Lines Matching defs:Data
388 UCHAR Data[sizeof(ULONG)];
394 UCHAR Data[sizeof(ULONG)];
410 char *data, size_t len)
434 hdrlen = sizeof(NDISUIO_QUERY_OID) - sizeof(o->Data);
448 os_memcpy(data, o->Data, written);
476 os_memcpy(data, o->Data, o->Length);
485 const char *data, size_t len)
494 wpa_hexdump_key(MSG_MSGDUMP, txt, data, len);
497 reallen = buflen - sizeof(o->Data);
505 if (data)
506 os_memcpy(o->Data, data, len);
522 wpa_hexdump_key(MSG_MSGDUMP, txt, data, len);
530 if (data)
531 os_memcpy(o->Data, data, len);
1223 union wpa_event_data data;
1236 * data. Limit the length to the current buffer size to avoid
1237 * crashing in hexdump. The data seems to be otherwise valid,
1279 os_memset(&data, 0, sizeof(data));
1280 data.assoc_info.req_ies = buf + ai->OffsetRequestIEs;
1281 data.assoc_info.req_ies_len = ai->RequestIELength;
1282 data.assoc_info.resp_ies = buf + ai->OffsetResponseIEs;
1283 data.assoc_info.resp_ies_len = ai->ResponseIELength;
1304 data.assoc_info.beacon_ies =
1307 data.assoc_info.beacon_ies_len =
1310 data.assoc_info.beacon_ies,
1311 data.assoc_info.beacon_ies_len);
1320 wpa_supplicant_event(drv->ctx, EVENT_ASSOCINFO, &data);
1404 const u8 *data, size_t data_len)
1415 req = (NDIS_802_11_AUTHENTICATION_REQUEST *) data;
1438 const u8 *data, size_t data_len)
1449 pmkid = (NDIS_802_11_PMKID_CANDIDATE_LIST *) data;
1483 const u8 *data, size_t data_len)
1487 if (data == NULL || data_len < sizeof(*status))
1491 data, data_len);
1493 status = (NDIS_802_11_STATUS_INDICATION *) data;
1494 data += sizeof(status);
1499 wpa_driver_ndis_event_auth(drv, data, data_len);
1502 wpa_driver_ndis_event_pmkid(drv, data, data_len);
1642 "OID_802_11_CAPABILITY data");
2560 * mechanism available to pass data from driver interface to l2_packet wrapper.