Home | History | Annotate | Download | only in ap

Lines Matching refs:resp

258 			    u16 auth_alg, u16 auth_transaction, u16 resp,
279 reply->u.auth.status_code = host_to_le16(resp);
285 " auth_alg=%d auth_transaction=%d resp=%d (IE len=%lu)",
287 resp, (unsigned long) ies_len);
443 u16 resp = WLAN_STATUS_SUCCESS;
461 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable,
473 if (resp == WLAN_STATUS_SUCCESS) {
479 resp = WLAN_STATUS_ANTI_CLOGGING_TOKEN_REQ;
483 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
494 resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION;
502 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
504 resp = WLAN_STATUS_SUCCESS;
512 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
523 resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION;
529 auth_transaction, resp,
541 u16 resp = WLAN_STATUS_SUCCESS;
578 resp = WLAN_REASON_MICHAEL_MIC_FAILURE;
596 resp = WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG;
604 resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION;
611 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
623 resp
638 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
649 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
696 resp = auth_shared_key(hapd, sta, auth_transaction, challenge,
717 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
741 auth_transaction + 1, resp, resp_ies, resp_ies_len);
857 u16 resp;
868 resp = check_ssid(hapd, sta, elems.ssid, elems.ssid_len);
869 if (resp != WLAN_STATUS_SUCCESS)
870 return resp;
871 resp = check_wmm(hapd, sta, elems.wmm, elems.wmm_len);
872 if (resp != WLAN_STATUS_SUCCESS)
873 return resp;
874 resp = copy_supp_rates(hapd, sta, &elems);
875 if (resp != WLAN_STATUS_SUCCESS)
876 return resp;
878 resp = copy_sta_ht_capab(hapd, sta, elems.ht_capabilities,
880 if (resp != WLAN_STATUS_SUCCESS)
881 return resp;
892 resp = copy_sta_vht_capab(hapd, sta, elems.vht_capabilities,
894 if (resp != WLAN_STATUS_SUCCESS)
895 return resp;
966 resp = WLAN_STATUS_GROUP_CIPHER_NOT_VALID;
968 resp = WLAN_STATUS_PAIRWISE_CIPHER_NOT_VALID;
970 resp = WLAN_STATUS_AKMP_NOT_VALID;
972 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
975 resp = WLAN_STATUS_ROBUST_MGMT_FRAME_POLICY_VIOLATION;
977 resp = WLAN_STATUS_ROBUST_MGMT_FRAME_POLICY_VIOLATION;
980 resp = WLAN_STATUS_INVALID_MDIE;
982 resp = WLAN_STATUS_INVALID_IE;
983 if (resp != WLAN_STATUS_SUCCESS)
984 return resp;
1020 resp = wpa_ft_validate_reassoc(sta->wpa_sm, ies,
1022 if (resp != WLAN_STATUS_SUCCESS)
1023 return resp;
1207 wpa_printf(MSG_INFO, "Failed to send assoc resp: %s",
1217 u16 resp = WLAN_STATUS_SUCCESS;
1273 resp = WLAN_REASON_MICHAEL_MIC_FAILURE;
1282 resp = WLAN_STATUS_ASSOC_DENIED_LISTEN_INT_TOO_LARGE;
1288 resp = check_assoc_ies(hapd, sta, pos, left, reassoc);
1289 if (resp != WLAN_STATUS_SUCCESS)
1295 resp = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA;
1381 send_assoc_resp(hapd, sta, resp, reassoc, pos, left);
1628 struct ieee80211_mgmt *resp;
1637 resp = os_malloc(len);
1638 if (resp == NULL)
1640 os_memcpy(resp, mgmt, len);
1641 os_memcpy(resp->da, resp->sa, ETH_ALEN);
1642 os_memcpy(resp->sa, hapd->own_addr, ETH_ALEN);
1643 os_memcpy(resp->bssid, hapd->own_addr, ETH_ALEN);
1644 resp->u.action.category |= 0x80;
1646 if (hostapd_drv_send_mlme(hapd, resp, len, 0) < 0) {
1650 os_free(resp);