/hostap-latest/tests/hwsim/ |
D | test_nfc_p2p.py | 28 def check_ip_addr(res): argument 29 if 'ip_addr' not in res: 31 if '192.168.42.' not in res['ip_addr']: 33 if 'ip_mask' not in res: 35 if '255.255.255.' not in res['ip_mask']: 37 if 'go_ip_addr' not in res: 39 if '192.168.42.' not in res['go_ip_addr']: 64 res = dev[1].global_request("NFC_REPORT_HANDOVER RESP P2P " + req + " " + sel) 65 if "FAIL" in res: 67 res = dev[0].global_request("NFC_REPORT_HANDOVER INIT P2P " + req + " " + sel) [all …]
|
D | wlantest.py | 118 res = self.cli_cmd(["flush"]) 119 if "FAIL" in res: 123 res = self.cli_cmd(["relog"]) 124 if "FAIL" in res: 128 res = self.cli_cmd(["add_passphrase", passphrase]) 129 if "FAIL" in res: 133 res = self.cli_cmd(["add_wepkey", key]) 134 if "FAIL" in res: 138 res = self.cli_cmd(["info_bss", field, bssid]) 139 if "FAIL" in res: [all …]
|
D | test_sigma_dut.py | 105 res = sock.recv(1000).decode() 106 for line in res.splitlines(): 113 res = line 119 res = sock.recv(1000).decode() 120 for line in res.splitlines(): 127 res = line 131 res = sock.recv(1000).decode() 133 res = '' 136 res = res.rstrip() 137 logger.debug("sigma_dut: '%s' --> '%s'" % (cmd, res)) [all …]
|
D | test_nfc_wps.py | 52 res = hapd.request("WPS_NFC_TAG_READ " + pw) 53 if "FAIL" in res: 56 res = dev[0].request("WPS_NFC") 57 if "FAIL" in res: 83 res = dev[0].request("WPS_NFC_TAG_READ " + conf) 84 if "FAIL" in res: 116 res = dev[0].request("WPS_NFC_TAG_READ " + conf) 117 if "FAIL" in res: 134 res = hapd.request("WPS_NFC_TAG_READ " + pw) 135 if "FAIL" in res: [all …]
|
D | test_fst_config.py | 178 res = subprocess.call(cmd) 179 self.logger.debug("fst hostapd start result: %d" % res) 180 if res == 0: 182 return res 210 res = subprocess.call(cmd) 211 self.logger.debug("fst supplicant start result: %d" % res) 212 return res 277 res = [] 281 res = iel[i + 2:i + 2 + iel[i + 1]] 285 res = [] [all …]
|
D | test_wpas_ctrl.py | 42 res = dev[0].request("GET_NETWORK " + str(id) + " proto") 43 if res != "RSN": 44 raise Exception("Unexpected SET_NETWORK/GET_NETWORK conversion for proto: " + res) 48 res = dev[0].request("GET_NETWORK " + str(id) + " key_mgmt") 49 if res != "WPA-PSK": 50 raise Exception("Unexpected SET_NETWORK/GET_NETWORK conversion for key_mgmt: " + res) 54 res = dev[0].request("GET_NETWORK " + str(id) + " auth_alg") 55 if res != "OPEN": 56 raise Exception("Unexpected SET_NETWORK/GET_NETWORK conversion for auth_alg: " + res) 60 res = dev[0].request("GET_NETWORK " + str(id) + " eap") [all …]
|
D | test_ap_track.py | 340 res = hapd.request("SIGNATURE " + addr0) 341 logger.info("sta0: " + res) 342 if not res.startswith("wifi4|probe:"): 344 if "|assoc:" not in res: 346 if "wps:track_test" in res: 349 res = hapd.request("SIGNATURE " + addr1) 350 logger.info("sta1: " + res) 351 if not res.startswith("wifi4|probe:"): 353 if "|assoc:" not in res: 355 if "wps:" in res: [all …]
|
D | wpasupplicant.py | 36 res = self.get_driver_status() 37 if 'capa.flags' in res and int(res['capa.flags'], 0) & 0x20000000: 189 res = self.global_request("INTERFACES ctrl") 190 lines = res.splitlines() 199 res = line.find("ctrl_iface=udp:") 200 if res == -1: 238 res = self.get_driver_status() 239 if 'capa.flags' in res and int(res['capa.flags'], 0) & 0x20000000: 291 res = self.request("FLUSH") 292 if "OK" not in res: [all …]
|
D | test_p2p_device.py | 33 res = wpas.global_request("IFNAME=p2p-dev-" + iface + " STATUS-DRIVER") 34 lines = res.splitlines() 101 res = p2p_iface_wpas.request("P2P_GROUP_REMOVE *") 102 if "OK" not in res: 141 res = wpas.global_request("P2P_LISTEN") 142 if "FAIL" in res: 148 res = wpas.global_request("P2P_SET nfc_tag 1").rstrip() 149 if "FAIL" in res: 157 res = dev[0].global_request("WPS_NFC_TAG_READ " + sel) 158 if "FAIL" in res: [all …]
|
D | test_p2p_ext.py | 24 res = dev[0].request("VENDOR_ELEM_GET 1") 25 if res != "dd050011223344": 26 raise Exception("Unexpected VENDOR_ELEM_GET result: " + res) 29 res = dev[0].request("VENDOR_ELEM_GET 1") 30 if res != "dd050011223344dd06001122335566": 31 raise Exception("Unexpected VENDOR_ELEM_GET result(2): " + res) 32 res = dev[0].request("VENDOR_ELEM_GET 2") 33 if res != "": 34 raise Exception("Unexpected VENDOR_ELEM_GET result(3): " + res) 37 res = dev[0].request("VENDOR_ELEM_GET 1") [all …]
|
D | test_p2p_autogo.py | 26 res = autogo(dev[0]) 27 if "p2p-wlan" in res['ifname']: 29 res = connect_cli(dev[0], dev[1]) 30 if "p2p-wlan" in res['ifname']: 32 bss = dev[1].get_bss("p2p_dev_addr=" + addr0, res['ifname']) 36 bss = dev[1].get_bss("ID-" + id, res['ifname']) 39 res = dev[1].group_request("BSS RANGE=" + id + "- MASK=0x1") 40 if "id=" + id not in res: 43 res = dev[1].request("SCAN_RESULTS") 44 if "[P2P]" not in res: [all …]
|
/hostap-latest/src/tls/ |
D | libtommath.c | 215 int olduse, res, min, max; in s_mp_add() local 232 if ((res = mp_grow (c, max + 1)) != MP_OKAY) { in s_mp_add() 233 return res; in s_mp_add() 302 int olduse, res, min, max; in s_mp_sub() local 310 if ((res = mp_grow (c, max)) != MP_OKAY) { in s_mp_sub() 311 return res; in s_mp_sub() 418 int sa, sb, res; in mp_add() local 429 res = s_mp_add (a, b, c); in mp_add() 437 res = s_mp_sub (b, a, c); in mp_add() 440 res = s_mp_sub (a, b, c); in mp_add() [all …]
|
/hostap-latest/hostapd/ |
D | hostapd_cli_cmds.c | 64 int res; in hostapd_cli_cmd_set() local 67 res = os_snprintf(cmd, sizeof(cmd), "SET %s ", argv[0]); in hostapd_cli_cmd_set() 68 if (os_snprintf_error(sizeof(cmd), res)) { in hostapd_cli_cmd_set() 101 char **res; in hostapd_complete_set() local 103 res = os_calloc(num_fields + 1, sizeof(char *)); in hostapd_complete_set() 104 if (!res) in hostapd_complete_set() 107 res[i] = os_strdup(fields[i]); in hostapd_complete_set() 108 if (!res[i]) in hostapd_complete_set() 109 return res; in hostapd_complete_set() 111 return res; in hostapd_complete_set() [all …]
|
D | hostapd_cli.c | 286 int res; in hostapd_cli_exec() local 293 res = os_exec(program, arg, 1); in hostapd_cli_exec() 296 return res; in hostapd_cli_exec() 342 char **res = NULL; in hostapd_complete_stations() local 346 res = cli_txt_list_array(&stations); in hostapd_complete_stations() 350 return res; in hostapd_complete_stations() 460 int res; in hostapd_cli_cmd_wps_check_pin() local 469 res = os_snprintf(cmd, sizeof(cmd), "WPS_CHECK_PIN %s %s", in hostapd_cli_cmd_wps_check_pin() 472 res = os_snprintf(cmd, sizeof(cmd), "WPS_CHECK_PIN %s", in hostapd_cli_cmd_wps_check_pin() 474 if (os_snprintf_error(sizeof(cmd), res)) { in hostapd_cli_cmd_wps_check_pin() [all …]
|
/hostap-latest/wlantest/ |
D | wlantest_cli.c | 109 int res; in cmd_send_and_recv() local 114 res = recv(s, resp, max_resp_len, 0); in cmd_send_and_recv() 115 if (res < 4) in cmd_send_and_recv() 120 return res; in cmd_send_and_recv() 134 int res; in cmd_simple() local 136 res = cmd_send_and_recv(s, buf, sizeof(buf), buf, sizeof(buf)); in cmd_simple() 137 return res < 0 ? -1 : 0; in cmd_simple() 148 char **res; in get_bssid_list() local 159 res = os_calloc(len / ETH_ALEN + 1, sizeof(char *)); in get_bssid_list() 160 if (res == NULL) in get_bssid_list() [all …]
|
/hostap-latest/src/fst/ |
D | fst_session.c | 273 int res; in fst_session_send_action() local 311 res = fst_iface_send_action(iface, in fst_session_send_action() 314 if (res < 0) in fst_session_send_action() 323 return res; in fst_session_send_action() 330 int res; in fst_session_send_tear_down() local 345 res = fst_session_send_action(s, true, &td, sizeof(td), NULL); in fst_session_send_tear_down() 346 if (!res) in fst_session_send_tear_down() 352 return res; in fst_session_send_tear_down() 503 const struct fst_setup_res *res; in fst_session_handle_setup_response() local 527 if (plen < sizeof(*res)) { in fst_session_handle_setup_response() [all …]
|
/hostap-latest/wpa_supplicant/ |
D | wpa_cli_cmds.c | 155 char **res = NULL; in wpa_cli_complete_network() local 159 res = cli_txt_list_array(&networks); in wpa_cli_complete_network() 162 res = os_calloc(num_fields + 1, sizeof(char *)); in wpa_cli_complete_network() 163 if (res == NULL) in wpa_cli_complete_network() 166 res[i] = os_strdup(network_fields[i]); in wpa_cli_complete_network() 167 if (res[i] == NULL) in wpa_cli_complete_network() 171 return res; in wpa_cli_complete_network() 303 int res; in wpa_cli_cmd_interface_add() local 317 res = os_snprintf(cmd, sizeof(cmd), in wpa_cli_cmd_interface_add() 324 if (os_snprintf_error(sizeof(cmd), res)) in wpa_cli_cmd_interface_add() [all …]
|
D | wpa_cli.c | 141 int flen, res; in wpa_cli_open_connection() 166 res = os_snprintf(cfile, flen, "%s/%s", ctrl_iface_dir, in wpa_cli_open_connection() 168 if (os_snprintf_error(flen, res)) { in wpa_cli_open_connection() 445 char **res = NULL; in wpa_cli_complete_help() local 449 res = wpa_list_cmd_list(); in wpa_cli_complete_help() 453 return res; in wpa_cli_complete_help() 488 int res; in wpa_cli_cmd_set() local 491 res = os_snprintf(cmd, sizeof(cmd), "SET %s ", argv[0]); in wpa_cli_cmd_set() 492 if (os_snprintf_error(sizeof(cmd), res)) { in wpa_cli_cmd_set() 581 char **res = os_calloc(num_fields + 1, sizeof(char *)); in wpa_cli_complete_set() local [all …]
|
/hostap-latest/src/p2p/ |
D | p2p_utils.c | 81 struct p2p_reg_class *res) in p2p_reg_class_intersect() argument 85 res->reg_class = a->reg_class; in p2p_reg_class_intersect() 91 res->channel[res->channels] = a->channel[i]; in p2p_reg_class_intersect() 92 res->channels++; in p2p_reg_class_intersect() 93 if (res->channels == P2P_MAX_REG_CLASS_CHANNELS) in p2p_reg_class_intersect() 113 struct p2p_channels *res) in p2p_channels_intersect() argument 117 os_memset(res, 0, sizeof(*res)); in p2p_channels_intersect() 127 &res->reg_class[res->reg_classes]); in p2p_channels_intersect() 128 if (res->reg_class[res->reg_classes].channels) { in p2p_channels_intersect() 129 res->reg_classes++; in p2p_channels_intersect() [all …]
|
/hostap-latest/src/utils/ |
D | common.c | 193 int res; in hwaddr_mask_txt() local 203 res = os_snprintf(buf, len, MACSTR "/" MACSTR, in hwaddr_mask_txt() 206 res = os_snprintf(buf, len, MACSTR, MAC2STR(addr)); in hwaddr_mask_txt() 207 if (os_snprintf_error(len, res)) in hwaddr_mask_txt() 209 return res; in hwaddr_mask_txt() 734 size_t merge_byte_arrays(u8 *res, size_t res_len, in merge_byte_arrays() argument 740 os_memset(res, 0, res_len); in merge_byte_arrays() 744 os_memcpy(res, src1, res_len); in merge_byte_arrays() 748 os_memcpy(res, src1, src1_len); in merge_byte_arrays() 754 os_memcpy(res + len, src2, res_len - len); in merge_byte_arrays() [all …]
|
/hostap-latest/hs20/server/www/ |
D | terms.php | 24 $res = $db->prepare("SELECT identity FROM pending_tc WHERE mac_addr=?"); variable 25 $res->execute(array($addr)); 26 $row = $res->fetch(); 38 $res = $db->prepare("UPDATE users SET t_c_timestamp=? WHERE identity=?"); variable 39 if (!$res->execute(array($t_c_timestamp, $identity))) { 43 $res = $db->prepare("DELETE FROM pending_tc WHERE mac_addr=?"); variable 44 $res->execute(array($addr)); 57 …$res = $db->prepare("SELECT waiting_coa_ack,coa_ack_received FROM current_sessions WHERE mac_addr=… variable 58 $res->execute(array($addr)); 59 $row = $res->fetch(); [all …]
|
/hostap-latest/hs20/client/ |
D | est.c | 124 int res; in est_load_cacerts() local 136 res = http_download_file(ctx->http, buf, "Cert/est-cacerts.txt", in est_load_cacerts() 141 if (res < 0) { in est_load_cacerts() 181 res = pkcs7_to_cert(ctx, pkcs7, pkcs7_len, "Cert/est-cacerts.pem", in est_load_cacerts() 184 if (res < 0) { in est_load_cacerts() 250 int res; in add_csrattrs_oid() local 255 res = OBJ_obj2txt(txt, sizeof(txt), oid, 1); in add_csrattrs_oid() 256 if (res < 0 || res >= (int) sizeof(txt)) in add_csrattrs_oid() 274 int i, num, res; in add_csrattrs_ext_req() local 280 res = OBJ_obj2txt(txt, sizeof(txt), oid, 1); in add_csrattrs_ext_req() [all …]
|
/hostap-latest/src/common/ |
D | dragonfly.c | 61 int res; in dragonfly_get_random_qr_qnr() local 69 res = crypto_bignum_legendre(tmp, prime); in dragonfly_get_random_qr_qnr() 70 if (res == 1 && !(*qr)) { in dragonfly_get_random_qr_qnr() 72 } else if (res == -1 && !(*qnr)) { in dragonfly_get_random_qr_qnr() 76 if (res == -2) in dragonfly_get_random_qr_qnr() 117 int check, res = -1; in dragonfly_is_quadratic_residue_blind() local 168 res = crypto_bignum_legendre(num, prime); in dragonfly_is_quadratic_residue_blind() 169 if (res == -2) { in dragonfly_is_quadratic_residue_blind() 170 res = -1; in dragonfly_is_quadratic_residue_blind() 175 mask = const_time_eq(res, check); in dragonfly_is_quadratic_residue_blind() [all …]
|
/hostap-latest/tests/hwsim/tnc/ |
D | hostap2_imc.c | 60 TNC_Result res; in TNC_IMC_BeginHandshake() local 74 res = send_message(imcID, connectionID, msg, os_strlen(msg), 1); in TNC_IMC_BeginHandshake() 75 if (res != TNC_RESULT_SUCCESS) in TNC_IMC_BeginHandshake() 76 return res; in TNC_IMC_BeginHandshake() 86 TNC_Result res; in TNC_IMC_ProvideBindFunction() local 113 res = report_message_types(imcID, message_types, in TNC_IMC_ProvideBindFunction() 115 if (res != TNC_RESULT_SUCCESS) in TNC_IMC_ProvideBindFunction() 116 return res; in TNC_IMC_ProvideBindFunction() 143 TNC_Result res; in TNC_IMC_ReceiveMessage() local 156 res = send_message(imcID, connectionID, msg, os_strlen(msg), 1); in TNC_IMC_ReceiveMessage() [all …]
|
/hostap-latest/src/drivers/ |
D | driver_wext.c | 871 char buf[200], *res; in wext_hostap_ifname() local 886 res = fgets(buf, sizeof(buf), f); in wext_hostap_ifname() 889 type = res ? atoi(res) : -1; in wext_hostap_ifname() 929 ssize_t res; in wext_check_hostap() local 945 res = readlink(path, buf, sizeof(buf) - 1); in wext_check_hostap() 946 if (res > 0) { in wext_check_hostap() 947 buf[res] = '\0'; in wext_check_hostap() 1197 struct wpa_scan_res res; member 1207 struct wext_scan_data *res) in wext_get_scan_mode() argument 1210 res->res.caps |= IEEE80211_CAP_IBSS; in wext_get_scan_mode() [all …]
|