Home
last modified time | relevance | path

Searched refs:ack (Results 1 – 25 of 29) sorted by relevance

12

/hostap-latest/hs20/server/www/
Dterms.php55 $ack = false; variable
66 $ack = $row[1] == 1; variable
72 if ($ack) {
/hostap-latest/src/common/
Dgas_server.c418 int ack) in gas_server_handle_tx_status() argument
420 if (ack && response->resp && in gas_server_handle_tx_status()
427 if (ack && !response->resp && response->comeback_delay) { in gas_server_handle_tx_status()
433 if (!ack) in gas_server_handle_tx_status()
441 response->resp, ack); in gas_server_handle_tx_status()
449 size_t data_len, int ack) in gas_server_tx_status() argument
467 MAC2STR(dst), ack, in gas_server_tx_status()
475 gas_server_handle_tx_status(response, ack); in gas_server_tx_status()
Dgas_server.h37 size_t data_len, int ack);
/hostap-latest/src/ap/
Dieee802_1x.h34 const u8 *buf, size_t len, int ack);
36 const u8 *data, int len, int ack);
Dieee802_1x.c2670 const u8 *buf, size_t len, int ack) in ieee802_1x_tx_status() argument
2692 ack); in ieee802_1x_tx_status()
2697 const u8 *buf, int len, int ack) in ieee802_1x_eapol_tx_status() argument
2709 be_to_host16(xhdr->length), ack); in ieee802_1x_eapol_tx_status()
2712 if (xhdr->type == IEEE802_1X_TYPE_EAP_PACKET && ack && in ieee802_1x_eapol_tx_status()
2731 sta->wpa_sm, ack); in ieee802_1x_eapol_tx_status()
2739 if (!ack && pos + sizeof(*key) <= buf + len) { in ieee802_1x_eapol_tx_status()
Ddrv_callbacks.c2376 const u8 *data, size_t len, int ack, in hostapd_eapol_tx_status() argument
2391 ieee802_1x_eapol_tx_status(hapd, sta, data, len, ack); in hostapd_eapol_tx_status()
2492 data->tx_status.ack, in hostapd_event()
2499 data->tx_status.ack); in hostapd_event()
2507 data->eapol_tx_status.ack, in hostapd_event()
Dieee802_11.h135 const u8 *buf, size_t len, int ack);
Dwpa_auth.h539 struct wpa_state_machine *sm, int ack);
Dieee802_11.c6923 const u8 *buf, size_t len, int ack) in hostapd_tx_status() argument
6943 ack ? "ACKed" : "did not ACK"); in hostapd_tx_status()
6944 if (ack) in hostapd_tx_status()
6948 ieee802_1x_tx_status(hapd, sta, buf, len, ack); in hostapd_tx_status()
/hostap-latest/wpa_supplicant/
Dap.h61 const u8 *buf, size_t len, int ack);
63 const u8 *data, size_t len, int ack);
Dap.c1215 const u8 *buf, size_t len, int ack) in ap_tx_status() argument
1219 hostapd_tx_status(wpa_s->ap_iface->bss[0], addr, buf, len, ack); in ap_tx_status()
1225 const u8 *data, size_t len, int ack) in ap_eapol_tx_status() argument
1231 hostapd_tx_status(wpa_s->ap_iface->bss[0], dst, data, len, ack); in ap_eapol_tx_status()
Devents.c6305 data->tx_status.ack) == 0) in wpa_supplicant_event()
6317 data->tx_status.ack ? in wpa_supplicant_event()
6342 data->tx_status.ack ? in wpa_supplicant_event()
6354 data->tx_status.ack); in wpa_supplicant_event()
6360 data->tx_status.ack); in wpa_supplicant_event()
6370 data->eapol_tx_status.ack); in wpa_supplicant_event()
/hostap-latest/src/eap_peer/
Deap_fast.c559 struct eap_tlv_pac_ack_tlv *ack; in eap_fast_tlv_pac_ack() local
561 buf = wpabuf_alloc(sizeof(*res) + sizeof(*ack)); in eap_fast_tlv_pac_ack()
566 ack = wpabuf_put(buf, sizeof(*ack)); in eap_fast_tlv_pac_ack()
567 ack->tlv_type = host_to_be16(EAP_TLV_PAC_TLV | in eap_fast_tlv_pac_ack()
569 ack->length = host_to_be16(sizeof(*ack) - sizeof(struct eap_tlv_hdr)); in eap_fast_tlv_pac_ack()
570 ack->pac_type = host_to_be16(PAC_TYPE_PAC_ACKNOWLEDGEMENT); in eap_fast_tlv_pac_ack()
571 ack->pac_len = host_to_be16(2); in eap_fast_tlv_pac_ack()
572 ack->result = host_to_be16(EAP_TLV_RESULT_SUCCESS); in eap_fast_tlv_pac_ack()
Deap_teap.c525 struct teap_tlv_pac_ack *ack; in eap_teap_tlv_pac_ack() local
527 buf = wpabuf_alloc(sizeof(*res) + sizeof(*ack)); in eap_teap_tlv_pac_ack()
532 ack = wpabuf_put(buf, sizeof(*ack)); in eap_teap_tlv_pac_ack()
533 ack->tlv_type = host_to_be16(TEAP_TLV_PAC | TEAP_TLV_MANDATORY); in eap_teap_tlv_pac_ack()
534 ack->length = host_to_be16(sizeof(*ack) - sizeof(struct teap_tlv_hdr)); in eap_teap_tlv_pac_ack()
535 ack->pac_type = host_to_be16(PAC_TYPE_PAC_ACKNOWLEDGEMENT); in eap_teap_tlv_pac_ack()
536 ack->pac_len = host_to_be16(2); in eap_teap_tlv_pac_ack()
537 ack->result = host_to_be16(TEAP_STATUS_SUCCESS); in eap_teap_tlv_pac_ack()
/hostap-latest/src/drivers/
Ddriver_zephyr.h186 const u8 *frame, size_t len, bool ack);
241 const u8 *frame, size_t len, bool ack);
Ddriver_nl80211_event.c27 struct nlattr *ack, struct nlattr *cookie);
1385 size_t len, struct nlattr *ack) in mlme_event_mgmt_tx_status() argument
1401 cookie ? "" : "(N/A)", ack != NULL); in mlme_event_mgmt_tx_status()
1408 nl80211_control_port_frame_tx_status(bss, frame, len, ack, in mlme_event_mgmt_tx_status()
1425 " (match)" : " (unknown)", ack != NULL); in mlme_event_mgmt_tx_status()
1432 !!ack); in mlme_event_mgmt_tx_status()
1441 event.tx_status.ack = ack != NULL; in mlme_event_mgmt_tx_status()
1647 struct nlattr *freq, struct nlattr *ack, in mlme_event() argument
1753 nla_len(frame), ack); in mlme_event()
3716 struct nlattr *ack, struct nlattr *cookie) in nl80211_control_port_frame_tx_status() argument
[all …]
Ddriver_nl80211_monitor.c41 event.tx_status.ack = ok; in handle_tx_callback()
Ddriver_zephyr.c603 const u8 *frame, size_t len, bool ack) in wpa_drv_zep_event_mgmt_tx_status() argument
620 event.tx_status.ack = ack; in wpa_drv_zep_event_mgmt_tx_status()
Ddriver.h6373 int ack; member
6612 int ack; member
Ddriver_atheros.c1379 event.tx_status.ack = sa->ack; in send_action_cb_event()
Ddriver_hostap.c135 event.tx_status.ack = ok; in handle_tx_callback()
/hostap-latest/wlantest/
Dprocess.c258 static void tx_status(struct wlantest *wt, const u8 *data, size_t len, int ack) in tx_status() argument
260 wpa_printf(MSG_DEBUG, "TX status: ack=%d", ack); in tx_status()
Drx_data.c774 u8 ack = (qos[0] & 0x60) >> 5; in rx_data_bss() local
782 ack == 0 ? "" : in rx_data_bss()
783 (ack == 1 ? " NoAck" : in rx_data_bss()
784 (ack == 2 ? " NoExpAck" : " BA"))); in rx_data_bss()
/hostap-latest/src/radius/
Dradius_server.c1561 struct radius_msg *msg, int ack) in radius_server_receive_disconnect_resp() argument
1589 ack ? "ACK" : "NAK", in radius_server_receive_disconnect_resp()
1600 struct radius_msg *msg, int ack) in radius_server_receive_coa_resp() argument
1633 ack ? "ACK" : "NAK", in radius_server_receive_coa_resp()
1647 if (ack) { in radius_server_receive_coa_resp()
/hostap-latest/tests/hwsim/
Dtest_ap_wps.py8098 ack, attrs = build_ack(msg['eap_identifier'], e_nonce, r_nonce,
8100 send_wsc_msg(hapd, addr, ack)
9096 ack = build_eap_wsc(2, msg['eap_identifier'], attrs, opcode=WSC_ACK)
9097 send_wsc_msg(hapd, addr, ack)
9134 ack, attrs = build_ack(msg['eap_identifier'], e_nonce, r_nonce, eap_code=2)
9135 send_wsc_msg(hapd, addr, ack)
9172 ack, attrs = build_ack(msg['eap_identifier'], e_nonce, r_nonce,
9174 send_wsc_msg(hapd, addr, ack)
9211 ack, attrs = build_ack(msg['eap_identifier'], e_nonce, r_nonce,
9213 send_wsc_msg(hapd, addr, ack)
[all …]

12