Home | History | Annotate | Download | only in ap

Lines Matching refs:resp

60 		       struct sta_info *sta, u16 *resp,
300 u16 auth_alg, u16 auth_transaction, u16 resp,
322 reply->u.auth.status_code = host_to_le16(resp);
328 " auth_alg=%d auth_transaction=%d resp=%d (IE len=%lu) (dbg=%s)",
330 resp, (unsigned long) ies_len, dbg);
981 int resp = WLAN_STATUS_SUCCESS;
997 auth_transaction, resp, pos, end - pos,
1005 auth_transaction, resp,
1015 resp = -1;
1020 resp = -1;
1052 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1055 resp = sae_group_allowed(sta->sae, groups,
1057 if (resp != WLAN_STATUS_SUCCESS) {
1070 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1081 resp = auth_sae_send_commit(hapd, sta, mgmt->bssid, 0);
1082 if (resp != WLAN_STATUS_SUCCESS) {
1134 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable,
1138 if (resp == SAE_SILENTLY_DISCARD) {
1145 if (resp == WLAN_STATUS_UNKNOWN_PASSWORD_IDENTIFIER) {
1160 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1164 if (resp != WLAN_STATUS_SUCCESS)
1173 resp = WLAN_STATUS_ANTI_CLOGGING_TOKEN_REQ;
1180 resp = sae_sm_step(hapd, sta, mgmt->bssid, auth_transaction,
1198 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1217 resp
1222 resp = sae_sm_step(hapd, sta, mgmt->bssid, auth_transaction, 0,
1231 resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION;
1235 if (!sta_removed && resp != WLAN_STATUS_SUCCESS) {
1241 if (resp == WLAN_STATUS_FINITE_CYCLIC_GROUP_NOT_SUPPORTED &&
1245 sae_sme_send_external_auth_status(hapd, sta, resp);
1247 auth_transaction, resp,
1254 (resp != WLAN_STATUS_SUCCESS ||
1425 struct sta_info *sta, u16 resp,
1432 struct sta_info *sta, u16 resp,
1435 u16 resp = WLAN_STATUS_SUCCESS;
1463 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1472 resp = WLAN_STATUS_FINITE_CYCLIC_GROUP_NOT_SUPPORTED;
1482 resp = WLAN_STATUS_FINITE_CYCLIC_GROUP_NOT_SUPPORTED;
1490 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1499 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1510 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1526 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1537 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1547 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1555 resp = wpa_res_to_status_code(res);
1556 if (resp != WLAN_STATUS_SUCCESS)
1561 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1605 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1642 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1653 data = prepare_auth_resp_fils(hapd, sta, &resp, pmksa, NULL,
1661 cb(hapd, sta, resp, data, pub);
1668 struct sta_info *sta, u16 *resp,
1684 if (*resp != WLAN_STATUS_SUCCESS)
1689 *resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1697 *resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1703 *resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1710 *resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1720 *resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1728 *resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1759 *resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1796 *resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1842 *resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1855 *resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1877 struct sta_info *sta, u16 resp,
1883 resp == WLAN_STATUS_FINITE_CYCLIC_GROUP_NOT_SUPPORTED) ?
1885 send_auth_reply(hapd, sta->addr, hapd->own_addr, auth_alg, 2, resp,
1890 if (resp == WLAN_STATUS_SUCCESS) {
1909 u16 resp;
1915 resp = success ? WLAN_STATUS_SUCCESS : WLAN_STATUS_UNSPECIFIED_FAILURE;
1916 data = prepare_auth_resp_fils(hapd, sta, &resp, NULL, erp_resp,
1923 sta->fils_pending_cb(hapd, sta, resp, data, pub);
2028 u16 resp = WLAN_STATUS_SUCCESS;
2084 resp = WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG;
2092 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
2117 resp = WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG;
2125 resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION;
2132 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
2151 resp = WLAN_STATUS_REJECTED_WITH_SUGGESTED_BSS_TRANSITION;
2199 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
2267 resp = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA;
2282 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
2330 resp = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA;
2349 resp = auth_shared_key(hapd, sta, auth_transaction, challenge,
2351 if (resp != 0)
2353 "auth_shared_key() failed: status=%d", resp);
2374 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
2397 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
2423 auth_transaction + 1, resp, resp_ies,
2426 if (sta && sta->added_unassoc && (resp != WLAN_STATUS_SUCCESS ||
2798 u16 resp;
2810 resp = check_ssid(hapd, sta, elems.ssid, elems.ssid_len);
2811 if (resp != WLAN_STATUS_SUCCESS)
2812 return resp;
2813 resp = check_wmm(hapd, sta, elems.wmm, elems.wmm_len);
2814 if (resp != WLAN_STATUS_SUCCESS)
2815 return resp;
2816 resp = check_ext_capab(hapd, sta, elems.ext_capab, elems.ext_capab_len);
2817 if (resp != WLAN_STATUS_SUCCESS)
2818 return resp;
2819 resp = copy_supp_rates(hapd, sta, &elems);
2820 if (resp != WLAN_STATUS_SUCCESS)
2821 return resp;
2823 resp = check_multi_ap(hapd, sta, elems.multi_ap, elems.multi_ap_len);
2824 if (resp != WLAN_STATUS_SUCCESS)
2825 return resp;
2828 resp = copy_sta_ht_capab(hapd, sta, elems.ht_capabilities);
2829 if (resp != WLAN_STATUS_SUCCESS)
2830 return resp;
2842 resp = copy_sta_vht_capab(hapd, sta, elems.vht_capabilities);
2843 if (resp != WLAN_STATUS_SUCCESS)
2844 return resp;
2846 resp = copy_sta_vht_oper(hapd, sta, elems.vht_operation);
2847 if (resp != WLAN_STATUS_SUCCESS)
2848 return resp;
2850 resp = set_sta_vht_opmode(hapd, sta, elems.vht_opmode_notif);
2851 if (resp != WLAN_STATUS_SUCCESS)
2852 return resp;
2864 resp = copy_sta_vendor_vht(hapd, sta, elems.vendor_vht,
2866 if (resp != WLAN_STATUS_SUCCESS)
2867 return resp;
2948 resp = wpa_res_to_status_code(res);
2949 if (resp != WLAN_STATUS_SUCCESS)
2950 return resp;
2990 resp = wpa_ft_validate_reassoc(sta->wpa_sm, ies,
2992 if (resp != WLAN_STATUS_SUCCESS)
2993 return resp;
3029 resp = owe_process_assoc_req(hapd, sta, elems.owe_dh,
3031 if (resp != WLAN_STATUS_SUCCESS)
3032 return resp;
3578 wpa_printf(MSG_INFO, "Failed to send assoc resp: %s",
3698 u16 resp = WLAN_STATUS_SUCCESS, reply_res;
3797 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
3811 resp = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA;
3820 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
3860 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
3869 resp = WLAN_STATUS_ASSOC_DENIED_LISTEN_INT_TOO_LARGE;
3875 resp = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA;
3883 resp = WLAN_STATUS_DENIED_POOR_CHANNEL_CONDITIONS;
3905 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
3912 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
3922 resp = check_assoc_ies(hapd, sta, pos, left, reassoc);
3923 if (resp != WLAN_STATUS_SUCCESS)
3929 resp = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA;
4043 if (resp == WLAN_STATUS_SUCCESS && sta &&
4045 resp = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA;
4048 if (sta && delay_assoc && resp == WLAN_STATUS_SUCCESS &&
4069 if (sta && delay_assoc && resp == WLAN_STATUS_SUCCESS) {
4084 reply_res = send_assoc_resp(hapd, sta, mgmt->sa, resp, reassoc, pos,
4094 resp == WLAN_STATUS_SUCCESS) || sta->added_unassoc)) {
4402 struct ieee80211_mgmt *resp;
4411 resp = os_memdup(mgmt, len);
4412 if (resp == NULL)
4414 os_memcpy(resp->da, resp->sa, ETH_ALEN);
4415 os_memcpy(resp->sa, hapd->own_addr, ETH_ALEN);
4416 os_memcpy(resp->bssid, hapd->own_addr, ETH_ALEN);
4417 resp->u.action.category |= 0x80;
4419 if (hostapd_drv_send_mlme(hapd, resp, len, 0) < 0) {
4423 os_free(resp);