| /hostap-latest/src/drivers/ |
| D | rfkill.c | 58 struct rfkill_event event; in rfkill_receive() local 62 len = read(rfkill->fd, &event, sizeof(event)); in rfkill_receive() 74 if (event.op != RFKILL_OP_CHANGE || event.idx != rfkill->idx) in rfkill_receive() 79 event.idx, event.type, event.op, event.soft, in rfkill_receive() 80 event.hard); in rfkill_receive() 82 if (event.hard) { in rfkill_receive() 85 } else if (event.soft) { in rfkill_receive() 106 struct rfkill_event event; in rfkill_init() local 140 len = read(rfkill->fd, &event, sizeof(event)); in rfkill_init() 154 if (event.op != RFKILL_OP_ADD || in rfkill_init() [all …]
|
| D | driver_nl80211_event.c | 201 union wpa_event_data event; in mlme_event_auth() local 224 os_memset(&event, 0, sizeof(event)); in mlme_event_auth() 225 os_memcpy(event.auth.peer, mgmt->sa, ETH_ALEN); in mlme_event_auth() 226 event.auth.auth_type = le_to_host16(mgmt->u.auth.auth_alg); in mlme_event_auth() 227 event.auth.auth_transaction = in mlme_event_auth() 229 event.auth.status_code = le_to_host16(mgmt->u.auth.status_code); in mlme_event_auth() 231 event.auth.ies = mgmt->u.auth.variable; in mlme_event_auth() 232 event.auth.ies_len = len - 24 - sizeof(mgmt->u.auth); in mlme_event_auth() 235 wpa_supplicant_event(drv->ctx, EVENT_AUTH, &event); in mlme_event_auth() 264 union wpa_event_data event; in mlme_event_assoc() local [all …]
|
| D | driver_zephyr.h | 117 enum wpa_event_type event; member 169 union wpa_event_data *event); 175 union wpa_event_data *event); 178 union wpa_event_data *event, unsigned int status); 181 union wpa_event_data *event, const struct ieee80211_mgmt *mgmt); 184 union wpa_event_data *event); 189 union wpa_event_data *event); 192 union wpa_event_data *event); 201 union wpa_event_data *event); 206 union wpa_event_data *event); [all …]
|
| D | driver_nl80211_monitor.c | 30 union wpa_event_data event; in handle_tx_callback() local 35 os_memset(&event, 0, sizeof(event)); in handle_tx_callback() 36 event.tx_status.type = WLAN_FC_GET_TYPE(fc); in handle_tx_callback() 37 event.tx_status.stype = WLAN_FC_GET_STYPE(fc); in handle_tx_callback() 38 event.tx_status.dst = hdr->addr1; in handle_tx_callback() 39 event.tx_status.data = buf; in handle_tx_callback() 40 event.tx_status.data_len = len; in handle_tx_callback() 41 event.tx_status.ack = ok; in handle_tx_callback() 42 wpa_supplicant_event(ctx, EVENT_TX_STATUS, &event); in handle_tx_callback() 51 union wpa_event_data event; in from_unknown_sta() local [all …]
|
| D | driver_zephyr.c | 40 void hostapd_event_wrapper(void *ctx, enum wpa_event_type event, union wpa_event_data *data) in hostapd_event_wrapper() argument 46 msg.event = event; in hostapd_event_wrapper() 50 wpa_printf(MSG_ERROR, "Failed to allocate data for event: %d", event); in hostapd_event_wrapper() 54 if (event == EVENT_TX_STATUS) { in hostapd_event_wrapper() 73 } else if (event == EVENT_RX_MGMT) { in hostapd_event_wrapper() 96 enum wpa_event_type event, in wpa_supplicant_event_wrapper() argument 102 msg.event = event; in wpa_supplicant_event_wrapper() 106 wpa_printf(MSG_ERROR, "Failed to allocated for event: %d", event); in wpa_supplicant_event_wrapper() 111 if (event == EVENT_AUTH) { in wpa_supplicant_event_wrapper() 120 __func__, __LINE__, event, data->auth.ies_len); in wpa_supplicant_event_wrapper() [all …]
|
| D | driver_wired.c | 86 union wpa_event_data event; in handle_data() local 102 os_memset(&event, 0, sizeof(event)); in handle_data() 103 event.new_sta.addr = sa; in handle_data() 104 wpa_supplicant_event(ctx, EVENT_NEW_STA, &event); in handle_data() 141 union wpa_event_data event; in handle_dhcp() local 161 os_memset(&event, 0, sizeof(event)); in handle_dhcp() 162 event.new_sta.addr = mac_address; in handle_dhcp() 163 wpa_supplicant_event(eloop_ctx, EVENT_NEW_STA, &event); in handle_dhcp()
|
| D | driver.h | 6876 void wpa_supplicant_event(void *ctx, enum wpa_event_type event, 6879 void hostapd_event(void *ctx, enum wpa_event_type event, 6896 void wpa_supplicant_event_global(void *ctx, enum wpa_event_type event, 6900 void hostapd_event_global(void *ctx, enum wpa_event_type event, 6914 union wpa_event_data event; in drv_event_assoc() local 6915 os_memset(&event, 0, sizeof(event)); in drv_event_assoc() 6916 event.assoc_info.reassoc = reassoc; in drv_event_assoc() 6917 event.assoc_info.req_ies = req_ies; in drv_event_assoc() 6918 event.assoc_info.req_ies_len = req_ielen; in drv_event_assoc() 6919 event.assoc_info.resp_ies = resp_ies; in drv_event_assoc() [all …]
|
| D | driver_atheros.c | 860 union wpa_event_data event; in atheros_raw_receive() local 884 os_memset(&event, 0, sizeof(event)); in atheros_raw_receive() 885 event.rx_probe_req.sa = mgmt->sa; in atheros_raw_receive() 886 event.rx_probe_req.da = mgmt->da; in atheros_raw_receive() 887 event.rx_probe_req.bssid = mgmt->bssid; in atheros_raw_receive() 888 event.rx_probe_req.ie = buf + IEEE80211_HDRLEN; in atheros_raw_receive() 889 event.rx_probe_req.ie_len = len - IEEE80211_HDRLEN; in atheros_raw_receive() 890 wpa_supplicant_event(drv->hapd, EVENT_RX_PROBE_REQ, &event); in atheros_raw_receive() 897 os_memset(&event, 0, sizeof(event)); in atheros_raw_receive() 898 event.rx_mgmt.frame = buf; in atheros_raw_receive() [all …]
|
| D | driver_hostap.c | 65 union wpa_event_data event; in handle_data() local 79 os_memset(&event, 0, sizeof(event)); in handle_data() 80 event.rx_from_unknown.bssid = get_hdr_bssid(hdr, len); in handle_data() 81 event.rx_from_unknown.addr = sa; in handle_data() 82 wpa_supplicant_event(drv->hapd, EVENT_RX_FROM_UNKNOWN, &event); in handle_data() 124 union wpa_event_data event; in handle_tx_callback() local 129 os_memset(&event, 0, sizeof(event)); in handle_tx_callback() 130 event.tx_status.type = WLAN_FC_GET_TYPE(fc); in handle_tx_callback() 131 event.tx_status.stype = WLAN_FC_GET_STYPE(fc); in handle_tx_callback() 132 event.tx_status.dst = hdr->addr1; in handle_tx_callback() [all …]
|
| D | driver_bsd.c | 629 union wpa_event_data event; in bsd_route_overflow() local 657 event.interface_status.ievent = EVENT_INTERFACE_ADDED; in bsd_route_overflow() 658 os_strlcpy(event.interface_status.ifname, ifa->ifa_name, in bsd_route_overflow() 659 sizeof(event.interface_status.ifname)); in bsd_route_overflow() 661 &event); in bsd_route_overflow() 670 event.interface_status.ievent = EVENT_INTERFACE_REMOVED; in bsd_route_overflow() 671 os_strlcpy(event.interface_status.ifname, drv->ifname, in bsd_route_overflow() 672 sizeof(event.interface_status.ifname)); in bsd_route_overflow() 674 &event); in bsd_route_overflow() 693 event.interface_status.ievent = EVENT_INTERFACE_REMOVED; in bsd_route_overflow() [all …]
|
| /hostap-latest/tests/hwsim/ |
| D | test_dscp.py | 96 def validate_dscp_req_event(dev, event): argument 100 if ev != event: 101 raise Exception("Invalid DSCP event received (%s; expected: %s)" % (ev, event)) 191 event = "<3>CTRL-EVENT-DSCP-POLICY request_start clear_all" 192 validate_dscp_req_event(dev[0], event) 193 event = "<3>CTRL-EVENT-DSCP-POLICY request_end" 194 validate_dscp_req_event(dev[0], event) 224 event = "<3>CTRL-EVENT-DSCP-POLICY request_start" 225 validate_dscp_req_event(dev[0], event) 226 …event = "<3>CTRL-EVENT-DSCP-POLICY add policy_id=1 dscp=22 ip_version=4 src_ip=192.168.0.1 src_por… [all …]
|
| D | fst_module_aux.py | 27 event = {} 31 event['event_type'] = 'attached' 33 event['event_type'] = 'detached' 38 event['ifname'] = f.group(1) 41 event['group'] = f.group(1) 42 return event 49 event = {} 52 event['new_state'] = '' # The field always exists in the dictionary 56 event['type'] = f.group(1) 59 event['id'] = f.group(1) [all …]
|
| D | test_fst_module.py | 245 event = initiator.wait_for_session_event(5, [], ["EVENT_FST_SESSION_STATE"]) 246 if event['new_state'] != "INITIAL" or event['reason'] != "REASON_REJECT": 256 event = initiator.wait_for_session_event(5, [], ["EVENT_FST_SESSION_STATE"]) 257 if event['new_state'] != "INITIAL" or event['reason'] != "REASON_ERROR_PARAMS": 262 event = initiator.wait_for_session_event(5, [], ["EVENT_FST_SESSION_STATE"]) 263 if event['new_state'] != "TRANSITION_DONE": 270 event = initiator.wait_for_session_event(5, [], ["EVENT_FST_SESSION_STATE"]) 271 if event['new_state'] != "INITIAL" or event['reason'] != "REASON_STT": 281 event = initiator.wait_for_session_event(5, [], ["EVENT_FST_SESSION_STATE"]) 285 event = initiator.wait_for_session_event(5, [], ["EVENT_FST_SESSION_STATE"]) [all …]
|
| /hostap-latest/src/utils/ |
| D | eloop_win.c | 22 WSAEVENT event; member 29 HANDLE event; member 116 WSAEVENT event; in eloop_register_read_sock() local 122 event = WSACreateEvent(); in eloop_register_read_sock() 123 if (event == WSA_INVALID_EVENT) { in eloop_register_read_sock() 128 if (WSAEventSelect(sock, event, FD_READ)) { in eloop_register_read_sock() 130 WSACloseEvent(event); in eloop_register_read_sock() 136 WSAEventSelect(sock, event, 0); in eloop_register_read_sock() 137 WSACloseEvent(event); in eloop_register_read_sock() 145 tmp[eloop.reader_count].event = event; in eloop_register_read_sock() [all …]
|
| /hostap-latest/wpa_supplicant/ |
| D | README-NAN-USD | 86 This event maps to the DiscoveryResult() event in the NAN Discovery 91 This event maps to the Replied() event in the NAN Discovery Engine. 95 This event maps to the PublishTerminated() event in the NAN Discovery 100 This event maps to the SubscribeTerminate() event in the NAN Discovery 105 This event maps to the Receive() event in the NAN Discovery Engine. 121 event on dev0: <3>NAN-DISCOVERY-RESULT subscribe_id=7 publish_id=5 address=02:00:00:00:01:00 fsd=1 … 126 event on dev1: <3>NAN-RECEIVE id=5 peer_instance_id=7 address=02:00:00:00:00:00 ssi= 134 event on dev1: <3>NAN-RECEIVE id=5 peer_instance_id=7 address=02:00:00:00:00:00 ssi=8899 142 event on dev0: <3>NAN-RECEIVE id=7 peer_instance_id=5 address=02:00:00:00:01:00 ssi=aabbccdd
|
| D | wpa_priv.c | 867 static int wpa_priv_send_event(struct wpa_priv_interface *iface, int event, in wpa_priv_send_event() argument 873 io[0].iov_base = &event; in wpa_priv_send_event() 874 io[0].iov_len = sizeof(event); in wpa_priv_send_event() 924 static void wpa_priv_send_assoc(struct wpa_priv_interface *iface, int event, in wpa_priv_send_assoc() argument 979 wpa_priv_send_event(iface, event, buf, buflen); in wpa_priv_send_assoc() 1045 void wpa_supplicant_event(void *ctx, enum wpa_event_type event, in wpa_supplicant_event() argument 1050 wpa_printf(MSG_DEBUG, "%s - event=%d", __func__, event); in wpa_supplicant_event() 1058 switch (event) { in wpa_supplicant_event() 1103 event, event_to_string(event)); in wpa_supplicant_event() 1109 void wpa_supplicant_event_global(void *ctx, enum wpa_event_type event, in wpa_supplicant_event_global() argument [all …]
|
| D | mesh_mpm.c | 967 enum plink_event event, u16 reason) in mesh_mpm_fsm() argument 974 mplevent[event]); in mesh_mpm_fsm() 978 switch (event) { in mesh_mpm_fsm() 996 switch (event) { in mesh_mpm_fsm() 1032 switch (event) { in mesh_mpm_fsm() 1064 switch (event) { in mesh_mpm_fsm() 1094 switch (event) { in mesh_mpm_fsm() 1129 switch (event) { in mesh_mpm_fsm() 1148 mplevent[event], mplstate[sta->plink_state]); in mesh_mpm_fsm() 1162 enum plink_event event; in mesh_mpm_action_rx() local [all …]
|
| /hostap-latest/src/common/ |
| D | wpa_helpers.c | 100 const char *event, const char *event2, in get_wpa_cli_event2() argument 109 printf("Waiting for wpa_cli event %s\n", event); in get_wpa_cli_event2() 124 printf("Timeout on waiting for event %s\n", event); in get_wpa_cli_event2() 133 printf("Failure while waiting for event %s\n", event); in get_wpa_cli_event2() 142 (strncmp(pos + 1, event, strlen(event)) == 0 || in get_wpa_cli_event2() 149 printf("Timeout on waiting for event %s\n", event); in get_wpa_cli_event2() 157 const char *event, char *buf, size_t buf_size) in get_wpa_cli_event() argument 159 return get_wpa_cli_event2(mon, event, NULL, buf, buf_size); in get_wpa_cli_event()
|
| D | wpa_helpers.h | 22 const char *event, char *buf, size_t buf_size); 24 const char *event, const char *event2,
|
| /hostap-latest/doc/ |
| D | driver_wrapper.doxygen | 24 card. In addition, support for driver events is required. The event 98 this was added in WE-18. With older versions, a custom event can be used 127 Request). This notification is done using EVENT_ASSOCINFO event (see 133 wpa_supplicant needs to receive event callbacks when certain events 140 Extensions event that is reporting new AP with SIOCGIWAP 141 event. Similarly, completion of a scan can be reported with SIOCGIWSCAN 142 event. 144 Michael MIC failure event was added in WE-18. Older versions of Wireless 145 Extensions will need to use a custom event. Host AP driver used a custom 146 event with following contents: MLME-MICHAELMICFAILURE.indication(keyid=# [all …]
|
| D | hostapd_ctrl_iface.doxygen | 6 daemon and to get status information and event notifications. There is 29 commands and unsolicited event messages. Commands are a pair of 32 Unsolicited event messages are sent by hostapd to the control 39 unsolicited event messages, there is potential for receiving an 52 unsolicited event messages, it should be first detached by calling
|
| D | ctrl_iface.doxygen | 6 daemon and to get status information and event notifications. There is 30 commands and unsolicited event messages. Commands are a pair of 33 Unsolicited event messages are sent by wpa_supplicant to the control 40 unsolicited event messages, there is potential for receiving an 53 unsolicited event messages, it should be first detached by calling 514 request event. For example, 568 (\a WPA_CTRL_REQ macro) in an unsolicited event message. An external 670 The event messages will be delivered over the attach control interface 673 additional information may be included depending on the event 674 message. For example, following event message is delivered when new [all …]
|
| /hostap-latest/src/wps/ |
| D | wps_er.c | 35 enum wps_event event) in wps_er_sta_event() argument 55 wps->event_cb(wps->cb_ctx, event, &data); in wps_er_sta_event() 128 enum wps_event event) in wps_er_ap_event() argument 150 wps->event_cb(wps->cb_ctx, event, &data); in wps_er_ap_event() 194 enum http_client_event event) in wps_er_http_unsubscribe_cb() argument 198 switch (event) { in wps_er_http_unsubscribe_cb() 402 enum http_client_event event) in wps_er_http_subscribe_cb() argument 406 switch (event) { in wps_er_http_subscribe_cb() 610 enum http_client_event event) in wps_er_http_dev_desc_cb() argument 616 switch (event) { in wps_er_http_dev_desc_cb() [all …]
|
| D | http_client.h | 27 enum http_client_event event), 33 enum http_client_event event),
|
| /hostap-latest/radius_example/ |
| D | README | 25 notifications. This is implemented using the generic event loop 28 The main application may either use the included event loop 30 to use whatever event loop design is used in the main program. This
|