Home
last modified time | relevance | path

Searched refs:status (Results 1 – 25 of 165) sorted by relevance

1234567

/hostap-latest/port/mbedtls/
Dsupp_psa_api.c94 psa_status_t status; in supp_psa_cipher_operation() local
104status = psa_cipher_update(operation, input + bytes_written, bytes_to_write, output + *output_len, in supp_psa_cipher_operation()
106 ASSERT_STATUS(status, PSA_SUCCESS); in supp_psa_cipher_operation()
112 status = psa_cipher_finish(operation, output + *output_len, output_size - *output_len, &len); in supp_psa_cipher_operation()
113 ASSERT_STATUS(status, PSA_SUCCESS); in supp_psa_cipher_operation()
117 return status; in supp_psa_cipher_operation()
125 psa_status_t status; in aes_128_encrypt_block_psa() local
133 status = psa_import_key(&attributes, key, SUPP_PSA_BLOCK_SIZE_128, &key_id); in aes_128_encrypt_block_psa()
134 ASSERT_STATUS(status, PSA_SUCCESS); in aes_128_encrypt_block_psa()
137status = psa_cipher_encrypt(key_id, alg, in, SUPP_PSA_BLOCK_SIZE_128, out, SUPP_PSA_BLOCK_SIZE_128… in aes_128_encrypt_block_psa()
[all …]
/hostap-latest/tests/remote/
Dtest_devices.py31 status, buf = host.execute(["id"])
32 if status != 0:
41 status, buf = host.execute(["uname", "-s", "-n", "-r", "-m", "-o"])
46 status, buf = host.execute(["ifconfig", iface])
47 if status != 0:
54 status, buf = host.execute([setup_params['wpa_supplicant'], "-v"])
55 if status != 0:
62 status, buf = host.execute([setup_params['hostapd'], "-v"])
63 if status != 1:
70 status, buf = host.execute([setup_params['iperf'], "-v"])
[all …]
Drutils.py121status, buf = host.execute([setup_params['hostapd'], "-B", "-ddt", "-g", "udp:" + host.port, "-P",…
122 if status != 0:
139status, buf = host.execute([setup_params['wpa_supplicant'], "-B", "-ddt", "-g", "udp:" + host.port…
140 if status != 0:
222 status, buf = client.execute(["ifconfig", ifname])
241 status, buf = client.execute(["ifconfig", ifname])
284 status, buf = host.execute(["ifconfig", iface])
285 if status != 0:
377 status, buf = a.execute(ping_a_b)
378 if status == 2 and ping == "ping6":
[all …]
/hostap-latest/tests/hwsim/
Dtest_multi_ap.py163 status = dev[0].get_status()
164 if status['wpa_state'] != 'COMPLETED' or status['bssid'] != multi_ap_bssid:
166 if status['ssid'] != params['multi_ap_backhaul_ssid'].strip('"'):
167 … raise Exception("Unexpected SSID %s != %s" % (status['ssid'], params["multi_ap_backhaul_ssid"]))
168 if status['pairwise_cipher'] != 'CCMP':
169 raise Exception("Unexpected encryption configuration %s" % status['pairwise_cipher'])
170 if status['key_mgmt'] != 'WPA2-PSK':
173 status = hapd.request("WPS_GET_STATUS")
174 if "PBC Status: Disabled" not in status:
176 if "Last WPS result: Success" not in status:
[all …]
Dtest_wpas_wmm_ac.py34 status = dev[0].request("WMM_AC_STATUS")
35 if "WMM AC is Enabled" not in status:
37 if "TSID" in status:
39 if "BK: acm=0 uapsd=0" not in status:
40 raise Exception("Unexpected BK info" + status)
41 if "BE: acm=0 uapsd=0" not in status:
42 raise Exception("Unexpected BE info" + status)
43 if "VI: acm=1 uapsd=0" not in status:
44 raise Exception("Unexpected VI info" + status)
45 if "VO: acm=1 uapsd=0" not in status:
[all …]
Dtest_he.py156 status = dev[0].get_status()
157 if status["ieee80211ac"] != "1":
159 status = hapd.get_status()
160 logger.info("hostapd STATUS: " + str(status))
161 if status["ieee80211n"] != "1":
163 if status["ieee80211ac"] != "1":
165 if status["ieee80211ax"] != "1":
167 if status["secondary_channel"] != "1":
169 if status["vht_oper_chwidth"] != "1":
171 if status["vht_oper_centr_freq_seg0_idx"] != "42":
[all …]
Dtest_ap_vht.py46 status = dev[0].get_status()
47 if status["ieee80211ac"] != "1":
49 status = hapd.get_status()
50 logger.info("hostapd STATUS: " + str(status))
51 if status["ieee80211n"] != "1":
53 if status["ieee80211ac"] != "1":
55 if status["secondary_channel"] != "1":
57 if status["vht_oper_chwidth"] != "1":
59 if status["vht_oper_centr_freq_seg0_idx"] != "42":
61 if "vht_caps_info" not in status:
[all …]
Dtest_wep.py121 status = hapd.get_status()
122 logger.info("hostapd STATUS: " + str(status))
123 if status["ieee80211n"] != "0":
125 if status["ieee80211ac"] != "0":
127 if status["secondary_channel"] != "0":
144 status = hapd.get_status()
145 logger.info("hostapd STATUS: " + str(status))
146 if status["ieee80211ax"] != "0":
Dremotehost.py26 status = 0
29 status = e.returncode
35 logger.debug("thread exit status: " + str(status))
37 reply.append(status)
70 status = 0
73 status = e.returncode
78 logger.debug("status: " + str(status))
80 return status, buf.decode()
91 status = 0
94 status = e.returncode
[all …]
Dtest_ap_wps.py83 status = dev[0].get_status()
84 if status['wpa_state'] != 'COMPLETED' or status['bssid'] != apdev[0]['bssid']:
86 if status['ssid'] != ssid:
88 if status['pairwise_cipher'] != 'CCMP':
90 if status['key_mgmt'] != 'WPA2-PSK':
93 status = hapd.request("WPS_GET_STATUS")
94 if "PBC Status: Disabled" not in status:
96 if "Last WPS result: Success" not in status:
98 if "Peer Address: " + dev[0].p2p_interface_addr() not in status:
249 status = dev[0].get_status()
[all …]
Dtest_rsn_override.py220 status = wpas.get_status()
221 logger.debug("wpas STATUS:\n" + str(status))
222 if status['key_mgmt'] != 'SAE-EXT-KEY' or \
223 'pmf' not in status or \
224 status['pmf'] != '2' or \
225 status['pairwise_cipher'] != 'GCMP-256':
228 status = dev[0].get_status()
229 logger.debug("dev[0] STATUS:\n" + str(status))
230 if status['key_mgmt'] != 'WPA2-PSK' or \
231 status['pairwise_cipher'] != 'CCMP':
Dtest_dpp3.py58 def run_dpp_tcp_pkex(dev0, dev1, cap_lo, sae=False, status=False): argument
63 run_dpp_tcp_pkex2(dev0, dev1, cap_lo, sae, status)
65 def run_dpp_tcp_pkex2(dev0, dev1, cap_lo, sae=False, status=False): argument
71 if status:
99 if status:
112 def run_dpp_tcp_pkex_auto_connect_2(dev, apdev, params, status, start_ap=True): argument
129 run_dpp_tcp_pkex(dev[0], dev[1], cap_lo, sae=True, status=status)
132 if status:
174 def run_dpp_tcp_pkex_while_associated(dev, apdev, params, status): argument
199 run_dpp_tcp_pkex(dev[0], dev[1], cap_lo, sae=True, status=status)
[all …]
/hostap-latest/src/p2p/
Dp2p_pd.c105 int follow_on_req_fail = prov->status >= 0 && in p2ps_add_pd_req_attrs()
106 prov->status != P2P_SC_SUCCESS_DEFERRED; in p2ps_add_pd_req_attrs()
113 if (prov->status >= 0) in p2ps_add_pd_req_attrs()
114 p2p_buf_add_status(buf, (u8) prov->status); in p2ps_add_pd_req_attrs()
144 if (prov->status < 0 && prov->info[0]) in p2ps_add_pd_req_attrs()
255 enum p2p_status_code status, in p2p_build_prov_disc_resp() argument
306 if (status == P2P_SC_SUCCESS || in p2p_build_prov_disc_resp()
307 status == P2P_SC_SUCCESS_DEFERRED) in p2p_build_prov_disc_resp()
310 if (!status && prov->status != -1) in p2p_build_prov_disc_resp()
311 status = prov->status; in p2p_build_prov_disc_resp()
[all …]
Dp2p_go_neg.c290 u8 dialog_token, u8 status, in p2p_build_go_neg_resp() argument
318 p2p_buf_add_status(buf, status); in p2p_build_go_neg_resp()
362 if (status || peer == NULL) { in p2p_build_go_neg_resp()
552 u8 *status) in p2p_go_select_channel() argument
567 *status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_go_select_channel()
575 *status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_go_select_channel()
808 u8 status = P2P_SC_FAIL_INVALID_PARAMS; in p2p_process_go_neg_req() local
871 if (msg.status && *msg.status) { in p2p_process_go_neg_req()
873 *msg.status); in p2p_process_go_neg_req()
875 *msg.status == P2P_SC_FAIL_REJECTED_BY_USER) { in p2p_process_go_neg_req()
[all …]
Dp2p_invitation.c114 u8 dialog_token, u8 status, in p2p_build_invitation_resp() argument
155 p2p_buf_add_status(buf, status); in p2p_build_invitation_resp()
190 u8 status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE; in p2p_process_invitation_req() local
216 status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE; in p2p_process_invitation_req()
224 status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE; in p2p_process_invitation_req()
232 status = P2P_SC_FAIL_INVALID_PARAMS; in p2p_process_invitation_req()
255 status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_process_invitation_req()
267 status = p2p->cfg->invitation_process( in p2p_process_invitation_req()
280 status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_process_invitation_req()
291 status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_process_invitation_req()
[all …]
Dp2p_dev_disc.c110 static struct wpabuf * p2p_build_dev_disc_resp(u8 dialog_token, u8 status) in p2p_build_dev_disc_resp() argument
122 p2p_buf_add_status(buf, status); in p2p_build_dev_disc_resp()
138 const u8 *addr, int freq, u8 status) in p2p_send_dev_disc_resp() argument
142 resp = p2p_build_dev_disc_resp(dialog_token, status); in p2p_send_dev_disc_resp()
148 MAC2STR(addr), status, freq); in p2p_send_dev_disc_resp()
219 u8 status; in p2p_process_dev_disc_resp() local
234 if (msg.status == NULL) { in p2p_process_dev_disc_resp()
246 status = *msg.status; in p2p_process_dev_disc_resp()
249 p2p_dbg(p2p, "Device Discoverability Response status %u", status); in p2p_process_dev_disc_resp()
260 if (status == 0) { in p2p_process_dev_disc_resp()
/hostap-latest/src/pasn/
Dpasn_responder.c46 u16 res, alg, seq, status; in pasn_wd_handle_sae_commit() local
64 status = WPA_GET_LE16(data + 4); in pasn_wd_handle_sae_commit()
67 alg, seq, status); in pasn_wd_handle_sae_commit()
70 status != WLAN_STATUS_SAE_HASH_TO_ELEMENT) { in pasn_wd_handle_sae_commit()
121 u16 res, alg, seq, status; in pasn_wd_handle_sae_confirm() local
137 status = WPA_GET_LE16(data + 4); in pasn_wd_handle_sae_confirm()
140 alg, seq, status); in pasn_wd_handle_sae_confirm()
142 if (alg != WLAN_AUTH_SAE || seq != 2 || status != WLAN_STATUS_SUCCESS) { in pasn_wd_handle_sae_confirm()
427 struct rsn_pmksa_cache_entry *pmksa, u16 status) in handle_auth_pasn_resp() argument
440 wpa_printf(MSG_DEBUG, "PASN: Building frame 2: status=%u", status); in handle_auth_pasn_resp()
[all …]
Dpasn_initiator.c80 u16 len, res, alg, seq, status; in wpas_pasn_wd_sae_rx() local
107 status = WPA_GET_LE16(data + 4); in wpas_pasn_wd_sae_rx()
110 alg, seq, status); in wpas_pasn_wd_sae_rx()
113 status != WLAN_STATUS_SAE_HASH_TO_ELEMENT) { in wpas_pasn_wd_sae_rx()
152 status = WPA_GET_LE16(data + 4); in wpas_pasn_wd_sae_rx()
155 alg, seq, status); in wpas_pasn_wd_sae_rx()
157 if (alg != WLAN_AUTH_SAE || seq != 2 || status != WLAN_STATUS_SUCCESS) { in wpas_pasn_wd_sae_rx()
311 u16 alg, seq, status; in wpas_pasn_wd_fils_rx() local
331 status = WPA_GET_LE16(data + 4); in wpas_pasn_wd_fils_rx()
334 alg, seq, status); in wpas_pasn_wd_fils_rx()
[all …]
/hostap-latest/src/pae/
Dieee802_1x_cp.h27 void ieee802_1x_cp_set_electedself(void *cp_ctx, bool status);
34 void ieee802_1x_cp_set_usingreceivesas(void *cp_ctx, bool status);
35 void ieee802_1x_cp_set_allreceiving(void *cp_ctx, bool status);
36 void ieee802_1x_cp_set_servertransmitting(void *cp_ctx, bool status);
37 void ieee802_1x_cp_set_usingtransmitas(void *cp_ctx, bool status);
/hostap-latest/hs20/client/
Dspp_client.c603 char *status = NULL; in process_spp_post_dev_data_response() local
609 status = get_spp_attr_value(ctx->xml, node, "sppStatus"); in process_spp_post_dev_data_response()
610 if (status == NULL) { in process_spp_post_dev_data_response()
615 status); in process_spp_post_dev_data_response()
624 status, session_id); in process_spp_post_dev_data_response()
643 strcasecmp(status, in process_spp_post_dev_data_response()
665 strcasecmp(status, "Exchange complete, release TLS connection") == in process_spp_post_dev_data_response()
676 strcasecmp(status, "Update complete, request sppUpdateResponse") == in process_spp_post_dev_data_response()
691 strcasecmp(status, "Provisioning complete, request " in process_spp_post_dev_data_response()
702 if (strcasecmp(status, "No update available at this time") == 0) { in process_spp_post_dev_data_response()
[all …]
/hostap-latest/src/common/
Ddpp_auth.c234 enum dpp_status_error status, in dpp_auth_build_resp() argument
254 auth->auth_resp_status = status; in dpp_auth_build_resp()
274 if (status != 255) in dpp_auth_build_resp()
275 dpp_build_attr_status(msg, status); in dpp_auth_build_resp()
428 enum dpp_status_error status = DPP_STATUS_OK; in dpp_auth_build_resp_ok() local
573 status = 255; in dpp_auth_build_resp_ok()
576 status = 254; in dpp_auth_build_resp_ok()
586 msg = dpp_auth_build_resp(auth, status, pr, nonce_len, in dpp_auth_build_resp_ok()
603 enum dpp_status_error status) in dpp_auth_build_resp_status() argument
649 status = 255; in dpp_auth_build_resp_status()
[all …]
/hostap-latest/wlantest/
Drx_tdls.c247 u8 dialog_token, u16 status) in rx_data_tdls_setup_response_failure() argument
253 if (status == WLAN_STATUS_SUCCESS) { in rx_data_tdls_setup_response_failure()
289 u16 status; in rx_data_tdls_setup_response() local
298 status = WPA_GET_LE16(data); in rx_data_tdls_setup_response()
301 MAC2STR(src), MAC2STR(dst), status); in rx_data_tdls_setup_response()
302 if (len < 5 && status == 0) { in rx_data_tdls_setup_response()
313 data[2], status); in rx_data_tdls_setup_response()
326 if (status) in rx_data_tdls_setup_response()
331 if (status != WLAN_STATUS_SUCCESS) in rx_data_tdls_setup_response()
357 u8 dialog_token, u16 status) in rx_data_tdls_setup_confirm_failure() argument
[all …]
/hostap-latest/src/ap/
Ddrv_callbacks.c237 info->links[link_id].status = WPA_GET_LE16(sta_profile); in hostapd_update_sta_links_status()
265 int status = WLAN_STATUS_SUCCESS; in hostapd_notif_assoc() local
353 status = WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY; in hostapd_notif_assoc()
355 hostapd_sta_assoc(hapd, addr, reassoc, status, buf, p - buf); in hostapd_notif_assoc()
484 status = WLAN_STATUS_INVALID_IE; in hostapd_notif_assoc()
535 status = WLAN_STATUS_INVALID_IE; in hostapd_notif_assoc()
539 status = WLAN_STATUS_SUCCESS; in hostapd_notif_assoc()
543 status = WLAN_STATUS_INVALID_IE; in hostapd_notif_assoc()
547 status = WLAN_STATUS_GROUP_CIPHER_NOT_VALID; in hostapd_notif_assoc()
551 status = WLAN_STATUS_PAIRWISE_CIPHER_NOT_VALID; in hostapd_notif_assoc()
[all …]
/hostap-latest/src/rsn_supp/
Dtdls.c1059 u16 status) in wpa_tdls_send_error() argument
1063 MAC2STR(dst), tdls_action, status); in wpa_tdls_send_error()
1064 return wpa_tdls_tpk_send(sm, dst, tdls_action, dialog_token, status, in wpa_tdls_send_error()
1110 int status; in wpa_tdls_send_tpk_m1() local
1273 status = wpa_tdls_tpk_send(sm, peer->addr, WLAN_TDLS_SETUP_REQUEST, in wpa_tdls_send_tpk_m1()
1278 return status; in wpa_tdls_send_tpk_m1()
1292 int status; in wpa_tdls_send_tpk_m2() local
1365 status = wpa_tdls_tpk_send(sm, src_addr, WLAN_TDLS_SETUP_RESPONSE, in wpa_tdls_send_tpk_m2()
1370 return status; in wpa_tdls_send_tpk_m2()
1384 int status; in wpa_tdls_send_tpk_m3() local
[all …]
/hostap-latest/wpa_supplicant/binder/
Dsupplicant.cpp44 android::binder::Status status; in CreateInterface() local
59 status = android::binder::Status::fromServiceSpecificError( in CreateInterface()
69 status = in CreateInterface()
75 status = android::binder::Status::ok(); in CreateInterface()
81 return status; in CreateInterface()

1234567