Home
last modified time | relevance | path

Searched refs:cmd (Results 1 – 25 of 158) sorted by relevance

1234567

/hostap-latest/tests/hwsim/
Dtest_nan_usd.py25 cmd = "NAN_PUBLISH service_name=_test solicited=0 unsolicited=0"
26 id0 = dev[0].request(cmd)
33 cmd = "NAN_PUBLISH service_name=_test srv_proto_type=2 ssi=6677"
34 id0 = dev[0].request(cmd)
38 cmd = "NAN_UPDATE_PUBLISH publish_id=" + id0 + " ssi=1122334455"
39 if "FAIL" in dev[0].request(cmd):
42 cmd = "NAN_CANCEL_PUBLISH publish_id=" + id0
43 if "FAIL" in dev[0].request(cmd):
54 cmd = "NAN_PUBLISH service_name=_test"
57 if "FAIL" in dev[0].request(cmd):
[all …]
Dwpasupplicant.py141 cmd = ' '.join(cmd_array)
143 cmd = cmd_array
144 proc = subprocess.Popen(cmd, stderr=subprocess.STDOUT,
212cmd = "INTERFACE_ADD " + ifname + "\t" + config + "\t" + driver + "\tDIR=/var/run/wpa_supplicant G…
214 cmd = cmd + '\t' + drv_params
217 cmd += '\t'
218 cmd += '\t' + br_ifname
221 cmd += '\t'
223 cmd += '\t'
224 cmd += '\tcreate'
[all …]
Dtest_mscs.py114 cmd = "MSCS add up_bitmap=F0 up_limit=7 stream_timeout=12345 frame_classifier=045F"
115 if "OK" not in dev[0].request(cmd):
120 cmd = "MSCS change up_bitmap=F0 up_limit=7 stream_timeout=12345 frame_classifier=045F"
121 if "FAIL" not in dev[0].request(cmd):
124 cmd = "MSCS add up_bitmap=F0 up_limit=7 stream_timeout=12345 frame_classifier=045F"
125 if "FAIL" not in dev[0].request(cmd):
140 cmd = "MSCS change up_bitmap=F0 up_limit=7 stream_timeout=12345 frame_classifier=045F"
141 if "FAIL" not in dev[0].request(cmd):
144 cmd = "MSCS add up_bitmap=F0 up_limit=7 stream_timeout=12345 frame_classifier=045F"
145 if "OK" not in dev[0].request(cmd):
[all …]
Dtest_scs.py120cmd = "SCS scs_id=1 add scs_up=7 classifier_type=10 prot_instance=1 prot_number=udp filter_value=1…
121 if "OK" not in dev[0].request(cmd):
127cmd = "SCS scs_id=2 add scs_up=5 classifier_type=10 prot_instance=1 prot_number=udp filter_value=1…
128 if "OK" not in dev[0].request(cmd):
138cmd = "SCS scs_id=1 add scs_up=5 classifier_type=10 prot_instance=1 prot_number=udp filter_value=1…
139 if "FAIL" not in dev[0].request(cmd):
142 cmd = "SCS scs_id=1 remove"
143 if "OK" not in dev[0].request(cmd):
163 cmd = "SCS scs_id=1 change " + t
164 if "OK" not in dev[0].request(cmd):
[all …]
Dtest_macsec.py187 cmd = subprocess.Popen(["ip", "macsec", "show"],
190 res = cmd.stdout.read().decode()
191 cmd.stdout.close()
195 cmd = subprocess.Popen(["ip", "link", "show"],
197 res = cmd.stdout.read().decode()
198 cmd.stdout.close()
295 cmd = {}
296 cmd[0] = WlantestCapture('veth0', cap_veth0)
297 cmd[1] = WlantestCapture('veth1', cap_veth1)
321 for i in range(len(cmd)):
[all …]
Dhostapd.py53 cmd = ' '.join(cmd_array)
55 cmd = cmd_array
56 proc = subprocess.Popen(cmd, stderr=subprocess.STDOUT,
64 def request(self, cmd, timeout=10): argument
65 logger.debug(self.dbg + ": CTRL(global): " + cmd)
66 return self.ctrl.request(cmd, timeout)
86 cmd = "ADD " + ifname + " " + hapd_ctrl
88 cmd += " " + driver
89 res = self.request(cmd)
170 cmd = ' '.join(cmd_array)
[all …]
Dtest_sigma_dut.py90 def run_cmd(self, cmd, port=9000, timeout=2, dump_dev=None): argument
91 if cmd.startswith('ap_config_commit'):
98 sock.send(cmd.encode() + b"\r\n")
137 logger.debug("sigma_dut: '%s' --> '%s'" % (cmd, res))
141 def cmd_check(self, cmd, port=9000, timeout=2): argument
142 res = self.run_cmd(cmd, port=port, timeout=timeout)
144 raise Exception("sigma_dut command failed: " + cmd)
151 cmd = ['./sigma_dut',
160 cmd += ['-H', hostapd_logdir]
162 cmd += ['-C', cert_path]
[all …]
Dhwsim_utils.py33 cmd = "DATA_TEST_CONFIG 1"
35 cmd = cmd + " ifname=" + ifname1
37 res = dev1.group_request(cmd)
39 res = dev1.request(cmd)
45 cmd = "DATA_TEST_CONFIG 1"
47 cmd = cmd + " ifname=" + ifname2
49 res = dev2.group_request(cmd)
51 res = dev2.request(cmd)
69 cmd = "DATA_TEST_TX ff:ff:ff:ff:ff:ff {} {}".format(addr1, tos)
71 cmd += " len=" + str(send_len)
[all …]
Dremotehost.py22 cmd = ' '.join(command)
23 logger.debug("thread run: " + cmd)
34 logger.debug("thread cmd: " + cmd)
86 cmd = ["ssh", self.user + "@" + self.host, ' '.join(command)]
87 _cmd = self.name + " execute: " + ' '.join(cmd)
92 buf = subprocess.check_output(cmd, stderr=err)
115 cmd = _command
117 cmd = ["ssh", self.user + "@" + self.host, ' '.join(_command)]
118 _cmd = self.name + " thread_run: " + ' '.join(cmd)
120 t = threading.Thread(target=execute_thread, name=filename, args=(cmd, res))
[all …]
Dtest_dscp.py144 cmd = "DSCP_QUERY wildcard"
145 if "OK" not in dev[0].request(cmd):
151 cmd = "DSCP_QUERY domain_name=example.com"
152 if "OK" not in dev[0].request(cmd):
159 cmd = "DSCP_QUERY domain_name=" + 250*'a' + ".example.com"
160 if "FAIL" not in dev[0].request(cmd):
170 cmd = "DSCP_QUERY wildcard"
171 if "FAIL" not in dev[0].request(cmd):
348 cmd = "DSCP_RESP solicited policy_id=1 status=0 policy_id=4 status=0"
349 if "OK" not in dev[0].request(cmd):
[all …]
/hostap-latest/wpa_supplicant/
Dwpa_cli_zephyr.c44 static int _wpa_ctrl_command(struct wpa_ctrl *ctrl, const char *cmd, int print, char *resp) in _wpa_ctrl_command() argument
56 os_snprintf(buf, sizeof(buf), "IFNAME=%s %s", ifname_prefix, cmd); in _wpa_ctrl_command()
58 cmd = buf; in _wpa_ctrl_command()
62 ret = wpa_ctrl_request(ctrl, cmd, os_strlen(cmd), buf, &len, wpa_cli_msg_cb); in _wpa_ctrl_command()
64 wpa_printf(MSG_ERROR, "'%s' command timed out.", cmd); in _wpa_ctrl_command()
67 wpa_printf(MSG_ERROR, "'%s' command failed.", cmd); in _wpa_ctrl_command()
92 static int wpa_ctrl_command_resp(struct wpa_ctrl *ctrl, const char *cmd, char *resp) in wpa_ctrl_command_resp() argument
94 return _wpa_ctrl_command(ctrl, cmd, 0, resp); in wpa_ctrl_command_resp()
97 int zephyr_wpa_cli_cmd_resp(const char *cmd, char *resp) in zephyr_wpa_cli_cmd_resp() argument
99 return _wpa_ctrl_command(ctrl_conn, cmd, 1, resp); in zephyr_wpa_cli_cmd_resp()
[all …]
Dwpa_cli_cmds.c39 static int wpa_cli_cmd(struct wpa_ctrl *ctrl, const char *cmd, int min_args, in wpa_cli_cmd() argument
57 "required.\n", cmd, min_args, in wpa_cli_cmd()
62 if (write_cmd(buf, CMD_BUF_LEN, cmd, argc, argv) < 0){ in wpa_cli_cmd()
302 char cmd[256]; in wpa_cli_cmd_interface_add() local
317 res = os_snprintf(cmd, sizeof(cmd), in wpa_cli_cmd_interface_add()
324 if (os_snprintf_error(sizeof(cmd), res)) in wpa_cli_cmd_interface_add()
326 cmd[sizeof(cmd) - 1] = '\0'; in wpa_cli_cmd_interface_add()
327 return wpa_cli_cmd(ctrl, cmd, 0, argc, argv); in wpa_cli_cmd_interface_add()
346 char cmd[256]; in wpa_cli_cmd_set() local
350 res = os_snprintf(cmd, sizeof(cmd), "SET %s ", argv[0]); in wpa_cli_cmd_set()
[all …]
Dwpa_cli.c74 static void print_help(const char *cmd);
231 static int _wpa_ctrl_command(struct wpa_ctrl *ctrl, const char *cmd, int print) in _wpa_ctrl_command() argument
244 ifname_prefix, cmd); in _wpa_ctrl_command()
246 cmd = buf; in _wpa_ctrl_command()
249 ret = wpa_ctrl_request(ctrl, cmd, os_strlen(cmd), buf, &len, in _wpa_ctrl_command()
252 printf("'%s' command timed out.\n", cmd); in _wpa_ctrl_command()
256 printf("'%s' command failed.\n", cmd); in _wpa_ctrl_command()
273 int wpa_ctrl_command(struct wpa_ctrl *ctrl, const char *cmd) in wpa_ctrl_command() argument
275 static int wpa_ctrl_command(struct wpa_ctrl *ctrl, const char *cmd) in wpa_ctrl_command()
297 repl_buf = wpa_supplicant_ctrl_iface_process (wpa_s, (char *) cmd, &len); in wpa_ctrl_command()
[all …]
Ddpp_supplicant.h16 int wpas_dpp_qr_code(struct wpa_supplicant *wpa_s, const char *cmd);
17 int wpas_dpp_nfc_uri(struct wpa_supplicant *wpa_s, const char *cmd);
18 int wpas_dpp_nfc_handover_req(struct wpa_supplicant *wpa_s, const char *cmd);
19 int wpas_dpp_nfc_handover_sel(struct wpa_supplicant *wpa_s, const char *cmd);
20 int wpas_dpp_auth_init(struct wpa_supplicant *wpa_s, const char *cmd);
21 int wpas_dpp_listen(struct wpa_supplicant *wpa_s, const char *cmd);
30 int wpas_dpp_configurator_sign(struct wpa_supplicant *wpa_s, const char *cmd);
31 int wpas_dpp_pkex_add(struct wpa_supplicant *wpa_s, const char *cmd);
38 int wpas_dpp_controller_start(struct wpa_supplicant *wpa_s, const char *cmd);
42 int wpas_dpp_chirp(struct wpa_supplicant *wpa_s, const char *cmd);
[all …]
Dctrl_iface.c281 static int wpas_ctrl_pno(struct wpa_supplicant *wpa_s, char *cmd) in wpas_ctrl_pno() argument
288 if (atoi(cmd)) { in wpas_ctrl_pno()
289 params = os_strchr(cmd, ' '); in wpas_ctrl_pno()
342 const char *cmd) in wpas_ctrl_iface_set_lci() argument
346 if (*cmd == '\0' || os_strcmp(cmd, "\"\"") == 0) { in wpas_ctrl_iface_set_lci()
352 lci = wpabuf_parse_bin(cmd); in wpas_ctrl_iface_set_lci()
369 wpas_ctrl_set_relative_rssi(struct wpa_supplicant *wpa_s, const char *cmd) in wpas_ctrl_set_relative_rssi() argument
373 if (os_strcmp(cmd, "disable") == 0) { in wpas_ctrl_set_relative_rssi()
378 relative_rssi = atoi(cmd); in wpas_ctrl_set_relative_rssi()
388 const char *cmd) in wpas_ctrl_set_relative_band_adjust() argument
[all …]
/hostap-latest/hostapd/
Dhostapd_cli_zephyr.c42 char *cmd = *ppcmd; in make_argv() local
46 c = *cmd; in make_argv()
53 memmove(cmd, cmd + 1, supp_strlen(cmd)); in make_argv()
59 char t = *(cmd + 1); in make_argv()
62 memmove(cmd, cmd + 1, in make_argv()
63 supp_strlen(cmd)); in make_argv()
64 cmd += 1; in make_argv()
73 t = *(cmd + i); in make_argv()
83 memmove(cmd, cmd + (i - 1), in make_argv()
84 supp_strlen(cmd) - (i - 2)); in make_argv()
[all …]
Dhostapd_cli_cmds.c23 static int hostapd_cli_cmd(struct wpa_ctrl *ctrl, const char *cmd, in hostapd_cli_cmd() argument
41 "required.\n", cmd, min_args, in hostapd_cli_cmd()
46 if (write_cmd(buf, CMD_BUF_LEN, cmd, argc, argv) < 0){ in hostapd_cli_cmd()
63 char cmd[256]; in hostapd_cli_cmd_set() local
67 res = os_snprintf(cmd, sizeof(cmd), "SET %s ", argv[0]); in hostapd_cli_cmd_set()
68 if (os_snprintf_error(sizeof(cmd), res)) { in hostapd_cli_cmd_set()
72 return hostapd_cli_cmd(ctrl, cmd, 0, argc, argv); in hostapd_cli_cmd_set()
237 char cmd[256]; in hostapd_cli_cmd_chan_switch() local
252 res = os_snprintf(cmd, sizeof(cmd), "CHAN_SWITCH %s %s", in hostapd_cli_cmd_chan_switch()
254 if (os_snprintf_error(sizeof(cmd), res)) { in hostapd_cli_cmd_chan_switch()
[all …]
Dhostapd_cli.c45 static void print_help(FILE *stream, const char *cmd);
193 static int _wpa_ctrl_command(struct wpa_ctrl *ctrl, const char *cmd, int print) in _wpa_ctrl_command() argument
204 ret = wpa_ctrl_request(ctrl, cmd, strlen(cmd), buf, &len, in _wpa_ctrl_command()
207 printf("'%s' command timed out.\n", cmd); in _wpa_ctrl_command()
210 printf("'%s' command failed.\n", cmd); in _wpa_ctrl_command()
221 static inline int wpa_ctrl_command(struct wpa_ctrl *ctrl, const char *cmd) in wpa_ctrl_command() argument
223 return _wpa_ctrl_command(ctrl, cmd, 1); in wpa_ctrl_command()
227 static int hostapd_cli_cmd(struct wpa_ctrl *ctrl, const char *cmd, in hostapd_cli_cmd() argument
234 cmd, min_args, min_args > 1 ? "s are" : " is"); in hostapd_cli_cmd()
237 if (write_cmd(buf, sizeof(buf), cmd, argc, argv) < 0) in hostapd_cli_cmd()
[all …]
Dctrl_iface.c194 struct hostapd_data *hapd, char *cmd, char *buf, size_t buflen) in hostapd_ctrl_iface_wps_check_pin() argument
202 (u8 *) cmd, os_strlen(cmd)); in hostapd_ctrl_iface_wps_check_pin()
203 for (pos = cmd, len = 0; *pos != '\0'; pos++) { in hostapd_ctrl_iface_wps_check_pin()
267 char *cmd, char *reply, in hostapd_ctrl_iface_wps_nfc_config_token() argument
274 if (os_strcmp(cmd, "WPS") == 0) in hostapd_ctrl_iface_wps_nfc_config_token()
276 else if (os_strcmp(cmd, "NDEF") == 0) in hostapd_ctrl_iface_wps_nfc_config_token()
319 char *cmd, char *reply, in hostapd_ctrl_iface_wps_nfc_token() argument
322 if (os_strcmp(cmd, "WPS") == 0) in hostapd_ctrl_iface_wps_nfc_token()
326 if (os_strcmp(cmd, "NDEF") == 0) in hostapd_ctrl_iface_wps_nfc_token()
330 if (os_strcmp(cmd, "enable") == 0) in hostapd_ctrl_iface_wps_nfc_token()
[all …]
/hostap-latest/wpa_supplicant/wpa_gui-qt4/
Dnetworkconfig.cpp187 char reply[10], cmd[256]; in addNetwork() local
404 snprintf(cmd, sizeof(cmd), "ENABLE_NETWORK %d", id); in addNetwork()
406 wpagui->ctrlRequest(cmd, reply, &reply_len); in addNetwork()
430 char reply[10], cmd[256]; in setNetworkParam() local
432 snprintf(cmd, sizeof(cmd), "SET_NETWORK %d %s %s%s%s", in setNetworkParam()
435 wpagui->ctrlRequest(cmd, reply, &reply_len); in setNetworkParam()
509 char reply[1024], cmd[256], *pos; in paramsFromConfig() local
512 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d ssid", network_id); in paramsFromConfig()
514 if (wpagui->ctrlRequest(cmd, reply, &reply_len) >= 0 && in paramsFromConfig()
523 snprintf(cmd, sizeof(cmd), "GET_NETWORK %d proto", network_id); in paramsFromConfig()
[all …]
Dpeers.cpp320 char cmd[100]; in enter_pin() local
325 snprintf(cmd, sizeof(cmd), "WPS_ER_PIN %s %s %s", in enter_pin()
330 snprintf(cmd, sizeof(cmd), "WPS_PIN %s %s", in enter_pin()
335 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) { in enter_pin()
458 char cmd[30]; in add_stations() local
479 res = snprintf(cmd, sizeof(cmd), "STA-NEXT %s", reply); in add_stations()
480 if (res < 0 || (size_t) res >= sizeof(cmd)) in add_stations()
482 res = wpagui->ctrlRequest(cmd, reply, &reply_len); in add_stations()
491 char cmd[30]; in add_single_station() local
494 snprintf(cmd, sizeof(cmd), "STA %s", addr); in add_single_station()
[all …]
/hostap-latest/hs20/server/www/
Dusers.php17 $cmd = $_GET["cmd"]; variable
19 $cmd = ''; variable
21 if ($cmd == 'eventlog' && $id > 0) {
35 if ($cmd == 'mo' && $id > 0) {
48 if ($cmd == 'cert' && $id > 0) {
63 if ($cmd == 'subrem-clear' && $id > 0) {
66 if ($cmd == 'subrem-add-user' && $id > 0) {
69 if ($cmd == 'subrem-add-machine' && $id > 0) {
72 if ($cmd == 'subrem-add-reenroll' && $id > 0) {
75 if ($cmd == 'subrem-add-policy' && $id > 0) {
[all …]
/hostap-latest/src/ap/
Ddpp_hostapd.h15 int hostapd_dpp_qr_code(struct hostapd_data *hapd, const char *cmd);
16 int hostapd_dpp_nfc_uri(struct hostapd_data *hapd, const char *cmd);
17 int hostapd_dpp_nfc_handover_req(struct hostapd_data *hapd, const char *cmd);
18 int hostapd_dpp_nfc_handover_sel(struct hostapd_data *hapd, const char *cmd);
19 int hostapd_dpp_auth_init(struct hostapd_data *hapd, const char *cmd);
20 int hostapd_dpp_listen(struct hostapd_data *hapd, const char *cmd);
31 int hostapd_dpp_configurator_add(struct hostapd_data *hapd, const char *cmd);
33 int hostapd_dpp_configurator_sign(struct hostapd_data *hapd, const char *cmd);
36 int hostapd_dpp_pkex_add(struct hostapd_data *hapd, const char *cmd);
44 int hostapd_dpp_controller_start(struct hostapd_data *hapd, const char *cmd);
[all …]
/hostap-latest/src/utils/
Dpcsc_funcs.c813 unsigned char cmd[50] = { SIM_CMD_SELECT }; in _scard_select_file() local
819 cmd[0] = USIM_CLA; in _scard_select_file()
820 cmd[3] = 0x04; in _scard_select_file()
828 if (5 + aidlen > sizeof(cmd)) in _scard_select_file()
830 cmd[2] = 0x04; /* Select by AID */ in _scard_select_file()
831 cmd[4] = aidlen; /* len */ in _scard_select_file()
832 os_memcpy(cmd + 5, aid, aidlen); in _scard_select_file()
835 cmd[5] = file_id >> 8; in _scard_select_file()
836 cmd[6] = file_id & 0xff; in _scard_select_file()
840 ret = scard_transmit(scard, cmd, cmdlen, resp, &len); in _scard_select_file()
[all …]
Dedit_readline.c19 static void (*edit_cmd_cb)(void *ctx, char *cmd);
21 static char ** (*edit_completion_cb)(void *ctx, const char *cmd, int pos) =
92 static void readline_cmd_handler(char *cmd) in readline_cmd_handler() argument
94 if (cmd && *cmd) { in readline_cmd_handler()
99 if (h == NULL || os_strcmp(cmd, h->line) != 0) in readline_cmd_handler()
100 add_history(cmd); in readline_cmd_handler()
103 if (cmd == NULL) { in readline_cmd_handler()
107 trunc_nl(cmd); in readline_cmd_handler()
108 edit_cmd_cb(edit_cb_ctx, cmd); in readline_cmd_handler()
112 int edit_init(void (*cmd_cb)(void *ctx, char *cmd), in edit_init() argument
[all …]

1234567