/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | mesh.h | 17 int wpas_mesh_scan_result_text(const u8 *ies, size_t ies_len, char *buf, 25 const u8 *ies, size_t ie_len); 33 const u8 *ies, size_t ie_len) 31 wpa_mesh_notify_peer(struct wpa_supplicant *wpa_s, const u8 *addr, const u8 *ies, size_t ie_len) argument
|
H A D | sme.h | 20 const u8 *ies, size_t ies_len); 56 const u8 *ies, size_t ies_len) 55 sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md, const u8 *ies, size_t ies_len) argument
|
H A D | mesh.c | 50 if (ifmsh->mconf->ies) { 51 ifmsh->mconf->ies = NULL; 277 const u8 *ies, size_t ie_len) 284 if (ieee802_11_parse_elems(ies, ie_len, &elems, 0) == ParseFailed) { 353 params.ies = wpa_s->ifmsh->mconf->ies; 391 static int mesh_attr_text(const u8 *ies, size_t ies_len, char *buf, char *end) argument 398 if (ieee802_11_parse_elems(ies, ies_len, &elems, 0) == ParseFailed) 479 int wpas_mesh_scan_result_text(const u8 *ies, size_t ies_len, char *buf, argument 482 return mesh_attr_text(ies, ies_le 276 wpa_mesh_notify_peer(struct wpa_supplicant *wpa_s, const u8 *addr, const u8 *ies, size_t ie_len) argument [all...] |
H A D | mesh_mpm.c | 876 const u8 *ies; local 889 ies = mgmt->u.action.u.slf_prot_action.variable; 904 WPA_GET_LE16(ies)); 905 ies += 2; /* capability */ 909 wpa_printf(MSG_DEBUG, "MPM: AID 0x%x", WPA_GET_LE16(ies)); 910 ies += 2; /* aid */ 915 if (ieee802_11_parse_elems(ies, ie_len, &elems, 0) == ParseFailed) { 982 ies, ie_len)) {
|
H A D | wmm_ac.c | 421 wmm_ac_process_param_elem(struct wpa_supplicant *wpa_s, const u8 *ies, argument 430 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) { 431 wpa_printf(MSG_DEBUG, "WMM AC: could not parse assoc ies"); 466 static int wmm_ac_init(struct wpa_supplicant *wpa_s, const u8 *ies, argument 477 if (!ies) { 491 assoc_data = wmm_ac_process_param_elem(wpa_s, ies, ies_len); 536 void wmm_ac_notify_assoc(struct wpa_supplicant *wpa_s, const u8 *ies, argument 539 if (wmm_ac_init(wpa_s, ies, ies_len, wmm_params))
|
/external/wpa_supplicant_8/hostapd/src/p2p/ |
H A D | p2p_dev_disc.c | 313 struct wpabuf *ies; local 317 ies = p2p_build_probe_resp_ies(p2p, NULL, 0); 318 if (ies == NULL) 325 ies) < 0) { 328 wpabuf_free(ies);
|
/external/wpa_supplicant_8/src/p2p/ |
H A D | p2p_dev_disc.c | 313 struct wpabuf *ies; local 317 ies = p2p_build_probe_resp_ies(p2p, NULL, 0); 318 if (ies == NULL) 325 ies) < 0) { 328 wpabuf_free(ies);
|
/external/wpa_supplicant_8/wpa_supplicant/src/p2p/ |
H A D | p2p_dev_disc.c | 313 struct wpabuf *ies; local 317 ies = p2p_build_probe_resp_ies(p2p, NULL, 0); 318 if (ies == NULL) 325 ies) < 0) { 328 wpabuf_free(ies);
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | ieee802_11_common.c | 363 int ieee802_11_ie_count(const u8 *ies, size_t ies_len) argument 368 if (ies == NULL) 371 pos = ies; 372 end = ies + ies_len; 385 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len, argument 391 pos = ies; 392 end = ies + ies_len;
|
H A D | wpa_common.c | 327 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, argument 337 if (ies == NULL) 340 pos = ies; 341 end = ies + ies_len; 1258 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid) argument 1263 start = ies; 1264 end = ies + ies_len;
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211_scan.c | 436 const u8 * nl80211_get_ie(const u8 *ies, size_t ies_len, u8 ie) argument 440 if (ies == NULL) 443 pos = ies; 444 end = ies + ies_len;
|
H A D | driver_nl80211_event.c | 175 event.auth.ies = mgmt->u.auth.variable; 950 data.ft_ies.ies = nla_data(tb[NL80211_ATTR_IE]); 1117 data.mesh_peer.ies = nla_data(tb[NL80211_ATTR_IE]); 1136 u8 *ies = NULL; local 1139 ies = nla_data(tb[NL80211_ATTR_IE]); 1142 wpa_hexdump(MSG_DEBUG, "nl80211: Assoc Req IEs", ies, ies_len); 1143 drv_event_assoc(bss->ctx, addr, ies, ies_len, 0);
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ft.c | 54 * @ies: Association Response IEs or %NULL to clear FT parameters 55 * @ies_len: Length of ies buffer in octets 58 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) argument 65 if (wpa_ft_parse_ies(ies, ies_len, &ft) < 0) 371 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument 384 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 408 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 669 int wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, argument 678 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 686 if (wpa_ft_parse_ies(ies, ies_le [all...] |
H A D | wpa.h | 48 int (*update_ft_ies)(void *ctx, const u8 *md, const u8 *ies, 51 const u8 *ies, size_t ies_len); 348 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len); 350 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 355 int wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, 363 wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) argument 375 wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument 391 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument 401 void wpa_tdls_ap_ies(struct wpa_sm *sm, const u8 *ies, size_t len); 402 void wpa_tdls_assoc_resp_ies(struct wpa_sm *sm, const u8 *ies, size_ [all...] |
/external/wpa_supplicant_8/src/common/ |
H A D | ieee802_11_common.c | 363 int ieee802_11_ie_count(const u8 *ies, size_t ies_len) argument 368 if (ies == NULL) 371 pos = ies; 372 end = ies + ies_len; 385 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len, argument 391 pos = ies; 392 end = ies + ies_len;
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211_scan.c | 436 const u8 * nl80211_get_ie(const u8 *ies, size_t ies_len, u8 ie) argument 440 if (ies == NULL) 443 pos = ies; 444 end = ies + ies_len;
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ft.c | 54 * @ies: Association Response IEs or %NULL to clear FT parameters 55 * @ies_len: Length of ies buffer in octets 58 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) argument 65 if (wpa_ft_parse_ies(ies, ies_len, &ft) < 0) 371 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument 384 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 408 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 669 int wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, argument 678 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 686 if (wpa_ft_parse_ies(ies, ies_le [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | ieee802_11_common.c | 363 int ieee802_11_ie_count(const u8 *ies, size_t ies_len) argument 368 if (ies == NULL) 371 pos = ies; 372 end = ies + ies_len; 385 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len, argument 391 pos = ies; 392 end = ies + ies_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_nl80211_scan.c | 436 const u8 * nl80211_get_ie(const u8 *ies, size_t ies_len, u8 ie) argument 440 if (ies == NULL) 443 pos = ies; 444 end = ies + ies_len;
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ft.c | 54 * @ies: Association Response IEs or %NULL to clear FT parameters 55 * @ies_len: Length of ies buffer in octets 58 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) argument 65 if (wpa_ft_parse_ies(ies, ies_len, &ft) < 0) 371 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument 384 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 408 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 669 int wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, argument 678 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 686 if (wpa_ft_parse_ies(ies, ies_le [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | drv_callbacks.c | 648 const u8 *ies, size_t ies_len) 661 hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len); 697 rx_auth->auth_transaction, rx_auth->ies, 645 hostapd_notify_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument
|
H A D | ieee802_11.c | 252 const u8 *ies, size_t ies_len) 274 if (ies && ies_len) 275 os_memcpy(reply->u.auth.variable, ies, ies_len); 291 const u8 *ies, size_t ies_len) 297 status, ies, ies_len); 1263 const u8 *ies, size_t ies_len, int reassoc) 1271 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) { 1331 sta->p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, 1360 sta->wps_ie = ieee802_11_vendor_ie_concat(ies, ies_len, 1457 resp = wpa_ft_validate_reassoc(sta->wpa_sm, ies, 249 send_auth_reply(struct hostapd_data *hapd, const u8 *dst, const u8 *bssid, u16 auth_alg, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument 289 handle_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument 1262 check_assoc_ies(struct hostapd_data *hapd, struct sta_info *sta, const u8 *ies, size_t ies_len, int reassoc) argument 1564 send_assoc_resp(struct hostapd_data *hapd, struct sta_info *sta, u16 status_code, int reassoc, const u8 *ies, size_t ies_len) argument [all...] |
H A D | wpa_auth_ft.c | 305 const u8 *ies, size_t ies_len, 354 sm->ft_pending_req_ies = wpabuf_alloc_copy(ies, ies_len); 506 const u8 *ies, size_t ies_len) 514 ies, ies_len); 529 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) == 799 const u8 *ies, size_t ies_len, 820 ies, ies_len); 822 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 869 if (wpa_ft_pull_pmk_r1(sm, ies, ies_len, parse.rsn_pmkid) < 0) { 945 u16 auth_transaction, const u8 *ies, size_ 304 wpa_ft_pull_pmk_r1(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len, const u8 *pmk_r0_name) argument 504 wpa_ft_process_rdie(struct wpa_state_machine *sm, u8 *pos, u8 *end, u8 id, u8 descr_count, const u8 *ies, size_t ies_len) argument 798 wpa_ft_process_auth_req(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len, u8 **resp_ies, size_t *resp_ies_len) argument 944 wpa_ft_process_auth(struct wpa_state_machine *sm, const u8 *bssid, u16 auth_transaction, const u8 *ies, size_t ies_len, void (*cb)(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len), void *ctx) argument 986 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len) argument 1142 const u8 *ies; local 1210 wpa_ft_rrb_rx_request_cb(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | drv_callbacks.c | 648 const u8 *ies, size_t ies_len) 661 hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len); 697 rx_auth->auth_transaction, rx_auth->ies, 645 hostapd_notify_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | drv_callbacks.c | 648 const u8 *ies, size_t ies_len) 661 hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len); 697 rx_auth->auth_transaction, rx_auth->ies, 645 hostapd_notify_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument
|