/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | scan.c | 1381 const u8 *ie; local 1384 ie = wpa_scan_get_ie(res, WLAN_EID_SUPP_RATES); 1385 for (i = 0; ie && i < ie[1]; i++) { 1386 if ((ie[i + 2] & 0x7f) > rate) 1387 rate = ie[i + 2] & 0x7f; 1390 ie = wpa_scan_get_ie(res, WLAN_EID_EXT_SUPP_RATES); 1391 for (i = 0; ie && i < ie[1]; i++) { 1392 if ((ie[ 1409 wpa_scan_get_ie(const struct wpa_scan_res *res, u8 ie) argument [all...] |
H A D | sme.c | 147 const u8 *ie; local 291 ie = wpa_bss_get_ie(bss, WLAN_EID_MOBILITY_DOMAIN); 292 if (ie && ie[1] >= MOBILITY_DOMAIN_ID_LEN) 293 md = ie + 2; 294 wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0); 297 wpa_ft_prepare_auth_request(wpa_s->wpa, ie); 321 params.ie 1058 const u8 *ie; local 1193 const u8 *ie; local [all...] |
H A D | wpas_glue.c | 359 const u8 *ie; local 374 ie = wpa_bss_get_vendor_ie(curr, WPA_IE_VENDOR_TYPE); 375 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0)) 378 ie = wpa_bss_get_ie(curr, WLAN_EID_RSN); 379 if (wpa_sm_set_ap_rsn_ie(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0))
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_drv_ops.c | 336 u16 seq, u16 status, const u8 *ie, size_t len) 341 seq, status, ie, len); 346 int reassoc, u16 status, const u8 *ie, size_t len) 351 reassoc, status, ie, len); 335 hostapd_sta_auth(struct hostapd_data *hapd, const u8 *addr, u16 seq, u16 status, const u8 *ie, size_t len) argument 345 hostapd_sta_assoc(struct hostapd_data *hapd, const u8 *addr, int reassoc, u16 status, const u8 *ie, size_t len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.c | 195 static int wpa_ft_parse_ftie(const u8 *ie, size_t ie_len, argument 200 parse->ftie = ie; 203 pos = ie + sizeof(struct rsn_ftie); 204 end = ie + ie_len; 461 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu", 471 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version", 489 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much", 500 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 517 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)", 528 wpa_printf(MSG_DEBUG, "%s: ie coun [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_madwifi.c | 645 madwifi_set_opt_ie(void *priv, const u8 *ie, size_t ie_len) argument 727 event.rx_probe_req.ie = mgmt->u.probe_req.variable; 761 madwifi_set_wps_ie(void *priv, const u8 *ie, size_t len, u32 frametype) argument 773 memcpy(&(beac_ie->app_buf[0]), ie, len); 819 struct ieee80211req_wpaie ie; local 826 memset(&ie, 0, sizeof(ie)); 827 memcpy(ie.wpa_macaddr, addr, IEEE80211_ADDR_LEN); 828 if (set80211priv(drv, IEEE80211_IOCTL_GETWPAIE, &ie, sizeof(ie))) { [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.h | 117 int wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len); 120 int wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len); 121 int wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, size_t len); 204 static inline int wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, argument 217 static inline int wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, argument 223 static inline int wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, argument
|
/external/valgrind/main/coregrind/ |
H A D | m_transtab.c | 452 static void InEdge__init ( InEdge* ie ) 454 ie->from_sNo = -1; /* invalid */ 455 ie->from_tteNo = 0; 456 ie->from_offs = 0; 457 ie->to_fastEP = False; 523 void InEdgeArr__add ( InEdgeArr* iea, InEdge* ie ) 527 VG_(addToXA)(iea->var, ie); 540 VG_(addToXA)(iea->var, ie); 544 iea->fixed[iea->n_fixed++] = *ie; 807 InEdge ie; local 836 unchain_one( VexArch vex_arch, InEdge* ie, void* to_fastEPaddr, void* to_slowEPaddr ) argument 887 InEdge* ie = InEdgeArr__index(&here_tte->in_edges, i); local 917 InEdge* ie = InEdgeArr__index(&to_tte->in_edges, j); local [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.c | 707 struct wpa_ie_data ie; local 710 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 || 711 ie.num_pmkid != 1 || ie.pmkid == NULL) { 717 os_memcpy(sm->sup_pmk_r1_name, ie.pmkid, PMKID_LEN);
|
H A D | wps_hostapd.c | 40 const u8 *ie, size_t ie_len, 1326 const u8 *ie, size_t ie_len, 1336 if (ieee802_11_parse_elems(ie, ie_len, &elems, 0) == ParseFailed) { 1348 wps_ie = ieee802_11_vendor_ie_concat(ie, ie_len, WPS_DEV_OUI_WFA); 1324 hostapd_wps_probe_req_rx(void *ctx, const u8 *addr, const u8 *da, const u8 *bssid, const u8 *ie, size_t ie_len, int ssi_signal) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_atheros.c | 674 atheros_set_opt_ie(void *priv, const u8 *ie, size_t ie_len) argument 682 wpa_hexdump(MSG_DEBUG, "atheros: set_generic_elem", ie, ie_len); 685 drv->wpa_ie = wpabuf_alloc_copy(ie, ie_len); 688 os_memcpy(&(app_ie->app_buf[0]), ie, ie_len); 796 event.rx_probe_req.ie = mgmt->u.probe_req.variable; 1069 atheros_set_wps_ie(void *priv, const u8 *ie, size_t len, u32 frametype) argument 1077 wpa_hexdump(MSG_DEBUG, "atheros: IE", ie, len); 1082 os_memcpy(&(beac_ie->app_buf[0]), ie, len); 1138 u16 status_code, const u8 *ie, size_t len) 1154 os_memcpy(mlme.im_optie, ie, le 1137 atheros_sta_auth(void *priv, const u8 *own_addr, const u8 *addr, u16 seq, u16 status_code, const u8 *ie, size_t len) argument 1174 atheros_sta_assoc(void *priv, const u8 *own_addr, const u8 *addr, int reassoc, u16 status_code, const u8 *ie, size_t len) argument 1217 struct ieee80211req_wpaie ie; local 2063 athr_wnm_tfs(struct atheros_driver_data *drv, const u8* peer, u8 *ie, u16 *len, enum wnm_oper oper) argument [all...] |
H A D | driver_bsd.c | 500 struct ieee80211req_wpaie ie; local 507 memset(&ie, 0, sizeof(ie)); 508 memcpy(ie.wpa_macaddr, addr, IEEE80211_ADDR_LEN); 509 if (get80211var(priv, IEEE80211_IOC_WPAIE, &ie, sizeof(ie)) < 0) { 513 iebuf = ie.wpa_ie; 514 ielen = ie.wpa_ie[1]; 578 bsd_set_opt_ie(void *priv, const u8 *ie, size_t ie_len) argument 581 wpa_printf(MSG_DEBUG, "%s: set WPA+RSN ie (le [all...] |
H A D | driver_test.c | 49 u8 *ie; member in struct:test_driver_bss 117 os_free(bss->ie); 478 u8 ie[512]; local 498 if (ielen > sizeof(ie)) 499 ielen = sizeof(ie); 500 if (hexstr2bin(data, ie, ielen) < 0) 505 wpa_hexdump(MSG_MSGDUMP, "test_driver: scan IEs", ie, ielen); 509 event.rx_probe_req.ie = ie; 530 pos += wpa_snprintf_hex(pos, end - pos, bss->ie, bs 552 u8 ie[256], ssid[32]; local 1658 wpa_scan_get_ie(const struct wpa_scan_res *res, u8 ie) argument [all...] |
H A D | driver_wext.c | 1107 u8 *ie; member in struct:wext_scan_data 1262 tmp = os_realloc(res->ie, res->ie_len + gend - gpos); 1266 res->ie = tmp; 1290 tmp = os_realloc(res->ie, res->ie_len + bytes); 1293 res->ie = tmp; 1305 tmp = os_realloc(res->ie, res->ie_len + bytes); 1308 res->ie = tmp; 1349 pos = data->ie; 1394 if (data->ie) 1395 os_memcpy(pos, data->ie, dat 1917 wpa_driver_wext_set_gen_ie(void *priv, const u8 *ie, size_t ie_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | tdls.c | 82 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs); 165 static u8 * wpa_add_ie(u8 *pos, const u8 *ie, size_t ie_len) argument 167 os_memcpy(pos, ie, ie_len); 1738 struct wpa_ie_data ie; local 1912 if (wpa_parse_wpa_ie_rsn(kde.rsn_ie, kde.rsn_ie_len, &ie) < 0) { 1918 cipher = ie.pairwise_cipher; 1928 if ((ie.capabilities & 2120 struct wpa_ie_data ie; local 2283 if (wpa_parse_wpa_ie_rsn(kde.rsn_ie, kde.rsn_ie_len, &ie) < 0) { 2289 cipher = ie 2549 wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs) argument [all...] |
H A D | wpa.c | 385 struct wpa_eapol_ie_parse ie; local 401 os_memset(&ie, 0, sizeof(ie)); 407 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 409 if (ie.pmkid) { 411 "Authenticator", ie.pmkid, PMKID_LEN); 415 res = wpa_supplicant_get_pmk(sm, src_addr, ie.pmkid); 748 struct wpa_eapol_ie_parse *ie) 754 if (ie->igtk) { 759 if (ie 747 ieee80211w_set_keys(struct wpa_sm *sm, struct wpa_eapol_ie_parse *ie) argument 830 ft_validate_mdie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie, const u8 *assoc_resp_mdie) argument 861 ft_validate_ftie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie, const u8 *assoc_resp_ftie) argument 889 ft_validate_rsnie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument 925 wpa_supplicant_validate_ie_ft(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument 960 wpa_supplicant_validate_ie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument 1076 struct wpa_eapol_ie_parse ie; local 1195 struct wpa_eapol_ie_parse ie; local 2517 wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument 2552 wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument 2587 wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth.c | 707 struct wpa_ie_data ie; local 710 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 || 711 ie.num_pmkid != 1 || ie.pmkid == NULL) { 717 os_memcpy(sm->sup_pmk_r1_name, ie.pmkid, PMKID_LEN);
|
H A D | wps_hostapd.c | 40 const u8 *ie, size_t ie_len, 1326 const u8 *ie, size_t ie_len, 1336 if (ieee802_11_parse_elems(ie, ie_len, &elems, 0) == ParseFailed) { 1348 wps_ie = ieee802_11_vendor_ie_concat(ie, ie_len, WPS_DEV_OUI_WFA); 1324 hostapd_wps_probe_req_rx(void *ctx, const u8 *addr, const u8 *da, const u8 *bssid, const u8 *ie, size_t ie_len, int ssi_signal) argument
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_atheros.c | 674 atheros_set_opt_ie(void *priv, const u8 *ie, size_t ie_len) argument 682 wpa_hexdump(MSG_DEBUG, "atheros: set_generic_elem", ie, ie_len); 685 drv->wpa_ie = wpabuf_alloc_copy(ie, ie_len); 688 os_memcpy(&(app_ie->app_buf[0]), ie, ie_len); 796 event.rx_probe_req.ie = mgmt->u.probe_req.variable; 1069 atheros_set_wps_ie(void *priv, const u8 *ie, size_t len, u32 frametype) argument 1077 wpa_hexdump(MSG_DEBUG, "atheros: IE", ie, len); 1082 os_memcpy(&(beac_ie->app_buf[0]), ie, len); 1138 u16 status_code, const u8 *ie, size_t len) 1154 os_memcpy(mlme.im_optie, ie, le 1137 atheros_sta_auth(void *priv, const u8 *own_addr, const u8 *addr, u16 seq, u16 status_code, const u8 *ie, size_t len) argument 1174 atheros_sta_assoc(void *priv, const u8 *own_addr, const u8 *addr, int reassoc, u16 status_code, const u8 *ie, size_t len) argument 1217 struct ieee80211req_wpaie ie; local 2063 athr_wnm_tfs(struct atheros_driver_data *drv, const u8* peer, u8 *ie, u16 *len, enum wnm_oper oper) argument [all...] |
H A D | driver_bsd.c | 500 struct ieee80211req_wpaie ie; local 507 memset(&ie, 0, sizeof(ie)); 508 memcpy(ie.wpa_macaddr, addr, IEEE80211_ADDR_LEN); 509 if (get80211var(priv, IEEE80211_IOC_WPAIE, &ie, sizeof(ie)) < 0) { 513 iebuf = ie.wpa_ie; 514 ielen = ie.wpa_ie[1]; 578 bsd_set_opt_ie(void *priv, const u8 *ie, size_t ie_len) argument 581 wpa_printf(MSG_DEBUG, "%s: set WPA+RSN ie (le [all...] |
H A D | driver_test.c | 49 u8 *ie; member in struct:test_driver_bss 117 os_free(bss->ie); 478 u8 ie[512]; local 498 if (ielen > sizeof(ie)) 499 ielen = sizeof(ie); 500 if (hexstr2bin(data, ie, ielen) < 0) 505 wpa_hexdump(MSG_MSGDUMP, "test_driver: scan IEs", ie, ielen); 509 event.rx_probe_req.ie = ie; 530 pos += wpa_snprintf_hex(pos, end - pos, bss->ie, bs 552 u8 ie[256], ssid[32]; local 1658 wpa_scan_get_ie(const struct wpa_scan_res *res, u8 ie) argument [all...] |
H A D | driver_wext.c | 1107 u8 *ie; member in struct:wext_scan_data 1262 tmp = os_realloc(res->ie, res->ie_len + gend - gpos); 1266 res->ie = tmp; 1290 tmp = os_realloc(res->ie, res->ie_len + bytes); 1293 res->ie = tmp; 1305 tmp = os_realloc(res->ie, res->ie_len + bytes); 1308 res->ie = tmp; 1349 pos = data->ie; 1394 if (data->ie) 1395 os_memcpy(pos, data->ie, dat 1917 wpa_driver_wext_set_gen_ie(void *priv, const u8 *ie, size_t ie_len) argument [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | tdls.c | 82 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs); 165 static u8 * wpa_add_ie(u8 *pos, const u8 *ie, size_t ie_len) argument 167 os_memcpy(pos, ie, ie_len); 1738 struct wpa_ie_data ie; local 1912 if (wpa_parse_wpa_ie_rsn(kde.rsn_ie, kde.rsn_ie_len, &ie) < 0) { 1918 cipher = ie.pairwise_cipher; 1928 if ((ie.capabilities & 2120 struct wpa_ie_data ie; local 2283 if (wpa_parse_wpa_ie_rsn(kde.rsn_ie, kde.rsn_ie_len, &ie) < 0) { 2289 cipher = ie 2549 wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs) argument [all...] |
H A D | wpa.c | 385 struct wpa_eapol_ie_parse ie; local 401 os_memset(&ie, 0, sizeof(ie)); 407 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 409 if (ie.pmkid) { 411 "Authenticator", ie.pmkid, PMKID_LEN); 415 res = wpa_supplicant_get_pmk(sm, src_addr, ie.pmkid); 748 struct wpa_eapol_ie_parse *ie) 754 if (ie->igtk) { 759 if (ie 747 ieee80211w_set_keys(struct wpa_sm *sm, struct wpa_eapol_ie_parse *ie) argument 830 ft_validate_mdie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie, const u8 *assoc_resp_mdie) argument 861 ft_validate_ftie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie, const u8 *assoc_resp_ftie) argument 889 ft_validate_rsnie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument 925 wpa_supplicant_validate_ie_ft(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument 960 wpa_supplicant_validate_ie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument 1076 struct wpa_eapol_ie_parse ie; local 1195 struct wpa_eapol_ie_parse ie; local 2517 wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument 2552 wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument 2587 wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers.c | 1867 * wpas_dbus_handler_add_blob - Store named binary blob (ie, for certificates) 1938 * wpas_dbus_handler_get_blob - Get named binary blob (ie, for certificates) 3903 const u8 *ie; local 3910 ie = wpa_bss_get_vendor_ie(res, WPA_IE_VENDOR_TYPE); 3911 if (ie) { 3912 if (wpa_parse_wpa_ie(ie, 2 + ie[1], &wpa_data) < 0) { 3938 const u8 *ie; local 3945 ie = wpa_bss_get_ie(res, WLAN_EID_RSN); 3946 if (ie) { 4282 wpas_dbus_signal_preq(struct wpa_supplicant *wpa_s, const u8 *addr, const u8 *dst, const u8 *bssid, const u8 *ie, size_t ie_len, u32 ssi_signal) argument [all...] |