Home
last modified time | relevance | path

Searched refs:report (Results 1 – 15 of 15) sorted by relevance

/hostap-latest/tests/hwsim/
Dtest_rrm.py776 def __init__(self, report): argument
777 …art, self.duration, self.frame_info, self.rcpi, self.rsni = struct.unpack("<BBQHBBB", report[0:15])
778 report = report[15:]
779 self.bssid = report[0:6]
781 report = report[6:]
782 self.antenna_id, self.parent_tsf = struct.unpack("<BI", report[0:5])
783 report = report[5:]
784 self.subelems = report
788 while len(report) >= 2:
789 eid, elen = struct.unpack('BB', report[0:2])
[all …]
Drun-tests.py100 def report(conn, prefill, build, commit, run, test, result, duration, logdir, function
455 report(conn, False, args.build, args.commit, run, name, 'NOTRUN', 0,
721 report(conn, args.prefill, args.build, args.commit, run, name, result,
Dtest_eht.py1693 report = BeaconReport(binascii.unhexlify(fields[4]))
1694 logger.info("Received beacon report: " + str(report))
1695 if report.bssid_str != hapd1.own_addr() or report.opclass != 81 or \
1696 report.channel != 6:
1699 if not report.last_indication:
/hostap-latest/wpa_supplicant/
Drrm.c63 const u8 *report, size_t report_len) in wpas_rrm_process_neighbor_rep() argument
67 wpa_hexdump(MSG_DEBUG, "RRM: New Neighbor Report", report, report_len); in wpas_rrm_process_neighbor_rep()
71 if (report[0] != wpa_s->rrm.next_neighbor_rep_token - 1) { in wpas_rrm_process_neighbor_rep()
74 report[0], wpa_s->rrm.next_neighbor_rep_token - 1); in wpas_rrm_process_neighbor_rep()
92 wpabuf_put_data(neighbor_rep, report + 1, report_len - 1); in wpas_rrm_process_neighbor_rep()
94 report[0]); in wpas_rrm_process_neighbor_rep()
380 struct wpabuf *report = wpabuf_alloc(len + 3); in wpas_rrm_send_msr_report_mpdu() local
382 if (!report) in wpas_rrm_send_msr_report_mpdu()
385 wpabuf_put_u8(report, WLAN_ACTION_RADIO_MEASUREMENT); in wpas_rrm_send_msr_report_mpdu()
386 wpabuf_put_u8(report, WLAN_RRM_RADIO_MEASUREMENT_REPORT); in wpas_rrm_send_msr_report_mpdu()
[all …]
Ddriver_i.h470 int report) in wpa_drv_probe_req_report() argument
474 report); in wpa_drv_probe_req_report()
DChangeLog232 * added support for beacon report
518 * add support for neighbor report
716 * fixed OBSS scan result processing for 20/40 MHz co-ex report
721 report processing
825 report only BSS entries that have been updated during this scan
849 - option to fetch and report alternative carrier records for external
1556 * added support for processing TNCC-TNCS-Messages to report
2344 * added support for larger scan results report (old limit was 4 kB of
Dwpa_supplicant_i.h1771 const u8 *report, size_t report_len);
/hostap-latest/src/ap/
Drrm.c78 char report[2 * 255 + 1]; in hostapd_handle_beacon_report() local
87 report[0] = '\0'; in hostapd_handle_beacon_report()
88 if (wpa_snprintf_hex(report, sizeof(report), pos, len) < 0) in hostapd_handle_beacon_report()
91 MAC2STR(addr), token, rep_mode, report); in hostapd_handle_beacon_report()
353 const struct rrm_link_measurement_report *report; in hostapd_handle_link_mesr_report() local
359 report = (const struct rrm_link_measurement_report *) (pos - 1); in hostapd_handle_link_mesr_report()
360 if (end - (const u8 *) report < (int) sizeof(*report)) in hostapd_handle_link_mesr_report()
364 (hapd->link_measurement_req_token != report->dialog_token)) { in hostapd_handle_link_mesr_report()
367 report->dialog_token); in hostapd_handle_link_mesr_report()
380 MAC2STR(mgmt->sa), report->dialog_token, report_msg); in hostapd_handle_link_mesr_report()
Dieee802_11.c6771 const struct rrm_measurement_report_element *report; in handle_action_cb() local
6827 if (len < 24 + 5 + sizeof(*report)) in handle_action_cb()
6829 report = (const struct rrm_measurement_report_element *) in handle_action_cb()
6833 report->eid == WLAN_EID_MEASURE_REQUEST && in handle_action_cb()
6834 report->len >= 3 && in handle_action_cb()
6835 report->type == MEASURE_TYPE_BEACON) in handle_action_cb()
/hostap-latest/doc/
Dtesting_tools.doxygen138 used to detect certain categories of memory leaks and report them
139 automatically when the program is terminated. The report will also
Dp2p.doxygen242 negotiation. \ref p2p_send_action_cb() is used to report the result of
/hostap-latest/hostapd/
DREADME-WPS348 <carrier from handover select>" is used to report completed NFC
DChangeLog198 * added support for requesting beacon report
508 - option to fetch and report alternative carrier records for external
/hostap-latest/src/drivers/
Ddriver.h4109 int (*probe_req_report)(void *priv, int report);
Ddriver_nl80211.c174 int report);
9397 static int wpa_driver_nl80211_probe_req_report(struct i802_bss *bss, int report) in wpa_driver_nl80211_probe_req_report() argument
9401 if (!report) { in wpa_driver_nl80211_probe_req_report()
10919 static int driver_nl80211_probe_req_report(void *priv, int report) in driver_nl80211_probe_req_report() argument
10922 return wpa_driver_nl80211_probe_req_report(bss, report); in driver_nl80211_probe_req_report()