/hostap-latest/wpa_supplicant/ |
D | pasn_supplicant.c | 38 struct wpabuf *comeback; member 53 wpabuf_free(awork->comeback); in wpas_pasn_free_auth_work() 54 awork->comeback = NULL; in wpas_pasn_free_auth_work() 83 struct wpabuf *comeback, in wpas_pasn_auth_status() argument 86 if (comeback) { in wpas_pasn_auth_status() 87 size_t comeback_len = wpabuf_len(comeback); in wpas_pasn_auth_status() 93 wpabuf_head(comeback), comeback_len); in wpas_pasn_auth_status() 347 const u8 *comeback = NULL; in wpas_pasn_configure_next_peer() local 382 comeback, comeback_len)) { in wpas_pasn_configure_next_peer() 656 awork->comeback); in wpas_pasn_auth_start_cb() [all …]
|
D | wpa_supplicant_i.h | 2012 const u8 *comeback, size_t comeback_len);
|
D | ctrl_iface.c | 11178 u8 *comeback = NULL; in wpas_ctrl_iface_pasn_start() local 11227 if (comeback || !comeback_len || comeback_len % 2) in wpas_ctrl_iface_pasn_start() 11231 comeback = os_malloc(comeback_len); in wpas_ctrl_iface_pasn_start() 11232 if (!comeback || in wpas_ctrl_iface_pasn_start() 11233 hexstr2bin(token + 9, comeback, comeback_len)) in wpas_ctrl_iface_pasn_start() 11249 group, id, comeback, comeback_len); in wpas_ctrl_iface_pasn_start() 11251 os_free(comeback); in wpas_ctrl_iface_pasn_start()
|
D | ChangeLog | 381 * improved GAS offchannel operations with comeback request 684 - fixed GAS indication for additional comeback delay with status
|
/hostap-latest/src/pasn/ |
D | pasn_initiator.c | 522 const struct wpabuf *comeback, in wpas_pasn_build_auth_1() argument 585 pubkey, true, comeback, -1); in wpas_pasn_build_auth_1() 719 wpabuf_free(pasn->comeback); in wpa_pasn_reset() 720 pasn->comeback = NULL; in wpa_pasn_reset() 879 const struct wpabuf *comeback, bool verify) in wpas_pasn_send_auth_1() argument 921 frame = wpas_pasn_build_auth_1(pasn, comeback, verify); in wpas_pasn_send_auth_1() 949 const struct wpabuf *comeback) in wpas_pasn_start() argument 995 beacon_rsnxe, beacon_rsnxe_len, comeback, in wpas_pasn_start() 1015 const struct wpabuf *comeback) in wpa_pasn_verify() argument 1020 beacon_rsnxe_len, comeback, true); in wpa_pasn_verify() [all …]
|
D | pasn_common.h | 86 struct wpabuf *comeback; member 162 const struct wpabuf *comeback); 168 const struct wpabuf *comeback);
|
D | pasn_responder.c | 377 struct wpabuf *buf, *comeback; in handle_auth_pasn_comeback() local 395 comeback = auth_build_token_req(&pasn->last_comeback_key_update, in handle_auth_pasn_comeback() 400 if (!comeback) { in handle_auth_pasn_comeback() 409 NULL, 0, comeback, in handle_auth_pasn_comeback() 411 wpabuf_free(comeback); in handle_auth_pasn_comeback() 705 if (pasn_params.comeback) { in handle_auth_pasn_1() 711 pasn_params.comeback, in handle_auth_pasn_1()
|
/hostap-latest/src/common/ |
D | wpa_common.h | 636 const u8 *comeback; member 797 const struct wpabuf *comeback, int after);
|
D | wpa_common.c | 3997 const struct wpabuf *comeback, int after) in wpa_pasn_add_parameter_ie() argument 4011 if (comeback) { in wpa_pasn_add_parameter_ie() 4020 params->len += 1 + wpabuf_len(comeback); in wpa_pasn_add_parameter_ie() 4025 wpabuf_put_u8(buf, wpabuf_len(comeback)); in wpa_pasn_add_parameter_ie() 4026 wpabuf_put_buf(buf, comeback); in wpa_pasn_add_parameter_ie() 4247 pasn_params->comeback = pos; in wpa_pasn_parse_parameter_ie()
|
D | dpp_tcp.c | 1652 size_t len, bool comeback) in dpp_rx_gas_resp() argument 1659 if (len < (size_t) (5 + 2 + (comeback ? 1 : 0))) in dpp_rx_gas_resp() 1675 if (comeback) in dpp_rx_gas_resp()
|
/hostap-latest/tests/hwsim/ |
D | test_ap_pmf.py | 243 run_ap_pmf_assoc_comeback(dev, apdev, comeback=10000) 245 def run_ap_pmf_assoc_comeback(dev, apdev, comeback=None): argument 250 if comeback is not None: 251 params["assoc_sa_query_max_timeout"] = str(comeback)
|
D | test_pasn.py | 812 comeback = re.split("comeback=", ev)[1] 815 (bssid, comeback)
|