| /hostap-latest/wpa_supplicant/wpa_gui-qt4/ |
| D | networkconfig.cpp | 187 char reply[10], cmd[256]; in addNetwork() local 225 memset(reply, 0, sizeof(reply)); in addNetwork() 226 reply_len = sizeof(reply) - 1; in addNetwork() 229 wpagui->ctrlRequest("ADD_NETWORK", reply, &reply_len); in addNetwork() 230 if (reply[0] == 'F') { in addNetwork() 237 id = atoi(reply); in addNetwork() 405 reply_len = sizeof(reply); in addNetwork() 406 wpagui->ctrlRequest(cmd, reply, &reply_len); in addNetwork() 407 if (strncmp(reply, "OK", 2) != 0) { in addNetwork() 415 wpagui->ctrlRequest("SAVE_CONFIG", reply, &reply_len); in addNetwork() [all …]
|
| D | peers.cpp | 321 char reply[100]; in enter_pin() local 334 reply_len = sizeof(reply) - 1; in enter_pin() 335 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) { in enter_pin() 352 char reply[20]; in ctx_p2p_start() local 354 reply_len = sizeof(reply) - 1; in ctx_p2p_start() 355 if (wpagui->ctrlRequest("P2P_FIND", reply, &reply_len) < 0 || in ctx_p2p_start() 356 memcmp(reply, "FAIL", 4) == 0) { in ctx_p2p_start() 367 char reply[20]; in ctx_p2p_stop() local 369 reply_len = sizeof(reply) - 1; in ctx_p2p_stop() 370 wpagui->ctrlRequest("P2P_STOP_FIND", reply, &reply_len); in ctx_p2p_stop() [all …]
|
| D | scanresults.cpp | 56 char reply[2048]; in updateResults() local 69 reply_len = sizeof(reply) - 1; in updateResults() 70 if (wpagui->ctrlRequest(cmd, reply, &reply_len) < 0) in updateResults() 72 reply[reply_len] = '\0'; in updateResults() 74 QString bss(reply); in updateResults() 116 char reply[10]; in scanRequest() local 117 size_t reply_len = sizeof(reply); in scanRequest() 122 wpagui->ctrlRequest("SCAN", reply, &reply_len); in scanRequest()
|
| D | wpagui.cpp | 786 char reply[10]; in disconnect() local 787 size_t reply_len = sizeof(reply); in disconnect() 788 ctrlRequest("DISCONNECT", reply, &reply_len); in disconnect() 883 char reply[128]; in signalMeterUpdate() local 884 size_t reply_len = sizeof(reply); in signalMeterUpdate() 888 ctrlRequest("SIGNAL_POLL", reply, &reply_len); in signalMeterUpdate() 892 if ((rssi = strstr(reply, "AVG_RSSI=")) != NULL) in signalMeterUpdate() 894 else if ((rssi = strstr(reply, "RSSI=")) != NULL) in signalMeterUpdate() 1069 char reply[10]; in connectB() local 1070 size_t reply_len = sizeof(reply); in connectB() [all …]
|
| D | userdatarequest.cpp | 81 char reply[10]; in sendReply() local 82 size_t reply_len = sizeof(reply); in sendReply() 92 wpagui->ctrlRequest(cmd.toLocal8Bit().constData(), reply, &reply_len); in sendReply()
|
| /hostap-latest/wpa_supplicant/dbus/ |
| D | dbus_new_handlers_wps.c | 36 DBusMessage **reply) in wpas_dbus_handler_wps_role() argument 46 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_role() 57 *reply = wpas_dbus_error_invalid_args(message, val); in wpas_dbus_handler_wps_role() 67 DBusMessage **reply) in wpas_dbus_handler_wps_type() argument 76 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_type() 88 *reply = wpas_dbus_error_invalid_args(message, val); in wpas_dbus_handler_wps_type() 98 DBusMessage **reply) in wpas_dbus_handler_wps_bssid() argument 109 *reply = wpas_dbus_error_invalid_args( in wpas_dbus_handler_wps_bssid() 118 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_bssid() 129 DBusMessage **reply) in wpas_dbus_handler_wps_pin() argument [all …]
|
| D | dbus_new_handlers.c | 102 DBusMessage *reply; in wpas_dbus_error_invalid_args() local 104 reply = dbus_message_new_error( in wpas_dbus_error_invalid_args() 108 dbus_message_append_args(reply, DBUS_TYPE_STRING, &arg, in wpas_dbus_error_invalid_args() 111 return reply; in wpas_dbus_error_invalid_args() 769 DBusMessage *reply = NULL; in wpas_dbus_handler_create_interface() local 856 reply = dbus_message_new_error( in wpas_dbus_handler_create_interface() 873 reply = wpas_dbus_error_unknown_error( in wpas_dbus_handler_create_interface() 891 reply = dbus_message_new_method_return(message); in wpas_dbus_handler_create_interface() 892 dbus_message_append_args(reply, DBUS_TYPE_OBJECT_PATH, in wpas_dbus_handler_create_interface() 895 reply = wpas_dbus_error_unknown_error( in wpas_dbus_handler_create_interface() [all …]
|
| D | dbus_new_helpers.c | 85 DBusMessage *reply; in get_all_properties() local 89 reply = dbus_message_new_method_return(message); in get_all_properties() 90 if (reply == NULL) in get_all_properties() 93 dbus_message_iter_init_append(reply, &iter); in get_all_properties() 95 dbus_message_unref(reply); in get_all_properties() 103 dbus_message_unref(reply); in get_all_properties() 104 reply = wpas_dbus_reply_new_from_error( in get_all_properties() 108 return reply; in get_all_properties() 112 dbus_message_unref(reply); in get_all_properties() 116 return reply; in get_all_properties() [all …]
|
| D | dbus_new_handlers_p2p.c | 110 DBusMessage *reply = NULL; in wpas_dbus_handler_p2p_find() local 174 reply = wpas_dbus_error_no_p2p_mgmt_iface(message); in wpas_dbus_handler_p2p_find() 180 reply = wpas_dbus_error_unknown_error( in wpas_dbus_handler_p2p_find() 184 return reply; in wpas_dbus_handler_p2p_find() 189 reply = wpas_dbus_error_invalid_args(message, entry.key); in wpas_dbus_handler_p2p_find() 192 return reply; in wpas_dbus_handler_p2p_find() 353 DBusMessage *reply = NULL; in wpas_dbus_handler_p2p_group_add() local 440 reply = wpas_dbus_error_no_p2p_mgmt_iface(message); in wpas_dbus_handler_p2p_group_add() 458 reply = in wpas_dbus_handler_p2p_group_add() 466 reply = wpas_dbus_error_invalid_args( in wpas_dbus_handler_p2p_group_add() [all …]
|
| D | dbus_new_introspect.c | 257 DBusMessage *reply; in wpa_dbus_introspect() local 276 reply = dbus_message_new_method_return(message); in wpa_dbus_introspect() 277 if (reply) { in wpa_dbus_introspect() 280 dbus_message_append_args(reply, DBUS_TYPE_STRING, &intro_str, in wpa_dbus_introspect() 285 return reply; in wpa_dbus_introspect()
|
| /hostap-latest/src/radius/ |
| D | radius_das.c | 40 struct radius_msg *reply; in radius_das_disconnect() local 175 reply = radius_msg_new(error ? RADIUS_CODE_DISCONNECT_NAK : in radius_das_disconnect() 177 if (reply == NULL) in radius_das_disconnect() 180 if (!radius_msg_add_msg_auth(reply)) { in radius_das_disconnect() 181 radius_msg_free(reply); in radius_das_disconnect() 186 if (!radius_msg_add_attr_int32(reply, RADIUS_ATTR_ERROR_CAUSE, in radius_das_disconnect() 188 radius_msg_free(reply); in radius_das_disconnect() 193 return reply; in radius_das_disconnect() 202 struct radius_msg *reply; in radius_das_coa() local 371 reply = radius_msg_new(error ? RADIUS_CODE_COA_NAK : in radius_das_coa() [all …]
|
| /hostap-latest/wpa_supplicant/ |
| D | ctrl_iface_udp.c | 200 char *reply; local 201 reply = os_malloc(7 + 2 * COOKIE_LEN + 1); 202 if (reply == NULL) { 207 os_memcpy(reply, "COOKIE=", 7); 208 wpa_snprintf_hex(reply + 7, 2 * COOKIE_LEN + 1, 212 return reply; 232 char *reply = NULL; local 282 reply = wpa_supplicant_ctrl_iface_get_cookie(priv, &reply_len); 339 reply = wpa_supplicant_ctrl_iface_process(wpa_s, pos, 344 if (reply) { [all …]
|
| D | ctrl_iface_zephyr.c | 131 char *reply = NULL; in wpa_supplicant_ctrl_iface_receive() local 175 reply = wpa_supplicant_ctrl_iface_process(wpa_s, pos, in wpa_supplicant_ctrl_iface_receive() 179 if (reply) { in wpa_supplicant_ctrl_iface_receive() 180 send(sock, reply, reply_len, 0); in wpa_supplicant_ctrl_iface_receive() 263 char *reply = NULL; in wpa_supplicant_global_ctrl_iface_receive() local 307 reply = wpa_supplicant_global_ctrl_iface_process(global, pos, in wpa_supplicant_global_ctrl_iface_receive() 311 if (reply) { in wpa_supplicant_global_ctrl_iface_receive() 312 send(sock, reply, reply_len, 0); in wpa_supplicant_global_ctrl_iface_receive()
|
| D | ctrl_iface_named_pipe.c | 282 char *reply = NULL, *send_buf; in wpa_supplicant_ctrl_iface_rx() local 306 reply = wpa_supplicant_ctrl_iface_process(wpa_s, buf, in wpa_supplicant_ctrl_iface_rx() 310 if (reply) { in wpa_supplicant_ctrl_iface_rx() 311 send_buf = reply; in wpa_supplicant_ctrl_iface_rx() 325 os_free(reply); in wpa_supplicant_ctrl_iface_rx() 328 os_free(reply); in wpa_supplicant_ctrl_iface_rx() 720 char *reply = NULL, *send_buf; in wpa_supplicant_global_iface_rx() local 729 reply = wpa_supplicant_global_ctrl_iface_process(global, buf, in wpa_supplicant_global_iface_rx() 731 if (reply) { in wpa_supplicant_global_iface_rx() 732 send_buf = reply; in wpa_supplicant_global_iface_rx() [all …]
|
| D | ctrl_iface_unix.c | 138 char *reply = NULL, *reply_buf = NULL; in wpa_supplicant_ctrl_iface_receive() local 186 reply = reply_buf; in wpa_supplicant_ctrl_iface_receive() 196 if (!reply && reply_len == 1) { in wpa_supplicant_ctrl_iface_receive() 197 reply = "FAIL\n"; in wpa_supplicant_ctrl_iface_receive() 199 } else if (!reply && reply_len == 2) { in wpa_supplicant_ctrl_iface_receive() 200 reply = "OK\n"; in wpa_supplicant_ctrl_iface_receive() 204 if (reply) { in wpa_supplicant_ctrl_iface_receive() 205 wpas_ctrl_sock_debug("ctrl_sock-sendto", sock, reply, in wpa_supplicant_ctrl_iface_receive() 207 if (sendto(sock, reply, reply_len, 0, (struct sockaddr *) &from, in wpa_supplicant_ctrl_iface_receive() 1107 char *reply = NULL, *reply_buf = NULL; in wpa_supplicant_global_ctrl_iface_receive() local [all …]
|
| D | ctrl_iface.c | 1551 struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len) in wpa_supplicant_ctrl_iface_wps_nfc_config_token() argument 1572 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), in wpa_supplicant_ctrl_iface_wps_nfc_config_token() 1574 reply[res++] = '\n'; in wpa_supplicant_ctrl_iface_wps_nfc_config_token() 1575 reply[res] = '\0'; in wpa_supplicant_ctrl_iface_wps_nfc_config_token() 1584 struct wpa_supplicant *wpa_s, char *cmd, char *reply, size_t max_len) in wpa_supplicant_ctrl_iface_wps_nfc_token() argument 1601 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), in wpa_supplicant_ctrl_iface_wps_nfc_token() 1603 reply[res++] = '\n'; in wpa_supplicant_ctrl_iface_wps_nfc_token() 1604 reply[res] = '\0'; in wpa_supplicant_ctrl_iface_wps_nfc_token() 1649 char *reply, size_t max_len, in wpas_ctrl_nfc_get_handover_req_wps() argument 1659 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), in wpas_ctrl_nfc_get_handover_req_wps() [all …]
|
| /hostap-latest/hostapd/ |
| D | ctrl_iface_zephyr.c | 19 char *reply = NULL; in hostapd_ctrl_iface_receive() local 47 reply = os_malloc(reply_size); in hostapd_ctrl_iface_receive() 48 if (reply == NULL) { in hostapd_ctrl_iface_receive() 54 reply_len = hostapd_ctrl_iface_receive_process(hapd, pos, reply, reply_size, NULL, 0); in hostapd_ctrl_iface_receive() 56 send(sock, reply, reply_len, 0); in hostapd_ctrl_iface_receive() 62 os_free(reply); in hostapd_ctrl_iface_receive()
|
| D | ctrl_iface.c | 267 char *cmd, char *reply, in hostapd_ctrl_iface_wps_nfc_config_token() argument 285 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), in hostapd_ctrl_iface_wps_nfc_config_token() 287 reply[res++] = '\n'; in hostapd_ctrl_iface_wps_nfc_config_token() 288 reply[res] = '\0'; in hostapd_ctrl_iface_wps_nfc_config_token() 297 char *reply, size_t max_len, in hostapd_ctrl_iface_wps_nfc_token_gen() argument 307 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), in hostapd_ctrl_iface_wps_nfc_token_gen() 309 reply[res++] = '\n'; in hostapd_ctrl_iface_wps_nfc_token_gen() 310 reply[res] = '\0'; in hostapd_ctrl_iface_wps_nfc_token_gen() 319 char *cmd, char *reply, in hostapd_ctrl_iface_wps_nfc_token() argument 323 return hostapd_ctrl_iface_wps_nfc_token_gen(hapd, reply, in hostapd_ctrl_iface_wps_nfc_token() [all …]
|
| /hostap-latest/src/wps/ |
| D | wps_upnp_web.c | 424 struct wpabuf **reply, const char **replyname) in web_process_get_device_info() argument 458 *reply = wps_get_msg(peer->wps, &op_code); in web_process_get_device_info() 459 if (*reply == NULL) { in web_process_get_device_info() 464 *reply = NULL; in web_process_get_device_info() 465 if (*reply == NULL) { in web_process_get_device_info() 490 struct wpabuf **reply, const char **replyname) in web_process_put_message() argument 559 *reply = NULL; in web_process_put_message() 563 *reply = wps_get_msg(peer->wps, &op_code); in web_process_put_message() 566 if (*reply == NULL) in web_process_put_message() 575 struct wpabuf **reply, const char **replyname) in web_process_put_wlan_response() argument [all …]
|
| D | wps_er.c | 533 struct wpabuf *reply) in wps_er_parse_device_description() argument 536 const char *tmp, *data = wpabuf_head(reply); in wps_er_parse_device_description() 540 wpabuf_head(reply), wpabuf_len(reply)); in wps_er_parse_device_description() 613 struct wpabuf *reply; in wps_er_http_dev_desc_cb() local 618 reply = http_client_get_body(c); in wps_er_http_dev_desc_cb() 619 if (reply == NULL) in wps_er_http_dev_desc_cb() 621 wps_er_parse_device_description(ap, reply); in wps_er_http_dev_desc_cb() 1644 struct wpabuf *reply; in wps_er_http_put_message_cb() local 1650 reply = http_client_get_body(c); in wps_er_http_put_message_cb() 1651 if (reply) in wps_er_http_put_message_cb() [all …]
|
| /hostap-latest/tests/hwsim/ |
| D | test_radius.py | 414 reply = srv.SendPacket(req) 416 for i in list(reply.keys()): 417 logger.debug("%s: %s" % (i, reply[i])) 418 if reply.code != code: 421 if 'Error-Cause' not in reply: 423 if reply['Error-Cause'][0] != error_cause: 424 raise Exception("Unexpected Error-Cause: {}".format(reply['Error-Cause'])) 516 reply = srv.SendPacket(req) 526 reply = srv.SendPacket(req) 537 reply = srv.SendPacket(req) [all …]
|
| /hostap-latest/src/common/ |
| D | wpa_ctrl.c | 490 char *reply, size_t *reply_len, in wpa_ctrl_request() argument 571 res = recv(ctrl->s, reply, *reply_len, 0); in wpa_ctrl_request() 574 if ((res > 0 && reply[0] == '<') || in wpa_ctrl_request() 575 (res > 6 && strncmp(reply, "IFNAME=", 7) == 0)) { in wpa_ctrl_request() 585 reply[res] = '\0'; in wpa_ctrl_request() 586 msg_cb(reply, res); in wpa_ctrl_request() 659 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) in wpa_ctrl_recv() argument 663 res = recv(ctrl->s, reply, *reply_len, 0); in wpa_ctrl_recv() 768 char *reply, size_t *reply_len, in wpa_ctrl_request() argument 777 if (!ReadFile(ctrl->pipe, reply, *reply_len, &readlen, NULL)) in wpa_ctrl_request() [all …]
|
| /hostap-latest/src/l2_packet/ |
| D | l2_packet_privsep.c | 143 u8 reply[ETH_ALEN + 1]; in l2_packet_init() local 202 res = recv(l2->fd, reply, sizeof(reply), 0); in l2_packet_init() 217 os_memcpy(l2->own_addr, reply, ETH_ALEN); in l2_packet_init()
|
| /hostap-latest/src/drivers/ |
| D | driver_privsep.c | 45 void *reply, size_t *reply_len) in wpa_priv_cmd() argument 67 if (reply) { in wpa_priv_cmd() 83 res = recv(drv->cmd_socket, reply, *reply_len, 0); in wpa_priv_cmd() 359 u8 reply[sizeof(int) + SSID_MAX_LEN]; in wpa_driver_privsep_get_ssid() local 360 size_t len = sizeof(reply); in wpa_driver_privsep_get_ssid() 362 res = wpa_priv_cmd(drv, PRIVSEP_CMD_GET_SSID, NULL, 0, reply, &len); in wpa_driver_privsep_get_ssid() 365 os_memcpy(&ssid_len, reply, sizeof(int)); in wpa_driver_privsep_get_ssid() 371 os_memcpy(ssid, &reply[sizeof(int)], ssid_len); in wpa_driver_privsep_get_ssid()
|
| /hostap-latest/wpaspy/ |
| D | wpaspy.py | 56 reply, server = self.s.recvfrom(4096) 57 self.cookie = reply
|