Lines Matching refs:resp
262 u16 auth_alg, u16 auth_transaction, u16 resp,
283 reply->u.auth.status_code = host_to_le16(resp);
289 " auth_alg=%d auth_transaction=%d resp=%d (IE len=%lu)",
291 resp, (unsigned long) ies_len);
447 u16 resp = WLAN_STATUS_SUCCESS;
465 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable,
477 if (resp == WLAN_STATUS_SUCCESS) {
483 resp = WLAN_STATUS_ANTI_CLOGGING_TOKEN_REQ;
487 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
498 resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION;
507 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
509 resp = WLAN_STATUS_SUCCESS;
517 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
528 resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION;
535 auth_transaction, resp,
547 u16 resp = WLAN_STATUS_SUCCESS;
594 resp = WLAN_REASON_MICHAEL_MIC_FAILURE;
612 resp = WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG;
620 resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION;
627 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
639 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
654 resp = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA;
664 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
706 resp = auth_shared_key(hapd, sta, auth_transaction, challenge,
727 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
751 auth_transaction + 1, resp, resp_ies, resp_ies_len);
880 u16 resp;
892 resp = check_ssid(hapd, sta, elems.ssid, elems.ssid_len);
893 if (resp != WLAN_STATUS_SUCCESS)
894 return resp;
895 resp = check_wmm(hapd, sta, elems.wmm, elems.wmm_len);
896 if (resp != WLAN_STATUS_SUCCESS)
897 return resp;
898 resp = check_ext_capab(hapd, sta, elems.ext_capab, elems.ext_capab_len);
899 if (resp != WLAN_STATUS_SUCCESS)
900 return resp;
901 resp = copy_supp_rates(hapd, sta, &elems);
902 if (resp != WLAN_STATUS_SUCCESS)
903 return resp;
905 resp = copy_sta_ht_capab(hapd, sta, elems.ht_capabilities,
907 if (resp != WLAN_STATUS_SUCCESS)
908 return resp;
919 resp = copy_sta_vht_capab(hapd, sta, elems.vht_capabilities,
921 if (resp != WLAN_STATUS_SUCCESS)
922 return resp;
924 resp = set_sta_vht_opmode(hapd, sta, elems.vht_opmode_notif);
925 if (resp != WLAN_STATUS_SUCCESS)
926 return resp;
1012 resp = WLAN_STATUS_GROUP_CIPHER_NOT_VALID;
1014 resp = WLAN_STATUS_PAIRWISE_CIPHER_NOT_VALID;
1016 resp = WLAN_STATUS_AKMP_NOT_VALID;
1018 resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
1021 resp = WLAN_STATUS_ROBUST_MGMT_FRAME_POLICY_VIOLATION;
1023 resp = WLAN_STATUS_ROBUST_MGMT_FRAME_POLICY_VIOLATION;
1026 resp = WLAN_STATUS_INVALID_MDIE;
1028 resp = WLAN_STATUS_INVALID_IE;
1029 if (resp != WLAN_STATUS_SUCCESS)
1030 return resp;
1066 resp = wpa_ft_validate_reassoc(sta->wpa_sm, ies,
1068 if (resp != WLAN_STATUS_SUCCESS)
1069 return resp;
1269 wpa_printf(MSG_INFO, "Failed to send assoc resp: %s",
1279 u16 resp = WLAN_STATUS_SUCCESS;
1355 resp = WLAN_REASON_MICHAEL_MIC_FAILURE;
1364 resp = WLAN_STATUS_ASSOC_DENIED_LISTEN_INT_TOO_LARGE;
1370 resp = check_assoc_ies(hapd, sta, pos, left, reassoc);
1371 if (resp != WLAN_STATUS_SUCCESS)
1377 resp = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA;
1452 send_assoc_resp(hapd, sta, resp, reassoc, pos, left);
1689 struct ieee80211_mgmt *resp;
1698 resp = os_malloc(len);
1699 if (resp == NULL)
1701 os_memcpy(resp, mgmt, len);
1702 os_memcpy(resp->da, resp->sa, ETH_ALEN);
1703 resp->sa, hapd->own_addr, ETH_ALEN);
1704 os_memcpy(resp->bssid, hapd->own_addr, ETH_ALEN);
1705 resp->u.action.category |= 0x80;
1707 if (hostapd_drv_send_mlme(hapd, resp, len, 0) < 0) {
1711 os_free(resp);