/hostap-3.7.0/port/mbedtls/ |
D | supp_psa_api.c | 91 psa_status_t status; in supp_psa_cipher_operation() local 101 … status = psa_cipher_update(operation, input + bytes_written, bytes_to_write, output + *output_len, in supp_psa_cipher_operation() 103 ASSERT_STATUS(status, PSA_SUCCESS); in supp_psa_cipher_operation() 109 status = psa_cipher_finish(operation, output + *output_len, output_size - *output_len, &len); in supp_psa_cipher_operation() 110 ASSERT_STATUS(status, PSA_SUCCESS); in supp_psa_cipher_operation() 114 return status; in supp_psa_cipher_operation() 122 psa_status_t status; in aes_128_encrypt_block_psa() local 130 status = psa_import_key(&attributes, key, SUPP_PSA_BLOCK_SIZE_128, &key_id); in aes_128_encrypt_block_psa() 131 ASSERT_STATUS(status, PSA_SUCCESS); in aes_128_encrypt_block_psa() 134 …status = psa_cipher_encrypt(key_id, alg, in, SUPP_PSA_BLOCK_SIZE_128, out, SUPP_PSA_BLOCK_SIZE_128… in aes_128_encrypt_block_psa() [all …]
|
/hostap-3.7.0/tests/remote/ |
D | test_devices.py | 31 status, buf = host.execute(["id"]) 32 if status != 0: 41 status, buf = host.execute(["uname", "-s", "-n", "-r", "-m", "-o"]) 46 status, buf = host.execute(["ifconfig", iface]) 47 if status != 0: 54 status, buf = host.execute([setup_params['wpa_supplicant'], "-v"]) 55 if status != 0: 62 status, buf = host.execute([setup_params['hostapd'], "-v"]) 63 if status != 1: 70 status, buf = host.execute([setup_params['iperf'], "-v"]) [all …]
|
D | rutils.py | 121 …status, buf = host.execute([setup_params['hostapd'], "-B", "-ddt", "-g", "udp:" + host.port, "-P",… 122 if status != 0: 139 …status, buf = host.execute([setup_params['wpa_supplicant'], "-B", "-ddt", "-g", "udp:" + host.port… 140 if status != 0: 222 status, buf = client.execute(["ifconfig", ifname]) 241 status, buf = client.execute(["ifconfig", ifname]) 284 status, buf = host.execute(["ifconfig", iface]) 285 if status != 0: 377 status, buf = a.execute(ping_a_b) 378 if status == 2 and ping == "ping6": [all …]
|
/hostap-3.7.0/tests/hwsim/ |
D | test_multi_ap.py | 151 status = dev[0].get_status() 152 if status['wpa_state'] != 'COMPLETED' or status['bssid'] != multi_ap_bssid: 154 if status['ssid'] != params['multi_ap_backhaul_ssid'].strip('"'): 155 … raise Exception("Unexpected SSID %s != %s" % (status['ssid'], params["multi_ap_backhaul_ssid"])) 156 if status['pairwise_cipher'] != 'CCMP': 157 raise Exception("Unexpected encryption configuration %s" % status['pairwise_cipher']) 158 if status['key_mgmt'] != 'WPA2-PSK': 161 status = hapd.request("WPS_GET_STATUS") 162 if "PBC Status: Disabled" not in status: 164 if "Last WPS result: Success" not in status: [all …]
|
D | test_wpas_wmm_ac.py | 34 status = dev[0].request("WMM_AC_STATUS") 35 if "WMM AC is Enabled" not in status: 37 if "TSID" in status: 39 if "BK: acm=0 uapsd=0" not in status: 40 raise Exception("Unexpected BK info" + status) 41 if "BE: acm=0 uapsd=0" not in status: 42 raise Exception("Unexpected BE info" + status) 43 if "VI: acm=1 uapsd=0" not in status: 44 raise Exception("Unexpected VI info" + status) 45 if "VO: acm=1 uapsd=0" not in status: [all …]
|
D | test_ap_vht.py | 46 status = dev[0].get_status() 47 if status["ieee80211ac"] != "1": 49 status = hapd.get_status() 50 logger.info("hostapd STATUS: " + str(status)) 51 if status["ieee80211n"] != "1": 53 if status["ieee80211ac"] != "1": 55 if status["secondary_channel"] != "1": 57 if status["vht_oper_chwidth"] != "1": 59 if status["vht_oper_centr_freq_seg0_idx"] != "42": 61 if "vht_caps_info" not in status: [all …]
|
D | remotehost.py | 26 status = 0 29 status = e.returncode 35 logger.debug("thread exit status: " + str(status)) 37 reply.append(status) 70 status = 0 73 status = e.returncode 78 logger.debug("status: " + str(status)) 80 return status, buf.decode() 91 status = 0 94 status = e.returncode [all …]
|
D | test_ap_wps.py | 80 status = dev[0].get_status() 81 if status['wpa_state'] != 'COMPLETED' or status['bssid'] != apdev[0]['bssid']: 83 if status['ssid'] != ssid: 85 if status['pairwise_cipher'] != 'CCMP': 87 if status['key_mgmt'] != 'WPA2-PSK': 90 status = hapd.request("WPS_GET_STATUS") 91 if "PBC Status: Disabled" not in status: 93 if "Last WPS result: Success" not in status: 95 if "Peer Address: " + dev[0].p2p_interface_addr() not in status: 246 status = dev[0].get_status() [all …]
|
D | test_wep.py | 121 status = hapd.get_status() 122 logger.info("hostapd STATUS: " + str(status)) 123 if status["ieee80211n"] != "0": 125 if status["ieee80211ac"] != "0": 127 if status["secondary_channel"] != "0": 144 status = hapd.get_status() 145 logger.info("hostapd STATUS: " + str(status)) 146 if status["ieee80211ax"] != "0":
|
D | test_dpp3.py | 58 def run_dpp_tcp_pkex(dev0, dev1, cap_lo, sae=False, status=False): argument 70 if status: 98 if status: 114 def run_dpp_tcp_pkex_auto_connect_2(dev, apdev, params, status, start_ap=True): argument 130 run_dpp_tcp_pkex(dev[0], dev[1], cap_lo, sae=True, status=status) 133 if status: 175 def run_dpp_tcp_pkex_while_associated(dev, apdev, params, status): argument 199 run_dpp_tcp_pkex(dev[0], dev[1], cap_lo, sae=True, status=status) 200 if status:
|
D | test_he.py | 155 status = dev[0].get_status() 156 if status["ieee80211ac"] != "1": 158 status = hapd.get_status() 159 logger.info("hostapd STATUS: " + str(status)) 160 if status["ieee80211n"] != "1": 162 if status["ieee80211ac"] != "1": 164 if status["ieee80211ax"] != "1": 166 if status["secondary_channel"] != "1": 168 if status["vht_oper_chwidth"] != "1": 170 if status["vht_oper_centr_freq_seg0_idx"] != "42": [all …]
|
D | test_ap_ht.py | 51 status = hapd.get_status() 52 logger.info("hostapd STATUS: " + str(status)) 78 status = dev[0].get_status() 79 if 'wifi_generation' not in status: 83 if status['wifi_generation'] != "4": 84 raise Exception("Unexpected wifi_generation value: " + status['wifi_generation']) 89 status = wpas.get_status() 90 if 'wifi_generation' not in status: 94 if status['wifi_generation'] != "4": 95 raise Exception("Unexpected wifi_generation value (connect): " + status['wifi_generation']) [all …]
|
D | test_sae_pk.py | 42 status = dev.get_status() 43 if "sae_h2e" not in status or "sae_pk" not in status or \ 44 status["sae_h2e"] != "1" or status["sae_pk"] != "1": 412 status = dev[0].get_status() 413 if "sae_h2e" not in status or "sae_pk" not in status or \ 414 status["sae_h2e"] != "1" or status["sae_pk"] != "1":
|
/hostap-3.7.0/src/p2p/ |
D | p2p_pd.c | 105 int follow_on_req_fail = prov->status >= 0 && in p2ps_add_pd_req_attrs() 106 prov->status != P2P_SC_SUCCESS_DEFERRED; in p2ps_add_pd_req_attrs() 113 if (prov->status >= 0) in p2ps_add_pd_req_attrs() 114 p2p_buf_add_status(buf, (u8) prov->status); in p2ps_add_pd_req_attrs() 138 if (prov->status < 0 && prov->info[0]) in p2ps_add_pd_req_attrs() 249 enum p2p_status_code status, in p2p_build_prov_disc_resp() argument 300 if (status == P2P_SC_SUCCESS || in p2p_build_prov_disc_resp() 301 status == P2P_SC_SUCCESS_DEFERRED) in p2p_build_prov_disc_resp() 304 if (!status && prov->status != -1) in p2p_build_prov_disc_resp() 305 status = prov->status; in p2p_build_prov_disc_resp() [all …]
|
D | p2p_go_neg.c | 273 u8 dialog_token, u8 status, in p2p_build_go_neg_resp() argument 299 p2p_buf_add_status(buf, status); in p2p_build_go_neg_resp() 331 if (status || peer == NULL) { in p2p_build_go_neg_resp() 515 u8 *status) in p2p_go_select_channel() argument 530 *status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_go_select_channel() 538 *status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_go_select_channel() 750 u8 status = P2P_SC_FAIL_INVALID_PARAMS; in p2p_process_go_neg_req() local 813 if (msg.status && *msg.status) { in p2p_process_go_neg_req() 815 *msg.status); in p2p_process_go_neg_req() 817 *msg.status == P2P_SC_FAIL_REJECTED_BY_USER) { in p2p_process_go_neg_req() [all …]
|
D | p2p_invitation.c | 110 u8 dialog_token, u8 status, in p2p_build_invitation_resp() argument 151 p2p_buf_add_status(buf, status); in p2p_build_invitation_resp() 180 u8 status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE; in p2p_process_invitation_req() local 206 status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE; in p2p_process_invitation_req() 214 status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE; in p2p_process_invitation_req() 222 status = P2P_SC_FAIL_INVALID_PARAMS; in p2p_process_invitation_req() 245 status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_process_invitation_req() 257 status = p2p->cfg->invitation_process( in p2p_process_invitation_req() 270 status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_process_invitation_req() 281 status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_process_invitation_req() [all …]
|
D | p2p_dev_disc.c | 110 static struct wpabuf * p2p_build_dev_disc_resp(u8 dialog_token, u8 status) in p2p_build_dev_disc_resp() argument 122 p2p_buf_add_status(buf, status); in p2p_build_dev_disc_resp() 138 const u8 *addr, int freq, u8 status) in p2p_send_dev_disc_resp() argument 142 resp = p2p_build_dev_disc_resp(dialog_token, status); in p2p_send_dev_disc_resp() 148 MAC2STR(addr), status, freq); in p2p_send_dev_disc_resp() 219 u8 status; in p2p_process_dev_disc_resp() local 234 if (msg.status == NULL) { in p2p_process_dev_disc_resp() 246 status = *msg.status; in p2p_process_dev_disc_resp() 249 p2p_dbg(p2p, "Device Discoverability Response status %u", status); in p2p_process_dev_disc_resp() 260 if (status == 0) { in p2p_process_dev_disc_resp()
|
/hostap-3.7.0/src/pae/ |
D | ieee802_1x_cp.h | 27 void ieee802_1x_cp_set_electedself(void *cp_ctx, bool status); 34 void ieee802_1x_cp_set_usingreceivesas(void *cp_ctx, bool status); 35 void ieee802_1x_cp_set_allreceiving(void *cp_ctx, bool status); 36 void ieee802_1x_cp_set_servertransmitting(void *cp_ctx, bool status); 37 void ieee802_1x_cp_set_usingtransmitas(void *cp_ctx, bool status);
|
/hostap-3.7.0/src/ap/ |
D | drv_callbacks.c | 146 int status = WLAN_STATUS_SUCCESS; in hostapd_notif_assoc() local 314 status = WLAN_STATUS_INVALID_IE; in hostapd_notif_assoc() 323 status = WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY; in hostapd_notif_assoc() 328 hostapd_sta_assoc(hapd, addr, reassoc, status, in hostapd_notif_assoc() 365 status = WLAN_STATUS_INVALID_IE; in hostapd_notif_assoc() 369 status = WLAN_STATUS_SUCCESS; in hostapd_notif_assoc() 373 status = WLAN_STATUS_INVALID_IE; in hostapd_notif_assoc() 377 status = WLAN_STATUS_GROUP_CIPHER_NOT_VALID; in hostapd_notif_assoc() 381 status = WLAN_STATUS_PAIRWISE_CIPHER_NOT_VALID; in hostapd_notif_assoc() 385 status = WLAN_STATUS_AKMP_NOT_VALID; in hostapd_notif_assoc() [all …]
|
/hostap-3.7.0/hs20/client/ |
D | spp_client.c | 603 char *status = NULL; in process_spp_post_dev_data_response() local 609 status = get_spp_attr_value(ctx->xml, node, "sppStatus"); in process_spp_post_dev_data_response() 610 if (status == NULL) { in process_spp_post_dev_data_response() 615 status); in process_spp_post_dev_data_response() 624 status, session_id); in process_spp_post_dev_data_response() 643 strcasecmp(status, in process_spp_post_dev_data_response() 665 strcasecmp(status, "Exchange complete, release TLS connection") == in process_spp_post_dev_data_response() 676 strcasecmp(status, "Update complete, request sppUpdateResponse") == in process_spp_post_dev_data_response() 691 strcasecmp(status, "Provisioning complete, request " in process_spp_post_dev_data_response() 702 if (strcasecmp(status, "No update available at this time") == 0) { in process_spp_post_dev_data_response() [all …]
|
/hostap-3.7.0/wpa_supplicant/ |
D | pasn_supplicant.c | 68 int akmp, int cipher, u8 status, in wpas_pasn_auth_status() argument 85 status, comeback_after, comeback_txt); in wpas_pasn_auth_status() 95 status); in wpas_pasn_auth_status() 144 u16 len, res, alg, seq, status; in wpas_pasn_wd_sae_rx() local 171 status = WPA_GET_LE16(data + 4); in wpas_pasn_wd_sae_rx() 174 alg, seq, status); in wpas_pasn_wd_sae_rx() 177 status != WLAN_STATUS_SAE_HASH_TO_ELEMENT) { in wpas_pasn_wd_sae_rx() 216 status = WPA_GET_LE16(data + 4); in wpas_pasn_wd_sae_rx() 219 alg, seq, status); in wpas_pasn_wd_sae_rx() 221 if (alg != WLAN_AUTH_SAE || seq != 2 || status != WLAN_STATUS_SUCCESS) { in wpas_pasn_wd_sae_rx() [all …]
|
/hostap-3.7.0/src/common/ |
D | dpp_auth.c | 234 enum dpp_status_error status, in dpp_auth_build_resp() argument 254 auth->auth_resp_status = status; in dpp_auth_build_resp() 274 if (status != 255) in dpp_auth_build_resp() 275 dpp_build_attr_status(msg, status); in dpp_auth_build_resp() 428 enum dpp_status_error status = DPP_STATUS_OK; in dpp_auth_build_resp_ok() local 573 status = 255; in dpp_auth_build_resp_ok() 576 status = 254; in dpp_auth_build_resp_ok() 586 msg = dpp_auth_build_resp(auth, status, pr, nonce_len, in dpp_auth_build_resp_ok() 603 enum dpp_status_error status) in dpp_auth_build_resp_status() argument 649 status = 255; in dpp_auth_build_resp_status() [all …]
|
/hostap-3.7.0/wlantest/ |
D | rx_tdls.c | 247 u8 dialog_token, u16 status) in rx_data_tdls_setup_response_failure() argument 253 if (status == WLAN_STATUS_SUCCESS) { in rx_data_tdls_setup_response_failure() 289 u16 status; in rx_data_tdls_setup_response() local 298 status = WPA_GET_LE16(data); in rx_data_tdls_setup_response() 301 MAC2STR(src), MAC2STR(dst), status); in rx_data_tdls_setup_response() 302 if (len < 5 && status == 0) { in rx_data_tdls_setup_response() 313 data[2], status); in rx_data_tdls_setup_response() 326 if (status) in rx_data_tdls_setup_response() 331 if (status != WLAN_STATUS_SUCCESS) in rx_data_tdls_setup_response() 357 u8 dialog_token, u16 status) in rx_data_tdls_setup_confirm_failure() argument [all …]
|
/hostap-3.7.0/src/rsn_supp/ |
D | tdls.c | 1030 u16 status) in wpa_tdls_send_error() argument 1034 MAC2STR(dst), tdls_action, status); in wpa_tdls_send_error() 1035 return wpa_tdls_tpk_send(sm, dst, tdls_action, dialog_token, status, in wpa_tdls_send_error() 1080 int status; in wpa_tdls_send_tpk_m1() local 1243 status = wpa_tdls_tpk_send(sm, peer->addr, WLAN_TDLS_SETUP_REQUEST, in wpa_tdls_send_tpk_m1() 1247 return status; in wpa_tdls_send_tpk_m1() 1261 int status; in wpa_tdls_send_tpk_m2() local 1333 status = wpa_tdls_tpk_send(sm, src_addr, WLAN_TDLS_SETUP_RESPONSE, in wpa_tdls_send_tpk_m2() 1338 return status; in wpa_tdls_send_tpk_m2() 1352 int status; in wpa_tdls_send_tpk_m3() local [all …]
|
/hostap-3.7.0/wpa_supplicant/binder/ |
D | supplicant.cpp | 44 android::binder::Status status; in CreateInterface() local 59 status = android::binder::Status::fromServiceSpecificError( in CreateInterface() 69 status = in CreateInterface() 75 status = android::binder::Status::ok(); in CreateInterface() 81 return status; in CreateInterface()
|