Home
last modified time | relevance | path

Searched refs:res2 (Results 1 – 19 of 19) sorted by relevance

/hostap-latest/src/utils/
Dutils_module_tests.c299 char *res2; in base64_tests() local
304 res2 = hostap_base64_encode("", ~0, &res_len); in base64_tests()
305 if (res2) { in base64_tests()
307 os_free(res2); in base64_tests()
310 res2 = hostap_base64_encode("=", 1, &res_len); in base64_tests()
311 if (!res2 || res_len != 5 || res2[0] != 'P' || res2[1] != 'Q' || in base64_tests()
312 res2[2] != '=' || res2[3] != '=' || res2[4] != '\n') in base64_tests()
314 os_free(res2); in base64_tests()
316 res2 = hostap_base64_encode("=", 1, NULL); in base64_tests()
317 if (!res2 || res2[0] != 'P' || res2[1] != 'Q' || in base64_tests()
[all …]
/hostap-latest/wpa_supplicant/
Dop_classes.c256 enum chan_allowed res, res2; in verify_channel() local
258 res2 = res = allow_channel(mode, op_class, channel, &flag); in verify_channel()
262 res2 = allow_channel(mode, op_class, channel - 4, NULL); in verify_channel()
266 res2 = allow_channel(mode, op_class, channel + 4, NULL); in verify_channel()
269 res2 = allow_channel(mode, op_class, channel - 4, NULL); in verify_channel()
271 res2 = allow_channel(mode, op_class, channel + 4, NULL); in verify_channel()
278 res2 = res = verify_80mhz(mode, op_class, channel); in verify_channel()
285 res2 = res = verify_160mhz(mode, op_class, channel); in verify_channel()
292 res2 = res = verify_80mhz(mode, op_class, channel); in verify_channel()
299 res2= res = verify_320mhz(mode, op_class, channel); in verify_channel()
[all …]
Dp2p_supplicant.c3906 enum chan_allowed res, res2; in wpas_p2p_verify_channel() local
3912 res2 = res = has_channel(wpa_s->global, mode, op_class, channel, &flag); in wpas_p2p_verify_channel()
3916 res2 = has_channel(wpa_s->global, mode, op_class, channel - 4, in wpas_p2p_verify_channel()
3921 res2 = has_channel(wpa_s->global, mode, op_class, channel + 4, in wpas_p2p_verify_channel()
3927 res2 = has_channel(wpa_s->global, mode, op_class, in wpas_p2p_verify_channel()
3930 res2 = has_channel(wpa_s->global, mode, op_class, in wpas_p2p_verify_channel()
3933 res2 = wpas_p2p_verify_80mhz(wpa_s, mode, op_class, channel, in wpas_p2p_verify_channel()
3936 res2 = wpas_p2p_verify_160mhz(wpa_s, mode, op_class, channel, in wpas_p2p_verify_channel()
3942 if (res == NOT_ALLOWED || res2 == NOT_ALLOWED) in wpas_p2p_verify_channel()
3944 if (res == NO_IR || res2 == NO_IR) in wpas_p2p_verify_channel()
[all …]
/hostap-latest/tests/hwsim/
Dtest_mbo.py32 res2 = None
77 res2 = sta['supp_op_classes'][2:]
87 return res2, res5
115 res2, res5 = run_mbo_supp_oper_classes(dev, apdev, hapd, hapd2, country,
149 if res2 != expected and res2 != expected2 and res2 != expected3 and res2 != alt_expected:
150 …xpected supp_op_class string (country=%s, 2.4 GHz): %s (expected: %s)" % (country, res2, expected))
Dtest_nfc_p2p.py345 res2 = dev[1].global_request("SET p2p_listen_channel 6")
346 if "FAIL" in res or "FAIL" in res2:
397 res2 = dev[1].global_request("SET p2p_listen_channel 6")
398 if "FAIL" in res or "FAIL" in res2:
450 res2 = dev[1].global_request("SET p2p_listen_channel 6")
451 if "FAIL" in res or "FAIL" in res2:
502 res2 = dev[1].global_request("SET p2p_listen_channel 6")
503 if "FAIL" in res or "FAIL" in res2:
Dtest_p2p_device.py422 res2 = connect_cli(dev[0], wpas, freq=res['freq'])
423 if not res2['ifname'].startswith('p2p-' + iface):
424 raise Exception("Unexpected group ifname: " + res2['ifname'])
439 res2 = connect_cli(dev[0], wpas, freq=res['freq'])
440 if res2['ifname'] != iface:
441 raise Exception("Unexpected group ifname: " + res2['ifname'])
Dtest_pmksa_cache.py468 res2 = dev[0].get_pmksa(apdev[1]['bssid'])
469 if res1 and res2:
1073 res2 = dev[0].request("PMKSA_GET %d" % id)
1074 logger.info("PMKSA_GET: " + res2)
1075 if bssid not in res2:
1077 if bssid2 not in res2:
1095 for entry in res2.splitlines():
Dtest_dbus.py3865 res2 = g_obj.Get(WPAS_DBUS_GROUP, 'WPSVendorExtensions',
3871 if res[0] != res2[0] or res[1] != res2[1]:
4292 res2 = if_obj.Get(WPAS_DBUS_IFACE_P2PDEVICE, "P2PDeviceConfig",
4296 if len(res) != len(res2):
4299 if res[k] != res2[k]:
4309 res2 = if_obj.Get(WPAS_DBUS_IFACE_P2PDEVICE, "P2PDeviceConfig",
4312 logger.debug("P2PDeviceConfig: " + str(res2))
4313 if 'VendorExtension' not in res2 or len(res2['VendorExtension']) != 1:
4315 if 'SecondaryDeviceTypes' not in res2 or len(res2['SecondaryDeviceTypes']) != 1:
4432 res2 = p_obj.Get(WPAS_DBUS_PERSISTENT_GROUP, "Properties",
[all …]
Dtest_p2p_autogo.py120 res2 = connect_cli(dev[0], dev[1], social=True, freq=2412)
123 if "p2p-wlan" not in res2['ifname']:
128 if res2['ifname'] not in ifnames:
136 if res2['ifname'] in ifnames:
Dtest_p2p_wifi_display.py102 res2 = dev[0].p2p_go_neg_auth_result()
259 res2 = dev[0].p2p_go_neg_auth_result()
Dtest_sta_dynamic.py209 res2 = wpas.get_bss(bssid)
210 if res2 is not None:
Dtest_wpas_mesh.py1697 res2 = dev[1].request("MESH_PMKSA_GET " + addr0)
1701 logger.info("MESH_PMKSA_GET: " + res2)
1704 if res1 != res2:
1717 if "OK" not in dev[1].request("MESH_PMKSA_ADD " + res2):
1735 r2 = res2.split()
Dtest_rrm.py79 res2 = hapd2.request("SHOW_NEIGHBOR")
80 if len(res2.splitlines()) != 2:
81 raise Exception("Unexpected SHOW_NEIGHBOR output: " + res2)
82 if res not in res2:
Dtest_p2p_channel.py545 res2 = autogo(wpas)
546 if res2['freq'] != "2417":
Dtest_scan.py705 res2 = dev[2].request("SCAN_RESULTS")
708 bssid in res1 and bssid2 in res2 and \
Dtest_sigma_dut.py1316 res2 = dut.cmd_check("ap_get_mac_address,NAME,AP,WLAN_TAG,2,Interface,24G")
1323 if dev[1].get_status_field('bssid') not in res2:
1324 raise Exception("Unexpected ap_get_mac_address WLAN_TAG,2: " + res2)
1342 res2 = dut.cmd_check("ap_get_mac_address,NAME,AP,WLAN_TAG,2,Interface,24G")
1347 if dev[0].get_status_field('bssid') not in res2:
1350 raise Exception("Unexpected ap_get_mac_address WLAN_TAG,1: " + res2)
Dtest_ap_hs20.py200 res2 = dev[0].get_bss(bssid2)
203 if 'anqp_nai_realm' not in res2:
205 if res1['anqp_nai_realm'] != res2['anqp_nai_realm']:
220 res2 = dev[0].get_bss(bssid2)
221 if res1['anqp_nai_realm'] == res2['anqp_nai_realm']:
Dtest_ap_wps.py2163 res2 = dev[0].request("WPS_CHECK_PIN " + t[0]).rstrip('\n')
2164 if res != res2:
/hostap-latest/src/drivers/
Ddriver_ndis.c908 int res, res2; in wpa_driver_ndis_remove_key() local
922 res2 = ndis_set_oid(drv, OID_802_11_REMOVE_WEP, in wpa_driver_ndis_remove_key()
925 res2 = 0; in wpa_driver_ndis_remove_key()
927 if (res < 0 && res2 < 0) in wpa_driver_ndis_remove_key()