HomeSort by relevance Sort by last modified time
    Searched refs:ies (Results 1 - 25 of 48) sorted by null

1 2

  /external/wpa_supplicant_6/wpa_supplicant/
mlme.h 41 const u8 *ies, size_t ies_len);
44 const u8 *ies, size_t ies_len);
45 int ieee80211_sta_set_probe_req_ie(struct wpa_supplicant *wpa_s, const u8 *ies,
110 const u8 *ies, size_t ies_len)
118 const u8 *ies, size_t ies_len)
124 ieee80211_sta_set_probe_req_ie(struct wpa_supplicant *wpa_s, const u8 *ies,
wpa_supplicant_i.h 195 /* The last AssocReq/Resp IEs */
744 const u8 *ies, size_t ies_len)
748 ies, ies_len);
754 const u8 *ies, size_t ies_len)
758 target_ap, ies, ies_len);
763 const u8 *ies, size_t ies_len)
766 return wpa_s->driver->set_probe_req_ie(wpa_s->drv_priv, ies,
wpas_glue.c 474 const u8 *ies, size_t ies_len)
478 return ieee80211_sta_update_ft_ies(wpa_s, md, ies, ies_len);
479 return wpa_drv_update_ft_ies(wpa_s, md, ies, ies_len);
485 const u8 *ies, size_t ies_len)
490 ies, ies_len);
491 return wpa_drv_send_ft_action(wpa_s, action, target_ap, ies, ies_len);
  /external/wpa_supplicant_8/src/rsn_supp/
wpa.h 47 int (*update_ft_ies)(void *ctx, const u8 *md, const u8 *ies,
50 const u8 *ies, size_t ies_len);
308 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len);
310 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
314 int wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies,
322 wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len)
334 wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
346 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
356 void wpa_tdls_ap_ies(struct wpa_sm *sm, const u8 *ies, size_t len);
357 void wpa_tdls_assoc_resp_ies(struct wpa_sm *sm, const u8 *ies, size_t len)
    [all...]
wpa_i.h 225 const u8 *ies, size_t ies_len)
228 return sm->ctx->update_ft_ies(sm->ctx->ctx, md, ies, ies_len);
234 const u8 *ies, size_t ies_len)
238 ies, ies_len);
wpa_ft.c 59 * @ies: Association Response IEs or %NULL to clear FT parameters
60 * @ies_len: Length of ies buffer in octets
63 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len)
70 if (wpa_ft_parse_ies(ies, ies_len, &ft) < 0)
131 * wpa_ft_gen_req_ies - Generate FT (IEEE 802.11r) IEs for Auth/ReAssoc Request
133 * @len: Buffer for returning the length of the IEs
141 * Returns: Pointer to buffer with IEs or %NULL on failure
372 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
385 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len)
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
sme.h 20 const u8 *ies, size_t ies_len);
55 const u8 *ies, size_t ies_len)
wps_supplicant.h 50 int wpas_wps_scan_result_text(const u8 *ies, size_t ies_len, char *pos,
p2p_supplicant.h 54 int wpas_p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf,
72 void wpas_p2p_scan_ie(struct wpa_supplicant *wpa_s, struct wpabuf *ies);
wpas_glue.c 478 const u8 *ies, size_t ies_len)
482 return sme_update_ft_ies(wpa_s, md, ies, ies_len);
483 return wpa_drv_update_ft_ies(wpa_s, md, ies, ies_len);
489 const u8 *ies, size_t ies_len)
492 return wpa_drv_send_ft_action(wpa_s, action, target_ap, ies, ies_len);
sme.c 330 wpa_hexdump(MSG_MSGDUMP, "SME: Authentication response IEs",
331 data->auth.ies, data->auth.ies_len);
374 edata.ft_ies.ies = data->auth.ies;
436 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Could not parse own IEs?!");
472 const u8 *ies, size_t ies_len)
474 if (md == NULL || ies == NULL) {
484 wpa_hexdump(MSG_DEBUG, "SME: FT IEs", ies, ies_len);
489 os_memcpy(wpa_s->sme.ft_ies, ies, ies_len)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
wpa.h 60 int (*update_ft_ies)(void *ctx, const u8 *md, const u8 *ies,
63 const u8 *ies, size_t ies_len);
278 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
281 int wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies,
300 wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
312 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
wpa_i.h 209 const u8 *ies, size_t ies_len)
212 return sm->ctx->update_ft_ies(sm->ctx->ctx, md, ies, ies_len);
218 const u8 *ies, size_t ies_len)
222 ies, ies_len);
wpa_ft.c 108 * wpa_ft_gen_req_ies - Generate FT (IEEE 802.11r) IEs for Auth Request
110 * @len: Buffer for returning the length of the IEs
115 * Returns: Pointer to buffer with IEs or %NULL on failure
343 static int wpa_ft_parse_ies(const u8 *ies, size_t ies_len,
351 if (ies == NULL)
354 pos = ies;
355 end = ies + ies_len;
454 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
466 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len)
    [all...]
  /external/wpa_supplicant_8/src/common/
ieee802_11_common.c 62 * IEs.
148 * @start: Pointer to the start of IEs
177 wpa_hexdump(MSG_MSGDUMP, "IEs", start, len);
308 int ieee802_11_ie_count(const u8 *ies, size_t ies_len)
313 if (ies == NULL)
316 pos = ies;
317 end = ies + ies_len;
330 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len,
336 pos = ies;
337 end = ies + ies_len
    [all...]
ieee802_11_common.h 84 int ieee802_11_ie_count(const u8 *ies, size_t ies_len);
85 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len,
wpa_common.c 238 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len,
248 if (ies == NULL)
251 pos = ies;
252 end = ies + ies_len;
298 * Check that the protected IE count matches with IEs included in the
308 wpa_printf(MSG_DEBUG, "FT: Some required IEs not included in "
328 wpa_printf(MSG_DEBUG, "FT: %d protected IEs missing from "
970 return 0; /* identical IEs */
979 * for this, but verify that other parts of the RSN IEs are
1000 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_dev_disc.c 339 struct wpabuf *ies; local
345 ies = p2p_build_probe_resp_ies(p2p);
346 if (ies == NULL)
353 ies) < 0) {
358 wpabuf_free(ies);
p2p.c 263 struct wpabuf *ies; local
285 ies = p2p_build_probe_resp_ies(p2p);
286 if (ies == NULL)
290 ies) < 0) {
295 wpabuf_free(ies);
302 struct wpabuf *ies; local
332 ies = p2p_build_probe_resp_ies(p2p);
333 if (ies == NULL)
336 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) {
340 wpabuf_free(ies);
1997 struct wpabuf *ies; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver.h 100 * If the driver does not support reporting all IEs, the IE data structure is
101 * constructed of the IEs that are available. This field will also need to
103 * report all IEs to make it easier to support future additions.
115 /* followed by ie_len octets of IEs */
237 * for fast transition, this parameter is set to include the IEs that
239 * update_ft_ies() handler is called to update the IEs for further
242 * The driver should use these IEs only if the target AP is advertising
245 * In ap_scan=2 mode, the driver can use these IEs when moving to a new
246 * AP after the initial association. These IEs can only be used if the
250 * The driver is responsible for reporting the FT IEs received from th
1304 const u8 *ies; member in struct:wpa_event_data::ft_ies
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth.h 272 u16 auth_transaction, const u8 *ies, size_t ies_len,
275 const u8 *ies, size_t ies_len),
277 u16 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies,
wpa_auth_ft.c 489 const u8 *ies, size_t ies_len)
497 ies, ies_len);
512 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) ==
514 wpa_printf(MSG_DEBUG, "FT: Failed to parse request IEs");
781 const u8 *ies, size_t ies_len,
801 wpa_hexdump(MSG_DEBUG, "FT: Received authentication frame IEs",
802 ies, ies_len);
804 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) {
805 wpa_printf(MSG_DEBUG, "FT: Failed to parse FT IEs");
934 u16 auth_transaction, const u8 *ies, size_t ies_len
1117 const u8 *ies; local
    [all...]
ieee802_11.c 237 const u8 *ies, size_t ies_len)
259 if (ies && ies_len)
260 os_memcpy(reply->u.auth.variable, ies, ies_len);
276 const u8 *ies, size_t ies_len)
282 status, ies, ies_len);
609 const u8 *ies, size_t ies_len, int reassoc)
616 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) {
679 sta->wps_ie = ieee802_11_vendor_ie_concat(ies, ies_len,
775 resp = wpa_ft_validate_reassoc(sta->wpa_sm, ies,
799 sta->p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len
    [all...]
  /external/webkit/Source/WebCore/plugins/win/
PaintHooks.asm 2 ; Copyright (C) 2009 Nokia Corporation and/or its subsidiary(-ies)
  /hardware/ti/wlan/wl1271/wpa_supplicant_lib/
driver_ti.c 859 ies - probe_req_ie data
863 static int wpa_driver_tista_set_probe_req_ie(void *priv, const u8* ies, size_t ies_len)
871 if ((!ies || (0 == ies_len)) && (NULL == drv->probe_req_ie)) {
875 if (ies && drv->probe_req_ie) {
878 if ((ies_len == len) && (0 == os_memcmp(ies, data, ies_len))) {
885 if (!ies || (0 == ies_len)) {
893 pos = (u8*)ies + head_len; /* Find the WSC mode in probe_req_ie by password_id */
894 end = (u8*)ies + ies_len;
904 pos = (u8*)ies + head_len;
918 if (ies && ies_len)
    [all...]

Completed in 480 milliseconds

1 2