/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | sme.h | 20 const u8 *ies, size_t ies_len); 56 const u8 *ies, size_t ies_len) 55 sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md, const u8 *ies, size_t ies_len) argument
|
H A D | mesh.c | 449 static int mesh_attr_text(const u8 *ies, size_t ies_len, char *buf, char *end) argument 456 if (ieee802_11_parse_elems(ies, ies_len, &elems, 0) == ParseFailed) 537 int wpas_mesh_scan_result_text(const u8 *ies, size_t ies_len, char *buf, argument 540 return mesh_attr_text(ies, ies_len, buf, end);
|
H A D | wmm_ac.c | 422 size_t ies_len) 430 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) { 467 size_t ies_len, const struct wmm_params *wmm_params) 491 assoc_data = wmm_ac_process_param_elem(wpa_s, ies, ies_len); 537 size_t ies_len, const struct wmm_params *wmm_params) 539 if (wmm_ac_init(wpa_s, ies, ies_len, wmm_params)) 421 wmm_ac_process_param_elem(struct wpa_supplicant *wpa_s, const u8 *ies, size_t ies_len) argument 466 wmm_ac_init(struct wpa_supplicant *wpa_s, const u8 *ies, size_t ies_len, const struct wmm_params *wmm_params) argument 536 wmm_ac_notify_assoc(struct wpa_supplicant *wpa_s, const u8 *ies, size_t ies_len, const struct wmm_params *wmm_params) argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ft.c | 55 * @ies_len: Length of ies buffer in octets 58 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) argument 65 if (wpa_ft_parse_ies(ies, ies_len, &ft) < 0) 369 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument 382 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 406 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 668 size_t ies_len, const u8 *src_addr) 676 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 684 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 667 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len, const u8 *src_addr) argument
|
H A D | wpa.h | 49 size_t ies_len); 51 const u8 *ies, size_t ies_len); 351 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len); 353 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 359 size_t ies_len, const u8 *src_addr); 366 wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) argument 378 wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument 394 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument
|
H A D | wpa_i.h | 235 const u8 *ies, size_t ies_len) 238 return sm->ctx->update_ft_ies(sm->ctx->ctx, md, ies, ies_len); 244 const u8 *ies, size_t ies_len) 248 ies, ies_len); 234 wpa_sm_update_ft_ies(struct wpa_sm *sm, const u8 *md, const u8 *ies, size_t ies_len) argument 242 wpa_sm_send_ft_action(struct wpa_sm *sm, u8 action, const u8 *target_ap, const u8 *ies, size_t ies_len) argument
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ft.c | 55 * @ies_len: Length of ies buffer in octets 58 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) argument 65 if (wpa_ft_parse_ies(ies, ies_len, &ft) < 0) 369 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument 382 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 406 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 668 size_t ies_len, const u8 *src_addr) 676 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 684 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 667 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len, const u8 *src_addr) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ft.c | 55 * @ies_len: Length of ies buffer in octets 58 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) argument 65 if (wpa_ft_parse_ies(ies, ies_len, &ft) < 0) 369 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, argument 382 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 406 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 668 size_t ies_len, const u8 *src_addr) 676 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); 684 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 667 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len, const u8 *src_addr) argument
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | ieee802_11_common.c | 399 int ieee802_11_ie_count(const u8 *ies, size_t ies_len) argument 408 end = ies + ies_len; 421 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len, argument 428 end = ies + ies_len; 445 buf = wpabuf_alloc(ies_len); 1128 size_t ies_len) 1132 while (ies_buf && ies_len >= 2 && 1136 if (len > ies_len) { 1138 ies_buf, ies_len); 1149 ies_len 1127 mb_ies_info_by_ies(struct mb_ies_info *info, const u8 *ies_buf, size_t ies_len) argument [all...] |
H A D | privsep_commands.h | 100 size_t ies_len; member in struct:privsep_event_auth 101 /* followed by ies_len bytes of ies */
|
H A D | wpa_common.c | 342 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, argument 356 end = ies + ies_len; 1285 int wpa_insert_pmkid(u8 *ies, size_t *ies_len, const u8 *pmkid) argument 1291 end = ies + *ies_len; 1379 *ies_len += added;
|
/external/wpa_supplicant_8/src/common/ |
H A D | ieee802_11_common.c | 399 int ieee802_11_ie_count(const u8 *ies, size_t ies_len) argument 408 end = ies + ies_len; 421 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len, argument 428 end = ies + ies_len; 445 buf = wpabuf_alloc(ies_len); 1128 size_t ies_len) 1132 while (ies_buf && ies_len >= 2 && 1136 if (len > ies_len) { 1138 ies_buf, ies_len); 1149 ies_len 1127 mb_ies_info_by_ies(struct mb_ies_info *info, const u8 *ies_buf, size_t ies_len) argument [all...] |
H A D | privsep_commands.h | 100 size_t ies_len; member in struct:privsep_event_auth 101 /* followed by ies_len bytes of ies */
|
H A D | wpa_common.c | 342 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, argument 356 end = ies + ies_len; 1285 int wpa_insert_pmkid(u8 *ies, size_t *ies_len, const u8 *pmkid) argument 1291 end = ies + *ies_len; 1379 *ies_len += added;
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | ieee802_11_common.c | 399 int ieee802_11_ie_count(const u8 *ies, size_t ies_len) argument 408 end = ies + ies_len; 421 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len, argument 428 end = ies + ies_len; 445 buf = wpabuf_alloc(ies_len); 1128 size_t ies_len) 1132 while (ies_buf && ies_len >= 2 && 1136 if (len > ies_len) { 1138 ies_buf, ies_len); 1149 ies_len 1127 mb_ies_info_by_ies(struct mb_ies_info *info, const u8 *ies_buf, size_t ies_len) argument [all...] |
H A D | privsep_commands.h | 100 size_t ies_len; member in struct:privsep_event_auth 101 /* followed by ies_len bytes of ies */
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | drv_callbacks.c | 690 const u8 *ies, size_t ies_len) 703 hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len); 740 rx_auth->ies_len, 687 hostapd_notify_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument
|
H A D | ieee802_11.c | 258 const u8 *ies, size_t ies_len) 265 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; 281 if (ies && ies_len) 282 os_memcpy(reply->u.auth.variable, ies, ies_len); 287 resp, (unsigned long) ies_len); 302 const u8 *ies, size_t ies_len) 309 auth_transaction, status, ies, ies_len); 1446 const u8 *ies, size_t ies_len, int reassoc) 1454 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) { 1516 sta->p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, 255 send_auth_reply(struct hostapd_data *hapd, const u8 *dst, const u8 *bssid, u16 auth_alg, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument 300 handle_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument 1445 check_assoc_ies(struct hostapd_data *hapd, struct sta_info *sta, const u8 *ies, size_t ies_len, int reassoc) argument 1828 send_assoc_resp(struct hostapd_data *hapd, struct sta_info *sta, u16 status_code, int reassoc, const u8 *ies, size_t ies_len) argument [all...] |
H A D | wpa_auth_ft.c | 305 const u8 *ies, size_t ies_len, 354 sm->ft_pending_req_ies = wpabuf_alloc_copy(ies, ies_len); 506 const u8 *ies, size_t ies_len) 514 ies, ies_len); 529 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) == 799 const u8 *ies, size_t ies_len, 820 ies, ies_len); 822 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 869 if (wpa_ft_pull_pmk_r1(sm, ies, ies_len, parse.rsn_pmkid) < 0) { 945 u16 auth_transaction, const u8 *ies, size_t ies_len, 304 wpa_ft_pull_pmk_r1(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len, const u8 *pmk_r0_name) argument 504 wpa_ft_process_rdie(struct wpa_state_machine *sm, u8 *pos, u8 *end, u8 id, u8 descr_count, const u8 *ies, size_t ies_len) argument 798 wpa_ft_process_auth_req(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len, u8 **resp_ies, size_t *resp_ies_len) argument 944 wpa_ft_process_auth(struct wpa_state_machine *sm, const u8 *bssid, u16 auth_transaction, const u8 *ies, size_t ies_len, void (*cb)(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len), void *ctx) argument 986 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len) argument 1143 size_t ies_len; local 1210 wpa_ft_rrb_rx_request_cb(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | drv_callbacks.c | 690 const u8 *ies, size_t ies_len) 703 hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len); 740 rx_auth->ies_len, 687 hostapd_notify_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument
|
H A D | ieee802_11.c | 258 const u8 *ies, size_t ies_len) 265 rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len; 281 if (ies && ies_len) 282 os_memcpy(reply->u.auth.variable, ies, ies_len); 287 resp, (unsigned long) ies_len); 302 const u8 *ies, size_t ies_len) 309 auth_transaction, status, ies, ies_len); 1446 const u8 *ies, size_t ies_len, int reassoc) 1454 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) { 1516 sta->p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, 255 send_auth_reply(struct hostapd_data *hapd, const u8 *dst, const u8 *bssid, u16 auth_alg, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument 300 handle_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument 1445 check_assoc_ies(struct hostapd_data *hapd, struct sta_info *sta, const u8 *ies, size_t ies_len, int reassoc) argument 1828 send_assoc_resp(struct hostapd_data *hapd, struct sta_info *sta, u16 status_code, int reassoc, const u8 *ies, size_t ies_len) argument [all...] |
H A D | wpa_auth_ft.c | 305 const u8 *ies, size_t ies_len, 354 sm->ft_pending_req_ies = wpabuf_alloc_copy(ies, ies_len); 506 const u8 *ies, size_t ies_len) 514 ies, ies_len); 529 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) == 799 const u8 *ies, size_t ies_len, 820 ies, ies_len); 822 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 869 if (wpa_ft_pull_pmk_r1(sm, ies, ies_len, parse.rsn_pmkid) < 0) { 945 u16 auth_transaction, const u8 *ies, size_t ies_len, 304 wpa_ft_pull_pmk_r1(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len, const u8 *pmk_r0_name) argument 504 wpa_ft_process_rdie(struct wpa_state_machine *sm, u8 *pos, u8 *end, u8 id, u8 descr_count, const u8 *ies, size_t ies_len) argument 798 wpa_ft_process_auth_req(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len, u8 **resp_ies, size_t *resp_ies_len) argument 944 wpa_ft_process_auth(struct wpa_state_machine *sm, const u8 *bssid, u16 auth_transaction, const u8 *ies, size_t ies_len, void (*cb)(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len), void *ctx) argument 986 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len) argument 1143 size_t ies_len; local 1210 wpa_ft_rrb_rx_request_cb(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | drv_callbacks.c | 690 const u8 *ies, size_t ies_len) 703 hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len); 740 rx_auth->ies_len, 687 hostapd_notify_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211_event.c | 176 event.auth.ies_len = len - 24 - sizeof(mgmt->u.auth); 997 data.ft_ies.ies_len = nla_len(tb[NL80211_ATTR_IE]); 1185 size_t ies_len = 0; local 1188 ies_len = nla_len(tb[NL80211_ATTR_IE]); 1190 wpa_hexdump(MSG_DEBUG, "nl80211: Assoc Req IEs", ies, ies_len); 1191 drv_event_assoc(bss->ctx, addr, ies, ies_len, 0);
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211_event.c | 176 event.auth.ies_len = len - 24 - sizeof(mgmt->u.auth); 997 data.ft_ies.ies_len = nla_len(tb[NL80211_ATTR_IE]); 1185 size_t ies_len = 0; local 1188 ies_len = nla_len(tb[NL80211_ATTR_IE]); 1190 wpa_hexdump(MSG_DEBUG, "nl80211: Assoc Req IEs", ies, ies_len); 1191 drv_event_assoc(bss->ctx, addr, ies, ies_len, 0);
|