Searched refs:request (Results 1 – 25 of 147) sorted by relevance
123456
| /hostap-latest/tests/hwsim/ |
| D | test_wpas_ctrl.py | 29 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id)): 31 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + " name"): 33 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id + 1) + " proto OPEN"): 35 if "FAIL" not in dev[0].request("GET_NETWORK " + str(id)): 37 if "FAIL" not in dev[0].request("GET_NETWORK " + str(id + 1) + " proto"): 40 if "OK" not in dev[0].request("SET_NETWORK " + str(id) + " proto \t WPA2 "): 42 res = dev[0].request("GET_NETWORK " + str(id) + " proto") 46 if "OK" not in dev[0].request("SET_NETWORK " + str(id) + " key_mgmt \t WPA-PSK "): 48 res = dev[0].request("GET_NETWORK " + str(id) + " key_mgmt") 52 if "OK" not in dev[0].request("SET_NETWORK " + str(id) + " auth_alg \t OPEN "): [all …]
|
| D | test_nfc_wps.py | 46 wps = dev[0].request("WPS_NFC_TOKEN WPS").rstrip() 49 pw = dev[0].request("WPS_NFC_TOKEN NDEF").rstrip() 52 res = hapd.request("WPS_NFC_TAG_READ " + pw) 56 res = dev[0].request("WPS_NFC") 63 if "FAIL" not in hapd.request("WPS_NFC_TAG_READ 0"): 65 if "FAIL" not in hapd.request("WPS_NFC_TAG_READ 0q"): 69 if "FAIL" not in hapd.request("WPS_NFC_TAG_READ 00"): 78 conf = hapd.request("WPS_NFC_CONFIG_TOKEN NDEF").rstrip() 83 res = dev[0].request("WPS_NFC_TAG_READ " + conf) 91 conf = hapd.request("WPS_NFC_CONFIG_TOKEN NDEF").rstrip() [all …]
|
| D | test_p2p_wifi_display.py | 17 dev[0].request("SET wifi_display 1") 18 dev[0].request("WFD_SUBELEM_SET 0 0006" + wfd_devinfo) 19 if wfd_devinfo not in dev[0].request("WFD_SUBELEM_GET 0"): 23 dev[0].request("WFD_SUBELEM_SET 1 0006020304050607") 25 dev[0].request("WFD_SUBELEM_SET 6 000700000000000000") 27 dev[0].request("WFD_SUBELEM_SET 9 0000") 29 dev[0].request("WFD_SUBELEM_SET 7 00020000") 32 dev[0].request("WFD_SUBELEM_SET 5 " + prot) 35 dev[0].request("WFD_SUBELEM_SET 3 " + video) 38 dev[0].request("WFD_SUBELEM_SET 4 " + video_3d) [all …]
|
| D | test_hapd_ctrl.py | 60 if "OK" not in hapd.request("DEAUTHENTICATE " + addr + " p2p=2"): 65 if "OK" not in hapd.request("DISASSOCIATE " + addr + " p2p=2"): 76 dev[0].request("VENDOR_ELEM_REMOVE 13 *") 84 dev[0].request("VENDOR_ELEM_ADD 13 2102ff02") 97 if "FAIL" in hapd.request("STA " + addr): 99 if "FAIL" not in hapd.request("STA " + addr + " eapol"): 101 if "FAIL" not in hapd.request("STA " + addr + " foo"): 103 if "FAIL" not in hapd.request("STA 00:11:22:33:44"): 105 if "FAIL" not in hapd.request("STA 00:11:22:33:44:55"): 108 if len(hapd.request("STA-NEXT " + addr).splitlines()) > 0: [all …]
|
| D | test_p2p_ext.py | 22 if "OK" not in dev[0].request("VENDOR_ELEM_ADD 1 dd050011223344"): 24 res = dev[0].request("VENDOR_ELEM_GET 1") 27 if "OK" not in dev[0].request("VENDOR_ELEM_ADD 1 dd06001122335566"): 29 res = dev[0].request("VENDOR_ELEM_GET 1") 32 res = dev[0].request("VENDOR_ELEM_GET 2") 35 if "OK" not in dev[0].request("VENDOR_ELEM_REMOVE 1 dd050011223344"): 37 res = dev[0].request("VENDOR_ELEM_GET 1") 40 if "OK" not in dev[0].request("VENDOR_ELEM_REMOVE 1 dd06001122335566"): 42 res = dev[0].request("VENDOR_ELEM_GET 1") 45 if "OK" not in dev[0].request("VENDOR_ELEM_ADD 1 dd050011223344dd06001122335566"): [all …]
|
| D | test_scan.py | 32 id = dev.request("SCAN " + params) 38 if "FAIL-BUSY" not in dev.request("SCAN"): 54 if "FAIL-BUSY" not in dev.request("SCAN"): 158 if "FAIL" not in dev[0].request("BSS_EXPIRE_COUNT 0"): 160 if "OK" not in dev[0].request("BSS_EXPIRE_COUNT 2"): 165 if bssid not in dev[0].request("SCAN_RESULTS"): 167 hapd.request("DISABLE") 174 if bssid not in dev[0].request("SCAN_RESULTS"): 177 if bssid in dev[0].request("SCAN_RESULTS"): 184 if "FAIL" not in dev[0].request("BSS_EXPIRE_AGE COUNT 9"): [all …]
|
| D | test_wpas_ap.py | 38 sig = dev.request("SIGNAL_POLL").splitlines() 43 if "FAIL" not in dev[0].request("DEAUTHENTICATE 00:11:22:33:44:55"): 45 if "FAIL" not in dev[0].request("DISASSOCIATE 00:11:22:33:44:55"): 47 if "FAIL" not in dev[0].request("CHAN_SWITCH 0 2432"): 59 if "FAIL" not in dev[0].request("DEAUTHENTICATE foo"): 61 if "FAIL" not in dev[0].request("DISASSOCIATE foo"): 91 dev[0].request("DEAUTHENTICATE " + addr1) 92 dev[0].request("DISASSOCIATE " + addr2) 97 dev[1].request("DISCONNECT") 98 dev[2].request("DISCONNECT") [all …]
|
| D | test_wpas_mesh.py | 33 id = dev.request("SCAN " + params) 64 res = dev.request("SCAN_RESULTS") 284 sta = dev[0].request("STA " + dev[1].own_addr()) 331 if "OK" not in dev[0].request("MESH_PEER_ADD " + addr1): 333 if "FAIL" not in dev[0].request("MESH_PEER_ADD ff:ff:ff:ff:ff:ff"): 336 if "FAIL" not in dev[0].request("MESH_PEER_ADD " + addr1): 399 dev[0].request("SET sae_groups ") 403 dev[1].request("SET sae_groups ") 419 dev[0].request("SET sae_groups ") 423 dev[1].request("SET sae_groups ") [all …]
|
| D | test_rrm.py | 71 res = hapd.request("SHOW_NEIGHBOR") 77 if "OK" not in hapd2.request("SET_NEIGHBOR " + res.strip()): 79 res2 = hapd2.request("SHOW_NEIGHBOR") 86 if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:gg ssid=\"test1\" nr=" + nr): 90 if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=test1 nr=" + nr): 94 if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1 nr=" + nr): 98 if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 nr=" + nr): 102 if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\""): 106 if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\" nr=" + nr[:-1]): 110 …if "FAIL" not in hapd.request("SET_NEIGHBOR 00:11:22:33:44:55 ssid=\"test1\" nr=" + nr + " lci=1"): [all …]
|
| D | test_erp.py | 25 dev[0].request("ERP_FLUSH") 39 dev[0].request("ERP_FLUSH") 55 dev[0].request("ERP_FLUSH") 61 dev[0].request("DISCONNECT") 63 dev[0].request("RECONNECT") 81 dev[0].request("ERP_FLUSH") 86 dev[0].request("DISCONNECT") 88 hapd.request("ERP_FLUSH") 89 dev[0].request("RECONNECT") 96 dev[0].request("DISCONNECT") [all …]
|
| D | test_radio_work.py | 16 id = dev[0].request("RADIO_WORK add test-work-a") 19 id2 = dev[0].request("RADIO_WORK add test-work-b freq=2417") 22 id3 = dev[0].request("RADIO_WORK add test-work-c") 32 items = dev[0].request("RADIO_WORK show") 43 dev[0].request("RADIO_WORK done " + id2) 44 dev[0].request("RADIO_WORK done " + id) 51 dev[0].request("RADIO_WORK done " + id3) 52 items = dev[0].request("RADIO_WORK show") 57 id = dev[0].request("RADIO_WORK add test-work timeout=1") 68 dev[0].request(("RADIO_WORK add test-work-%d-" % i) + 100*'a') [all …]
|
| D | test_mbo.py | 65 dev[0].request("REMOVE_NETWORK all") 66 dev[0].request("ABORT_SCAN") 82 dev[0].request("REMOVE_NETWORK all") 83 dev[0].request("ABORT_SCAN") 114 dev[0].request("STA_AUTOCONNECT 0") 121 dev[0].request("STA_AUTOCONNECT 1") 211 if "FAIL" not in hapd1.request("SET mbo_assoc_disallow 6"): 215 if "OK" not in hapd1.request("SET mbo_assoc_disallow 1"): 217 if "OK" not in hapd2.request("SET mbo_assoc_disallow 0"): 233 if "OK" not in hapd1.request("SET mbo_assoc_disallow 0"): [all …]
|
| D | test_ap_qosmap.py | 51 dev[0].request("DATA_TEST_CONFIG 1") 52 hapd.request("DATA_TEST_CONFIG 1") 68 hapd.request("SET_QOS_MAP_SET 22,6,8,15,0,7,255,255,16,31,32,39,255,255,40,47,48,55") 69 hapd.request("SEND_QOS_MAP_CONF " + dev[0].get_status_field("address")) 76 dev[0].request("DATA_TEST_CONFIG 0") 77 hapd.request("DATA_TEST_CONFIG 0") 105 dev[0].request("DATA_TEST_CONFIG 1") 106 hapd.request("DATA_TEST_CONFIG 1") 123 dev[0].request("DATA_TEST_CONFIG 0") 124 hapd.request("DATA_TEST_CONFIG 0") [all …]
|
| D | test_ap_open.py | 36 dev[0].request("DISCONNECT") 62 if "FAIL" in dev[0].request(cmd): 76 if "FAIL" in dev[0].request(cmd): 87 hapd.request("DEAUTHENTICATE " + dev[0].p2p_interface_addr() + " reason=4") 198 dev[0].request("DISCONNECT") 215 dev[0].request("STA_AUTOCONNECT 0") 218 dev[0].request("ENABLE_NETWORK %s no-connect" % id) 230 dev[0].request("DISCONNECT") 233 dev[0].request("STA_AUTOCONNECT 1") 276 flags2 = hapd.request("DRIVER_FLAGS2").splitlines()[1:] [all …]
|
| D | test_p2p_grpform.py | 201 wpas.request("P2P_SET listen_channel 1") 203 wpas.request("P2P_LISTEN") 206 dev[0].request("P2P_LISTEN") 216 ifaces = wpas.request("INTERFACES").splitlines() 226 ifaces = dev[0].request("INTERFACES").splitlines() 269 if "OK" not in dev[0].request("P2P_CONNECT " + addr1 + " pbc auth"): 273 if "OK" not in dev[1].request("P2P_CONNECT " + addr0 + " 12345670 display"): 290 if "OK" not in dev[0].request("P2P_CONNECT " + addr1 + " 12345670 display auth"): 294 if "OK" not in dev[1].request("P2P_CONNECT " + addr0 + " pbc"): 330 dev[2].request("WPS_PBC") [all …]
|
| D | test_dpp3.py | 81 if "OK" not in dev1.request(req): 89 res = dev1.request("DPP_PKEX_ADD " + cmd) 110 dev[1].request("DPP_CONTROLLER_STOP") 144 dev[1].request("DPP_CONTROLLER_STOP") 163 dev[1].request("DPP_CONTROLLER_STOP") 171 dev[1].request("DPP_CONTROLLER_STOP") 214 dev[1].request("DPP_CONTROLLER_STOP") 231 res = dev[1].request("DPP_BOOTSTRAP_INFO %d" % id_c) 240 if "OK" not in dev[1].request("DPP_CONTROLLER_START"): 252 uri_r = relay.request("DPP_BOOTSTRAP_GET_URI %d" % id_h) [all …]
|
| D | test_hostapd_oom.py | 20 if "OK" not in hapd.request("TEST_ALLOC_FAIL %d:%s" % (i, start_func)): 27 state = hapd.request('GET_ALLOC_FAIL') 29 hapd.request("TEST_ALLOC_FAIL 0:") 56 hapd.request("TEST_ALLOC_FAIL 1:%s" % t) 65 state = hapd.request('GET_ALLOC_FAIL') 92 dev[0].request("SCAN_INTERVAL 1") 96 if "OK" not in hapd.request("TEST_ALLOC_FAIL %d:main" % i): 104 dev[0].request("REMOVE_NETWORK all") 111 dev[0].request("REMOVE_NETWORK all") 117 state = hapd.request('GET_ALLOC_FAIL') [all …]
|
| D | test_nan_usd.py | 16 capa = dev.request("GET_CAPABILITY nan") 26 id0 = dev[0].request(cmd) 34 id0 = dev[0].request(cmd) 39 if "FAIL" in dev[0].request(cmd): 43 if "FAIL" in dev[0].request(cmd): 57 if "FAIL" in dev[0].request(cmd): 63 if "FAIL" in dev[0].request(cmd): 74 id0 = dev[0].request(cmd) 79 if "FAIL" in dev[0].request(cmd): 94 id0 = dev[0].request(cmd) [all …]
|
| D | test_ap_hs20.py | 60 dev.request("INTERWORKING_SELECT auto freq=2412") 66 dev.request("REMOVE_NETWORK all") 77 dev.request("INTERWORKING_SELECT" + freq_extra) 89 dev.request("INTERWORKING_SELECT" + freq_extra) 115 dev.request("INTERWORKING_CONNECT " + bssid) 142 dev.request("CTRL-RSP-SIM-" + id + ":GSM-AUTH:" + resp) 146 dev.request("INTERWORKING_CONNECT " + bssid) 198 logger.debug("BSS entries:\n" + dev[0].request("BSS RANGE=ALL")) 209 dev[0].request("ANQP_GET " + bssid + " 263") 214 dev[0].request("ANQP_GET " + bssid2 + " 263") [all …]
|
| D | test_ap_wps.py | 29 from urllib.request import urlopen 66 hapd.request("WPS_PBC") 67 if "PBC Status: Active" not in hapd.request("WPS_GET_STATUS"): 73 dev[0].request("ENABLE_NETWORK %s no-connect" % id) 79 dev[0].request("ENABLE_NETWORK %s no-connect" % id) 81 dev[0].request("WPS_PBC") 93 status = hapd.request("WPS_GET_STATUS") 100 conf = hapd.request("GET_CONFIG") 129 hapd.request("WPS_PBC") 139 dev[0].request("SET wps_cred_processing 2") [all …]
|
| D | test_fils.py | 50 res = dev[0].request("SCAN_RESULTS") 57 dev[0].request("ERP_FLUSH") 100 res = dev[0].request("SCAN_RESULTS") 107 dev[0].request("ERP_FLUSH") 140 dev[0].request("ERP_FLUSH") 153 dev[0].request("DISCONNECT") 176 hapd.request("EAPOL_REAUTH " + dev[0].own_addr()) 212 dev[0].request("ERP_FLUSH") 222 dev[0].request("DISCONNECT") 243 hapd.request("EAPOL_REAUTH " + dev[0].own_addr()) [all …]
|
| D | test_authsrv.py | 42 dev[0].request("REMOVE_NETWORK all") 52 dev[0].request("REMOVE_NETWORK all") 63 dev[0].request("REMOVE_NETWORK all") 74 dev[0].request("REMOVE_NETWORK all") 84 dev[0].request("REMOVE_NETWORK all") 97 dev[0].request("REMOVE_NETWORK all") 112 dev[0].request("REMOVE_NETWORK all") 124 dev[0].request("REMOVE_NETWORK all") 137 dev[0].request("REMOVE_NETWORK all") 143 if "FAIL" not in authsrv.request("ENABLE"): [all …]
|
| D | test_pmksa_cache.py | 50 dev[0].request("ROAM " + bssid2) 64 dev[0].request("ROAM " + bssid) 78 if "FAIL" in dev[0].request("PMKSA_FLUSH"): 109 dev[0].request("ROAM " + bssid2) 118 dev[0].request("ROAM " + bssid) 127 hapd.request("EAPOL_REAUTH " + dev[0].own_addr()) 160 dev[0].request("ROAM " + bssid2) 169 dev[0].request("ROAM " + bssid) 203 dev[0].request("ROAM " + bssid2) 217 dev[0].request("ROAM " + bssid) [all …]
|
| D | test_sta_dynamic.py | 37 if "OK" not in wpas.request("AP_SCAN 0"): 42 wpas.request("ENABLE_NETWORK " + str(id) + " no-connect") 43 wpas.request("SCAN") 47 wpas.request("SCAN") 59 if "FAIL" not in wpas.request("AP_SCAN -1"): 61 if "FAIL" not in wpas.request("AP_SCAN 3"): 63 if "OK" not in wpas.request("AP_SCAN 2"): 68 wpas.request("ENABLE_NETWORK " + str(id) + " no-connect") 74 wpas.request("SET disallow_aps bssid " + bssid) 91 if "OK" not in wpas.request("AP_SCAN 2"): [all …]
|
| D | test_gas.py | 79 if "FAIL" not in dev.request("GAS_RESPONSE_GET " + bssid + " 123456"): 81 …if "FAIL-Invalid range" not in dev.request("GAS_RESPONSE_GET " + bssid + " " + token + " 10000,100… 83 …if "FAIL-Invalid range" not in dev.request("GAS_RESPONSE_GET " + bssid + " " + token + " 0,10000"): 85 if "FAIL" not in dev.request("GAS_RESPONSE_GET " + bssid + " " + token + " 0"): 88 res1_2 = dev.request("GAS_RESPONSE_GET " + bssid + " " + token + " 1,2") 89 res5_3 = dev.request("GAS_RESPONSE_GET " + bssid + " " + token + " 5,3") 91 resp = dev.request("GAS_RESPONSE_GET " + bssid + " " + token) 126 if "FAIL" not in dev[0].request("GAS_REQUEST " + cmd): 130 req = dev[0].request("GAS_REQUEST " + bssid + " 00 000102000101") 138 if "FAIL" not in dev[0].request("GAS_RESPONSE_GET ff"): [all …]
|
123456