/hostap-latest/src/utils/ |
D | utils_module_tests.c | 299 char *res2; in base64_tests() local 304 res2 = hostap_base64_encode("", ~0, &res_len); in base64_tests() 305 if (res2) { in base64_tests() 307 os_free(res2); in base64_tests() 310 res2 = hostap_base64_encode("=", 1, &res_len); in base64_tests() 311 if (!res2 || res_len != 5 || res2[0] != 'P' || res2[1] != 'Q' || in base64_tests() 312 res2[2] != '=' || res2[3] != '=' || res2[4] != '\n') in base64_tests() 314 os_free(res2); in base64_tests() 316 res2 = hostap_base64_encode("=", 1, NULL); in base64_tests() 317 if (!res2 || res2[0] != 'P' || res2[1] != 'Q' || in base64_tests() [all …]
|
/hostap-latest/wpa_supplicant/ |
D | op_classes.c | 256 enum chan_allowed res, res2; in verify_channel() local 258 res2 = res = allow_channel(mode, op_class, channel, &flag); in verify_channel() 262 res2 = allow_channel(mode, op_class, channel - 4, NULL); in verify_channel() 266 res2 = allow_channel(mode, op_class, channel + 4, NULL); in verify_channel() 269 res2 = allow_channel(mode, op_class, channel - 4, NULL); in verify_channel() 271 res2 = allow_channel(mode, op_class, channel + 4, NULL); in verify_channel() 278 res2 = res = verify_80mhz(mode, op_class, channel); in verify_channel() 285 res2 = res = verify_160mhz(mode, op_class, channel); in verify_channel() 292 res2 = res = verify_80mhz(mode, op_class, channel); in verify_channel() 299 res2= res = verify_320mhz(mode, op_class, channel); in verify_channel() [all …]
|
D | p2p_supplicant.c | 3906 enum chan_allowed res, res2; in wpas_p2p_verify_channel() local 3912 res2 = res = has_channel(wpa_s->global, mode, op_class, channel, &flag); in wpas_p2p_verify_channel() 3916 res2 = has_channel(wpa_s->global, mode, op_class, channel - 4, in wpas_p2p_verify_channel() 3921 res2 = has_channel(wpa_s->global, mode, op_class, channel + 4, in wpas_p2p_verify_channel() 3927 res2 = has_channel(wpa_s->global, mode, op_class, in wpas_p2p_verify_channel() 3930 res2 = has_channel(wpa_s->global, mode, op_class, in wpas_p2p_verify_channel() 3933 res2 = wpas_p2p_verify_80mhz(wpa_s, mode, op_class, channel, in wpas_p2p_verify_channel() 3936 res2 = wpas_p2p_verify_160mhz(wpa_s, mode, op_class, channel, in wpas_p2p_verify_channel() 3942 if (res == NOT_ALLOWED || res2 == NOT_ALLOWED) in wpas_p2p_verify_channel() 3944 if (res == NO_IR || res2 == NO_IR) in wpas_p2p_verify_channel() [all …]
|
/hostap-latest/tests/hwsim/ |
D | test_mbo.py | 32 res2 = None 77 res2 = sta['supp_op_classes'][2:] 87 return res2, res5 115 res2, res5 = run_mbo_supp_oper_classes(dev, apdev, hapd, hapd2, country, 149 if res2 != expected and res2 != expected2 and res2 != expected3 and res2 != alt_expected: 150 …xpected supp_op_class string (country=%s, 2.4 GHz): %s (expected: %s)" % (country, res2, expected))
|
D | test_nfc_p2p.py | 345 res2 = dev[1].global_request("SET p2p_listen_channel 6") 346 if "FAIL" in res or "FAIL" in res2: 397 res2 = dev[1].global_request("SET p2p_listen_channel 6") 398 if "FAIL" in res or "FAIL" in res2: 450 res2 = dev[1].global_request("SET p2p_listen_channel 6") 451 if "FAIL" in res or "FAIL" in res2: 502 res2 = dev[1].global_request("SET p2p_listen_channel 6") 503 if "FAIL" in res or "FAIL" in res2:
|
D | test_p2p_device.py | 422 res2 = connect_cli(dev[0], wpas, freq=res['freq']) 423 if not res2['ifname'].startswith('p2p-' + iface): 424 raise Exception("Unexpected group ifname: " + res2['ifname']) 439 res2 = connect_cli(dev[0], wpas, freq=res['freq']) 440 if res2['ifname'] != iface: 441 raise Exception("Unexpected group ifname: " + res2['ifname'])
|
D | test_pmksa_cache.py | 468 res2 = dev[0].get_pmksa(apdev[1]['bssid']) 469 if res1 and res2: 1073 res2 = dev[0].request("PMKSA_GET %d" % id) 1074 logger.info("PMKSA_GET: " + res2) 1075 if bssid not in res2: 1077 if bssid2 not in res2: 1095 for entry in res2.splitlines():
|
D | test_dbus.py | 3865 res2 = g_obj.Get(WPAS_DBUS_GROUP, 'WPSVendorExtensions', 3871 if res[0] != res2[0] or res[1] != res2[1]: 4292 res2 = if_obj.Get(WPAS_DBUS_IFACE_P2PDEVICE, "P2PDeviceConfig", 4296 if len(res) != len(res2): 4299 if res[k] != res2[k]: 4309 res2 = if_obj.Get(WPAS_DBUS_IFACE_P2PDEVICE, "P2PDeviceConfig", 4312 logger.debug("P2PDeviceConfig: " + str(res2)) 4313 if 'VendorExtension' not in res2 or len(res2['VendorExtension']) != 1: 4315 if 'SecondaryDeviceTypes' not in res2 or len(res2['SecondaryDeviceTypes']) != 1: 4432 res2 = p_obj.Get(WPAS_DBUS_PERSISTENT_GROUP, "Properties", [all …]
|
D | test_p2p_autogo.py | 120 res2 = connect_cli(dev[0], dev[1], social=True, freq=2412) 123 if "p2p-wlan" not in res2['ifname']: 128 if res2['ifname'] not in ifnames: 136 if res2['ifname'] in ifnames:
|
D | test_p2p_wifi_display.py | 102 res2 = dev[0].p2p_go_neg_auth_result() 259 res2 = dev[0].p2p_go_neg_auth_result()
|
D | test_sta_dynamic.py | 209 res2 = wpas.get_bss(bssid) 210 if res2 is not None:
|
D | test_wpas_mesh.py | 1697 res2 = dev[1].request("MESH_PMKSA_GET " + addr0) 1701 logger.info("MESH_PMKSA_GET: " + res2) 1704 if res1 != res2: 1717 if "OK" not in dev[1].request("MESH_PMKSA_ADD " + res2): 1735 r2 = res2.split()
|
D | test_rrm.py | 79 res2 = hapd2.request("SHOW_NEIGHBOR") 80 if len(res2.splitlines()) != 2: 81 raise Exception("Unexpected SHOW_NEIGHBOR output: " + res2) 82 if res not in res2:
|
D | test_p2p_channel.py | 545 res2 = autogo(wpas) 546 if res2['freq'] != "2417":
|
D | test_scan.py | 705 res2 = dev[2].request("SCAN_RESULTS") 708 bssid in res1 and bssid2 in res2 and \
|
D | test_sigma_dut.py | 1316 res2 = dut.cmd_check("ap_get_mac_address,NAME,AP,WLAN_TAG,2,Interface,24G") 1323 if dev[1].get_status_field('bssid') not in res2: 1324 raise Exception("Unexpected ap_get_mac_address WLAN_TAG,2: " + res2) 1342 res2 = dut.cmd_check("ap_get_mac_address,NAME,AP,WLAN_TAG,2,Interface,24G") 1347 if dev[0].get_status_field('bssid') not in res2: 1350 raise Exception("Unexpected ap_get_mac_address WLAN_TAG,1: " + res2)
|
D | test_ap_hs20.py | 200 res2 = dev[0].get_bss(bssid2) 203 if 'anqp_nai_realm' not in res2: 205 if res1['anqp_nai_realm'] != res2['anqp_nai_realm']: 220 res2 = dev[0].get_bss(bssid2) 221 if res1['anqp_nai_realm'] == res2['anqp_nai_realm']:
|
D | test_ap_wps.py | 2163 res2 = dev[0].request("WPS_CHECK_PIN " + t[0]).rstrip('\n') 2164 if res != res2:
|
/hostap-latest/src/drivers/ |
D | driver_ndis.c | 908 int res, res2; in wpa_driver_ndis_remove_key() local 922 res2 = ndis_set_oid(drv, OID_802_11_REMOVE_WEP, in wpa_driver_ndis_remove_key() 925 res2 = 0; in wpa_driver_ndis_remove_key() 927 if (res < 0 && res2 < 0) in wpa_driver_ndis_remove_key()
|