Searched defs:ie (Results 76 - 100 of 154) sorted by relevance

1234567

/external/wpa_supplicant_8/wpa_supplicant/
H A Dscan.c1381 const u8 *ie; local
1384 ie = wpa_scan_get_ie(res, WLAN_EID_SUPP_RATES);
1385 for (i = 0; ie && i < ie[1]; i++) {
1386 if ((ie[i + 2] & 0x7f) > rate)
1387 rate = ie[i + 2] & 0x7f;
1390 ie = wpa_scan_get_ie(res, WLAN_EID_EXT_SUPP_RATES);
1391 for (i = 0; ie && i < ie[1]; i++) {
1392 if ((ie[
1409 wpa_scan_get_ie(const struct wpa_scan_res *res, u8 ie) argument
[all...]
H A Dsme.c147 const u8 *ie; local
291 ie = wpa_bss_get_ie(bss, WLAN_EID_MOBILITY_DOMAIN);
292 if (ie && ie[1] >= MOBILITY_DOMAIN_ID_LEN)
293 md = ie + 2;
294 wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0);
297 wpa_ft_prepare_auth_request(wpa_s->wpa, ie);
321 params.ie
1058 const u8 *ie; local
1193 const u8 *ie; local
[all...]
H A Dwpas_glue.c359 const u8 *ie; local
374 ie = wpa_bss_get_vendor_ie(curr, WPA_IE_VENDOR_TYPE);
375 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0))
378 ie = wpa_bss_get_ie(curr, WLAN_EID_RSN);
379 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0))
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dap_drv_ops.c336 u16 seq, u16 status, const u8 *ie, size_t len)
341 seq, status, ie, len);
346 int reassoc, u16 status, const u8 *ie, size_t len)
351 reassoc, status, ie, len);
335 hostapd_sta_auth(struct hostapd_data *hapd, const u8 *addr, u16 seq, u16 status, const u8 *ie, size_t len) argument
345 hostapd_sta_assoc(struct hostapd_data *hapd, const u8 *addr, int reassoc, u16 status, const u8 *ie, size_t len) argument
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dwpa_common.c195 static int wpa_ft_parse_ftie(const u8 *ie, size_t ie_len, argument
200 parse->ftie = ie;
203 pos = ie + sizeof(struct rsn_ftie);
204 end = ie + ie_len;
461 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu",
471 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version",
489 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much",
500 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), "
517 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)",
528 wpa_printf(MSG_DEBUG, "%s: ie coun
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_madwifi.c645 madwifi_set_opt_ie(void *priv, const u8 *ie, size_t ie_len) argument
727 event.rx_probe_req.ie = mgmt->u.probe_req.variable;
761 madwifi_set_wps_ie(void *priv, const u8 *ie, size_t len, u32 frametype) argument
773 memcpy(&(beac_ie->app_buf[0]), ie, len);
819 struct ieee80211req_wpaie ie; local
826 memset(&ie, 0, sizeof(ie));
827 memcpy(ie.wpa_macaddr, addr, IEEE80211_ADDR_LEN);
828 if (set80211priv(drv, IEEE80211_IOCTL_GETWPAIE, &ie, sizeof(ie))) {
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa.h117 int wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len);
120 int wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len);
121 int wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, size_t len);
204 static inline int wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, argument
217 static inline int wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, argument
223 static inline int wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, argument
/external/valgrind/main/coregrind/
H A Dm_transtab.c452 static void InEdge__init ( InEdge* ie )
454 ie->from_sNo = -1; /* invalid */
455 ie->from_tteNo = 0;
456 ie->from_offs = 0;
457 ie->to_fastEP = False;
523 void InEdgeArr__add ( InEdgeArr* iea, InEdge* ie )
527 VG_(addToXA)(iea->var, ie);
540 VG_(addToXA)(iea->var, ie);
544 iea->fixed[iea->n_fixed++] = *ie;
807 InEdge ie; local
836 unchain_one( VexArch vex_arch, InEdge* ie, void* to_fastEPaddr, void* to_slowEPaddr ) argument
887 InEdge* ie = InEdgeArr__index(&here_tte->in_edges, i); local
917 InEdge* ie = InEdgeArr__index(&to_tte->in_edges, j); local
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth.c707 struct wpa_ie_data ie; local
710 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 ||
711 ie.num_pmkid != 1 || ie.pmkid == NULL) {
717 os_memcpy(sm->sup_pmk_r1_name, ie.pmkid, PMKID_LEN);
H A Dwps_hostapd.c40 const u8 *ie, size_t ie_len,
1326 const u8 *ie, size_t ie_len,
1336 if (ieee802_11_parse_elems(ie, ie_len, &elems, 0) == ParseFailed) {
1348 wps_ie = ieee802_11_vendor_ie_concat(ie, ie_len, WPS_DEV_OUI_WFA);
1324 hostapd_wps_probe_req_rx(void *ctx, const u8 *addr, const u8 *da, const u8 *bssid, const u8 *ie, size_t ie_len, int ssi_signal) argument
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_atheros.c674 atheros_set_opt_ie(void *priv, const u8 *ie, size_t ie_len) argument
682 wpa_hexdump(MSG_DEBUG, "atheros: set_generic_elem", ie, ie_len);
685 drv->wpa_ie = wpabuf_alloc_copy(ie, ie_len);
688 os_memcpy(&(app_ie->app_buf[0]), ie, ie_len);
796 event.rx_probe_req.ie = mgmt->u.probe_req.variable;
1069 atheros_set_wps_ie(void *priv, const u8 *ie, size_t len, u32 frametype) argument
1077 wpa_hexdump(MSG_DEBUG, "atheros: IE", ie, len);
1082 os_memcpy(&(beac_ie->app_buf[0]), ie, len);
1138 u16 status_code, const u8 *ie, size_t len)
1154 os_memcpy(mlme.im_optie, ie, le
1137 atheros_sta_auth(void *priv, const u8 *own_addr, const u8 *addr, u16 seq, u16 status_code, const u8 *ie, size_t len) argument
1174 atheros_sta_assoc(void *priv, const u8 *own_addr, const u8 *addr, int reassoc, u16 status_code, const u8 *ie, size_t len) argument
1217 struct ieee80211req_wpaie ie; local
2063 athr_wnm_tfs(struct atheros_driver_data *drv, const u8* peer, u8 *ie, u16 *len, enum wnm_oper oper) argument
[all...]
H A Ddriver_bsd.c500 struct ieee80211req_wpaie ie; local
507 memset(&ie, 0, sizeof(ie));
508 memcpy(ie.wpa_macaddr, addr, IEEE80211_ADDR_LEN);
509 if (get80211var(priv, IEEE80211_IOC_WPAIE, &ie, sizeof(ie)) < 0) {
513 iebuf = ie.wpa_ie;
514 ielen = ie.wpa_ie[1];
578 bsd_set_opt_ie(void *priv, const u8 *ie, size_t ie_len) argument
581 wpa_printf(MSG_DEBUG, "%s: set WPA+RSN ie (le
[all...]
H A Ddriver_test.c49 u8 *ie; member in struct:test_driver_bss
117 os_free(bss->ie);
478 u8 ie[512]; local
498 if (ielen > sizeof(ie))
499 ielen = sizeof(ie);
500 if (hexstr2bin(data, ie, ielen) < 0)
505 wpa_hexdump(MSG_MSGDUMP, "test_driver: scan IEs", ie, ielen);
509 event.rx_probe_req.ie = ie;
530 pos += wpa_snprintf_hex(pos, end - pos, bss->ie, bs
552 u8 ie[256], ssid[32]; local
1658 wpa_scan_get_ie(const struct wpa_scan_res *res, u8 ie) argument
[all...]
H A Ddriver_wext.c1107 u8 *ie; member in struct:wext_scan_data
1262 tmp = os_realloc(res->ie, res->ie_len + gend - gpos);
1266 res->ie = tmp;
1290 tmp = os_realloc(res->ie, res->ie_len + bytes);
1293 res->ie = tmp;
1305 tmp = os_realloc(res->ie, res->ie_len + bytes);
1308 res->ie = tmp;
1349 pos = data->ie;
1394 if (data->ie)
1395 os_memcpy(pos, data->ie, dat
1917 wpa_driver_wext_set_gen_ie(void *priv, const u8 *ie, size_t ie_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dtdls.c82 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs);
165 static u8 * wpa_add_ie(u8 *pos, const u8 *ie, size_t ie_len) argument
167 os_memcpy(pos, ie, ie_len);
1738 struct wpa_ie_data ie; local
1912 if (wpa_parse_wpa_ie_rsn(kde.rsn_ie, kde.rsn_ie_len, &ie) < 0) {
1918 cipher = ie.pairwise_cipher;
1928 if ((ie.capabilities &
2120 struct wpa_ie_data ie; local
2283 if (wpa_parse_wpa_ie_rsn(kde.rsn_ie, kde.rsn_ie_len, &ie) < 0) {
2289 cipher = ie
2549 wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs) argument
[all...]
H A Dwpa.c385 struct wpa_eapol_ie_parse ie; local
401 os_memset(&ie, 0, sizeof(ie));
407 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0)
409 if (ie.pmkid) {
411 "Authenticator", ie.pmkid, PMKID_LEN);
415 res = wpa_supplicant_get_pmk(sm, src_addr, ie.pmkid);
748 struct wpa_eapol_ie_parse *ie)
754 if (ie->igtk) {
759 if (ie
747 ieee80211w_set_keys(struct wpa_sm *sm, struct wpa_eapol_ie_parse *ie) argument
830 ft_validate_mdie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie, const u8 *assoc_resp_mdie) argument
861 ft_validate_ftie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie, const u8 *assoc_resp_ftie) argument
889 ft_validate_rsnie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument
925 wpa_supplicant_validate_ie_ft(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument
960 wpa_supplicant_validate_ie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument
1076 struct wpa_eapol_ie_parse ie; local
1195 struct wpa_eapol_ie_parse ie; local
2517 wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument
2552 wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument
2587 wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument
[all...]
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth.c707 struct wpa_ie_data ie; local
710 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 ||
711 ie.num_pmkid != 1 || ie.pmkid == NULL) {
717 os_memcpy(sm->sup_pmk_r1_name, ie.pmkid, PMKID_LEN);
H A Dwps_hostapd.c40 const u8 *ie, size_t ie_len,
1326 const u8 *ie, size_t ie_len,
1336 if (ieee802_11_parse_elems(ie, ie_len, &elems, 0) == ParseFailed) {
1348 wps_ie = ieee802_11_vendor_ie_concat(ie, ie_len, WPS_DEV_OUI_WFA);
1324 hostapd_wps_probe_req_rx(void *ctx, const u8 *addr, const u8 *da, const u8 *bssid, const u8 *ie, size_t ie_len, int ssi_signal) argument
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_atheros.c674 atheros_set_opt_ie(void *priv, const u8 *ie, size_t ie_len) argument
682 wpa_hexdump(MSG_DEBUG, "atheros: set_generic_elem", ie, ie_len);
685 drv->wpa_ie = wpabuf_alloc_copy(ie, ie_len);
688 os_memcpy(&(app_ie->app_buf[0]), ie, ie_len);
796 event.rx_probe_req.ie = mgmt->u.probe_req.variable;
1069 atheros_set_wps_ie(void *priv, const u8 *ie, size_t len, u32 frametype) argument
1077 wpa_hexdump(MSG_DEBUG, "atheros: IE", ie, len);
1082 os_memcpy(&(beac_ie->app_buf[0]), ie, len);
1138 u16 status_code, const u8 *ie, size_t len)
1154 os_memcpy(mlme.im_optie, ie, le
1137 atheros_sta_auth(void *priv, const u8 *own_addr, const u8 *addr, u16 seq, u16 status_code, const u8 *ie, size_t len) argument
1174 atheros_sta_assoc(void *priv, const u8 *own_addr, const u8 *addr, int reassoc, u16 status_code, const u8 *ie, size_t len) argument
1217 struct ieee80211req_wpaie ie; local
2063 athr_wnm_tfs(struct atheros_driver_data *drv, const u8* peer, u8 *ie, u16 *len, enum wnm_oper oper) argument
[all...]
H A Ddriver_bsd.c500 struct ieee80211req_wpaie ie; local
507 memset(&ie, 0, sizeof(ie));
508 memcpy(ie.wpa_macaddr, addr, IEEE80211_ADDR_LEN);
509 if (get80211var(priv, IEEE80211_IOC_WPAIE, &ie, sizeof(ie)) < 0) {
513 iebuf = ie.wpa_ie;
514 ielen = ie.wpa_ie[1];
578 bsd_set_opt_ie(void *priv, const u8 *ie, size_t ie_len) argument
581 wpa_printf(MSG_DEBUG, "%s: set WPA+RSN ie (le
[all...]
H A Ddriver_test.c49 u8 *ie; member in struct:test_driver_bss
117 os_free(bss->ie);
478 u8 ie[512]; local
498 if (ielen > sizeof(ie))
499 ielen = sizeof(ie);
500 if (hexstr2bin(data, ie, ielen) < 0)
505 wpa_hexdump(MSG_MSGDUMP, "test_driver: scan IEs", ie, ielen);
509 event.rx_probe_req.ie = ie;
530 pos += wpa_snprintf_hex(pos, end - pos, bss->ie, bs
552 u8 ie[256], ssid[32]; local
1658 wpa_scan_get_ie(const struct wpa_scan_res *res, u8 ie) argument
[all...]
H A Ddriver_wext.c1107 u8 *ie; member in struct:wext_scan_data
1262 tmp = os_realloc(res->ie, res->ie_len + gend - gpos);
1266 res->ie = tmp;
1290 tmp = os_realloc(res->ie, res->ie_len + bytes);
1293 res->ie = tmp;
1305 tmp = os_realloc(res->ie, res->ie_len + bytes);
1308 res->ie = tmp;
1349 pos = data->ie;
1394 if (data->ie)
1395 os_memcpy(pos, data->ie, dat
1917 wpa_driver_wext_set_gen_ie(void *priv, const u8 *ie, size_t ie_len) argument
[all...]
/external/wpa_supplicant_8/src/rsn_supp/
H A Dtdls.c82 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs);
165 static u8 * wpa_add_ie(u8 *pos, const u8 *ie, size_t ie_len) argument
167 os_memcpy(pos, ie, ie_len);
1738 struct wpa_ie_data ie; local
1912 if (wpa_parse_wpa_ie_rsn(kde.rsn_ie, kde.rsn_ie_len, &ie) < 0) {
1918 cipher = ie.pairwise_cipher;
1928 if ((ie.capabilities &
2120 struct wpa_ie_data ie; local
2283 if (wpa_parse_wpa_ie_rsn(kde.rsn_ie, kde.rsn_ie_len, &ie) < 0) {
2289 cipher = ie
2549 wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs) argument
[all...]
H A Dwpa.c385 struct wpa_eapol_ie_parse ie; local
401 os_memset(&ie, 0, sizeof(ie));
407 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0)
409 if (ie.pmkid) {
411 "Authenticator", ie.pmkid, PMKID_LEN);
415 res = wpa_supplicant_get_pmk(sm, src_addr, ie.pmkid);
748 struct wpa_eapol_ie_parse *ie)
754 if (ie->igtk) {
759 if (ie
747 ieee80211w_set_keys(struct wpa_sm *sm, struct wpa_eapol_ie_parse *ie) argument
830 ft_validate_mdie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie, const u8 *assoc_resp_mdie) argument
861 ft_validate_ftie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie, const u8 *assoc_resp_ftie) argument
889 ft_validate_rsnie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument
925 wpa_supplicant_validate_ie_ft(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument
960 wpa_supplicant_validate_ie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument
1076 struct wpa_eapol_ie_parse ie; local
1195 struct wpa_eapol_ie_parse ie; local
2517 wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument
2552 wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument
2587 wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/dbus/
H A Ddbus_new_handlers.c1867 * wpas_dbus_handler_add_blob - Store named binary blob (ie, for certificates)
1938 * wpas_dbus_handler_get_blob - Get named binary blob (ie, for certificates)
3903 const u8 *ie; local
3910 ie = wpa_bss_get_vendor_ie(res, WPA_IE_VENDOR_TYPE);
3911 if (ie) {
3912 if (wpa_parse_wpa_ie(ie, 2 + ie[1], &wpa_data) < 0) {
3938 const u8 *ie; local
3945 ie = wpa_bss_get_ie(res, WLAN_EID_RSN);
3946 if (ie) {
4282 wpas_dbus_signal_preq(struct wpa_supplicant *wpa_s, const u8 *addr, const u8 *dst, const u8 *bssid, const u8 *ie, size_t ie_len, u32 ssi_signal) argument
[all...]

Completed in 2955 milliseconds

1234567