = buf; in _wpa_ctrl_command() 62 ret = wpa_ctrl_request(ctrl, cmd, os_strlen(cmd), buf, &len, wpa_cli_msg_cb); in _wpa_ctrl_command() 64 wpa_printf(MSG_ERROR, "'%s' command timed out.", cmd); in _wpa_ctrl_command() 67 wpa_printf(MSG_ERROR, "'%s' command failed.", cmd); in _wpa_ctrl_command() 92 static int wpa_ctrl_command_resp(struct wpa_ctrl *ctrl, const char *cmd, char *resp) in wpa_ctrl_command_resp() argument 94 return _wpa_ctrl_command(ctrl, cmd, 0, resp); in wpa_ctrl_command_resp() 97 int zephyr_wpa_cli_cmd_resp(const char *cmd, char *resp) in zephyr_wpa_cli_cmd_resp() argument 99 return _wpa_ctrl_command(ctrl_conn, cmd, 1, resp); in zephyr_wpa_cli_cmd_resp() [all …]
|
D | wpa_cli_cmds.c | 39 static int wpa_cli_cmd(struct wpa_ctrl *ctrl, const char *cmd, int min_args, in wpa_cli_cmd() argument 57 "required.\n", cmd, min_args, in wpa_cli_cmd() 62 if (write_cmd(buf, CMD_BUF_LEN, cmd, argc, argv) < 0){ in wpa_cli_cmd() 302 char cmd[256]; in wpa_cli_cmd_interface_add() local 317 res = os_snprintf(cmd, sizeof(cmd), in wpa_cli_cmd_interface_add() 324 if (os_snprintf_error(sizeof(cmd), res)) in wpa_cli_cmd_interface_add() 326 cmd[sizeof(cmd) - 1] = '\0'; in wpa_cli_cmd_interface_add() 327 return wpa_cli_cmd(ctrl, cmd, 0, argc, argv); in wpa_cli_cmd_interface_add() 346 char cmd[256]; in wpa_cli_cmd_set() local 350 res = os_snprintf(cmd, sizeof(cmd), "SET %s ", argv[0]); in wpa_cli_cmd_set() [all …]
|
D | wpa_cli.c | 74 static void print_help(const char *cmd); 231 static int _wpa_ctrl_command(struct wpa_ctrl *ctrl, const char *cmd, int print) in _wpa_ctrl_command() argument 244 ifname_prefix, cmd); in _wpa_ctrl_command() 246 cmd = buf; in _wpa_ctrl_command() 249 ret = wpa_ctrl_request(ctrl, cmd, os_strlen(cmd), buf, &len, in _wpa_ctrl_command() 252 printf("'%s' command timed out.\n", cmd); in _wpa_ctrl_command() 256 printf("'%s' command failed.\n", cmd); in _wpa_ctrl_command() 273 int wpa_ctrl_command(struct wpa_ctrl *ctrl, const char *cmd) in wpa_ctrl_command() argument 275 static int wpa_ctrl_command(struct wpa_ctrl *ctrl, const char *cmd) in wpa_ctrl_command() 297 repl_buf = wpa_supplicant_ctrl_iface_process (wpa_s, (char *) cmd, &len); in wpa_ctrl_command() [all …]
|
D | dpp_supplicant.h | 16 int wpas_dpp_qr_code(struct wpa_supplicant *wpa_s, const char *cmd); 17 int wpas_dpp_nfc_uri(struct wpa_supplicant *wpa_s, const char *cmd); 18 int wpas_dpp_nfc_handover_req(struct wpa_supplicant *wpa_s, const char *cmd); 19 int wpas_dpp_nfc_handover_sel(struct wpa_supplicant *wpa_s, const char *cmd); 20 int wpas_dpp_auth_init(struct wpa_supplicant *wpa_s, const char *cmd); 21 int wpas_dpp_listen(struct wpa_supplicant *wpa_s, const char *cmd); 30 int wpas_dpp_configurator_sign(struct wpa_supplicant *wpa_s, const char *cmd); 31 int wpas_dpp_pkex_add(struct wpa_supplicant *wpa_s, const char *cmd); 38 int wpas_dpp_controller_start(struct wpa_supplicant *wpa_s, const char *cmd); 42 int wpas_dpp_chirp(struct wpa_supplicant *wpa_s, const char *cmd); [all …]
|
D | ctrl_iface.c | 281 static int wpas_ctrl_pno(struct wpa_supplicant *wpa_s, char *cmd) in wpas_ctrl_pno() argument 288 if (atoi(cmd)) { in wpas_ctrl_pno() 289 params = os_strchr(cmd, ' '); in wpas_ctrl_pno() 342 const char *cmd) in wpas_ctrl_iface_set_lci() argument 346 if (*cmd == '\0' || os_strcmp(cmd, "\"\"") == 0) { in wpas_ctrl_iface_set_lci() 352 lci = wpabuf_parse_bin(cmd); in wpas_ctrl_iface_set_lci() 369 wpas_ctrl_set_relative_rssi(struct wpa_supplicant *wpa_s, const char *cmd) in wpas_ctrl_set_relative_rssi() argument 373 if (os_strcmp(cmd, "disable") == 0) { in wpas_ctrl_set_relative_rssi() 378 relative_rssi = atoi(cmd); in wpas_ctrl_set_relative_rssi() 388 const char *cmd) in wpas_ctrl_set_relative_band_adjust() argument [all …]
|
/hostap-latest/hostapd/ |
D | hostapd_cli_zephyr.c | 42 char *cmd = *ppcmd; in make_argv() local 46 c = *cmd; in make_argv() 53 memmove(cmd, cmd + 1, supp_strlen(cmd)); in make_argv() 59 char t = *(cmd + 1); in make_argv() 62 memmove(cmd, cmd + 1, in make_argv() 63 supp_strlen(cmd)); in make_argv() 64 cmd += 1; in make_argv() 73 t = *(cmd + i); in make_argv() 83 memmove(cmd, cmd + (i - 1), in make_argv() 84 supp_strlen(cmd) - (i - 2)); in make_argv() [all …]
|
D | hostapd_cli_cmds.c | 23 static int hostapd_cli_cmd(struct wpa_ctrl *ctrl, const char *cmd, in hostapd_cli_cmd() argument 41 "required.\n", cmd, min_args, in hostapd_cli_cmd() 46 if (write_cmd(buf, CMD_BUF_LEN, cmd, argc, argv) < 0){ in hostapd_cli_cmd() 63 char cmd[256]; in hostapd_cli_cmd_set() local 67 res = os_snprintf(cmd, sizeof(cmd), "SET %s ", argv[0]); in hostapd_cli_cmd_set() 68 if (os_snprintf_error(sizeof(cmd), res)) { in hostapd_cli_cmd_set() 72 return hostapd_cli_cmd(ctrl, cmd, 0, argc, argv); in hostapd_cli_cmd_set() 237 char cmd[256]; in hostapd_cli_cmd_chan_switch() local 252 res = os_snprintf(cmd, sizeof(cmd), "CHAN_SWITCH %s %s", in hostapd_cli_cmd_chan_switch() 254 if (os_snprintf_error(sizeof(cmd), res)) { in hostapd_cli_cmd_chan_switch() [all …]
|
D | hostapd_cli.c | 45 static void print_help(FILE *stream, const char *cmd); 193 static int _wpa_ctrl_command(struct wpa_ctrl *ctrl, const char *cmd, int print) in _wpa_ctrl_command() argument 204 ret = wpa_ctrl_request(ctrl, cmd, strlen(cmd), buf, &len, in _wpa_ctrl_command() 207 printf("'%s' command timed out.\n", cmd); in _wpa_ctrl_command() 210 printf("'%s' command failed.\n", cmd); in _wpa_ctrl_command() 221 static inline int wpa_ctrl_command(struct wpa_ctrl *ctrl, const char *cmd) in wpa_ctrl_command() argument 223 return _wpa_ctrl_command(ctrl, cmd, 1); in wpa_ctrl_command() 227 static int hostapd_cli_cmd(struct wpa_ctrl *ctrl, const char *cmd, in hostapd_cli_cmd() argument 234 cmd, min_args, min_args > 1 ? "s are" : " is"); in hostapd_cli_cmd() 237 if (write_cmd(buf, sizeof(buf), cmd, argc, argv) < 0) in hostapd_cli_cmd() [all …]
|
D | ctrl_iface.c | 194 struct hostapd_data *hapd, char *cmd, char *buf, size_t buflen) in hostapd_ctrl_iface_wps_check_pin() argument 202 (u8 *) cmd, os_strlen(cmd)); in hostapd_ctrl_iface_wps_check_pin() 203 for (pos = cmd, len = 0; *pos != '\0'; pos++) { in hostapd_ctrl_iface_wps_check_pin() 267 char *cmd, char *reply, in hostapd_ctrl_iface_wps_nfc_config_token() argument 274 if (os_strcmp(cmd, "WPS") == 0) in hostapd_ctrl_iface_wps_nfc_config_token() 276 else if (os_strcmp(cmd, "NDEF") == 0) in hostapd_ctrl_iface_wps_nfc_config_token() 319 char *cmd, char *reply, in hostapd_ctrl_iface_wps_nfc_token() argument 322 if (os_strcmp(cmd, "WPS") == 0) in hostapd_ctrl_iface_wps_nfc_token() 326 if (os_strcmp(cmd, "NDEF") == 0) in hostapd_ctrl_iface_wps_nfc_token() 330 if (os_strcmp(cmd, "enable") == 0) in hostapd_ctrl_iface_wps_nfc_token() [all …]
|
/hostap-latest/wpa_supplicant/wpa_gui-qt4/ |
D | networkconfig.cpp | 187 char reply[10], cmd[256]; in addNetwork() local 404 snprintf(cmd, sizeof(cmd), "ENABLE_NETWORK %d", id); in addNetwork() 406 wpagui->ctrlRequest(cmd, reply, &reply_len); in addNetwork() 430 char reply[10], cmd[256]; in setNetworkParam() local 432 snprintf(cmd, sizeof(cmd), "SET_NETWORK %d %s %s%s%s", in setNetworkParam() 435 wpagui->ctrlRequest(cmd, reply, &reply_len); in setNetworkParam() 509 char reply[1024], cmd[256], *pos; in paramsFromConfig() local 512 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d ssid", network_id); in paramsFromConfig() 514 if (wpagui->ctrlRequest(cmd, reply, &reply_len) >= 0 && in paramsFromConfig() 523 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d proto", network_id); in paramsFromConfig() [all …]
|
D | peers.cpp | 320 char cmd[100]; in enter_pin() local 325 snprintf(cmd, sizeof(cmd), "WPS_ER_PIN %s %s %s", in enter_pin() 330 snprintf(cmd, sizeof(cmd), "WPS_PIN %s %s", in enter_pin() 335 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) { in enter_pin() 458 char cmd[30]; in add_stations() local 479 res = snprintf(cmd, sizeof(cmd), "STA-NEXT %s", reply); in add_stations() 480 if (res < 0 || (size_t) res >= sizeof(cmd)) in add_stations() 482 res = wpagui->ctrlRequest(cmd, reply, &reply_len); in add_stations() 491 char cmd[30]; in add_single_station() local 494 snprintf(cmd, sizeof(cmd), "STA %s", addr); in add_single_station() [all …]
|
/hostap-latest/hs20/server/www/ |
D | users.php | 17 $cmd = $_GET["cmd"]; variable 19 $cmd = ''; variable 21 if ($cmd == 'eventlog' && $id > 0) { 35 if ($cmd == 'mo' && $id > 0) { 48 if ($cmd == 'cert' && $id > 0) { 63 if ($cmd == 'subrem-clear' && $id > 0) { 66 if ($cmd == 'subrem-add-user' && $id > 0) { 69 if ($cmd == 'subrem-add-machine' && $id > 0) { 72 if ($cmd == 'subrem-add-reenroll' && $id > 0) { 75 if ($cmd == 'subrem-add-policy' && $id > 0) { [all …]
|
/hostap-latest/src/ap/ |
D | dpp_hostapd.h | 15 int hostapd_dpp_qr_code(struct hostapd_data *hapd, const char *cmd); 16 int hostapd_dpp_nfc_uri(struct hostapd_data *hapd, const char *cmd); 17 int hostapd_dpp_nfc_handover_req(struct hostapd_data *hapd, const char *cmd); 18 int hostapd_dpp_nfc_handover_sel(struct hostapd_data *hapd, const char *cmd); 19 int hostapd_dpp_auth_init(struct hostapd_data *hapd, const char *cmd); 20 int hostapd_dpp_listen(struct hostapd_data *hapd, const char *cmd); 31 int hostapd_dpp_configurator_add(struct hostapd_data *hapd, const char *cmd); 33 int hostapd_dpp_configurator_sign(struct hostapd_data *hapd, const char *cmd); 36 int hostapd_dpp_pkex_add(struct hostapd_data *hapd, const char *cmd); 44 int hostapd_dpp_controller_start(struct hostapd_data *hapd, const char *cmd); [all …]
|
/hostap-latest/src/utils/ |
D | pcsc_funcs.c | 813 unsigned char cmd[50] = { SIM_CMD_SELECT }; in _scard_select_file() local 819 cmd[0] = USIM_CLA; in _scard_select_file() 820 cmd[3] = 0x04; in _scard_select_file() 828 if (5 + aidlen > sizeof(cmd)) in _scard_select_file() 830 cmd[2] = 0x04; /* Select by AID */ in _scard_select_file() 831 cmd[4] = aidlen; /* len */ in _scard_select_file() 832 os_memcpy(cmd + 5, aid, aidlen); in _scard_select_file() 835 cmd[5] = file_id >> 8; in _scard_select_file() 836 cmd[6] = file_id & 0xff; in _scard_select_file() 840 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); in _scard_select_file() [all …]
|
D | edit_readline.c | 19 static void (*edit_cmd_cb)(void *ctx, char *cmd); 21 static char ** (*edit_completion_cb)(void *ctx, const char *cmd, int pos) = 92 static void readline_cmd_handler(char *cmd) in readline_cmd_handler() argument 94 if (cmd && *cmd) { in readline_cmd_handler() 99 if (h == NULL || os_strcmp(cmd, h->line) != 0) in readline_cmd_handler() 100 add_history(cmd); in readline_cmd_handler() 103 if (cmd == NULL) { in readline_cmd_handler() 107 trunc_nl(cmd); in readline_cmd_handler() 108 edit_cmd_cb(edit_cb_ctx, cmd); in readline_cmd_handler() 112 int edit_init(void (*cmd_cb)(void *ctx, char *cmd), in edit_init() argument [all …]
|