Home
last modified time | relevance | path

Searched refs:status (Results 1 – 25 of 155) sorted by relevance

1234567

/hostap-3.7.0/port/mbedtls/
Dsupp_psa_api.c91 psa_status_t status; in supp_psa_cipher_operation() local
101status = psa_cipher_update(operation, input + bytes_written, bytes_to_write, output + *output_len, in supp_psa_cipher_operation()
103 ASSERT_STATUS(status, PSA_SUCCESS); in supp_psa_cipher_operation()
109 status = psa_cipher_finish(operation, output + *output_len, output_size - *output_len, &len); in supp_psa_cipher_operation()
110 ASSERT_STATUS(status, PSA_SUCCESS); in supp_psa_cipher_operation()
114 return status; in supp_psa_cipher_operation()
122 psa_status_t status; in aes_128_encrypt_block_psa() local
130 status = psa_import_key(&attributes, key, SUPP_PSA_BLOCK_SIZE_128, &key_id); in aes_128_encrypt_block_psa()
131 ASSERT_STATUS(status, PSA_SUCCESS); in aes_128_encrypt_block_psa()
134status = psa_cipher_encrypt(key_id, alg, in, SUPP_PSA_BLOCK_SIZE_128, out, SUPP_PSA_BLOCK_SIZE_128… in aes_128_encrypt_block_psa()
[all …]
/hostap-3.7.0/tests/remote/
Dtest_devices.py31 status, buf = host.execute(["id"])
32 if status != 0:
41 status, buf = host.execute(["uname", "-s", "-n", "-r", "-m", "-o"])
46 status, buf = host.execute(["ifconfig", iface])
47 if status != 0:
54 status, buf = host.execute([setup_params['wpa_supplicant'], "-v"])
55 if status != 0:
62 status, buf = host.execute([setup_params['hostapd'], "-v"])
63 if status != 1:
70 status, buf = host.execute([setup_params['iperf'], "-v"])
[all …]
Drutils.py121status, buf = host.execute([setup_params['hostapd'], "-B", "-ddt", "-g", "udp:" + host.port, "-P",…
122 if status != 0:
139status, buf = host.execute([setup_params['wpa_supplicant'], "-B", "-ddt", "-g", "udp:" + host.port…
140 if status != 0:
222 status, buf = client.execute(["ifconfig", ifname])
241 status, buf = client.execute(["ifconfig", ifname])
284 status, buf = host.execute(["ifconfig", iface])
285 if status != 0:
377 status, buf = a.execute(ping_a_b)
378 if status == 2 and ping == "ping6":
[all …]
/hostap-3.7.0/tests/hwsim/
Dtest_multi_ap.py151 status = dev[0].get_status()
152 if status['wpa_state'] != 'COMPLETED' or status['bssid'] != multi_ap_bssid:
154 if status['ssid'] != params['multi_ap_backhaul_ssid'].strip('"'):
155 … raise Exception("Unexpected SSID %s != %s" % (status['ssid'], params["multi_ap_backhaul_ssid"]))
156 if status['pairwise_cipher'] != 'CCMP':
157 raise Exception("Unexpected encryption configuration %s" % status['pairwise_cipher'])
158 if status['key_mgmt'] != 'WPA2-PSK':
161 status = hapd.request("WPS_GET_STATUS")
162 if "PBC Status: Disabled" not in status:
164 if "Last WPS result: Success" not in status:
[all …]
Dtest_wpas_wmm_ac.py34 status = dev[0].request("WMM_AC_STATUS")
35 if "WMM AC is Enabled" not in status:
37 if "TSID" in status:
39 if "BK: acm=0 uapsd=0" not in status:
40 raise Exception("Unexpected BK info" + status)
41 if "BE: acm=0 uapsd=0" not in status:
42 raise Exception("Unexpected BE info" + status)
43 if "VI: acm=1 uapsd=0" not in status:
44 raise Exception("Unexpected VI info" + status)
45 if "VO: acm=1 uapsd=0" not in status:
[all …]
Dtest_ap_vht.py46 status = dev[0].get_status()
47 if status["ieee80211ac"] != "1":
49 status = hapd.get_status()
50 logger.info("hostapd STATUS: " + str(status))
51 if status["ieee80211n"] != "1":
53 if status["ieee80211ac"] != "1":
55 if status["secondary_channel"] != "1":
57 if status["vht_oper_chwidth"] != "1":
59 if status["vht_oper_centr_freq_seg0_idx"] != "42":
61 if "vht_caps_info" not in status:
[all …]
Dremotehost.py26 status = 0
29 status = e.returncode
35 logger.debug("thread exit status: " + str(status))
37 reply.append(status)
70 status = 0
73 status = e.returncode
78 logger.debug("status: " + str(status))
80 return status, buf.decode()
91 status = 0
94 status = e.returncode
[all …]
Dtest_ap_wps.py80 status = dev[0].get_status()
81 if status['wpa_state'] != 'COMPLETED' or status['bssid'] != apdev[0]['bssid']:
83 if status['ssid'] != ssid:
85 if status['pairwise_cipher'] != 'CCMP':
87 if status['key_mgmt'] != 'WPA2-PSK':
90 status = hapd.request("WPS_GET_STATUS")
91 if "PBC Status: Disabled" not in status:
93 if "Last WPS result: Success" not in status:
95 if "Peer Address: " + dev[0].p2p_interface_addr() not in status:
246 status = dev[0].get_status()
[all …]
Dtest_wep.py121 status = hapd.get_status()
122 logger.info("hostapd STATUS: " + str(status))
123 if status["ieee80211n"] != "0":
125 if status["ieee80211ac"] != "0":
127 if status["secondary_channel"] != "0":
144 status = hapd.get_status()
145 logger.info("hostapd STATUS: " + str(status))
146 if status["ieee80211ax"] != "0":
Dtest_dpp3.py58 def run_dpp_tcp_pkex(dev0, dev1, cap_lo, sae=False, status=False): argument
70 if status:
98 if status:
114 def run_dpp_tcp_pkex_auto_connect_2(dev, apdev, params, status, start_ap=True): argument
130 run_dpp_tcp_pkex(dev[0], dev[1], cap_lo, sae=True, status=status)
133 if status:
175 def run_dpp_tcp_pkex_while_associated(dev, apdev, params, status): argument
199 run_dpp_tcp_pkex(dev[0], dev[1], cap_lo, sae=True, status=status)
200 if status:
Dtest_he.py155 status = dev[0].get_status()
156 if status["ieee80211ac"] != "1":
158 status = hapd.get_status()
159 logger.info("hostapd STATUS: " + str(status))
160 if status["ieee80211n"] != "1":
162 if status["ieee80211ac"] != "1":
164 if status["ieee80211ax"] != "1":
166 if status["secondary_channel"] != "1":
168 if status["vht_oper_chwidth"] != "1":
170 if status["vht_oper_centr_freq_seg0_idx"] != "42":
[all …]
Dtest_ap_ht.py51 status = hapd.get_status()
52 logger.info("hostapd STATUS: " + str(status))
78 status = dev[0].get_status()
79 if 'wifi_generation' not in status:
83 if status['wifi_generation'] != "4":
84 raise Exception("Unexpected wifi_generation value: " + status['wifi_generation'])
89 status = wpas.get_status()
90 if 'wifi_generation' not in status:
94 if status['wifi_generation'] != "4":
95 raise Exception("Unexpected wifi_generation value (connect): " + status['wifi_generation'])
[all …]
Dtest_sae_pk.py42 status = dev.get_status()
43 if "sae_h2e" not in status or "sae_pk" not in status or \
44 status["sae_h2e"] != "1" or status["sae_pk"] != "1":
412 status = dev[0].get_status()
413 if "sae_h2e" not in status or "sae_pk" not in status or \
414 status["sae_h2e"] != "1" or status["sae_pk"] != "1":
/hostap-3.7.0/src/p2p/
Dp2p_pd.c105 int follow_on_req_fail = prov->status >= 0 && in p2ps_add_pd_req_attrs()
106 prov->status != P2P_SC_SUCCESS_DEFERRED; in p2ps_add_pd_req_attrs()
113 if (prov->status >= 0) in p2ps_add_pd_req_attrs()
114 p2p_buf_add_status(buf, (u8) prov->status); in p2ps_add_pd_req_attrs()
138 if (prov->status < 0 && prov->info[0]) in p2ps_add_pd_req_attrs()
249 enum p2p_status_code status, in p2p_build_prov_disc_resp() argument
300 if (status == P2P_SC_SUCCESS || in p2p_build_prov_disc_resp()
301 status == P2P_SC_SUCCESS_DEFERRED) in p2p_build_prov_disc_resp()
304 if (!status && prov->status != -1) in p2p_build_prov_disc_resp()
305 status = prov->status; in p2p_build_prov_disc_resp()
[all …]
Dp2p_go_neg.c273 u8 dialog_token, u8 status, in p2p_build_go_neg_resp() argument
299 p2p_buf_add_status(buf, status); in p2p_build_go_neg_resp()
331 if (status || peer == NULL) { in p2p_build_go_neg_resp()
515 u8 *status) in p2p_go_select_channel() argument
530 *status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_go_select_channel()
538 *status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_go_select_channel()
750 u8 status = P2P_SC_FAIL_INVALID_PARAMS; in p2p_process_go_neg_req() local
813 if (msg.status && *msg.status) { in p2p_process_go_neg_req()
815 *msg.status); in p2p_process_go_neg_req()
817 *msg.status == P2P_SC_FAIL_REJECTED_BY_USER) { in p2p_process_go_neg_req()
[all …]
Dp2p_invitation.c110 u8 dialog_token, u8 status, in p2p_build_invitation_resp() argument
151 p2p_buf_add_status(buf, status); in p2p_build_invitation_resp()
180 u8 status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE; in p2p_process_invitation_req() local
206 status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE; in p2p_process_invitation_req()
214 status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE; in p2p_process_invitation_req()
222 status = P2P_SC_FAIL_INVALID_PARAMS; in p2p_process_invitation_req()
245 status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_process_invitation_req()
257 status = p2p->cfg->invitation_process( in p2p_process_invitation_req()
270 status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_process_invitation_req()
281 status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_process_invitation_req()
[all …]
Dp2p_dev_disc.c110 static struct wpabuf * p2p_build_dev_disc_resp(u8 dialog_token, u8 status) in p2p_build_dev_disc_resp() argument
122 p2p_buf_add_status(buf, status); in p2p_build_dev_disc_resp()
138 const u8 *addr, int freq, u8 status) in p2p_send_dev_disc_resp() argument
142 resp = p2p_build_dev_disc_resp(dialog_token, status); in p2p_send_dev_disc_resp()
148 MAC2STR(addr), status, freq); in p2p_send_dev_disc_resp()
219 u8 status; in p2p_process_dev_disc_resp() local
234 if (msg.status == NULL) { in p2p_process_dev_disc_resp()
246 status = *msg.status; in p2p_process_dev_disc_resp()
249 p2p_dbg(p2p, "Device Discoverability Response status %u", status); in p2p_process_dev_disc_resp()
260 if (status == 0) { in p2p_process_dev_disc_resp()
/hostap-3.7.0/src/pae/
Dieee802_1x_cp.h27 void ieee802_1x_cp_set_electedself(void *cp_ctx, bool status);
34 void ieee802_1x_cp_set_usingreceivesas(void *cp_ctx, bool status);
35 void ieee802_1x_cp_set_allreceiving(void *cp_ctx, bool status);
36 void ieee802_1x_cp_set_servertransmitting(void *cp_ctx, bool status);
37 void ieee802_1x_cp_set_usingtransmitas(void *cp_ctx, bool status);
/hostap-3.7.0/src/ap/
Ddrv_callbacks.c146 int status = WLAN_STATUS_SUCCESS; in hostapd_notif_assoc() local
314 status = WLAN_STATUS_INVALID_IE; in hostapd_notif_assoc()
323 status = WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY; in hostapd_notif_assoc()
328 hostapd_sta_assoc(hapd, addr, reassoc, status, in hostapd_notif_assoc()
365 status = WLAN_STATUS_INVALID_IE; in hostapd_notif_assoc()
369 status = WLAN_STATUS_SUCCESS; in hostapd_notif_assoc()
373 status = WLAN_STATUS_INVALID_IE; in hostapd_notif_assoc()
377 status = WLAN_STATUS_GROUP_CIPHER_NOT_VALID; in hostapd_notif_assoc()
381 status = WLAN_STATUS_PAIRWISE_CIPHER_NOT_VALID; in hostapd_notif_assoc()
385 status = WLAN_STATUS_AKMP_NOT_VALID; in hostapd_notif_assoc()
[all …]
/hostap-3.7.0/hs20/client/
Dspp_client.c603 char *status = NULL; in process_spp_post_dev_data_response() local
609 status = get_spp_attr_value(ctx->xml, node, "sppStatus"); in process_spp_post_dev_data_response()
610 if (status == NULL) { in process_spp_post_dev_data_response()
615 status); in process_spp_post_dev_data_response()
624 status, session_id); in process_spp_post_dev_data_response()
643 strcasecmp(status, in process_spp_post_dev_data_response()
665 strcasecmp(status, "Exchange complete, release TLS connection") == in process_spp_post_dev_data_response()
676 strcasecmp(status, "Update complete, request sppUpdateResponse") == in process_spp_post_dev_data_response()
691 strcasecmp(status, "Provisioning complete, request " in process_spp_post_dev_data_response()
702 if (strcasecmp(status, "No update available at this time") == 0) { in process_spp_post_dev_data_response()
[all …]
/hostap-3.7.0/wpa_supplicant/
Dpasn_supplicant.c68 int akmp, int cipher, u8 status, in wpas_pasn_auth_status() argument
85 status, comeback_after, comeback_txt); in wpas_pasn_auth_status()
95 status); in wpas_pasn_auth_status()
144 u16 len, res, alg, seq, status; in wpas_pasn_wd_sae_rx() local
171 status = WPA_GET_LE16(data + 4); in wpas_pasn_wd_sae_rx()
174 alg, seq, status); in wpas_pasn_wd_sae_rx()
177 status != WLAN_STATUS_SAE_HASH_TO_ELEMENT) { in wpas_pasn_wd_sae_rx()
216 status = WPA_GET_LE16(data + 4); in wpas_pasn_wd_sae_rx()
219 alg, seq, status); in wpas_pasn_wd_sae_rx()
221 if (alg != WLAN_AUTH_SAE || seq != 2 || status != WLAN_STATUS_SUCCESS) { in wpas_pasn_wd_sae_rx()
[all …]
/hostap-3.7.0/src/common/
Ddpp_auth.c234 enum dpp_status_error status, in dpp_auth_build_resp() argument
254 auth->auth_resp_status = status; in dpp_auth_build_resp()
274 if (status != 255) in dpp_auth_build_resp()
275 dpp_build_attr_status(msg, status); in dpp_auth_build_resp()
428 enum dpp_status_error status = DPP_STATUS_OK; in dpp_auth_build_resp_ok() local
573 status = 255; in dpp_auth_build_resp_ok()
576 status = 254; in dpp_auth_build_resp_ok()
586 msg = dpp_auth_build_resp(auth, status, pr, nonce_len, in dpp_auth_build_resp_ok()
603 enum dpp_status_error status) in dpp_auth_build_resp_status() argument
649 status = 255; in dpp_auth_build_resp_status()
[all …]
/hostap-3.7.0/wlantest/
Drx_tdls.c247 u8 dialog_token, u16 status) in rx_data_tdls_setup_response_failure() argument
253 if (status == WLAN_STATUS_SUCCESS) { in rx_data_tdls_setup_response_failure()
289 u16 status; in rx_data_tdls_setup_response() local
298 status = WPA_GET_LE16(data); in rx_data_tdls_setup_response()
301 MAC2STR(src), MAC2STR(dst), status); in rx_data_tdls_setup_response()
302 if (len < 5 && status == 0) { in rx_data_tdls_setup_response()
313 data[2], status); in rx_data_tdls_setup_response()
326 if (status) in rx_data_tdls_setup_response()
331 if (status != WLAN_STATUS_SUCCESS) in rx_data_tdls_setup_response()
357 u8 dialog_token, u16 status) in rx_data_tdls_setup_confirm_failure() argument
[all …]
/hostap-3.7.0/src/rsn_supp/
Dtdls.c1030 u16 status) in wpa_tdls_send_error() argument
1034 MAC2STR(dst), tdls_action, status); in wpa_tdls_send_error()
1035 return wpa_tdls_tpk_send(sm, dst, tdls_action, dialog_token, status, in wpa_tdls_send_error()
1080 int status; in wpa_tdls_send_tpk_m1() local
1243 status = wpa_tdls_tpk_send(sm, peer->addr, WLAN_TDLS_SETUP_REQUEST, in wpa_tdls_send_tpk_m1()
1247 return status; in wpa_tdls_send_tpk_m1()
1261 int status; in wpa_tdls_send_tpk_m2() local
1333 status = wpa_tdls_tpk_send(sm, src_addr, WLAN_TDLS_SETUP_RESPONSE, in wpa_tdls_send_tpk_m2()
1338 return status; in wpa_tdls_send_tpk_m2()
1352 int status; in wpa_tdls_send_tpk_m3() local
[all …]
/hostap-3.7.0/wpa_supplicant/binder/
Dsupplicant.cpp44 android::binder::Status status; in CreateInterface() local
59 status = android::binder::Status::fromServiceSpecificError( in CreateInterface()
69 status = in CreateInterface()
75 status = android::binder::Status::ok(); in CreateInterface()
81 return status; in CreateInterface()

1234567