/hostap-latest/tests/hwsim/ |
D | test_dbus.py | 100 if type == dbus.exceptions.DBusException and self._expected in str(value): 122 logger.debug("GetAll(fi.w1.wpa.supplicant1, /fi/w1/wpa_supplicant1) ==> " + str(props)) 126 logger.debug("GetAll(%s, %s): %s" % (WPAS_DBUS_IFACE, path, str(props))) 130 logger.debug("GetAll(%s, %s): %s" % (WPAS_DBUS_IFACE_WPS, path, str(props))) 135 raise Exception("Unexpected BSSs entry: " + str(res)) 140 raise Exception("Unexpected Networks entry: " + str(res)) 152 raise Exception("Missing BSSs entry: " + str(res)) 154 raise Exception("Too manu BSSs entries: " + str(res)) 157 logger.debug("GetAll(%s, %s): %s" % (WPAS_DBUS_BSS, res[0], str(props))) 169 raise Exception("Missing Networks entry: " + str(res)) [all …]
|
D | test_wpas_ctrl.py | 29 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id)): 31 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id) + " name"): 33 if "FAIL" not in dev[0].request("SET_NETWORK " + str(id + 1) + " proto OPEN"): 35 if "FAIL" not in dev[0].request("GET_NETWORK " + str(id)): 37 if "FAIL" not in dev[0].request("GET_NETWORK " + str(id + 1) + " proto"): 40 if "OK" not in dev[0].request("SET_NETWORK " + str(id) + " proto \t WPA2 "): 42 res = dev[0].request("GET_NETWORK " + str(id) + " proto") 46 if "OK" not in dev[0].request("SET_NETWORK " + str(id) + " key_mgmt \t WPA-PSK "): 48 res = dev[0].request("GET_NETWORK " + str(id) + " key_mgmt") 52 if "OK" not in dev[0].request("SET_NETWORK " + str(id) + " auth_alg \t OPEN "): [all …]
|
D | test_he.py | 150 raise Exception("Unexpected SIGNAL_POLL value(1): " + str(sig)) 152 raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig)) 160 logger.info("hostapd STATUS: " + str(status)) 181 logger.info("hostapd STA: " + str(sta)) 190 if isinstance(e, Exception) and str(e) == "AP startup failed": 229 if isinstance(e, Exception) and str(e) == "AP startup failed": 267 "channel": str(channel), 280 scan_freq=str(5000 + 5 * channel)) 283 if isinstance(e, Exception) and str(e) == "AP startup failed": 359 if isinstance(e, Exception) and str(e) == "AP startup failed": [all …]
|
D | test_ap_vht.py | 40 raise Exception("Unexpected SIGNAL_POLL value(1): " + str(sig)) 42 raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig)) 50 logger.info("hostapd STATUS: " + str(status)) 65 logger.info("hostapd STA: " + str(sta)) 76 if isinstance(e, Exception) and str(e) == "AP startup failed": 121 if isinstance(e, Exception) and str(e) == "AP startup failed": 136 "channel": str(channel), 146 scan_freq=str(5000 + 5 * channel)) 149 if isinstance(e, Exception) and str(e) == "AP startup failed": 186 scan_freq=str(5000 + 5 * 161)) [all …]
|
D | p2p_utils.py | 103 logger.debug("i_res: " + str(i_res)) 104 logger.debug("r_res: " + str(r_res)) 204 logger.debug("res: " + str(res)) 240 logger.debug("i_res: " + str(i_res)) 243 logger.info("go_neg_init thread caught an exception from p2p_go_neg_init: " + str(e)) 266 logger.info("go_neg_pin - r_dev.p2p_go_neg_init() exception: " + str(e)) 269 logger.debug("r_res: " + str(r_res)) 275 logger.debug("i_res: " + str(i_res)) 303 logger.debug("i_res: " + str(i_res)) 304 logger.debug("r_res: " + str(r_res)) [all …]
|
D | wpasupplicant.py | 48 self.global_dbg = hostname + "/" + str(global_port) + "/" 89 if str(e) == "DETACH failed": 110 if str(e) == "DETACH failed": 306 states = str(state1) + " " + str(state2) 346 id = self.request("REMOVE_NETWORK " + str(id)) 352 res = self.request("GET_NETWORK " + str(id) + " " + field) 358 res = self.request("SET_NETWORK " + str(id) + " " + field + " " + value) 364 res = self.request("SET_NETWORK " + str(id) + " " + field + ' "' + value + '"') 379 res = self.p2pdev_request("SET_NETWORK " + str(id) + " " + field + " " + value) 385 res = self.p2pdev_request("SET_NETWORK " + str(id) + " " + field + ' "' + value + '"') [all …]
|
D | remotehost.py | 35 logger.debug("thread exit status: " + str(status)) 36 logger.debug("thread exit buf: " + str(buf)) 67 logger.debug("execute: " + str(command)) 78 logger.debug("status: " + str(status)) 79 logger.debug("buf: " + str(buf)) 99 logger.debug(self.name + " status: " + str(status)) 100 logger.debug(self.name + " buf: " + str(buf)) 158 wait_str = str(wait) + "s" 193 … logger.debug(self.name + " proc_wait_event: " + ' '.join(events) + " timeout: " + str(timeout)) 225 r = str(res)
|
D | test_p2ps.py | 34 …if "OK" not in r_dev.global_request("P2P_SERVICE_ADD asp " + str(r_role) + " " + str(advid) + " 1 … 38 …if "OK" not in r_dev.global_request("P2P_SERVICE_ADD asp " + str(r_role) + " " + str(advid) + " 1 … 42 …if "OK" not in r_dev.global_request("P2P_SERVICE_ADD asp " + str(r_role) + " " + str(advid) + " 1 … 46 …if "OK" not in r_dev.global_request("P2P_SERVICE_ADD asp " + str(r_role) + " " + str(adv_id) + " 1… 145 seeker.asp_provision(addr1, adv_id=str(adv_id), adv_mac=addr1, session_id=1, 411 ev0 = dev[0].global_request("P2P_SERVICE_DEL asp " + str(adv_id)) 424 ev0 = dev[0].global_request("P2P_SERVICE_DEL asp " + str(adv_id)) 437 ev0 = dev[0].global_request("P2P_SERVICE_DEL asp " + str(adv_id)) 450 ev0 = dev[0].global_request("P2P_SERVICE_DEL asp " + str(adv_id)) 466 ev0 = dev[0].global_request("P2P_SERVICE_DEL asp " + str(adv_id)) [all …]
|
D | test_ibss.py | 19 dev.select_network(id, freq=str(freq)) 56 dev.set_network(id, "frequency", str(freq)) 58 dev.set_network(id, "max_oper_chwidth", str(chwidth)) 60 dev.set_network(id, "scan_freq", str(scan_freq)) 79 dev.set_network(id, "group_rekey", str(group_rekey)) 80 dev.request("ENABLE_NETWORK " + str(id) + " no-connect") 247 logger.info("Ignoring known connectivity failure: " + str(e)) 251 logger.info("Ignoring known connectivity failure: " + str(e)) 255 logger.info("Ignoring known connectivity failure: " + str(e)) 300 logger.info("Ignoring known connectivity failure: " + str(e)) [all …]
|
D | test_ap_qosmap.py | 29 …logger.info("Expected TX DSCP " + str(dscp) + " with TID " + str(tid) + " but counters: " + str(tx… 34 …logger.info("Expected RX DSCP " + str(dscp) + " with TID " + str(ap_tid) + " but counters: " + str… 115 if str(e) == "No STA->AP data frame using the expected TID": 171 if str(e) == "No STA->AP data frame using the expected TID":
|
D | test_eht.py | 23 logger.info("station status: " + str(status)) 67 logger.info("hostapd STATUS: " + str(status)) 78 logger.info("hostapd STA: " + str(sta)) 98 raise Exception("Unexpected SIGNAL_POLL value(1): " + str(sig)) 100 raise Exception("Unexpected SIGNAL_POLL value(2): " + str(sig)) 119 str(e) == "Failed to set hostapd parameter ieee80211be": 146 str(e) == "Failed to set hostapd parameter ieee80211be": 177 str(e) == "Failed to set hostapd parameter ieee80211be": 333 logger.info("BSS 0: " + str(bss)) 356 logger.info("BSS 1: " + str(bss)) [all …]
|
D | test_p2p_channel.py | 179 if "OK" not in dev[0].request("DRIVER_EVENT AVOID_FREQUENCIES " + str(freq)): 209 if "OK" not in dev[0].request("DRIVER_EVENT AVOID_FREQUENCIES " + str(freq)): 282 raise Exception("Unexpected channel width: " + str(sig)) 300 "channel": str(key)}) 302 scan_freq=str(channels[key])) 609 …0 times and not all social channels were selected. freqs not selected: " + str(list(set(go_freqs) … 638 raise Exception("Unexpected number of network blocks: " + str(netw)) 668 raise Exception("Unexpected freq=2 channel: " + str(freq)) 673 raise Exception("Unexpected freq=5 channel: " + str(freq)) 676 logger.info(str(res)) [all …]
|
/hostap-latest/src/utils/ |
D | common.c | 450 void wpa_unicode2ascii_inplace(TCHAR *str) in wpa_unicode2ascii_inplace() argument 453 char *dst = (char *) str; in wpa_unicode2ascii_inplace() 454 while (*str) in wpa_unicode2ascii_inplace() 455 *dst++ = (char) *str++; in wpa_unicode2ascii_inplace() 461 TCHAR * wpa_strdup_tchar(const char *str) in wpa_strdup_tchar() argument 465 buf = os_malloc((strlen(str) + 1) * sizeof(TCHAR)); in wpa_strdup_tchar() 468 wsprintf(buf, L"%S", str); in wpa_strdup_tchar() 471 return os_strdup(str); in wpa_strdup_tchar() 526 size_t printf_decode(u8 *buf, size_t maxlen, const char *str) in printf_decode() argument 528 const char *pos = str; in printf_decode() [all …]
|
D | json.c | 67 char *str, *spos, *s_end; in json_parse_string() local 75 str = os_malloc(buf_len); in json_parse_string() 76 if (!str) in json_parse_string() 78 spos = str; in json_parse_string() 79 s_end = str + buf_len; in json_parse_string() 86 idx = spos - str; in json_parse_string() 90 tmp = os_realloc(str, buf_len); in json_parse_string() 93 str = tmp; in json_parse_string() 94 spos = str + idx; in json_parse_string() 95 s_end = str + buf_len; in json_parse_string() [all …]
|
D | edit.c | 29 char str[1]; member 176 static void history_add(const char *str) in history_add() argument 181 if (str[0] == '\0') in history_add() 185 if (os_strcmp(str, h->str) == 0) { in history_add() 205 len = os_strlen(str); in history_add() 210 os_strlcpy(h->str, str, len + 1); in history_add() 218 cmdbuf_len = cmdbuf_pos = os_strlen(history_curr->str); in history_use() 219 os_memcpy(cmdbuf, history_curr->str, cmdbuf_len); in history_use() 305 if (filter_cb && filter_cb(edit_cb_ctx, h->str)) in history_write() 307 fprintf(f, "%s\n", h->str); in history_write() [all …]
|
/hostap-latest/src/wps/ |
D | wps_dev_attr.c | 260 static int wps_process_manufacturer(struct wps_device_data *dev, const u8 *str, in wps_process_manufacturer() argument 263 if (str == NULL) { in wps_process_manufacturer() 268 wpa_hexdump_ascii(MSG_DEBUG, "WPS: Manufacturer", str, str_len); in wps_process_manufacturer() 271 dev->manufacturer = dup_binstr(str, str_len); in wps_process_manufacturer() 279 static int wps_process_model_name(struct wps_device_data *dev, const u8 *str, in wps_process_model_name() argument 282 if (str == NULL) { in wps_process_model_name() 287 wpa_hexdump_ascii(MSG_DEBUG, "WPS: Model Name", str, str_len); in wps_process_model_name() 290 dev->model_name = dup_binstr(str, str_len); in wps_process_model_name() 298 static int wps_process_model_number(struct wps_device_data *dev, const u8 *str, in wps_process_model_number() argument 301 if (str == NULL) { in wps_process_model_number() [all …]
|
D | wps_common.c | 462 int wps_dev_type_str2bin(const char *str, u8 dev_type[WPS_DEV_TYPE_LEN]) in wps_dev_type_str2bin() argument 467 WPA_PUT_BE16(dev_type, atoi(str)); in wps_dev_type_str2bin() 468 pos = os_strchr(str, '-'); in wps_dev_type_str2bin() 528 u16 wps_config_methods_str2bin(const char *str) in wps_config_methods_str2bin() argument 532 if (str == NULL || str[0] == '\0') { in wps_config_methods_str2bin() 543 if (os_strstr(str, "ethernet")) in wps_config_methods_str2bin() 545 if (os_strstr(str, "label")) in wps_config_methods_str2bin() 547 if (os_strstr(str, "display")) in wps_config_methods_str2bin() 549 if (os_strstr(str, "ext_nfc_token")) in wps_config_methods_str2bin() 551 if (os_strstr(str, "int_nfc_token")) in wps_config_methods_str2bin() [all …]
|
/hostap-latest/wlantest/ |
D | wlantest_cli.c | 22 static int get_prev_arg_pos(const char *str, int pos) in get_prev_arg_pos() argument 24 while (pos > 0 && str[pos - 1] != ' ') in get_prev_arg_pos() 26 while (pos > 0 && str[pos - 1] == ' ') in get_prev_arg_pos() 28 while (pos > 0 && str[pos - 1] != ' ') in get_prev_arg_pos() 75 const char *str) in attr_add_str() argument 77 size_t len = os_strlen(str); in attr_add_str() 85 os_memcpy(pos, str, len); in attr_add_str() 295 static char ** complete_list_sta(int s, const char *str, int pos) in complete_list_sta() argument 297 if (get_cmd_arg_num(str, pos) == 1) in complete_list_sta() 352 static char ** complete_clear_sta_counters(int s, const char *str, int pos) in complete_clear_sta_counters() argument [all …]
|
/hostap-latest/tests/remote/ |
D | run-tests.py | 298 logger.warning("get devices failed: " + str(e)) 311 logger.warning("DUT (apdev): " + str(dut)) 313 logger.warning("DUT: " + str(dut)) 316 logger.warning("REF (dev): " + str(ref)) 318 logger.warning("REF: " + str(ref)) 320 logger.warning("MON: " + str(monitor)) 327 logger.warning("FAILED: " + str(e)) 343 …logger.warning("START - " + setup_params['tc_name'] + " (" + str(test_no) + "/" + str(len(tests_to… 351 logger.warning("PASS (" + res + ") - " + str((end - start).total_seconds()) + "s") 357 logger.warning("SKIP (" + str(e) + ") - " + str((end - start).total_seconds()) + "s") [all …]
|
/hostap-latest/hs20/client/ |
D | osu_client.c | 80 char *str = xml_node_to_str(ctx->xml, node); in debug_dump_node() local 81 wpa_printf(MSG_DEBUG, "[hs20] %s: '%s'", title, str); in debug_dump_node() 82 free(str); in debug_dump_node() 555 char *str; in hs20_add_pps_mo() local 630 str = xml_node_get_text(ctx->xml, add_mo); in hs20_add_pps_mo() 631 if (str == NULL) { in hs20_add_pps_mo() 636 wpa_printf(MSG_DEBUG, "[hs20] addMO text: '%s'", str); in hs20_add_pps_mo() 638 tnds = xml_node_from_buf(ctx->xml, str); in hs20_add_pps_mo() 639 xml_node_get_text_free(ctx->xml, str); in hs20_add_pps_mo() 697 char *str; in update_pps_file() local [all …]
|
/hostap-latest/hs20/server/ |
D | hs20_spp_server.c | 51 char *str; in debug_dump_node() local 55 str = xml_node_to_str(ctx->xml, node); in debug_dump_node() 56 if (str == NULL) in debug_dump_node() 60 fprintf(ctx->debug_log, "%s: '%s'\n", title, str); in debug_dump_node() 61 os_free(str); in debug_dump_node() 69 char *user, *realm, *post, *str; in process() local 135 str = xml_node_to_str(ctx->xml, soap); in process() 137 if (str == NULL) { in process() 141 printf("%s", str); in process() 142 free(str); in process()
|
D | spp_server.c | 146 char *str; in db_add_session_pps() local 149 str = xml_node_to_str(ctx->xml, node); in db_add_session_pps() 150 if (str == NULL) in db_add_session_pps() 154 str, sessionid, user, realm); in db_add_session_pps() 155 free(str); in db_add_session_pps() 170 char *str; in db_add_session_devinfo() local 173 str = xml_node_to_str(ctx->xml, node); in db_add_session_devinfo() 174 if (str == NULL) in db_add_session_devinfo() 177 str, sessionid); in db_add_session_devinfo() 178 free(str); in db_add_session_devinfo() [all …]
|
/hostap-latest/wpadebug/src/w1/fi/wpadebug/ |
D | QrCodeDisplayActivity.java | 48 String str = readFromFile(FILE_NAME); in onCreate() local 52 Bitmap bitmap = (TextUtils.isEmpty(str)) ? null : encodeAsBitmap(str); in onCreate() 56 Log.e(TAG, "Failed to generate bitmap for uri=" + str); in onCreate() 65 private Bitmap encodeAsBitmap(String str) throws WriterException { in encodeAsBitmap() argument 68 … result = new MultiFormatWriter().encode(str, BarcodeFormat.QR_CODE, WIDTH, HEIGHT, null); in encodeAsBitmap()
|
/hostap-latest/wpa_supplicant/examples/ |
D | p2p-nfc.py | 81 cmd = "WPS_NFC_TAG_READ " + str(message).encode("hex") 136 …cmd = "NFC_REPORT_HANDOVER " + type + " P2P " + str(req).encode("hex") + " " + str(sel).encode("he… 147 …cmd = "NFC_REPORT_HANDOVER " + type + " WPS " + str(req).encode("hex") + " " + str(sel).encode("he… 186 print(str(message).encode("hex")) 198 summary("Other exception: " + str(e)) 225 print(str(message).encode("hex")) 360 print(str(sel).encode("hex")) 418 summary("Tag found - writing - " + str(tag)) 420 tag.ndef.message = str(p2p_sel_data) 448 print(str(p2p_sel_data).encode("hex")) [all …]
|
/hostap-latest/hostapd/ |
D | wps-ap-nfc.py | 66 if "FAIL" in wpas.request("WPS_NFC_TAG_READ " + str(message).encode("hex")): 106 str(req).encode("hex") + " " + 107 str(sel).encode("hex")) 139 print(str(request).encode("hex")) 166 print(str(sel).encode("hex")) 192 summary("Tag found - writing - " + str(tag)) 194 tag.ndef.message = str(write_data) 233 summary("Tag connected: " + str(tag))
|