| /hostap-latest/wpa_supplicant/wpa_gui-qt4/lang/ |
| D | wpa_gui_de.ts | 6 <message> 10 </message> 11 <message> 15 </message> 16 <message> 20 </message> 21 <message> 25 </message> 26 <message> 30 </message> [all …]
|
| /hostap-latest/wpa_supplicant/dbus/ |
| D | dbus_new_handlers.h | 55 DBusMessage * wpas_dbus_handler_create_interface(DBusMessage *message, 58 DBusMessage * wpas_dbus_handler_remove_interface(DBusMessage *message, 61 DBusMessage * wpas_dbus_handler_get_interface(DBusMessage *message, 64 DBusMessage * wpas_dbus_handler_expect_disconnect(DBusMessage *message, 79 DBusMessage * wpas_dbus_handler_scan(DBusMessage *message, 82 DBusMessage * wpas_dbus_handler_abort_scan(DBusMessage *message, 85 DBusMessage * wpas_dbus_handler_signal_poll(DBusMessage *message, 88 DBusMessage * wpas_dbus_handler_disconnect(DBusMessage *message, 96 DBusMessage * wpas_dbus_handler_add_network(DBusMessage *message, 99 DBusMessage * wpas_dbus_handler_reassociate(DBusMessage *message, [all …]
|
| D | dbus_new_handlers_p2p.h | 22 DBusMessage *message, struct wpa_supplicant *wpa_s); 25 DBusMessage *message, struct wpa_supplicant *wpa_s); 28 DBusMessage *message, struct wpa_supplicant *wpa_s); 31 DBusMessage *message, struct wpa_supplicant *wpa_s); 34 DBusMessage *message, struct wpa_supplicant *wpa_s); 37 DBusMessage *message, struct wpa_supplicant *wpa_s); 40 DBusMessage *message, struct wpa_supplicant *wpa_s); 43 DBusMessage *message, struct wpa_supplicant *wpa_s); 46 DBusMessage *message, 49 DBusMessage * wpas_dbus_handler_p2p_cancel(DBusMessage *message, [all …]
|
| D | dbus_new_helpers.c | 82 static DBusMessage * get_all_properties(DBusMessage *message, char *interface, in get_all_properties() argument 89 reply = dbus_message_new_method_return(message); in get_all_properties() 91 return wpas_dbus_error_no_memory(message); in get_all_properties() 96 return wpas_dbus_error_no_memory(message); in get_all_properties() 105 message, &error, DBUS_ERROR_INVALID_ARGS, in get_all_properties() 113 return wpas_dbus_error_no_memory(message); in get_all_properties() 120 static int is_signature_correct(DBusMessage *message, in is_signature_correct() argument 126 const char *sig = dbus_message_get_signature(message); in is_signature_correct() 148 static DBusMessage * properties_get_all(DBusMessage *message, char *interface, in properties_get_all() argument 151 if (os_strcmp(dbus_message_get_signature(message), "s") != 0) in properties_get_all() [all …]
|
| D | dbus_new_handlers.c | 54 DBusMessage * wpas_dbus_error_unknown_error(DBusMessage *message, in wpas_dbus_error_unknown_error() argument 57 return dbus_message_new_error(message, WPAS_DBUS_ERROR_UNKNOWN_ERROR, in wpas_dbus_error_unknown_error() 69 static DBusMessage * wpas_dbus_error_iface_unknown(DBusMessage *message) in wpas_dbus_error_iface_unknown() argument 72 message, WPAS_DBUS_ERROR_IFACE_UNKNOWN, in wpas_dbus_error_iface_unknown() 84 static DBusMessage * wpas_dbus_error_network_unknown(DBusMessage *message) in wpas_dbus_error_network_unknown() argument 87 message, WPAS_DBUS_ERROR_NETWORK_UNKNOWN, in wpas_dbus_error_network_unknown() 99 DBusMessage * wpas_dbus_error_invalid_args(DBusMessage *message, in wpas_dbus_error_invalid_args() argument 105 message, WPAS_DBUS_ERROR_INVALID_ARGS, in wpas_dbus_error_invalid_args() 123 static DBusMessage * wpas_dbus_error_scan_error(DBusMessage *message, in wpas_dbus_error_scan_error() argument 126 return dbus_message_new_error(message, in wpas_dbus_error_scan_error() [all …]
|
| D | dbus_new_handlers_wps.c | 33 static int wpas_dbus_handler_wps_role(DBusMessage *message, in wpas_dbus_handler_wps_role() argument 46 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_role() 57 *reply = wpas_dbus_error_invalid_args(message, val); in wpas_dbus_handler_wps_role() 64 static int wpas_dbus_handler_wps_type(DBusMessage *message, in wpas_dbus_handler_wps_type() argument 76 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_type() 88 *reply = wpas_dbus_error_invalid_args(message, val); in wpas_dbus_handler_wps_type() 95 static int wpas_dbus_handler_wps_bssid(DBusMessage *message, in wpas_dbus_handler_wps_bssid() argument 110 message, "Bssid must be a byte array"); in wpas_dbus_handler_wps_bssid() 118 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_bssid() 126 static int wpas_dbus_handler_wps_pin(DBusMessage *message, in wpas_dbus_handler_wps_pin() argument [all …]
|
| D | dbus_new_handlers_p2p.c | 82 wpas_dbus_error_persistent_group_unknown(DBusMessage *message) in wpas_dbus_error_persistent_group_unknown() argument 85 message, WPAS_DBUS_ERROR_NETWORK_UNKNOWN, in wpas_dbus_error_persistent_group_unknown() 98 static DBusMessage * wpas_dbus_error_no_p2p_mgmt_iface(DBusMessage *message) in wpas_dbus_error_no_p2p_mgmt_iface() argument 101 return dbus_message_new_error(message, WPAS_DBUS_ERROR_IFACE_UNKNOWN, in wpas_dbus_error_no_p2p_mgmt_iface() 106 DBusMessage * wpas_dbus_handler_p2p_find(DBusMessage *message, in wpas_dbus_handler_p2p_find() argument 120 dbus_message_iter_init(message, &iter); in wpas_dbus_handler_p2p_find() 174 reply = wpas_dbus_error_no_p2p_mgmt_iface(message); in wpas_dbus_handler_p2p_find() 181 message, "Could not start P2P find"); in wpas_dbus_handler_p2p_find() 189 reply = wpas_dbus_error_invalid_args(message, entry.key); in wpas_dbus_handler_p2p_find() 196 DBusMessage * wpas_dbus_handler_p2p_stop_find(DBusMessage *message, in wpas_dbus_handler_p2p_stop_find() argument [all …]
|
| D | dbus_new_helpers.h | 17 typedef DBusMessage * (*WPADBusMethodHandler)(DBusMessage *message, 145 DBusMessage * wpa_dbus_introspect(DBusMessage *message, 151 DBusMessage *wpas_dbus_reply_new_from_error(DBusMessage *message,
|
| D | dbus_common.c | 263 DBusMessage *message, void *data) in disconnect_filter() argument 267 if (dbus_message_is_signal(message, DBUS_INTERFACE_LOCAL, in disconnect_filter() 292 error.name, error.message); in wpas_dbus_init_common()
|
| D | dbus_new_introspect.c | 253 DBusMessage * wpa_dbus_introspect(DBusMessage *message, in wpa_dbus_introspect() argument 272 dbus_message_get_path(message)); in wpa_dbus_introspect() 276 reply = dbus_message_new_method_return(message); in wpa_dbus_introspect()
|
| /hostap-latest/wpa_supplicant/examples/ |
| D | p2p-nfc.py | 77 def wpas_tag_read(message): argument 81 cmd = "WPS_NFC_TAG_READ " + str(message).encode("hex") 154 message = nfc.ndef.HandoverRequestMessage(version="1.2") 155 message.nonce = random.randint(0, 0xffff) 165 message.add_carrier(datamsg[0], "active", datamsg[1:]) 171 print(message.pretty()) 179 message.add_carrier(datamsg[0], "active", datamsg[1:]) 183 print(message.pretty()) 186 print(str(message).encode("hex")) 204 if not client.send(message): [all …]
|
| D | wps-nfc.py | 66 def wpas_tag_read(message): argument 70 if "FAIL" in wpas.request("WPS_NFC_TAG_READ " + str(message).encode("hex")): 188 message = nfc.ndef.Message(data); 189 sel.add_carrier(message[0], "active", message[1:]) 212 message = nfc.ndef.HandoverRequestMessage(version="1.2") 213 message.nonce = random.randint(0, 0xffff) 215 message.add_carrier(datamsg[0], "active", datamsg[1:]) 219 print(message.pretty()) 222 print(str(message).encode("hex")) 240 if not client.send(message): [all …]
|
| D | dpp-nfc.py | 358 message = [hr, carrier] 359 summary("NFC Handover Request message for DPP: " + str(message)) 393 if not client.send_records(message): 404 message = client.recv_records(timeout=3.0) 406 …summary("Received {} record(s) in {} seconds".format(len(message) if message is not None else -1, … 415 message = None 416 if message is None: 427 summary("Received message: " + str(message)) 428 if len(message) < 1 or \ 429 not isinstance(message[0], ndef.HandoverSelectRecord): [all …]
|
| /hostap-latest/wpadebug/src/w1/fi/wpadebug/ |
| D | MainActivity.java | 110 String message = run("wpa_cli " + cmd); in wpaCmd() local 111 if (message == null) in wpaCmd() 113 intent.putExtra(EXTRA_MESSAGE, message); in wpaCmd() 143 private void show_alert(String title, String message) in show_alert() argument 147 alert.setMessage(message); in show_alert() 160 String message = "WifiState: " + manager.getWifiState() + "\n" + in wifiManagerInfo() local 164 intent.putExtra(EXTRA_MESSAGE, message); in wifiManagerInfo() 173 String message = wifi.toString() + "\n" + wifi.getSupplicantState(); in wifiInfo() local 174 intent.putExtra(EXTRA_MESSAGE, message); in wifiInfo()
|
| D | WpaCommandListActivity.java | 83 String message = run(item.command); in onListItemClick() local 84 if (message == null) in onListItemClick() 87 intent.putExtra(MainActivity.EXTRA_MESSAGE, message); in onListItemClick()
|
| D | CommandListActivity.java | 101 String message = run(item.command); in onListItemClick() local 102 if (message == null) in onListItemClick() 105 intent.putExtra(MainActivity.EXTRA_MESSAGE, message); in onListItemClick()
|
| D | DisplayMessageActivity.java | 42 String message = intent.getStringExtra(MainActivity.EXTRA_MESSAGE); in onCreate() local 45 textView.setText(message); in onCreate()
|
| D | WpaNfcActivity.java | 41 private void show_alert(String title, String message) in show_alert() argument 45 alert.setMessage(message); in show_alert()
|
| /hostap-latest/hostapd/ |
| D | wps-ap-nfc.py | 62 def wpas_tag_read(message): argument 66 if "FAIL" in wpas.request("WPS_NFC_TAG_READ " + str(message).encode("hex")): 158 message = nfc.ndef.Message(data); 159 sel.add_carrier(message[0], "active", message[1:]) 175 if len(tag.ndef.message): 176 for record in tag.ndef.message: 180 success = wpas_tag_read(tag.ndef.message) 194 tag.ndef.message = str(write_data) 238 print(tag.ndef.message.pretty())
|
| /hostap-latest/src/eap_server/ |
| D | eap_server_mschapv2.c | 152 char *message = "OK"; in eap_mschapv2_build_success_req() local 156 os_strlen(message); in eap_mschapv2_build_success_req() 181 wpabuf_put_data(req, message, os_strlen(message)); in eap_mschapv2_build_success_req() 195 char *message = "E=691 R=0 C=00000000000000000000000000000000 V=3 " in eap_mschapv2_build_failure_req() local 199 ms_len = sizeof(*ms) + os_strlen(message); in eap_mschapv2_build_failure_req() 214 wpabuf_put_data(req, message, os_strlen(message)); in eap_mschapv2_build_failure_req() 217 (u8 *) message, os_strlen(message)); in eap_mschapv2_build_failure_req()
|
| /hostap-latest/tests/hwsim/tnc/ |
| D | hostap2_imv.c | 81 /*in*/ TNC_BufferReference message, in TNC_IMV_ReceiveMessage() argument 92 message, messageLength); in TNC_IMV_ReceiveMessage() 98 os_memcmp(message, "hello", 5) == 0) { in TNC_IMV_ReceiveMessage() 107 os_memcmp(message, "i'm fine", 8) == 0) { in TNC_IMV_ReceiveMessage()
|
| D | hostap2_imc.c | 139 /*in*/ TNC_BufferReference message, in TNC_IMC_ReceiveMessage() argument 150 message, messageLength); in TNC_IMC_ReceiveMessage() 153 os_memcmp(message, "hello", 5) == 0) { in TNC_IMC_ReceiveMessage()
|
| /hostap-latest/wpa_supplicant/ |
| D | README-NAN-USD | 31 If ttl=0 or the parameter is not included, only one Publish message is 123 Publisher notification of a Follow-up message with no ssi (to enter 128 Subscriber sending a Follow-up message: 132 Publisher receiving the Follow-up message: 136 Publisher sending a Follow-up message: 140 Subscriber receiving the Follow-up message:
|
| /hostap-latest/src/common/ |
| D | tnc.h | 42 TNC_BufferReference message, 61 TNC_BufferReference message,
|
| /hostap-latest/ |
| D | CONTRIBUTIONS | 14 commit log message. This tag indicates that the contributor agrees with 23 terms, please add the following line to the end of the commit message 35 Note that the list may require subscription before accepting message 39 The message should contain an inlined patch against the current 44 patch file than just send a whitespace damaged version in the message 90 with a Signed-hostap tag in the commit message. This additional item (e)
|