| /hostap-latest/tests/hwsim/ |
| D | test_rrm.py | 776 def __init__(self, report): argument 777 …art, self.duration, self.frame_info, self.rcpi, self.rsni = struct.unpack("<BBQHBBB", report[0:15]) 778 report = report[15:] 779 self.bssid = report[0:6] 781 report = report[6:] 782 self.antenna_id, self.parent_tsf = struct.unpack("<BI", report[0:5]) 783 report = report[5:] 784 self.subelems = report 788 while len(report) >= 2: 789 eid, elen = struct.unpack('BB', report[0:2]) [all …]
|
| D | run-tests.py | 100 def report(conn, prefill, build, commit, run, test, result, duration, logdir, function 455 report(conn, False, args.build, args.commit, run, name, 'NOTRUN', 0, 721 report(conn, args.prefill, args.build, args.commit, run, name, result,
|
| D | test_eht.py | 1693 report = BeaconReport(binascii.unhexlify(fields[4])) 1694 logger.info("Received beacon report: " + str(report)) 1695 if report.bssid_str != hapd1.own_addr() or report.opclass != 81 or \ 1696 report.channel != 6: 1699 if not report.last_indication:
|
| /hostap-latest/wpa_supplicant/ |
| D | rrm.c | 63 const u8 *report, size_t report_len) in wpas_rrm_process_neighbor_rep() argument 67 wpa_hexdump(MSG_DEBUG, "RRM: New Neighbor Report", report, report_len); in wpas_rrm_process_neighbor_rep() 71 if (report[0] != wpa_s->rrm.next_neighbor_rep_token - 1) { in wpas_rrm_process_neighbor_rep() 74 report[0], wpa_s->rrm.next_neighbor_rep_token - 1); in wpas_rrm_process_neighbor_rep() 92 wpabuf_put_data(neighbor_rep, report + 1, report_len - 1); in wpas_rrm_process_neighbor_rep() 94 report[0]); in wpas_rrm_process_neighbor_rep() 380 struct wpabuf *report = wpabuf_alloc(len + 3); in wpas_rrm_send_msr_report_mpdu() local 382 if (!report) in wpas_rrm_send_msr_report_mpdu() 385 wpabuf_put_u8(report, WLAN_ACTION_RADIO_MEASUREMENT); in wpas_rrm_send_msr_report_mpdu() 386 wpabuf_put_u8(report, WLAN_RRM_RADIO_MEASUREMENT_REPORT); in wpas_rrm_send_msr_report_mpdu() [all …]
|
| D | driver_i.h | 470 int report) in wpa_drv_probe_req_report() argument 474 report); in wpa_drv_probe_req_report()
|
| D | ChangeLog | 232 * added support for beacon report 518 * add support for neighbor report 716 * fixed OBSS scan result processing for 20/40 MHz co-ex report 721 report processing 825 report only BSS entries that have been updated during this scan 849 - option to fetch and report alternative carrier records for external 1556 * added support for processing TNCC-TNCS-Messages to report 2344 * added support for larger scan results report (old limit was 4 kB of
|
| D | wpa_supplicant_i.h | 1771 const u8 *report, size_t report_len);
|
| /hostap-latest/src/ap/ |
| D | rrm.c | 78 char report[2 * 255 + 1]; in hostapd_handle_beacon_report() local 87 report[0] = '\0'; in hostapd_handle_beacon_report() 88 if (wpa_snprintf_hex(report, sizeof(report), pos, len) < 0) in hostapd_handle_beacon_report() 91 MAC2STR(addr), token, rep_mode, report); in hostapd_handle_beacon_report() 353 const struct rrm_link_measurement_report *report; in hostapd_handle_link_mesr_report() local 359 report = (const struct rrm_link_measurement_report *) (pos - 1); in hostapd_handle_link_mesr_report() 360 if (end - (const u8 *) report < (int) sizeof(*report)) in hostapd_handle_link_mesr_report() 364 (hapd->link_measurement_req_token != report->dialog_token)) { in hostapd_handle_link_mesr_report() 367 report->dialog_token); in hostapd_handle_link_mesr_report() 380 MAC2STR(mgmt->sa), report->dialog_token, report_msg); in hostapd_handle_link_mesr_report()
|
| D | ieee802_11.c | 6771 const struct rrm_measurement_report_element *report; in handle_action_cb() local 6827 if (len < 24 + 5 + sizeof(*report)) in handle_action_cb() 6829 report = (const struct rrm_measurement_report_element *) in handle_action_cb() 6833 report->eid == WLAN_EID_MEASURE_REQUEST && in handle_action_cb() 6834 report->len >= 3 && in handle_action_cb() 6835 report->type == MEASURE_TYPE_BEACON) in handle_action_cb()
|
| /hostap-latest/doc/ |
| D | testing_tools.doxygen | 138 used to detect certain categories of memory leaks and report them 139 automatically when the program is terminated. The report will also
|
| D | p2p.doxygen | 242 negotiation. \ref p2p_send_action_cb() is used to report the result of
|
| /hostap-latest/hostapd/ |
| D | README-WPS | 348 <carrier from handover select>" is used to report completed NFC
|
| D | ChangeLog | 198 * added support for requesting beacon report 508 - option to fetch and report alternative carrier records for external
|
| /hostap-latest/src/drivers/ |
| D | driver.h | 4109 int (*probe_req_report)(void *priv, int report);
|
| D | driver_nl80211.c | 174 int report); 9397 static int wpa_driver_nl80211_probe_req_report(struct i802_bss *bss, int report) in wpa_driver_nl80211_probe_req_report() argument 9401 if (!report) { in wpa_driver_nl80211_probe_req_report() 10919 static int driver_nl80211_probe_req_report(void *priv, int report) in driver_nl80211_probe_req_report() argument 10922 return wpa_driver_nl80211_probe_req_report(bss, report); in driver_nl80211_probe_req_report()
|