Home
last modified time | relevance | path

Searched refs:event (Results 1 – 25 of 84) sorted by relevance

1234

/hostap-latest/src/drivers/
Drfkill.c58 struct rfkill_event event; in rfkill_receive() local
62 len = read(rfkill->fd, &event, sizeof(event)); in rfkill_receive()
74 if (event.op != RFKILL_OP_CHANGE || event.idx != rfkill->idx) in rfkill_receive()
79 event.idx, event.type, event.op, event.soft, in rfkill_receive()
80 event.hard); in rfkill_receive()
82 if (event.hard) { in rfkill_receive()
85 } else if (event.soft) { in rfkill_receive()
106 struct rfkill_event event; in rfkill_init() local
140 len = read(rfkill->fd, &event, sizeof(event)); in rfkill_init()
154 if (event.op != RFKILL_OP_ADD || in rfkill_init()
[all …]
Ddriver_nl80211_event.c201 union wpa_event_data event; in mlme_event_auth() local
224 os_memset(&event, 0, sizeof(event)); in mlme_event_auth()
225 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); in mlme_event_auth()
226 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); in mlme_event_auth()
227 event.auth.auth_transaction = in mlme_event_auth()
229 event.auth.status_code = le_to_host16(mgmt->u.auth.status_code); in mlme_event_auth()
231 event.auth.ies = mgmt->u.auth.variable; in mlme_event_auth()
232 event.auth.ies_len = len - 24 - sizeof(mgmt->u.auth); in mlme_event_auth()
235 wpa_supplicant_event(drv->ctx, EVENT_AUTH, &event); in mlme_event_auth()
264 union wpa_event_data event; in mlme_event_assoc() local
[all …]
Ddriver_zephyr.h117 enum wpa_event_type event; member
169 union wpa_event_data *event);
175 union wpa_event_data *event);
178 union wpa_event_data *event, unsigned int status);
181 union wpa_event_data *event, const struct ieee80211_mgmt *mgmt);
184 union wpa_event_data *event);
189 union wpa_event_data *event);
192 union wpa_event_data *event);
201 union wpa_event_data *event);
206 union wpa_event_data *event);
[all …]
Ddriver_nl80211_monitor.c30 union wpa_event_data event; in handle_tx_callback() local
35 os_memset(&event, 0, sizeof(event)); in handle_tx_callback()
36 event.tx_status.type = WLAN_FC_GET_TYPE(fc); in handle_tx_callback()
37 event.tx_status.stype = WLAN_FC_GET_STYPE(fc); in handle_tx_callback()
38 event.tx_status.dst = hdr->addr1; in handle_tx_callback()
39 event.tx_status.data = buf; in handle_tx_callback()
40 event.tx_status.data_len = len; in handle_tx_callback()
41 event.tx_status.ack = ok; in handle_tx_callback()
42 wpa_supplicant_event(ctx, EVENT_TX_STATUS, &event); in handle_tx_callback()
51 union wpa_event_data event; in from_unknown_sta() local
[all …]
Ddriver_zephyr.c40 void hostapd_event_wrapper(void *ctx, enum wpa_event_type event, union wpa_event_data *data) in hostapd_event_wrapper() argument
46 msg.event = event; in hostapd_event_wrapper()
50 wpa_printf(MSG_ERROR, "Failed to allocate data for event: %d", event); in hostapd_event_wrapper()
54 if (event == EVENT_TX_STATUS) { in hostapd_event_wrapper()
73 } else if (event == EVENT_RX_MGMT) { in hostapd_event_wrapper()
96 enum wpa_event_type event, in wpa_supplicant_event_wrapper() argument
102 msg.event = event; in wpa_supplicant_event_wrapper()
106 wpa_printf(MSG_ERROR, "Failed to allocated for event: %d", event); in wpa_supplicant_event_wrapper()
111 if (event == EVENT_AUTH) { in wpa_supplicant_event_wrapper()
120 __func__, __LINE__, event, data->auth.ies_len); in wpa_supplicant_event_wrapper()
[all …]
Ddriver_wired.c86 union wpa_event_data event; in handle_data() local
102 os_memset(&event, 0, sizeof(event)); in handle_data()
103 event.new_sta.addr = sa; in handle_data()
104 wpa_supplicant_event(ctx, EVENT_NEW_STA, &event); in handle_data()
141 union wpa_event_data event; in handle_dhcp() local
161 os_memset(&event, 0, sizeof(event)); in handle_dhcp()
162 event.new_sta.addr = mac_address; in handle_dhcp()
163 wpa_supplicant_event(eloop_ctx, EVENT_NEW_STA, &event); in handle_dhcp()
Ddriver.h6876 void wpa_supplicant_event(void *ctx, enum wpa_event_type event,
6879 void hostapd_event(void *ctx, enum wpa_event_type event,
6896 void wpa_supplicant_event_global(void *ctx, enum wpa_event_type event,
6900 void hostapd_event_global(void *ctx, enum wpa_event_type event,
6914 union wpa_event_data event; in drv_event_assoc() local
6915 os_memset(&event, 0, sizeof(event)); in drv_event_assoc()
6916 event.assoc_info.reassoc = reassoc; in drv_event_assoc()
6917 event.assoc_info.req_ies = req_ies; in drv_event_assoc()
6918 event.assoc_info.req_ies_len = req_ielen; in drv_event_assoc()
6919 event.assoc_info.resp_ies = resp_ies; in drv_event_assoc()
[all …]
Ddriver_atheros.c860 union wpa_event_data event; in atheros_raw_receive() local
884 os_memset(&event, 0, sizeof(event)); in atheros_raw_receive()
885 event.rx_probe_req.sa = mgmt->sa; in atheros_raw_receive()
886 event.rx_probe_req.da = mgmt->da; in atheros_raw_receive()
887 event.rx_probe_req.bssid = mgmt->bssid; in atheros_raw_receive()
888 event.rx_probe_req.ie = buf + IEEE80211_HDRLEN; in atheros_raw_receive()
889 event.rx_probe_req.ie_len = len - IEEE80211_HDRLEN; in atheros_raw_receive()
890 wpa_supplicant_event(drv->hapd, EVENT_RX_PROBE_REQ, &event); in atheros_raw_receive()
897 os_memset(&event, 0, sizeof(event)); in atheros_raw_receive()
898 event.rx_mgmt.frame = buf; in atheros_raw_receive()
[all …]
Ddriver_hostap.c65 union wpa_event_data event; in handle_data() local
79 os_memset(&event, 0, sizeof(event)); in handle_data()
80 event.rx_from_unknown.bssid = get_hdr_bssid(hdr, len); in handle_data()
81 event.rx_from_unknown.addr = sa; in handle_data()
82 wpa_supplicant_event(drv->hapd, EVENT_RX_FROM_UNKNOWN, &event); in handle_data()
124 union wpa_event_data event; in handle_tx_callback() local
129 os_memset(&event, 0, sizeof(event)); in handle_tx_callback()
130 event.tx_status.type = WLAN_FC_GET_TYPE(fc); in handle_tx_callback()
131 event.tx_status.stype = WLAN_FC_GET_STYPE(fc); in handle_tx_callback()
132 event.tx_status.dst = hdr->addr1; in handle_tx_callback()
[all …]
Ddriver_bsd.c629 union wpa_event_data event; in bsd_route_overflow() local
657 event.interface_status.ievent = EVENT_INTERFACE_ADDED; in bsd_route_overflow()
658 os_strlcpy(event.interface_status.ifname, ifa->ifa_name, in bsd_route_overflow()
659 sizeof(event.interface_status.ifname)); in bsd_route_overflow()
661 &event); in bsd_route_overflow()
670 event.interface_status.ievent = EVENT_INTERFACE_REMOVED; in bsd_route_overflow()
671 os_strlcpy(event.interface_status.ifname, drv->ifname, in bsd_route_overflow()
672 sizeof(event.interface_status.ifname)); in bsd_route_overflow()
674 &event); in bsd_route_overflow()
693 event.interface_status.ievent = EVENT_INTERFACE_REMOVED; in bsd_route_overflow()
[all …]
/hostap-latest/tests/hwsim/
Dtest_dscp.py96 def validate_dscp_req_event(dev, event): argument
100 if ev != event:
101 raise Exception("Invalid DSCP event received (%s; expected: %s)" % (ev, event))
191 event = "<3>CTRL-EVENT-DSCP-POLICY request_start clear_all"
192 validate_dscp_req_event(dev[0], event)
193 event = "<3>CTRL-EVENT-DSCP-POLICY request_end"
194 validate_dscp_req_event(dev[0], event)
224 event = "<3>CTRL-EVENT-DSCP-POLICY request_start"
225 validate_dscp_req_event(dev[0], event)
226event = "<3>CTRL-EVENT-DSCP-POLICY add policy_id=1 dscp=22 ip_version=4 src_ip=192.168.0.1 src_por…
[all …]
Dfst_module_aux.py27 event = {}
31 event['event_type'] = 'attached'
33 event['event_type'] = 'detached'
38 event['ifname'] = f.group(1)
41 event['group'] = f.group(1)
42 return event
49 event = {}
52 event['new_state'] = '' # The field always exists in the dictionary
56 event['type'] = f.group(1)
59 event['id'] = f.group(1)
[all …]
Dtest_fst_module.py245 event = initiator.wait_for_session_event(5, [], ["EVENT_FST_SESSION_STATE"])
246 if event['new_state'] != "INITIAL" or event['reason'] != "REASON_REJECT":
256 event = initiator.wait_for_session_event(5, [], ["EVENT_FST_SESSION_STATE"])
257 if event['new_state'] != "INITIAL" or event['reason'] != "REASON_ERROR_PARAMS":
262 event = initiator.wait_for_session_event(5, [], ["EVENT_FST_SESSION_STATE"])
263 if event['new_state'] != "TRANSITION_DONE":
270 event = initiator.wait_for_session_event(5, [], ["EVENT_FST_SESSION_STATE"])
271 if event['new_state'] != "INITIAL" or event['reason'] != "REASON_STT":
281 event = initiator.wait_for_session_event(5, [], ["EVENT_FST_SESSION_STATE"])
285 event = initiator.wait_for_session_event(5, [], ["EVENT_FST_SESSION_STATE"])
[all …]
/hostap-latest/src/utils/
Deloop_win.c22 WSAEVENT event; member
29 HANDLE event; member
116 WSAEVENT event; in eloop_register_read_sock() local
122 event = WSACreateEvent(); in eloop_register_read_sock()
123 if (event == WSA_INVALID_EVENT) { in eloop_register_read_sock()
128 if (WSAEventSelect(sock, event, FD_READ)) { in eloop_register_read_sock()
130 WSACloseEvent(event); in eloop_register_read_sock()
136 WSAEventSelect(sock, event, 0); in eloop_register_read_sock()
137 WSACloseEvent(event); in eloop_register_read_sock()
145 tmp[eloop.reader_count].event = event; in eloop_register_read_sock()
[all …]
/hostap-latest/wpa_supplicant/
DREADME-NAN-USD86 This event maps to the DiscoveryResult() event in the NAN Discovery
91 This event maps to the Replied() event in the NAN Discovery Engine.
95 This event maps to the PublishTerminated() event in the NAN Discovery
100 This event maps to the SubscribeTerminate() event in the NAN Discovery
105 This event maps to the Receive() event in the NAN Discovery Engine.
121 event on dev0: <3>NAN-DISCOVERY-RESULT subscribe_id=7 publish_id=5 address=02:00:00:00:01:00 fsd=1 …
126 event on dev1: <3>NAN-RECEIVE id=5 peer_instance_id=7 address=02:00:00:00:00:00 ssi=
134 event on dev1: <3>NAN-RECEIVE id=5 peer_instance_id=7 address=02:00:00:00:00:00 ssi=8899
142 event on dev0: <3>NAN-RECEIVE id=7 peer_instance_id=5 address=02:00:00:00:01:00 ssi=aabbccdd
Dwpa_priv.c867 static int wpa_priv_send_event(struct wpa_priv_interface *iface, int event, in wpa_priv_send_event() argument
873 io[0].iov_base = &event; in wpa_priv_send_event()
874 io[0].iov_len = sizeof(event); in wpa_priv_send_event()
924 static void wpa_priv_send_assoc(struct wpa_priv_interface *iface, int event, in wpa_priv_send_assoc() argument
979 wpa_priv_send_event(iface, event, buf, buflen); in wpa_priv_send_assoc()
1045 void wpa_supplicant_event(void *ctx, enum wpa_event_type event, in wpa_supplicant_event() argument
1050 wpa_printf(MSG_DEBUG, "%s - event=%d", __func__, event); in wpa_supplicant_event()
1058 switch (event) { in wpa_supplicant_event()
1103 event, event_to_string(event)); in wpa_supplicant_event()
1109 void wpa_supplicant_event_global(void *ctx, enum wpa_event_type event, in wpa_supplicant_event_global() argument
[all …]
Dmesh_mpm.c967 enum plink_event event, u16 reason) in mesh_mpm_fsm() argument
974 mplevent[event]); in mesh_mpm_fsm()
978 switch (event) { in mesh_mpm_fsm()
996 switch (event) { in mesh_mpm_fsm()
1032 switch (event) { in mesh_mpm_fsm()
1064 switch (event) { in mesh_mpm_fsm()
1094 switch (event) { in mesh_mpm_fsm()
1129 switch (event) { in mesh_mpm_fsm()
1148 mplevent[event], mplstate[sta->plink_state]); in mesh_mpm_fsm()
1162 enum plink_event event; in mesh_mpm_action_rx() local
[all …]
/hostap-latest/src/common/
Dwpa_helpers.c100 const char *event, const char *event2, in get_wpa_cli_event2() argument
109 printf("Waiting for wpa_cli event %s\n", event); in get_wpa_cli_event2()
124 printf("Timeout on waiting for event %s\n", event); in get_wpa_cli_event2()
133 printf("Failure while waiting for event %s\n", event); in get_wpa_cli_event2()
142 (strncmp(pos + 1, event, strlen(event)) == 0 || in get_wpa_cli_event2()
149 printf("Timeout on waiting for event %s\n", event); in get_wpa_cli_event2()
157 const char *event, char *buf, size_t buf_size) in get_wpa_cli_event() argument
159 return get_wpa_cli_event2(mon, event, NULL, buf, buf_size); in get_wpa_cli_event()
Dwpa_helpers.h22 const char *event, char *buf, size_t buf_size);
24 const char *event, const char *event2,
/hostap-latest/doc/
Ddriver_wrapper.doxygen24 card. In addition, support for driver events is required. The event
98 this was added in WE-18. With older versions, a custom event can be used
127 Request). This notification is done using EVENT_ASSOCINFO event (see
133 wpa_supplicant needs to receive event callbacks when certain events
140 Extensions event that is reporting new AP with SIOCGIWAP
141 event. Similarly, completion of a scan can be reported with SIOCGIWSCAN
142 event.
144 Michael MIC failure event was added in WE-18. Older versions of Wireless
145 Extensions will need to use a custom event. Host AP driver used a custom
146 event with following contents: MLME-MICHAELMICFAILURE.indication(keyid=#
[all …]
Dhostapd_ctrl_iface.doxygen6 daemon and to get status information and event notifications. There is
29 commands and unsolicited event messages. Commands are a pair of
32 Unsolicited event messages are sent by hostapd to the control
39 unsolicited event messages, there is potential for receiving an
52 unsolicited event messages, it should be first detached by calling
Dctrl_iface.doxygen6 daemon and to get status information and event notifications. There is
30 commands and unsolicited event messages. Commands are a pair of
33 Unsolicited event messages are sent by wpa_supplicant to the control
40 unsolicited event messages, there is potential for receiving an
53 unsolicited event messages, it should be first detached by calling
514 request event. For example,
568 (\a WPA_CTRL_REQ macro) in an unsolicited event message. An external
670 The event messages will be delivered over the attach control interface
673 additional information may be included depending on the event
674 message. For example, following event message is delivered when new
[all …]
/hostap-latest/src/wps/
Dwps_er.c35 enum wps_event event) in wps_er_sta_event() argument
55 wps->event_cb(wps->cb_ctx, event, &data); in wps_er_sta_event()
128 enum wps_event event) in wps_er_ap_event() argument
150 wps->event_cb(wps->cb_ctx, event, &data); in wps_er_ap_event()
194 enum http_client_event event) in wps_er_http_unsubscribe_cb() argument
198 switch (event) { in wps_er_http_unsubscribe_cb()
402 enum http_client_event event) in wps_er_http_subscribe_cb() argument
406 switch (event) { in wps_er_http_subscribe_cb()
610 enum http_client_event event) in wps_er_http_dev_desc_cb() argument
616 switch (event) { in wps_er_http_dev_desc_cb()
[all …]
Dhttp_client.h27 enum http_client_event event),
33 enum http_client_event event),
/hostap-latest/radius_example/
DREADME25 notifications. This is implemented using the generic event loop
28 The main application may either use the included event loop
30 to use whatever event loop design is used in the main program. This

1234