/hostap-latest/tests/hwsim/vm/ |
D | bisect-run.sh | 32 output=$(mktemp) 37 rm -f $output 41 "$path/vm-run.sh" $test 2>&1 | tee $output 43 grep -q 'ALL-PASSED' $output && exit 0 || exit 1
|
D | combine-codecov.sh | 32 …ostapd combined for hwsim test run $(date +%s)" combined.info.filtered --output-directory $ODIR > …
|
/hostap-latest/tests/remote/ |
D | test_monitor.py | 19 output = "\n\tPCAP files:\n" 41 output = output + "\t" + local_log_dir + "/" + tail + "\n" 43 return output
|
/hostap-latest/tests/hwsim/ |
D | tshark.py | 51 output = cmd.communicate() 52 out = output[0].decode(errors='ignore') 53 out1 = output[1].decode() 121 output = cmd.communicate() 122 out = output[0].decode()
|
D | run-all.sh | 155 lcov -q --capture --directory ../../wpa_supplicant --output-file $LOGDIR/wpas_lcov.info 156 genhtml -q $LOGDIR/wpas_lcov.info --output-directory $LOGDIR/wpas_lcov 157 lcov -q --capture --directory ../../hostapd --output-file $LOGDIR/hostapd_lcov.info 158 genhtml -q $LOGDIR/hostapd_lcov.info --output-directory $LOGDIR/hostapd_lcov
|
D | run-tests.py | 135 output = os.path.abspath(os.path.join(self._logdir, '%s.dat' % (self._testname, ))) 136 …self._trace_cmd = subprocess.Popen(['trace-cmd', 'record', '-o', output, '-T', '-e', 'skb', '-e', … 149 output = os.path.abspath(os.path.join(self._logdir, '%s.dbus' % (self._testname, ))) 151 stdout=open(output, 'w'), 165 output = os.path.join(self._logdir, '%s.kmemleak' % (self._testname, )) 167 while os.path.exists(output): 168 output = os.path.join(self._logdir, '%s.kmemleak-%d' % (self._testname, num)) 187 with open(output, 'w') as out: 194 output = os.path.join(self._logdir, '%s.dmesg' % (self._testname, )) 196 while os.path.exists(output): [all …]
|
D | wlantest.py | 248 def __init__(self, ifname, output, netns=None): argument 256 args = [bin, '-e', '-i', ifname, '-w', output]
|
D | README | 171 cases. run-tests.py output verbosity can be controlled with -d (more 172 verbose debug output) and -q (less verbose output) on the command
|
/hostap-latest/wpadebug/src/w1/fi/wpadebug/ |
D | WpaCommandListActivity.java | 96 StringBuffer output = new StringBuffer(); in run() local 100 output.append(buffer, 0, read); in run() 103 return output.toString(); in run()
|
D | CommandListActivity.java | 114 StringBuffer output = new StringBuffer(); in run() local 118 output.append(buffer, 0, read); in run() 121 return output.toString(); in run()
|
D | WpaNfcActivity.java | 61 StringBuffer output = new StringBuffer(); in wpaCmd() local 65 output.append(buffer, 0, read); in wpaCmd() 70 return output.toString(); in wpaCmd()
|
D | MainActivity.java | 123 StringBuffer output = new StringBuffer(); in run() local 127 output.append(buffer, 0, read); in run() 132 return output.toString(); in run()
|
D | WpaCredActivity.java | 235 StringBuffer output = new StringBuffer(); in run() local 239 output.append(buffer, 0, read); in run() 242 return output.toString(); in run()
|
/hostap-latest/port/mbedtls/ |
D | supp_psa_api.c | 90 uint8_t *output, in supp_psa_cipher_operation() argument 104 … status = psa_cipher_update(operation, input + bytes_written, bytes_to_write, output + *output_len, in supp_psa_cipher_operation() 112 status = psa_cipher_finish(operation, output + *output_len, output_size - *output_len, &len); in supp_psa_cipher_operation() 417 unsigned char *output) in pbkdf2_sha1_psa() argument 455 status = psa_key_derivation_output_bytes(&operation, output, key_length); in pbkdf2_sha1_psa()
|
D | supp_psa_api.h | 59 unsigned char *output);
|
/hostap-latest/hs20/server/www/ |
D | spp.php | 144 $last = exec("$osu_root/spp/hs20_spp_server -r$osu_root -f/tmp/hs20_spp_server.log", $output, $ret); 166 echo implode($output);
|
/hostap-latest/src/eap_common/ |
D | eap_pax_common.c | 33 size_t output_len, u8 *output) in eap_pax_kdf() argument 56 pos = output; in eap_pax_kdf()
|
D | eap_pax_common.h | 83 size_t output_len, u8 *output);
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.sgml | 24 <arg>-f<replaceable>output file</replaceable></arg> 249 your system, refer to the help output of wpa_supplicant 390 <term>-f output file</term> 392 <para>Log output to specified file instead of stdout. (This 410 <para>Include keys (passwords, etc.) in debug output.</para> 469 <para>Log output to syslog instead of stdout. (This is only 479 <para>Log output to Linux tracing in addition to any other
|
/hostap-latest/doc/ |
D | ctrl_iface.doxygen | 70 Request a list of MIB variables (dot1x, dot11). The output is a text 117 Request current WPA/EAPOL/EAP status information. The output is a text 247 \c LIST_NETWORKS command output. 324 \c LIST_NETWORKS command output. 330 \c LIST_NETWORKS command output. Special network id \c all can be 337 \c LIST_NETWORKS command output. Special network id \c all can be 352 \c LIST_NETWORKS command output. Special network id \c all can be 359 \c LIST_NETWORKS command output. 375 \c LIST_NETWORKS command output.
|
D | eap.doxygen | 82 be desirable to replace the debug output code in \ref src/utils/wpa_debug.c
|
/hostap-latest/src/crypto/ |
D | tls_wolfssl.c | 78 struct tls_out_data output; member 353 wolfSSL_SetIOWriteCtx(conn->ssl, &conn->output); in tls_connection_init() 1660 wolfssl_reset_out_data(&conn->output); in wolfssl_handshake() 1703 return conn->output.out_data; in wolfssl_handshake() 1802 wolfssl_reset_out_data(&conn->output); in tls_connection_encrypt() 1815 return conn->output.out_data; in tls_connection_encrypt()
|
/hostap-latest/radius_example/ |
D | README | 17 be desirable to replace the debug output code in src/utils/wpa_debug.c
|
/hostap-latest/eap_example/ |
D | README | 39 be desirable to replace the debug output code in src/utils/wpa_debug.c
|
/hostap-latest/wpa_supplicant/ |
D | README-WPS | 334 interface (AP or P2P GO). The output value from this command is a 364 handover. The first argument selects the format of the output data and 371 Message. The first argument selects the format of the output data and 387 wpa_supplicant is operating as a WPS ER. The output value from this
|