/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_drv_ops.c | 336 u16 seq, u16 status, const u8 *ie, size_t len) 341 seq, status, ie, len); 346 int reassoc, u16 status, const u8 *ie, size_t len) 351 reassoc, status, ie, len); 335 hostapd_sta_auth(struct hostapd_data *hapd, const u8 *addr, u16 seq, u16 status, const u8 *ie, size_t len) argument 345 hostapd_sta_assoc(struct hostapd_data *hapd, const u8 *addr, int reassoc, u16 status, const u8 *ie, size_t len) argument
|
H A D | beacon.c | 256 const u8 *ie; local 259 ie = wpa_auth_get_wpa_ie(hapd->wpa_auth, &ielen); 260 if (ie == NULL || ielen > len) 263 os_memcpy(eid, ie, ielen); 509 const u8 *ie; local 516 ie = mgmt->u.probe_req.variable; 524 ie, ie_len, ssi_signal) > 0) 530 if (ieee802_11_parse_elems(ie, ie_len, &elems, 0) == ParseFailed) { 546 wps = ieee802_11_vendor_ie_concat(ie, ie_len, WPS_DEV_OUI_WFA); 559 p2p = ieee802_11_vendor_ie_concat(ie, ie_le [all...] |
H A D | drv_callbacks.c | 43 const u8 *ie; local 72 ie = elems.wps_ie - 2; 76 ie = elems.rsn_ie - 2; 80 ie = elems.wpa_ie - 2; 85 ie = elems.osen - 2; 90 ie = NULL; 161 if (ie == NULL || ielen == 0) { 176 if (hapd->conf->wps_state && ie[0] == 0xdd && ie[1] >= 4 && 177 os_memcmp(ie 525 hostapd_probe_req_rx(struct hostapd_data *hapd, const u8 *sa, const u8 *da, const u8 *bssid, const u8 *ie, size_t ie_len, int ssi_signal) argument [all...] |
H A D | utils.c | 20 const u8 *ie, size_t ie_len, 17 hostapd_register_probereq_cb(struct hostapd_data *hapd, int (*cb)(void *ctx, const u8 *sa, const u8 *da, const u8 *bssid, const u8 *ie, size_t ie_len, int ssi_signal), void *ctx) argument
|
H A D | wpa_auth.c | 707 struct wpa_ie_data ie; local 710 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 || 711 ie.num_pmkid != 1 || ie.pmkid == NULL) { 717 os_memcpy(sm->sup_pmk_r1_name, ie.pmkid, PMKID_LEN);
|
H A D | wpa_auth_ie.c | 734 * @ie: Pointer to parsed IE data 738 struct wpa_eapol_ie_parse *ie) 747 ie->wpa_ie = pos; 748 ie->wpa_ie_len = pos[1] + 2; 753 ie->osen = pos; 754 ie->osen_len = pos[1] + 2; 761 ie->pmkid = pos + 2 + RSN_SELECTOR_LEN; 767 ie->gtk = pos + 2 + RSN_SELECTOR_LEN; 768 ie->gtk_len = pos[1] - RSN_SELECTOR_LEN; 774 ie 737 wpa_parse_generic(const u8 *pos, const u8 *end, struct wpa_eapol_ie_parse *ie) argument 848 wpa_parse_kde_ies(const u8 *buf, size_t len, struct wpa_eapol_ie_parse *ie) argument [all...] |
H A D | wps_hostapd.c | 40 const u8 *ie, size_t ie_len, 1326 const u8 *ie, size_t ie_len, 1336 if (ieee802_11_parse_elems(ie, ie_len, &elems, 0) == ParseFailed) { 1348 wps_ie = ieee802_11_vendor_ie_concat(ie, ie_len, WPS_DEV_OUI_WFA); 1324 hostapd_wps_probe_req_rx(void *ctx, const u8 *addr, const u8 *da, const u8 *bssid, const u8 *ie, size_t ie_len, int ssi_signal) argument
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | ieee802_11_common.c | 340 const u8 *end, *pos, *ie; local 344 ie = NULL; 351 ie = pos; 357 if (ie == NULL)
|
H A D | wpa_common.c | 195 static int wpa_ft_parse_ftie(const u8 *ie, size_t ie_len, argument 200 parse->ftie = ie; 203 pos = ie + sizeof(struct rsn_ftie); 204 end = ie + ie_len; 461 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu", 471 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version", 489 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much", 500 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " 517 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)", 528 wpa_printf(MSG_DEBUG, "%s: ie coun [all...] |
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver.h | 390 const u8 *ie; member in struct:wpa_driver_auth_params 2634 * @ie: assoc response ie buffer 2635 * @len: ie buffer length 2642 int reassoc, u16 status, const u8 *ie, size_t len); 2651 * @ie: authentication frame ie buffer 2652 * @len: ie buffer length 2658 u16 seq, u16 status, const u8 *ie, size_t len); 2664 * @tspec_ie: tspec ie buffe 3644 const u8 *ie; member in struct:wpa_event_data::disassoc_info 3675 const u8 *ie; member in struct:wpa_event_data::deauth_info 3959 const u8 *ie; member in struct:wpa_event_data::rx_probe_req 4161 drv_event_assoc(void *ctx, const u8 *addr, const u8 *ie, size_t ielen, int reassoc) argument [all...] |
H A D | driver_atheros.c | 674 atheros_set_opt_ie(void *priv, const u8 *ie, size_t ie_len) argument 682 wpa_hexdump(MSG_DEBUG, "atheros: set_generic_elem", ie, ie_len); 685 drv->wpa_ie = wpabuf_alloc_copy(ie, ie_len); 688 os_memcpy(&(app_ie->app_buf[0]), ie, ie_len); 796 event.rx_probe_req.ie = mgmt->u.probe_req.variable; 1069 atheros_set_wps_ie(void *priv, const u8 *ie, size_t len, u32 frametype) argument 1077 wpa_hexdump(MSG_DEBUG, "atheros: IE", ie, len); 1082 os_memcpy(&(beac_ie->app_buf[0]), ie, len); 1138 u16 status_code, const u8 *ie, size_t len) 1154 os_memcpy(mlme.im_optie, ie, le 1137 atheros_sta_auth(void *priv, const u8 *own_addr, const u8 *addr, u16 seq, u16 status_code, const u8 *ie, size_t len) argument 1174 atheros_sta_assoc(void *priv, const u8 *own_addr, const u8 *addr, int reassoc, u16 status_code, const u8 *ie, size_t len) argument 1217 struct ieee80211req_wpaie ie; local 2063 athr_wnm_tfs(struct atheros_driver_data *drv, const u8* peer, u8 *ie, u16 *len, enum wnm_oper oper) argument [all...] |
H A D | driver_bsd.c | 500 struct ieee80211req_wpaie ie; local 507 memset(&ie, 0, sizeof(ie)); 508 memcpy(ie.wpa_macaddr, addr, IEEE80211_ADDR_LEN); 509 if (get80211var(priv, IEEE80211_IOC_WPAIE, &ie, sizeof(ie)) < 0) { 513 iebuf = ie.wpa_ie; 514 ielen = ie.wpa_ie[1]; 578 bsd_set_opt_ie(void *priv, const u8 *ie, size_t ie_len) argument 581 wpa_printf(MSG_DEBUG, "%s: set WPA+RSN ie (le [all...] |
H A D | driver_madwifi.c | 645 madwifi_set_opt_ie(void *priv, const u8 *ie, size_t ie_len) argument 727 event.rx_probe_req.ie = mgmt->u.probe_req.variable; 761 madwifi_set_wps_ie(void *priv, const u8 *ie, size_t len, u32 frametype) argument 773 memcpy(&(beac_ie->app_buf[0]), ie, len); 819 struct ieee80211req_wpaie ie; local 826 memset(&ie, 0, sizeof(ie)); 827 memcpy(ie.wpa_macaddr, addr, IEEE80211_ADDR_LEN); 828 if (set80211priv(drv, IEEE80211_IOCTL_GETWPAIE, &ie, sizeof(ie))) { [all...] |
H A D | driver_ndis.c | 781 static const u8 * wpa_scan_get_ie(const struct wpa_scan_res *res, u8 ie) argument 791 if (pos[0] == ie)
|
H A D | driver_nl80211.c | 1965 event.disassoc_info.ie = mgmt->u.disassoc.variable; 1988 event.deauth_info.ie = mgmt->u.deauth.variable; 5412 static const u8 * nl80211_get_ie(const u8 *ies, size_t ies_len, u8 ie) argument 5425 if (pos[0] == ie) 5435 const u8 *ie, size_t ie_len) 5443 ssid = nl80211_get_ie(ie, ie_len, WLAN_EID_SSID); 5480 const u8 *ie, *beacon_ie; local 5520 ie = nla_data(bss[NL80211_BSS_INFORMATION_ELEMENTS]); 5523 ie = NULL; 5534 if (nl80211_scan_filtered(_arg->drv, ie 5434 nl80211_scan_filtered(struct wpa_driver_nl80211_data *drv, const u8 *ie, size_t ie_len) argument [all...] |
H A D | driver_test.c | 49 u8 *ie; member in struct:test_driver_bss 117 os_free(bss->ie); 478 u8 ie[512]; local 498 if (ielen > sizeof(ie)) 499 ielen = sizeof(ie); 500 if (hexstr2bin(data, ie, ielen) < 0) 505 wpa_hexdump(MSG_MSGDUMP, "test_driver: scan IEs", ie, ielen); 509 event.rx_probe_req.ie = ie; 530 pos += wpa_snprintf_hex(pos, end - pos, bss->ie, bs 552 u8 ie[256], ssid[32]; local 1658 wpa_scan_get_ie(const struct wpa_scan_res *res, u8 ie) argument [all...] |
H A D | driver_wext.c | 1107 u8 *ie; member in struct:wext_scan_data 1262 tmp = os_realloc(res->ie, res->ie_len + gend - gpos); 1266 res->ie = tmp; 1290 tmp = os_realloc(res->ie, res->ie_len + bytes); 1293 res->ie = tmp; 1305 tmp = os_realloc(res->ie, res->ie_len + bytes); 1308 res->ie = tmp; 1349 pos = data->ie; 1394 if (data->ie) 1395 os_memcpy(pos, data->ie, dat 1917 wpa_driver_wext_set_gen_ie(void *priv, const u8 *ie, size_t ie_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p.c | 1859 const u8 *ie, size_t ie_len) 1865 if (p2p_parse_ies(ie, ie_len, &msg) < 0 || msg.p2p_attributes == NULL) 2061 const u8 *bssid, const u8 *ie, size_t ie_len) 2076 if (ieee802_11_parse_elems((u8 *) ie, ie_len, &elems, 0) == 2120 if (p2p_parse_ies(ie, ie_len, &msg) < 0) { 2216 const u8 *bssid, const u8 *ie, size_t ie_len) 2220 p2p_add_dev_from_probe_req(p2p, addr, ie, ie_len); 2222 res = p2p_reply_probe(p2p, addr, dst, bssid, ie, ie_len); 4048 const u8 *ie, size_t ie_len) 4052 if (bssid == NULL || ie 1858 p2p_add_dev_from_probe_req(struct p2p_data *p2p, const u8 *addr, const u8 *ie, size_t ie_len) argument 2060 p2p_reply_probe(struct p2p_data *p2p, const u8 *addr, const u8 *dst, const u8 *bssid, const u8 *ie, size_t ie_len) argument 2215 p2p_probe_req_rx(struct p2p_data *p2p, const u8 *addr, const u8 *dst, const u8 *bssid, const u8 *ie, size_t ie_len) argument 4047 p2p_deauth_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code, const u8 *ie, size_t ie_len) argument 4071 p2p_disassoc_notif(struct p2p_data *p2p, const u8 *bssid, u16 reason_code, const u8 *ie, size_t ie_len) argument 4433 p2p_set_wfd_ie_beacon(struct p2p_data *p2p, struct wpabuf *ie) argument 4442 p2p_set_wfd_ie_probe_req(struct p2p_data *p2p, struct wpabuf *ie) argument 4450 p2p_set_wfd_ie_probe_resp(struct p2p_data *p2p, struct wpabuf *ie) argument 4459 p2p_set_wfd_ie_assoc_req(struct p2p_data *p2p, struct wpabuf *ie) argument 4467 p2p_set_wfd_ie_invitation(struct p2p_data *p2p, struct wpabuf *ie) argument 4475 p2p_set_wfd_ie_prov_disc_req(struct p2p_data *p2p, struct wpabuf *ie) argument 4483 p2p_set_wfd_ie_prov_disc_resp(struct p2p_data *p2p, struct wpabuf *ie) argument 4491 p2p_set_wfd_ie_go_neg(struct p2p_data *p2p, struct wpabuf *ie) argument [all...] |
H A D | p2p_group.c | 127 static void p2p_client_info(struct wpabuf *ie, struct p2p_group_member *m) argument 131 if (wpabuf_tailroom(ie) < wpabuf_len(m->client_info) + 1) 133 wpabuf_put_buf(ie, m->client_info); 138 struct wpabuf *ie) 159 p2p_buf_add_capability(ie, dev_capab, group_capab); 163 static void p2p_group_add_noa(struct wpabuf *ie, struct wpabuf *noa) argument 168 wpabuf_put_u8(ie, P2P_ATTR_NOTICE_OF_ABSENCE); 169 wpabuf_put_le16(ie, wpabuf_len(noa)); 170 wpabuf_put_buf(ie, noa); 176 struct wpabuf *ie; local 137 p2p_group_add_common_ies(struct p2p_group *group, struct wpabuf *ie) argument 209 struct wpabuf *ie; local 256 struct wpabuf *ie; local 442 struct wpabuf *p2p_subelems, *ie; local 599 p2p_group_notif_assoc(struct p2p_group *group, const u8 *addr, const u8 *ie, size_t len) argument [all...] |
H A D | p2p_invitation.c | 34 struct wpabuf *ie; local 38 ie = p2p_group_get_wfd_ie(g); 39 if (ie) { 40 wfd_ie = ie; 122 struct wpabuf *ie; local 126 ie = p2p_group_get_wfd_ie(g); 127 if (ie) { 128 wfd_ie = ie;
|
H A D | p2p_pd.c | 106 struct wpabuf *ie; local 110 ie = p2p_group_get_wfd_ie(g); 111 if (ie) { 112 wfd_ie = ie;
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | peerkey.c | 25 static u8 * wpa_add_ie(u8 *pos, const u8 *ie, size_t ie_len) argument 27 os_memcpy(pos, ie, ie_len); 180 struct wpa_ie_data ie; local 215 if (wpa_parse_wpa_ie_rsn(kde.rsn_ie, kde.rsn_ie_len, &ie) < 0) { 220 cipher = wpa_pick_pairwise_cipher(ie.pairwise_cipher & 244 if (ie.key_mgmt & (WPA_KEY_MGMT_IEEE8021X_SHA256 | 465 struct wpa_ie_data ie; local 470 wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0) { 493 cipher = wpa_pick_pairwise_cipher(ie.pairwise_cipher & 659 struct wpa_eapol_ie_parse ie; local 987 struct wpa_ie_data ie; local [all...] |
H A D | preauth.c | 444 struct wpa_ie_data ie; local 454 if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ie)) 459 !(ie.capabilities & WPA_CAPABILITY_PREAUTH))) 464 ie.capabilities & WPA_CAPABILITY_PREAUTH);
|
H A D | tdls.c | 82 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs); 165 static u8 * wpa_add_ie(u8 *pos, const u8 *ie, size_t ie_len) argument 167 os_memcpy(pos, ie, ie_len); 1738 struct wpa_ie_data ie; local 1912 if (wpa_parse_wpa_ie_rsn(kde.rsn_ie, kde.rsn_ie_len, &ie) < 0) { 1918 cipher = ie.pairwise_cipher; 1928 if ((ie.capabilities & 2120 struct wpa_ie_data ie; local 2283 if (wpa_parse_wpa_ie_rsn(kde.rsn_ie, kde.rsn_ie_len, &ie) < 0) { 2289 cipher = ie 2549 wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs) argument [all...] |
H A D | wpa.c | 385 struct wpa_eapol_ie_parse ie; local 401 os_memset(&ie, 0, sizeof(ie)); 407 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) 409 if (ie.pmkid) { 411 "Authenticator", ie.pmkid, PMKID_LEN); 415 res = wpa_supplicant_get_pmk(sm, src_addr, ie.pmkid); 748 struct wpa_eapol_ie_parse *ie) 754 if (ie->igtk) { 759 if (ie 747 ieee80211w_set_keys(struct wpa_sm *sm, struct wpa_eapol_ie_parse *ie) argument 830 ft_validate_mdie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie, const u8 *assoc_resp_mdie) argument 861 ft_validate_ftie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie, const u8 *assoc_resp_ftie) argument 889 ft_validate_rsnie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument 925 wpa_supplicant_validate_ie_ft(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument 960 wpa_supplicant_validate_ie(struct wpa_sm *sm, const unsigned char *src_addr, struct wpa_eapol_ie_parse *ie) argument 1076 struct wpa_eapol_ie_parse ie; local 1195 struct wpa_eapol_ie_parse ie; local 2517 wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument 2552 wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument 2587 wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, size_t len) argument [all...] |