/external/wpa_supplicant_6/wpa_supplicant/ |
mlme.h | 41 const u8 *ies, size_t ies_len); 44 const u8 *ies, size_t ies_len); 45 int ieee80211_sta_set_probe_req_ie(struct wpa_supplicant *wpa_s, const u8 *ies, 110 const u8 *ies, size_t ies_len) 118 const u8 *ies, size_t ies_len) 124 ieee80211_sta_set_probe_req_ie(struct wpa_supplicant *wpa_s, const u8 *ies,
|
wpa_supplicant_i.h | 195 /* The last AssocReq/Resp IEs */ 744 const u8 *ies, size_t ies_len) 748 ies, ies_len); 754 const u8 *ies, size_t ies_len) 758 target_ap, ies, ies_len); 763 const u8 *ies, size_t ies_len) 766 return wpa_s->driver->set_probe_req_ie(wpa_s->drv_priv, ies,
|
wpas_glue.c | 474 const u8 *ies, size_t ies_len) 478 return ieee80211_sta_update_ft_ies(wpa_s, md, ies, ies_len); 479 return wpa_drv_update_ft_ies(wpa_s, md, ies, ies_len); 485 const u8 *ies, size_t ies_len) 490 ies, ies_len); 491 return wpa_drv_send_ft_action(wpa_s, action, target_ap, ies, ies_len);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.h | 47 int (*update_ft_ies)(void *ctx, const u8 *md, const u8 *ies, 50 const u8 *ies, size_t ies_len); 308 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len); 310 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 314 int wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, 322 wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) 334 wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 346 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 356 void wpa_tdls_ap_ies(struct wpa_sm *sm, const u8 *ies, size_t len); 357 void wpa_tdls_assoc_resp_ies(struct wpa_sm *sm, const u8 *ies, size_t len) [all...] |
wpa_i.h | 225 const u8 *ies, size_t ies_len) 228 return sm->ctx->update_ft_ies(sm->ctx->ctx, md, ies, ies_len); 234 const u8 *ies, size_t ies_len) 238 ies, ies_len);
|
wpa_ft.c | 59 * @ies: Association Response IEs or %NULL to clear FT parameters 60 * @ies_len: Length of ies buffer in octets 63 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) 70 if (wpa_ft_parse_ies(ies, ies_len, &ft) < 0) 131 * wpa_ft_gen_req_ies - Generate FT (IEEE 802.11r) IEs for Auth/ReAssoc Request 133 * @len: Buffer for returning the length of the IEs 141 * Returns: Pointer to buffer with IEs or %NULL on failure 372 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 385 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
sme.h | 20 const u8 *ies, size_t ies_len); 55 const u8 *ies, size_t ies_len)
|
wps_supplicant.h | 50 int wpas_wps_scan_result_text(const u8 *ies, size_t ies_len, char *pos,
|
p2p_supplicant.h | 54 int wpas_p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf, 72 void wpas_p2p_scan_ie(struct wpa_supplicant *wpa_s, struct wpabuf *ies);
|
wpas_glue.c | 478 const u8 *ies, size_t ies_len) 482 return sme_update_ft_ies(wpa_s, md, ies, ies_len); 483 return wpa_drv_update_ft_ies(wpa_s, md, ies, ies_len); 489 const u8 *ies, size_t ies_len) 492 return wpa_drv_send_ft_action(wpa_s, action, target_ap, ies, ies_len);
|
sme.c | 330 wpa_hexdump(MSG_MSGDUMP, "SME: Authentication response IEs", 331 data->auth.ies, data->auth.ies_len); 374 edata.ft_ies.ies = data->auth.ies; 436 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Could not parse own IEs?!"); 472 const u8 *ies, size_t ies_len) 474 if (md == NULL || ies == NULL) { 484 wpa_hexdump(MSG_DEBUG, "SME: FT IEs", ies, ies_len); 489 os_memcpy(wpa_s->sme.ft_ies, ies, ies_len) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa.h | 60 int (*update_ft_ies)(void *ctx, const u8 *md, const u8 *ies, 63 const u8 *ies, size_t ies_len); 278 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 281 int wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, 300 wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 312 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
|
wpa_i.h | 209 const u8 *ies, size_t ies_len) 212 return sm->ctx->update_ft_ies(sm->ctx->ctx, md, ies, ies_len); 218 const u8 *ies, size_t ies_len) 222 ies, ies_len);
|
wpa_ft.c | 108 * wpa_ft_gen_req_ies - Generate FT (IEEE 802.11r) IEs for Auth Request 110 * @len: Buffer for returning the length of the IEs 115 * Returns: Pointer to buffer with IEs or %NULL on failure 343 static int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, 351 if (ies == NULL) 354 pos = ies; 355 end = ies + ies_len; 454 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 466 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len) [all...] |
/external/wpa_supplicant_8/src/common/ |
ieee802_11_common.c | 62 * IEs. 148 * @start: Pointer to the start of IEs 177 wpa_hexdump(MSG_MSGDUMP, "IEs", start, len); 308 int ieee802_11_ie_count(const u8 *ies, size_t ies_len) 313 if (ies == NULL) 316 pos = ies; 317 end = ies + ies_len; 330 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len, 336 pos = ies; 337 end = ies + ies_len [all...] |
ieee802_11_common.h | 84 int ieee802_11_ie_count(const u8 *ies, size_t ies_len); 85 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len,
|
wpa_common.c | 238 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, 248 if (ies == NULL) 251 pos = ies; 252 end = ies + ies_len; 298 * Check that the protected IE count matches with IEs included in the 308 wpa_printf(MSG_DEBUG, "FT: Some required IEs not included in " 328 wpa_printf(MSG_DEBUG, "FT: %d protected IEs missing from " 970 return 0; /* identical IEs */ 979 * for this, but verify that other parts of the RSN IEs are 1000 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_dev_disc.c | 339 struct wpabuf *ies; local 345 ies = p2p_build_probe_resp_ies(p2p); 346 if (ies == NULL) 353 ies) < 0) { 358 wpabuf_free(ies);
|
p2p.c | 263 struct wpabuf *ies; local 285 ies = p2p_build_probe_resp_ies(p2p); 286 if (ies == NULL) 290 ies) < 0) { 295 wpabuf_free(ies); 302 struct wpabuf *ies; local 332 ies = p2p_build_probe_resp_ies(p2p); 333 if (ies == NULL) 336 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) { 340 wpabuf_free(ies); 1997 struct wpabuf *ies; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver.h | 100 * If the driver does not support reporting all IEs, the IE data structure is 101 * constructed of the IEs that are available. This field will also need to 103 * report all IEs to make it easier to support future additions. 115 /* followed by ie_len octets of IEs */ 237 * for fast transition, this parameter is set to include the IEs that 239 * update_ft_ies() handler is called to update the IEs for further 242 * The driver should use these IEs only if the target AP is advertising 245 * In ap_scan=2 mode, the driver can use these IEs when moving to a new 246 * AP after the initial association. These IEs can only be used if the 250 * The driver is responsible for reporting the FT IEs received from th 1304 const u8 *ies; member in struct:wpa_event_data::ft_ies [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.h | 272 u16 auth_transaction, const u8 *ies, size_t ies_len, 275 const u8 *ies, size_t ies_len), 277 u16 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies,
|
wpa_auth_ft.c | 489 const u8 *ies, size_t ies_len) 497 ies, ies_len); 512 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) == 514 wpa_printf(MSG_DEBUG, "FT: Failed to parse request IEs"); 781 const u8 *ies, size_t ies_len, 801 wpa_hexdump(MSG_DEBUG, "FT: Received authentication frame IEs", 802 ies, ies_len); 804 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 805 wpa_printf(MSG_DEBUG, "FT: Failed to parse FT IEs"); 934 u16 auth_transaction, const u8 *ies, size_t ies_len 1117 const u8 *ies; local [all...] |
ieee802_11.c | 237 const u8 *ies, size_t ies_len) 259 if (ies && ies_len) 260 os_memcpy(reply->u.auth.variable, ies, ies_len); 276 const u8 *ies, size_t ies_len) 282 status, ies, ies_len); 609 const u8 *ies, size_t ies_len, int reassoc) 616 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) { 679 sta->wps_ie = ieee802_11_vendor_ie_concat(ies, ies_len, 775 resp = wpa_ft_validate_reassoc(sta->wpa_sm, ies, 799 sta->p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len [all...] |
/external/webkit/Source/WebCore/plugins/win/ |
PaintHooks.asm | 2 ; Copyright (C) 2009 Nokia Corporation and/or its subsidiary(-ies)
|
/hardware/ti/wlan/wl1271/wpa_supplicant_lib/ |
driver_ti.c | 859 ies - probe_req_ie data 863 static int wpa_driver_tista_set_probe_req_ie(void *priv, const u8* ies, size_t ies_len) 871 if ((!ies || (0 == ies_len)) && (NULL == drv->probe_req_ie)) { 875 if (ies && drv->probe_req_ie) { 878 if ((ies_len == len) && (0 == os_memcmp(ies, data, ies_len))) { 885 if (!ies || (0 == ies_len)) { 893 pos = (u8*)ies + head_len; /* Find the WSC mode in probe_req_ie by password_id */ 894 end = (u8*)ies + ies_len; 904 pos = (u8*)ies + head_len; 918 if (ies && ies_len) [all...] |