/hostap-latest/hs20/server/www/ |
D | terms.php | 55 $ack = false; variable 66 $ack = $row[1] == 1; variable 72 if ($ack) {
|
/hostap-latest/src/common/ |
D | gas_server.c | 418 int ack) in gas_server_handle_tx_status() argument 420 if (ack && response->resp && in gas_server_handle_tx_status() 427 if (ack && !response->resp && response->comeback_delay) { in gas_server_handle_tx_status() 433 if (!ack) in gas_server_handle_tx_status() 441 response->resp, ack); in gas_server_handle_tx_status() 449 size_t data_len, int ack) in gas_server_tx_status() argument 467 MAC2STR(dst), ack, in gas_server_tx_status() 475 gas_server_handle_tx_status(response, ack); in gas_server_tx_status()
|
D | gas_server.h | 37 size_t data_len, int ack);
|
/hostap-latest/src/ap/ |
D | ieee802_1x.h | 34 const u8 *buf, size_t len, int ack); 36 const u8 *data, int len, int ack);
|
D | ieee802_1x.c | 2670 const u8 *buf, size_t len, int ack) in ieee802_1x_tx_status() argument 2692 ack); in ieee802_1x_tx_status() 2697 const u8 *buf, int len, int ack) in ieee802_1x_eapol_tx_status() argument 2709 be_to_host16(xhdr->length), ack); in ieee802_1x_eapol_tx_status() 2712 if (xhdr->type == IEEE802_1X_TYPE_EAP_PACKET && ack && in ieee802_1x_eapol_tx_status() 2731 sta->wpa_sm, ack); in ieee802_1x_eapol_tx_status() 2739 if (!ack && pos + sizeof(*key) <= buf + len) { in ieee802_1x_eapol_tx_status()
|
D | drv_callbacks.c | 2376 const u8 *data, size_t len, int ack, in hostapd_eapol_tx_status() argument 2391 ieee802_1x_eapol_tx_status(hapd, sta, data, len, ack); in hostapd_eapol_tx_status() 2492 data->tx_status.ack, in hostapd_event() 2499 data->tx_status.ack); in hostapd_event() 2507 data->eapol_tx_status.ack, in hostapd_event()
|
D | ieee802_11.h | 135 const u8 *buf, size_t len, int ack);
|
D | wpa_auth.h | 539 struct wpa_state_machine *sm, int ack);
|
D | ieee802_11.c | 6923 const u8 *buf, size_t len, int ack) in hostapd_tx_status() argument 6943 ack ? "ACKed" : "did not ACK"); in hostapd_tx_status() 6944 if (ack) in hostapd_tx_status() 6948 ieee802_1x_tx_status(hapd, sta, buf, len, ack); in hostapd_tx_status()
|
/hostap-latest/wpa_supplicant/ |
D | ap.h | 61 const u8 *buf, size_t len, int ack); 63 const u8 *data, size_t len, int ack);
|
D | ap.c | 1215 const u8 *buf, size_t len, int ack) in ap_tx_status() argument 1219 hostapd_tx_status(wpa_s->ap_iface->bss[0], addr, buf, len, ack); in ap_tx_status() 1225 const u8 *data, size_t len, int ack) in ap_eapol_tx_status() argument 1231 hostapd_tx_status(wpa_s->ap_iface->bss[0], dst, data, len, ack); in ap_eapol_tx_status()
|
D | events.c | 6305 data->tx_status.ack) == 0) in wpa_supplicant_event() 6317 data->tx_status.ack ? in wpa_supplicant_event() 6342 data->tx_status.ack ? in wpa_supplicant_event() 6354 data->tx_status.ack); in wpa_supplicant_event() 6360 data->tx_status.ack); in wpa_supplicant_event() 6370 data->eapol_tx_status.ack); in wpa_supplicant_event()
|
/hostap-latest/src/eap_peer/ |
D | eap_fast.c | 559 struct eap_tlv_pac_ack_tlv *ack; in eap_fast_tlv_pac_ack() local 561 buf = wpabuf_alloc(sizeof(*res) + sizeof(*ack)); in eap_fast_tlv_pac_ack() 566 ack = wpabuf_put(buf, sizeof(*ack)); in eap_fast_tlv_pac_ack() 567 ack->tlv_type = host_to_be16(EAP_TLV_PAC_TLV | in eap_fast_tlv_pac_ack() 569 ack->length = host_to_be16(sizeof(*ack) - sizeof(struct eap_tlv_hdr)); in eap_fast_tlv_pac_ack() 570 ack->pac_type = host_to_be16(PAC_TYPE_PAC_ACKNOWLEDGEMENT); in eap_fast_tlv_pac_ack() 571 ack->pac_len = host_to_be16(2); in eap_fast_tlv_pac_ack() 572 ack->result = host_to_be16(EAP_TLV_RESULT_SUCCESS); in eap_fast_tlv_pac_ack()
|
D | eap_teap.c | 525 struct teap_tlv_pac_ack *ack; in eap_teap_tlv_pac_ack() local 527 buf = wpabuf_alloc(sizeof(*res) + sizeof(*ack)); in eap_teap_tlv_pac_ack() 532 ack = wpabuf_put(buf, sizeof(*ack)); in eap_teap_tlv_pac_ack() 533 ack->tlv_type = host_to_be16(TEAP_TLV_PAC | TEAP_TLV_MANDATORY); in eap_teap_tlv_pac_ack() 534 ack->length = host_to_be16(sizeof(*ack) - sizeof(struct teap_tlv_hdr)); in eap_teap_tlv_pac_ack() 535 ack->pac_type = host_to_be16(PAC_TYPE_PAC_ACKNOWLEDGEMENT); in eap_teap_tlv_pac_ack() 536 ack->pac_len = host_to_be16(2); in eap_teap_tlv_pac_ack() 537 ack->result = host_to_be16(TEAP_STATUS_SUCCESS); in eap_teap_tlv_pac_ack()
|
/hostap-latest/src/drivers/ |
D | driver_zephyr.h | 186 const u8 *frame, size_t len, bool ack); 241 const u8 *frame, size_t len, bool ack);
|
D | driver_nl80211_event.c | 27 struct nlattr *ack, struct nlattr *cookie); 1385 size_t len, struct nlattr *ack) in mlme_event_mgmt_tx_status() argument 1401 cookie ? "" : "(N/A)", ack != NULL); in mlme_event_mgmt_tx_status() 1408 nl80211_control_port_frame_tx_status(bss, frame, len, ack, in mlme_event_mgmt_tx_status() 1425 " (match)" : " (unknown)", ack != NULL); in mlme_event_mgmt_tx_status() 1432 !!ack); in mlme_event_mgmt_tx_status() 1441 event.tx_status.ack = ack != NULL; in mlme_event_mgmt_tx_status() 1647 struct nlattr *freq, struct nlattr *ack, in mlme_event() argument 1753 nla_len(frame), ack); in mlme_event() 3716 struct nlattr *ack, struct nlattr *cookie) in nl80211_control_port_frame_tx_status() argument [all …]
|
D | driver_nl80211_monitor.c | 41 event.tx_status.ack = ok; in handle_tx_callback()
|
D | driver_zephyr.c | 603 const u8 *frame, size_t len, bool ack) in wpa_drv_zep_event_mgmt_tx_status() argument 620 event.tx_status.ack = ack; in wpa_drv_zep_event_mgmt_tx_status()
|
D | driver.h | 6373 int ack; member 6612 int ack; member
|
D | driver_atheros.c | 1379 event.tx_status.ack = sa->ack; in send_action_cb_event()
|
D | driver_hostap.c | 135 event.tx_status.ack = ok; in handle_tx_callback()
|
/hostap-latest/wlantest/ |
D | process.c | 258 static void tx_status(struct wlantest *wt, const u8 *data, size_t len, int ack) in tx_status() argument 260 wpa_printf(MSG_DEBUG, "TX status: ack=%d", ack); in tx_status()
|
D | rx_data.c | 774 u8 ack = (qos[0] & 0x60) >> 5; in rx_data_bss() local 782 ack == 0 ? "" : in rx_data_bss() 783 (ack == 1 ? " NoAck" : in rx_data_bss() 784 (ack == 2 ? " NoExpAck" : " BA"))); in rx_data_bss()
|
/hostap-latest/src/radius/ |
D | radius_server.c | 1561 struct radius_msg *msg, int ack) in radius_server_receive_disconnect_resp() argument 1589 ack ? "ACK" : "NAK", in radius_server_receive_disconnect_resp() 1600 struct radius_msg *msg, int ack) in radius_server_receive_coa_resp() argument 1633 ack ? "ACK" : "NAK", in radius_server_receive_coa_resp() 1647 if (ack) { in radius_server_receive_coa_resp()
|
/hostap-latest/tests/hwsim/ |
D | test_ap_wps.py | 8098 ack, attrs = build_ack(msg['eap_identifier'], e_nonce, r_nonce, 8100 send_wsc_msg(hapd, addr, ack) 9096 ack = build_eap_wsc(2, msg['eap_identifier'], attrs, opcode=WSC_ACK) 9097 send_wsc_msg(hapd, addr, ack) 9134 ack, attrs = build_ack(msg['eap_identifier'], e_nonce, r_nonce, eap_code=2) 9135 send_wsc_msg(hapd, addr, ack) 9172 ack, attrs = build_ack(msg['eap_identifier'], e_nonce, r_nonce, 9174 send_wsc_msg(hapd, addr, ack) 9211 ack, attrs = build_ack(msg['eap_identifier'], e_nonce, r_nonce, 9213 send_wsc_msg(hapd, addr, ack) [all …]
|