/external/wpa_supplicant_8/src/p2p/ |
p2p_dev_disc.c | 339 struct wpabuf *ies; local 345 ies = p2p_build_probe_resp_ies(p2p); 346 if (ies == NULL) 353 ies) < 0) { 358 wpabuf_free(ies);
|
p2p.c | 265 struct wpabuf *ies; local 300 ies = p2p_build_probe_resp_ies(p2p); 301 if (ies == NULL) 305 ies) < 0) { 310 wpabuf_free(ies); 317 struct wpabuf *ies; local 347 ies = p2p_build_probe_resp_ies(p2p); 348 if (ies == NULL) 351 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) { 355 wpabuf_free(ies); 2094 struct wpabuf *ies; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 489 const u8 *ies, size_t ies_len) 497 ies, ies_len); 512 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) == 514 wpa_printf(MSG_DEBUG, "FT: Failed to parse request IEs"); 781 const u8 *ies, size_t ies_len, 801 wpa_hexdump(MSG_DEBUG, "FT: Received authentication frame IEs", 802 ies, ies_len); 804 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 805 wpa_printf(MSG_DEBUG, "FT: Failed to parse FT IEs"); 934 u16 auth_transaction, const u8 *ies, size_t ies_len 1117 const u8 *ies; local [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_test.c | 526 /* data: optional [ ' ' | STA-addr | ' ' | IEs(hex) ] */ 549 wpa_hexdump(MSG_MSGDUMP, "test_driver: scan IEs", ie, ielen); 566 /* reply: SCANRESP BSSID SSID IEs */ 605 /* data: STA-addr SSID(hex) IEs(hex) */ 2914 struct wpabuf *wps_ie, *ies; local [all...] |
driver.h | 159 * If the driver does not support reporting all IEs, the IE data structure is 160 * constructed of the IEs that are available. This field will also need to 162 * report all IEs to make it easier to support future additions. 178 * Followed by ie_len octets of IEs from Probe Response frame (or if 179 * the driver does not indicate source of IEs, these may also be from 180 * Beacon frame). After the first set of IEs, another set of IEs may 458 * for fast transition, this parameter is set to include the IEs that 460 * update_ft_ies() handler is called to update the IEs for further 463 * The driver should use these IEs only if the target AP is advertisin 3344 const u8 *ies; member in struct:wpa_event_data::ft_ies 3370 const u8 *ies; member in struct:wpa_event_data::auth_info [all...] |
driver_nl80211.c | 1063 event.auth.ies = mgmt->u.auth.variable; 2016 u8 *ies = NULL; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers.c | 1071 u8 *ies = NULL, *nies; local 1078 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ies must " 1081 message, "Wrong IEs value type. Array of arrays of " 1091 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ies must " 1094 message, "Wrong IEs value type. Array required"); 1108 nies = os_realloc(ies, ies_len + len); 1113 os_free(ies); 1118 ies = nies; 1119 os_memcpy(ies + ies_len, val, len); 1125 params->extra_ies = ies; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
p2p_supplicant.c | 152 struct wpabuf *wps_ie, *ies; local 187 ies = wpabuf_alloc(wpabuf_len(wps_ie) + ielen); 188 if (ies == NULL) { 192 wpabuf_put_buf(ies, wps_ie); 195 p2p_scan_ie(wpa_s->global->p2p, ies, dev_id); 198 params.extra_ies = wpabuf_head(ies); 199 params.extra_ies_len = wpabuf_len(ies); 220 wpabuf_free(ies); 455 wpa_hexdump(MSG_DEBUG, "P2P: Probe Response IEs", 457 wpa_hexdump(MSG_DEBUG, "P2P: Beacon IEs", 3589 struct wpabuf *wps_ie, *ies; local [all...] |