/hostap-latest/port/mbedtls/ |
D | supp_psa_api.c | 94 psa_status_t status; in supp_psa_cipher_operation() local 104 … status = psa_cipher_update(operation, input + bytes_written, bytes_to_write, output + *output_len, in supp_psa_cipher_operation() 106 ASSERT_STATUS(status, PSA_SUCCESS); in supp_psa_cipher_operation() 112 status = psa_cipher_finish(operation, output + *output_len, output_size - *output_len, &len); in supp_psa_cipher_operation() 113 ASSERT_STATUS(status, PSA_SUCCESS); in supp_psa_cipher_operation() 117 return status; in supp_psa_cipher_operation() 125 psa_status_t status; in aes_128_encrypt_block_psa() local 133 status = psa_import_key(&attributes, key, SUPP_PSA_BLOCK_SIZE_128, &key_id); in aes_128_encrypt_block_psa() 134 ASSERT_STATUS(status, PSA_SUCCESS); in aes_128_encrypt_block_psa() 137 …status = psa_cipher_encrypt(key_id, alg, in, SUPP_PSA_BLOCK_SIZE_128, out, SUPP_PSA_BLOCK_SIZE_128… in aes_128_encrypt_block_psa() [all …]
|
/hostap-latest/tests/remote/ |
D | test_devices.py | 31 status, buf = host.execute(["id"]) 32 if status != 0: 41 status, buf = host.execute(["uname", "-s", "-n", "-r", "-m", "-o"]) 46 status, buf = host.execute(["ifconfig", iface]) 47 if status != 0: 54 status, buf = host.execute([setup_params['wpa_supplicant'], "-v"]) 55 if status != 0: 62 status, buf = host.execute([setup_params['hostapd'], "-v"]) 63 if status != 1: 70 status, buf = host.execute([setup_params['iperf'], "-v"]) [all …]
|
D | rutils.py | 121 …status, buf = host.execute([setup_params['hostapd'], "-B", "-ddt", "-g", "udp:" + host.port, "-P",… 122 if status != 0: 139 …status, buf = host.execute([setup_params['wpa_supplicant'], "-B", "-ddt", "-g", "udp:" + host.port… 140 if status != 0: 222 status, buf = client.execute(["ifconfig", ifname]) 241 status, buf = client.execute(["ifconfig", ifname]) 284 status, buf = host.execute(["ifconfig", iface]) 285 if status != 0: 377 status, buf = a.execute(ping_a_b) 378 if status == 2 and ping == "ping6": [all …]
|
/hostap-latest/tests/hwsim/ |
D | test_multi_ap.py | 163 status = dev[0].get_status() 164 if status['wpa_state'] != 'COMPLETED' or status['bssid'] != multi_ap_bssid: 166 if status['ssid'] != params['multi_ap_backhaul_ssid'].strip('"'): 167 … raise Exception("Unexpected SSID %s != %s" % (status['ssid'], params["multi_ap_backhaul_ssid"])) 168 if status['pairwise_cipher'] != 'CCMP': 169 raise Exception("Unexpected encryption configuration %s" % status['pairwise_cipher']) 170 if status['key_mgmt'] != 'WPA2-PSK': 173 status = hapd.request("WPS_GET_STATUS") 174 if "PBC Status: Disabled" not in status: 176 if "Last WPS result: Success" not in status: [all …]
|
D | test_wpas_wmm_ac.py | 34 status = dev[0].request("WMM_AC_STATUS") 35 if "WMM AC is Enabled" not in status: 37 if "TSID" in status: 39 if "BK: acm=0 uapsd=0" not in status: 40 raise Exception("Unexpected BK info" + status) 41 if "BE: acm=0 uapsd=0" not in status: 42 raise Exception("Unexpected BE info" + status) 43 if "VI: acm=1 uapsd=0" not in status: 44 raise Exception("Unexpected VI info" + status) 45 if "VO: acm=1 uapsd=0" not in status: [all …]
|
D | test_he.py | 156 status = dev[0].get_status() 157 if status["ieee80211ac"] != "1": 159 status = hapd.get_status() 160 logger.info("hostapd STATUS: " + str(status)) 161 if status["ieee80211n"] != "1": 163 if status["ieee80211ac"] != "1": 165 if status["ieee80211ax"] != "1": 167 if status["secondary_channel"] != "1": 169 if status["vht_oper_chwidth"] != "1": 171 if status["vht_oper_centr_freq_seg0_idx"] != "42": [all …]
|
D | test_ap_vht.py | 46 status = dev[0].get_status() 47 if status["ieee80211ac"] != "1": 49 status = hapd.get_status() 50 logger.info("hostapd STATUS: " + str(status)) 51 if status["ieee80211n"] != "1": 53 if status["ieee80211ac"] != "1": 55 if status["secondary_channel"] != "1": 57 if status["vht_oper_chwidth"] != "1": 59 if status["vht_oper_centr_freq_seg0_idx"] != "42": 61 if "vht_caps_info" not in status: [all …]
|
D | test_wep.py | 121 status = hapd.get_status() 122 logger.info("hostapd STATUS: " + str(status)) 123 if status["ieee80211n"] != "0": 125 if status["ieee80211ac"] != "0": 127 if status["secondary_channel"] != "0": 144 status = hapd.get_status() 145 logger.info("hostapd STATUS: " + str(status)) 146 if status["ieee80211ax"] != "0":
|
D | remotehost.py | 26 status = 0 29 status = e.returncode 35 logger.debug("thread exit status: " + str(status)) 37 reply.append(status) 70 status = 0 73 status = e.returncode 78 logger.debug("status: " + str(status)) 80 return status, buf.decode() 91 status = 0 94 status = e.returncode [all …]
|
D | test_ap_wps.py | 83 status = dev[0].get_status() 84 if status['wpa_state'] != 'COMPLETED' or status['bssid'] != apdev[0]['bssid']: 86 if status['ssid'] != ssid: 88 if status['pairwise_cipher'] != 'CCMP': 90 if status['key_mgmt'] != 'WPA2-PSK': 93 status = hapd.request("WPS_GET_STATUS") 94 if "PBC Status: Disabled" not in status: 96 if "Last WPS result: Success" not in status: 98 if "Peer Address: " + dev[0].p2p_interface_addr() not in status: 249 status = dev[0].get_status() [all …]
|
D | test_rsn_override.py | 220 status = wpas.get_status() 221 logger.debug("wpas STATUS:\n" + str(status)) 222 if status['key_mgmt'] != 'SAE-EXT-KEY' or \ 223 'pmf' not in status or \ 224 status['pmf'] != '2' or \ 225 status['pairwise_cipher'] != 'GCMP-256': 228 status = dev[0].get_status() 229 logger.debug("dev[0] STATUS:\n" + str(status)) 230 if status['key_mgmt'] != 'WPA2-PSK' or \ 231 status['pairwise_cipher'] != 'CCMP':
|
D | test_dpp3.py | 58 def run_dpp_tcp_pkex(dev0, dev1, cap_lo, sae=False, status=False): argument 63 run_dpp_tcp_pkex2(dev0, dev1, cap_lo, sae, status) 65 def run_dpp_tcp_pkex2(dev0, dev1, cap_lo, sae=False, status=False): argument 71 if status: 99 if status: 112 def run_dpp_tcp_pkex_auto_connect_2(dev, apdev, params, status, start_ap=True): argument 129 run_dpp_tcp_pkex(dev[0], dev[1], cap_lo, sae=True, status=status) 132 if status: 174 def run_dpp_tcp_pkex_while_associated(dev, apdev, params, status): argument 199 run_dpp_tcp_pkex(dev[0], dev[1], cap_lo, sae=True, status=status) [all …]
|
/hostap-latest/src/p2p/ |
D | p2p_pd.c | 105 int follow_on_req_fail = prov->status >= 0 && in p2ps_add_pd_req_attrs() 106 prov->status != P2P_SC_SUCCESS_DEFERRED; in p2ps_add_pd_req_attrs() 113 if (prov->status >= 0) in p2ps_add_pd_req_attrs() 114 p2p_buf_add_status(buf, (u8) prov->status); in p2ps_add_pd_req_attrs() 144 if (prov->status < 0 && prov->info[0]) in p2ps_add_pd_req_attrs() 255 enum p2p_status_code status, in p2p_build_prov_disc_resp() argument 306 if (status == P2P_SC_SUCCESS || in p2p_build_prov_disc_resp() 307 status == P2P_SC_SUCCESS_DEFERRED) in p2p_build_prov_disc_resp() 310 if (!status && prov->status != -1) in p2p_build_prov_disc_resp() 311 status = prov->status; in p2p_build_prov_disc_resp() [all …]
|
D | p2p_go_neg.c | 290 u8 dialog_token, u8 status, in p2p_build_go_neg_resp() argument 318 p2p_buf_add_status(buf, status); in p2p_build_go_neg_resp() 362 if (status || peer == NULL) { in p2p_build_go_neg_resp() 552 u8 *status) in p2p_go_select_channel() argument 567 *status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_go_select_channel() 575 *status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_go_select_channel() 808 u8 status = P2P_SC_FAIL_INVALID_PARAMS; in p2p_process_go_neg_req() local 871 if (msg.status && *msg.status) { in p2p_process_go_neg_req() 873 *msg.status); in p2p_process_go_neg_req() 875 *msg.status == P2P_SC_FAIL_REJECTED_BY_USER) { in p2p_process_go_neg_req() [all …]
|
D | p2p_invitation.c | 114 u8 dialog_token, u8 status, in p2p_build_invitation_resp() argument 155 p2p_buf_add_status(buf, status); in p2p_build_invitation_resp() 190 u8 status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE; in p2p_process_invitation_req() local 216 status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE; in p2p_process_invitation_req() 224 status = P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE; in p2p_process_invitation_req() 232 status = P2P_SC_FAIL_INVALID_PARAMS; in p2p_process_invitation_req() 255 status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_process_invitation_req() 267 status = p2p->cfg->invitation_process( in p2p_process_invitation_req() 280 status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_process_invitation_req() 291 status = P2P_SC_FAIL_NO_COMMON_CHANNELS; in p2p_process_invitation_req() [all …]
|
D | p2p_dev_disc.c | 110 static struct wpabuf * p2p_build_dev_disc_resp(u8 dialog_token, u8 status) in p2p_build_dev_disc_resp() argument 122 p2p_buf_add_status(buf, status); in p2p_build_dev_disc_resp() 138 const u8 *addr, int freq, u8 status) in p2p_send_dev_disc_resp() argument 142 resp = p2p_build_dev_disc_resp(dialog_token, status); in p2p_send_dev_disc_resp() 148 MAC2STR(addr), status, freq); in p2p_send_dev_disc_resp() 219 u8 status; in p2p_process_dev_disc_resp() local 234 if (msg.status == NULL) { in p2p_process_dev_disc_resp() 246 status = *msg.status; in p2p_process_dev_disc_resp() 249 p2p_dbg(p2p, "Device Discoverability Response status %u", status); in p2p_process_dev_disc_resp() 260 if (status == 0) { in p2p_process_dev_disc_resp()
|
/hostap-latest/src/pasn/ |
D | pasn_responder.c | 46 u16 res, alg, seq, status; in pasn_wd_handle_sae_commit() local 64 status = WPA_GET_LE16(data + 4); in pasn_wd_handle_sae_commit() 67 alg, seq, status); in pasn_wd_handle_sae_commit() 70 status != WLAN_STATUS_SAE_HASH_TO_ELEMENT) { in pasn_wd_handle_sae_commit() 121 u16 res, alg, seq, status; in pasn_wd_handle_sae_confirm() local 137 status = WPA_GET_LE16(data + 4); in pasn_wd_handle_sae_confirm() 140 alg, seq, status); in pasn_wd_handle_sae_confirm() 142 if (alg != WLAN_AUTH_SAE || seq != 2 || status != WLAN_STATUS_SUCCESS) { in pasn_wd_handle_sae_confirm() 427 struct rsn_pmksa_cache_entry *pmksa, u16 status) in handle_auth_pasn_resp() argument 440 wpa_printf(MSG_DEBUG, "PASN: Building frame 2: status=%u", status); in handle_auth_pasn_resp() [all …]
|
D | pasn_initiator.c | 80 u16 len, res, alg, seq, status; in wpas_pasn_wd_sae_rx() local 107 status = WPA_GET_LE16(data + 4); in wpas_pasn_wd_sae_rx() 110 alg, seq, status); in wpas_pasn_wd_sae_rx() 113 status != WLAN_STATUS_SAE_HASH_TO_ELEMENT) { in wpas_pasn_wd_sae_rx() 152 status = WPA_GET_LE16(data + 4); in wpas_pasn_wd_sae_rx() 155 alg, seq, status); in wpas_pasn_wd_sae_rx() 157 if (alg != WLAN_AUTH_SAE || seq != 2 || status != WLAN_STATUS_SUCCESS) { in wpas_pasn_wd_sae_rx() 311 u16 alg, seq, status; in wpas_pasn_wd_fils_rx() local 331 status = WPA_GET_LE16(data + 4); in wpas_pasn_wd_fils_rx() 334 alg, seq, status); in wpas_pasn_wd_fils_rx() [all …]
|
/hostap-latest/src/pae/ |
D | ieee802_1x_cp.h | 27 void ieee802_1x_cp_set_electedself(void *cp_ctx, bool status); 34 void ieee802_1x_cp_set_usingreceivesas(void *cp_ctx, bool status); 35 void ieee802_1x_cp_set_allreceiving(void *cp_ctx, bool status); 36 void ieee802_1x_cp_set_servertransmitting(void *cp_ctx, bool status); 37 void ieee802_1x_cp_set_usingtransmitas(void *cp_ctx, bool status);
|
/hostap-latest/hs20/client/ |
D | spp_client.c | 603 char *status = NULL; in process_spp_post_dev_data_response() local 609 status = get_spp_attr_value(ctx->xml, node, "sppStatus"); in process_spp_post_dev_data_response() 610 if (status == NULL) { in process_spp_post_dev_data_response() 615 status); in process_spp_post_dev_data_response() 624 status, session_id); in process_spp_post_dev_data_response() 643 strcasecmp(status, in process_spp_post_dev_data_response() 665 strcasecmp(status, "Exchange complete, release TLS connection") == in process_spp_post_dev_data_response() 676 strcasecmp(status, "Update complete, request sppUpdateResponse") == in process_spp_post_dev_data_response() 691 strcasecmp(status, "Provisioning complete, request " in process_spp_post_dev_data_response() 702 if (strcasecmp(status, "No update available at this time") == 0) { in process_spp_post_dev_data_response() [all …]
|
/hostap-latest/src/common/ |
D | dpp_auth.c | 234 enum dpp_status_error status, in dpp_auth_build_resp() argument 254 auth->auth_resp_status = status; in dpp_auth_build_resp() 274 if (status != 255) in dpp_auth_build_resp() 275 dpp_build_attr_status(msg, status); in dpp_auth_build_resp() 428 enum dpp_status_error status = DPP_STATUS_OK; in dpp_auth_build_resp_ok() local 573 status = 255; in dpp_auth_build_resp_ok() 576 status = 254; in dpp_auth_build_resp_ok() 586 msg = dpp_auth_build_resp(auth, status, pr, nonce_len, in dpp_auth_build_resp_ok() 603 enum dpp_status_error status) in dpp_auth_build_resp_status() argument 649 status = 255; in dpp_auth_build_resp_status() [all …]
|
/hostap-latest/wlantest/ |
D | rx_tdls.c | 247 u8 dialog_token, u16 status) in rx_data_tdls_setup_response_failure() argument 253 if (status == WLAN_STATUS_SUCCESS) { in rx_data_tdls_setup_response_failure() 289 u16 status; in rx_data_tdls_setup_response() local 298 status = WPA_GET_LE16(data); in rx_data_tdls_setup_response() 301 MAC2STR(src), MAC2STR(dst), status); in rx_data_tdls_setup_response() 302 if (len < 5 && status == 0) { in rx_data_tdls_setup_response() 313 data[2], status); in rx_data_tdls_setup_response() 326 if (status) in rx_data_tdls_setup_response() 331 if (status != WLAN_STATUS_SUCCESS) in rx_data_tdls_setup_response() 357 u8 dialog_token, u16 status) in rx_data_tdls_setup_confirm_failure() argument [all …]
|
/hostap-latest/src/ap/ |
D | drv_callbacks.c | 237 info->links[link_id].status = WPA_GET_LE16(sta_profile); in hostapd_update_sta_links_status() 265 int status = WLAN_STATUS_SUCCESS; in hostapd_notif_assoc() local 353 status = WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY; in hostapd_notif_assoc() 355 hostapd_sta_assoc(hapd, addr, reassoc, status, buf, p - buf); in hostapd_notif_assoc() 484 status = WLAN_STATUS_INVALID_IE; in hostapd_notif_assoc() 535 status = WLAN_STATUS_INVALID_IE; in hostapd_notif_assoc() 539 status = WLAN_STATUS_SUCCESS; in hostapd_notif_assoc() 543 status = WLAN_STATUS_INVALID_IE; in hostapd_notif_assoc() 547 status = WLAN_STATUS_GROUP_CIPHER_NOT_VALID; in hostapd_notif_assoc() 551 status = WLAN_STATUS_PAIRWISE_CIPHER_NOT_VALID; in hostapd_notif_assoc() [all …]
|
/hostap-latest/src/rsn_supp/ |
D | tdls.c | 1059 u16 status) in wpa_tdls_send_error() argument 1063 MAC2STR(dst), tdls_action, status); in wpa_tdls_send_error() 1064 return wpa_tdls_tpk_send(sm, dst, tdls_action, dialog_token, status, in wpa_tdls_send_error() 1110 int status; in wpa_tdls_send_tpk_m1() local 1273 status = wpa_tdls_tpk_send(sm, peer->addr, WLAN_TDLS_SETUP_REQUEST, in wpa_tdls_send_tpk_m1() 1278 return status; in wpa_tdls_send_tpk_m1() 1292 int status; in wpa_tdls_send_tpk_m2() local 1365 status = wpa_tdls_tpk_send(sm, src_addr, WLAN_TDLS_SETUP_RESPONSE, in wpa_tdls_send_tpk_m2() 1370 return status; in wpa_tdls_send_tpk_m2() 1384 int status; in wpa_tdls_send_tpk_m3() local [all …]
|
/hostap-latest/wpa_supplicant/binder/ |
D | supplicant.cpp | 44 android::binder::Status status; in CreateInterface() local 59 status = android::binder::Status::fromServiceSpecificError( in CreateInterface() 69 status = in CreateInterface() 75 status = android::binder::Status::ok(); in CreateInterface() 81 return status; in CreateInterface()
|