/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | sme.h | 20 const u8 *ies, size_t ies_len); 55 const u8 *ies, size_t ies_len) 54 sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md, const u8 *ies, size_t ies_len) argument
|
H A D | sme.c | 651 data->auth.ies, data->auth.ies_len); 660 data->auth.ies_len); 717 edata.ft_ies.ies_len = data->auth.ies_len; 831 const u8 *ies, size_t ies_len) 843 wpa_hexdump(MSG_DEBUG, "SME: FT IEs", ies, ies_len); 845 wpa_s->sme.ft_ies = os_malloc(ies_len); 848 os_memcpy(wpa_s->sme.ft_ies, ies, ies_len); 849 wpa_s->sme.ft_ies_len = ies_len; 830 sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md, const u8 *ies, size_t ies_len) argument
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | ieee802_11_common.c | 314 int ieee802_11_ie_count(const u8 *ies, size_t ies_len) argument 323 end = ies + ies_len; 336 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len, argument 343 end = ies + ies_len; 360 buf = wpabuf_alloc(ies_len);
|
H A D | wpa_common.c | 244 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, argument 258 end = ies + ies_len; 1068 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid) argument 1074 end = ies + ies_len;
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ft.c | 60 * @ies_len: Length of ies buffer in octets 63 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) argument 70 if (wpa_ft_parse_ies(ies, ies_len, &ft) < 0) 374 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument 387 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 411 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 674 size_t ies_len, const u8 *src_addr) 682 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 690 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 673 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len, const u8 *src_addr) argument
|
H A D | wpa.h | 48 size_t ies_len); 50 const u8 *ies, size_t ies_len); 325 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len); 327 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 333 size_t ies_len, const u8 *src_addr); 340 wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) argument 352 wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument 368 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument
|
H A D | wpa_i.h | 224 const u8 *ies, size_t ies_len) 227 return sm->ctx->update_ft_ies(sm->ctx->ctx, md, ies, ies_len); 233 const u8 *ies, size_t ies_len) 237 ies, ies_len); 223 wpa_sm_update_ft_ies(struct wpa_sm *sm, const u8 *md, const u8 *ies, size_t ies_len) argument 231 wpa_sm_send_ft_action(struct wpa_sm *sm, u8 action, const u8 *target_ap, const u8 *ies, size_t ies_len) argument
|
/external/wpa_supplicant_8/src/common/ |
H A D | ieee802_11_common.c | 314 int ieee802_11_ie_count(const u8 *ies, size_t ies_len) argument 323 end = ies + ies_len; 336 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len, argument 343 end = ies + ies_len; 360 buf = wpabuf_alloc(ies_len);
|
H A D | wpa_common.c | 244 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, argument 258 end = ies + ies_len; 1068 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid) argument 1074 end = ies + ies_len;
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ft.c | 60 * @ies_len: Length of ies buffer in octets 63 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) argument 70 if (wpa_ft_parse_ies(ies, ies_len, &ft) < 0) 374 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument 387 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 411 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 674 size_t ies_len, const u8 *src_addr) 682 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 690 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 673 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len, const u8 *src_addr) argument
|
H A D | wpa.h | 48 size_t ies_len); 50 const u8 *ies, size_t ies_len); 325 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len); 327 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 333 size_t ies_len, const u8 *src_addr); 340 wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) argument 352 wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument 368 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument
|
H A D | wpa_i.h | 224 const u8 *ies, size_t ies_len) 227 return sm->ctx->update_ft_ies(sm->ctx->ctx, md, ies, ies_len); 233 const u8 *ies, size_t ies_len) 237 ies, ies_len); 223 wpa_sm_update_ft_ies(struct wpa_sm *sm, const u8 *md, const u8 *ies, size_t ies_len) argument 231 wpa_sm_send_ft_action(struct wpa_sm *sm, u8 action, const u8 *target_ap, const u8 *ies, size_t ies_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | ieee802_11_common.c | 314 int ieee802_11_ie_count(const u8 *ies, size_t ies_len) argument 323 end = ies + ies_len; 336 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len, argument 343 end = ies + ies_len; 360 buf = wpabuf_alloc(ies_len);
|
H A D | wpa_common.c | 244 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, argument 258 end = ies + ies_len; 1068 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid) argument 1074 end = ies + ies_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ft.c | 60 * @ies_len: Length of ies buffer in octets 63 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) argument 70 if (wpa_ft_parse_ies(ies, ies_len, &ft) < 0) 374 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument 387 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 411 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 674 size_t ies_len, const u8 *src_addr) 682 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 690 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 673 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len, const u8 *src_addr) argument
|
H A D | wpa.h | 48 size_t ies_len); 50 const u8 *ies, size_t ies_len); 325 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len); 327 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 333 size_t ies_len, const u8 *src_addr); 340 wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) argument 352 wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument 368 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | drv_callbacks.c | 554 const u8 *ies, size_t ies_len) 567 hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len); 604 rx_auth->ies_len, 551 hostapd_notify_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument
|
H A D | ieee802_11.c | 263 const u8 *ies, size_t ies_len) 269 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; 285 if (ies && ies_len) 286 os_memcpy(reply->u.auth.variable, ies, ies_len); 291 resp, (unsigned long) ies_len); 302 const u8 *ies, size_t ies_len) 308 status, ies, ies_len); 877 const u8 *ies, size_t ies_len, int reassoc) 885 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) { 940 sta->p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, 260 send_auth_reply(struct hostapd_data *hapd, const u8 *dst, const u8 *bssid, u16 auth_alg, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument 300 handle_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument 876 check_assoc_ies(struct hostapd_data *hapd, struct sta_info *sta, const u8 *ies, size_t ies_len, int reassoc) argument 1161 send_assoc_resp(struct hostapd_data *hapd, struct sta_info *sta, u16 status_code, int reassoc, const u8 *ies, size_t ies_len) argument [all...] |
H A D | wpa_auth_ft.c | 304 const u8 *ies, size_t ies_len, 353 sm->ft_pending_req_ies = wpabuf_alloc_copy(ies, ies_len); 509 const u8 *ies, size_t ies_len) 517 ies, ies_len); 532 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) == 800 const u8 *ies, size_t ies_len, 821 ies, ies_len); 823 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 870 if (wpa_ft_pull_pmk_r1(sm, ies, ies_len, parse.rsn_pmkid) < 0) { 948 u16 auth_transaction, const u8 *ies, size_t ies_len, 303 wpa_ft_pull_pmk_r1(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len, const u8 *pmk_r0_name) argument 507 wpa_ft_process_rdie(struct wpa_state_machine *sm, u8 *pos, u8 *end, u8 id, u8 descr_count, const u8 *ies, size_t ies_len) argument 799 wpa_ft_process_auth_req(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len, u8 **resp_ies, size_t *resp_ies_len) argument 947 wpa_ft_process_auth(struct wpa_state_machine *sm, const u8 *bssid, u16 auth_transaction, const u8 *ies, size_t ies_len, void (*cb)(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len), void *ctx) argument 989 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len) argument 1143 size_t ies_len; local 1210 wpa_ft_rrb_rx_request_cb(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | drv_callbacks.c | 554 const u8 *ies, size_t ies_len) 567 hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len); 604 rx_auth->ies_len, 551 hostapd_notify_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument
|
H A D | ieee802_11.c | 263 const u8 *ies, size_t ies_len) 269 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; 285 if (ies && ies_len) 286 os_memcpy(reply->u.auth.variable, ies, ies_len); 291 resp, (unsigned long) ies_len); 302 const u8 *ies, size_t ies_len) 308 status, ies, ies_len); 877 const u8 *ies, size_t ies_len, int reassoc) 885 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) { 940 sta->p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, 260 send_auth_reply(struct hostapd_data *hapd, const u8 *dst, const u8 *bssid, u16 auth_alg, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument 300 handle_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument 876 check_assoc_ies(struct hostapd_data *hapd, struct sta_info *sta, const u8 *ies, size_t ies_len, int reassoc) argument 1161 send_assoc_resp(struct hostapd_data *hapd, struct sta_info *sta, u16 status_code, int reassoc, const u8 *ies, size_t ies_len) argument [all...] |
H A D | wpa_auth_ft.c | 304 const u8 *ies, size_t ies_len, 353 sm->ft_pending_req_ies = wpabuf_alloc_copy(ies, ies_len); 509 const u8 *ies, size_t ies_len) 517 ies, ies_len); 532 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) == 800 const u8 *ies, size_t ies_len, 821 ies, ies_len); 823 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 870 if (wpa_ft_pull_pmk_r1(sm, ies, ies_len, parse.rsn_pmkid) < 0) { 948 u16 auth_transaction, const u8 *ies, size_t ies_len, 303 wpa_ft_pull_pmk_r1(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len, const u8 *pmk_r0_name) argument 507 wpa_ft_process_rdie(struct wpa_state_machine *sm, u8 *pos, u8 *end, u8 id, u8 descr_count, const u8 *ies, size_t ies_len) argument 799 wpa_ft_process_auth_req(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len, u8 **resp_ies, size_t *resp_ies_len) argument 947 wpa_ft_process_auth(struct wpa_state_machine *sm, const u8 *bssid, u16 auth_transaction, const u8 *ies, size_t ies_len, void (*cb)(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len), void *ctx) argument 989 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len) argument 1143 size_t ies_len; local 1210 wpa_ft_rrb_rx_request_cb(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | drv_callbacks.c | 554 const u8 *ies, size_t ies_len) 567 hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len); 604 rx_auth->ies_len, 551 hostapd_notify_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument
|
H A D | ieee802_11.c | 263 const u8 *ies, size_t ies_len) 269 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; 285 if (ies && ies_len) 286 os_memcpy(reply->u.auth.variable, ies, ies_len); 291 resp, (unsigned long) ies_len); 302 const u8 *ies, size_t ies_len) 308 status, ies, ies_len); 877 const u8 *ies, size_t ies_len, int reassoc) 885 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) { 940 sta->p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, 260 send_auth_reply(struct hostapd_data *hapd, const u8 *dst, const u8 *bssid, u16 auth_alg, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument 300 handle_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument 876 check_assoc_ies(struct hostapd_data *hapd, struct sta_info *sta, const u8 *ies, size_t ies_len, int reassoc) argument 1161 send_assoc_resp(struct hostapd_data *hapd, struct sta_info *sta, u16 status_code, int reassoc, const u8 *ies, size_t ies_len) argument [all...] |
H A D | wpa_auth_ft.c | 304 const u8 *ies, size_t ies_len, 353 sm->ft_pending_req_ies = wpabuf_alloc_copy(ies, ies_len); 509 const u8 *ies, size_t ies_len) 517 ies, ies_len); 532 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) == 800 const u8 *ies, size_t ies_len, 821 ies, ies_len); 823 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 870 if (wpa_ft_pull_pmk_r1(sm, ies, ies_len, parse.rsn_pmkid) < 0) { 948 u16 auth_transaction, const u8 *ies, size_t ies_len, 303 wpa_ft_pull_pmk_r1(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len, const u8 *pmk_r0_name) argument 507 wpa_ft_process_rdie(struct wpa_state_machine *sm, u8 *pos, u8 *end, u8 id, u8 descr_count, const u8 *ies, size_t ies_len) argument 799 wpa_ft_process_auth_req(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len, u8 **resp_ies, size_t *resp_ies_len) argument 947 wpa_ft_process_auth(struct wpa_state_machine *sm, const u8 *bssid, u16 auth_transaction, const u8 *ies, size_t ies_len, void (*cb)(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len), void *ctx) argument 989 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len) argument 1143 size_t ies_len; local 1210 wpa_ft_rrb_rx_request_cb(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument [all...] |