/external/wpa_supplicant_8/src/ap/ |
taxonomy.h | 14 const u8 *ie, size_t ie_len); 17 const u8 *ie, size_t ie_len); 20 const u8 *ie, size_t ie_len);
|
taxonomy.c | 104 size_t ie_len; local 121 ie_len = wpabuf_len(ies); 123 while (ie_len >= 2) { 129 ie_len -= 2; 131 if (elen > ie_len) 226 ie_len -= elen; 270 const u8 *ie, size_t ie_len) 273 sta->probe_ie_taxonomy = wpabuf_alloc_copy(ie, ie_len); 279 const u8 *ie, size_t ie_len) 282 info->probe_ie_taxonomy = wpabuf_alloc_copy(ie, ie_len); [all...] |
mbo_ap.c | 103 u8 ie_len = pos[1]; local 105 if (2 + ie_len > end - pos) 109 mbo_ap_parse_non_pref_chan(sta, pos + 2, ie_len); 212 u8 ie_len; local 227 ie_len = pos[1]; 229 if (2 + ie_len > end - pos) 233 ie_len >= 4 && WPA_GET_BE24(pos + 2) == OUI_WFA) 235 pos + 6, ie_len - 4,
|
utils.c | 21 const u8 *ie, size_t ie_len,
|
hostapd.h | 81 const u8 *ie, size_t ie_len, int ssi_signal); 593 const u8 *ie, size_t ie_len, 608 const u8 *bssid, const u8 *ie, size_t ie_len,
|
wnm_ap.c | 267 u8 ie_len = pos[1]; local 268 if (pos + 2 + ie_len > frm + len) 271 ie_len >= (int) sizeof(*wnmsleep_ie) - 2) 278 } else if (*pos == WLAN_EID_EXTENSION && ie_len >= 1 && 281 oci_ie_len = ie_len - 1; 286 pos += ie_len + 2;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
mesh.h | 28 const u8 *ies, size_t ie_len); 36 const u8 *ies, size_t ie_len)
|
bss.c | 435 bss = os_zalloc(sizeof(*bss) + res->ie_len + res->beacon_ie_len); 443 bss->ie_len = res->ie_len; 445 os_memcpy(bss + 1, res + 1, res->ie_len + res->beacon_ie_len); 542 if (old->ie_len == new_res->ie_len && 543 os_memcmp(old + 1, new_res + 1, old->ie_len) == 0) 665 if (bss->ie_len + bss->beacon_ie_len >= 666 res->ie_len + res->beacon_ie_len) { 667 os_memcpy(bss + 1, res + 1, res->ie_len + res->beacon_ie_len) [all...] |
op_classes.c | 343 u8 *ie_len; local 365 ie_len = wpabuf_put(buf, 1); 373 *ie_len = wpabuf_len(buf) - 2; 374 if (*ie_len < 2 || wpabuf_len(buf) > len) {
|
mesh_mpm.c | 218 u8 ie_len, add_plid = 0; local 309 ie_len = 4; 311 ie_len += PMKID_LEN; 316 ie_len += 2; 320 ie_len += 2; 322 ie_len += 2; /* reason code */ 327 wpabuf_put_u8(buf, ie_len); 1095 size_t ie_len; local 1109 ie_len = (const u8 *) mgmt + len - 1113 if (ie_len < 2 + 2) [all...] |
wnm_sta.c | 329 u8 ie_len = *(pos + 1); local 330 if (2 + ie_len > frm + len - pos) { 331 wpa_printf(MSG_INFO, "WNM: Invalid IE len %u", ie_len); 334 wpa_hexdump(MSG_DEBUG, "WNM: Element", pos, 2 + ie_len); 335 if (*pos == WLAN_EID_WNMSLEEP && ie_len >= 4) 342 } else if (*pos == WLAN_EID_EXTENSION && ie_len >= 1 && 345 oci_ie_len = ie_len - 1; 349 pos += ie_len + 2; 1637 u8 ie, ie_len; local [all...] |
p2p_supplicant.h | 128 u16 reason_code, const u8 *ie, size_t ie_len, 131 u16 reason_code, const u8 *ie, size_t ie_len, 177 const u8 *ie, size_t ie_len, 239 const u8 *ie, size_t ie_len,
|
events.c | 3589 size_t ie_len = 0; local 3643 size_t ie_len = 0; local 4562 size_t ie_len; local 4618 size_t ie_len; local [all...] |
rrm.c | 760 size_t *ie_len, int add_fixed) 763 size_t ies_len = *ie_len; 831 *ie_len = ies_len; 844 u8 **ie, size_t *ie_len, u8 idx) 855 buf = os_malloc(sizeof(*rep) + 14 + *ie_len + subelems_len); 863 14 + *ie_len, ie, ie_len, 881 if (data->report_detail != BEACON_REPORT_DETAIL_NONE && *ie_len) 913 size_t ies_len = bss->ie_len ? bss->ie_len : bss->beacon_ie_len [all...] |
mbo.c | 44 u8 ie_len = mbo_ie[1]; local 46 if (ie_len < MBO_IE_HEADER - 2) 50 return get_ie(mbo, 2 + ie_len - MBO_IE_HEADER, attr);
|
bss.h | 108 size_t ie_len; member in struct:wpa_bss 111 /* followed by ie_len octets of IEs */
|
/external/tcpdump/ |
print-fr.c | 433 uint8_t ie_len; member in struct:ie_tlv_header_t 442 uint8_t ie_type,ie_len; local 476 ie_len=tptr[1]; 481 ie_len)); 484 if (ie_type == 0 || ie_len <= sizeof(struct ie_tlv_header_t)) 487 ND_TCHECK2(*tptr, ie_len); 490 ie_len-=sizeof(struct ie_tlv_header_t); 501 for (idx = 0; idx < ie_len && idx < MFR_ID_STRING_MAXLEN; idx++) { 510 if (ie_len == sizeof(struct timeval)) { 526 print_unknown_data(ndo, tptr, "\n\t ", ie_len); [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_build.c | 478 const char *svc_name, u8 **ie_len, u8 **pos, 503 if (*ie_len) { 504 int ie_data_len = (*pos - *ie_len) - 1; 518 *ie_len = p2p_buf_add_ie_hdr(buf); 538 p2p_buf_update_ie_hdr(buf, *ie_len); 539 *ie_len = p2p_buf_add_ie_hdr(buf); 560 p2p_buf_update_ie_hdr(buf, *ie_len); 561 *ie_len = p2p_buf_add_ie_hdr(buf); 568 p2p_buf_update_ie_hdr(buf, *ie_len); 569 *ie_len = p2p_buf_add_ie_hdr(buf) 602 u8 *pos, *attr_len, *ie_len = NULL; local [all...] |
/external/wpa_supplicant_8/src/common/ |
privsep_commands.h | 49 size_t ie_len; member in struct:privsep_cmd_authenticate 56 /* followed by ie_len bytes of ie */
|
hw_features_common.c | 163 ieee802_11_parse_elems((u8 *) (bss + 1), bss->ie_len, &elems, 0); 256 ieee802_11_parse_elems((u8 *) (bss + 1), bss->ie_len, &elems, 0); 340 ieee802_11_parse_elems((u8 *) (bss + 1), bss->ie_len, &elems,
|
/external/wpa_supplicant_8/src/drivers/ |
driver_privsep.c | 191 if (sizeof(*r) + r->ie_len + r->beacon_ie_len > (size_t) len) { 194 (int) sizeof(*r), (int) r->ie_len, 256 buflen = sizeof(*data) + params->ie_len + params->auth_data_len; 266 data->ie_len = params->ie_len; 277 if (params->ie_len) { 278 os_memcpy(pos, params->ie, params->ie_len); 279 pos += params->ie_len; 414 int ie_len; local 423 os_memcpy(&ie_len, pos, sizeof(int)) [all...] |
driver_nl80211_scan.c | 671 const u8 *ie, size_t ie_len) 679 ssid = get_ie(ie, ie_len, WLAN_EID_SSID); 719 size_t ie_len, beacon_ie_len; local 731 ie_len = nla_len(bss[NL80211_BSS_INFORMATION_ELEMENTS]); 734 ie_len = 0; 745 ie ? ie_len : beacon_ie_len)) 748 r = os_zalloc(sizeof(*r) + ie_len + beacon_ie_len); 796 r->ie_len = ie_len; 799 os_memcpy(pos, ie, ie_len); [all...] |
driver_wext.c | 1193 size_t ie_len; member in struct:wext_scan_data [all...] |
driver.h | 292 * @ie_len: length of the following IE field in octets 304 * This structure data is followed by ie_len octets of IEs from Probe Response 324 size_t ie_len; member in struct:wpa_scan_res 326 /* Followed by ie_len + beacon_ie_len octets of IE data */ 617 size_t ie_len; member in struct:wpa_driver_auth_params 1429 int ie_len; member in struct:wpa_driver_mesh_join_params 4954 size_t ie_len; member in struct:wpa_event_data::disassoc_info 4985 size_t ie_len; member in struct:wpa_event_data::deauth_info 5273 size_t ie_len; member in struct:wpa_event_data::rx_probe_req 5465 size_t ie_len; member in struct:wpa_event_data::mesh_peer [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 54 u8 ie_len; member in struct:wpa_tdls_ftie 64 u8 ie_len; member in struct:wpa_tdls_timeoutie 71 u8 ie_len; member in struct:wpa_tdls_lnkid 84 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs); 171 static u8 * wpa_add_ie(u8 *pos, const u8 *ie, size_t ie_len) 173 os_memcpy(pos, ie, ie_len); 174 return pos + ie_len; 735 lnkid->ie_len = 3 * ETH_ALEN; 807 ftie->ie_len = sizeof(struct wpa_tdls_ftie) - 2; 813 ftie->ie_len += 170 [all...] |