/external/wpa_supplicant_8/wpa_supplicant/ |
sme.h | 20 const u8 *ies, size_t ies_len); 55 const u8 *ies, size_t ies_len)
|
driver_i.h | 270 const u8 *ies, size_t ies_len) 274 ies, ies_len); 280 const u8 *ies, size_t ies_len) 284 target_ap, ies, ies_len);
|
wps_supplicant.h | 47 int wpas_wps_scan_result_text(const u8 *ies, size_t ies_len, char *pos,
|
p2p_supplicant.h | 58 int wpas_p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf, 76 void wpas_p2p_scan_ie(struct wpa_supplicant *wpa_s, struct wpabuf *ies);
|
sme.c | 550 wpa_hexdump(MSG_MSGDUMP, "SME: Authentication response IEs", 551 data->auth.ies, data->auth.ies_len); 559 data->auth.status_code, data->auth.ies, 614 edata.ft_ies.ies = data->auth.ies; 688 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Could not parse own IEs?!"); 724 const u8 *ies, size_t ies_len) 726 if (md == NULL || ies == NULL) { 736 wpa_hexdump(MSG_DEBUG, "SME: FT IEs", ies, ies_len) [all...] |
wpas_glue.c | 477 const u8 *ies, size_t ies_len) 481 return sme_update_ft_ies(wpa_s, md, ies, ies_len); 482 return wpa_drv_update_ft_ies(wpa_s, md, ies, ies_len); 488 const u8 *ies, size_t ies_len) 491 return wpa_drv_send_ft_action(wpa_s, action, target_ap, ies, ies_len); 576 * TDLS Setup frames do not contain WMM IEs, hence need to depend on
|
p2p_supplicant.c | 221 struct wpabuf *wps_ie, *ies; local 256 ies = wpabuf_alloc(wpabuf_len(wps_ie) + ielen); 257 if (ies == NULL) { 261 wpabuf_put_buf(ies, wps_ie); 264 p2p_scan_ie(wpa_s->global->p2p, ies, dev_id); 267 params.extra_ies = wpabuf_head(ies); 268 params.extra_ies_len = wpabuf_len(ies); 284 wpabuf_free(ies); 525 wpa_hexdump(MSG_DEBUG, "P2P: Probe Response IEs", 527 wpa_hexdump(MSG_DEBUG, "P2P: Beacon IEs", 3812 struct wpabuf *wps_ie, *ies; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.h | 47 int (*update_ft_ies)(void *ctx, const u8 *md, const u8 *ies, 50 const u8 *ies, size_t ies_len); 318 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len); 320 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 325 int wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, 333 wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) 345 wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 361 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 371 void wpa_tdls_ap_ies(struct wpa_sm *sm, const u8 *ies, size_t len); 372 void wpa_tdls_assoc_resp_ies(struct wpa_sm *sm, const u8 *ies, size_t len) [all...] |
wpa_i.h | 219 const u8 *ies, size_t ies_len) 222 return sm->ctx->update_ft_ies(sm->ctx->ctx, md, ies, ies_len); 228 const u8 *ies, size_t ies_len) 232 ies, ies_len);
|
wpa_ft.c | 59 * @ies: Association Response IEs or %NULL to clear FT parameters 60 * @ies_len: Length of ies buffer in octets 63 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) 70 if (wpa_ft_parse_ies(ies, ies_len, &ft) < 0) 131 * wpa_ft_gen_req_ies - Generate FT (IEEE 802.11r) IEs for Auth/ReAssoc Request 133 * @len: Buffer for returning the length of the IEs 141 * Returns: Pointer to buffer with IEs or %NULL on failure 372 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 385 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len) [all...] |
tdls.c | 834 wpa_printf(MSG_INFO, "TDLS: Failed to parse IEs in Teardown"); [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_dev_disc.c | 309 struct wpabuf *ies; local 313 ies = p2p_build_probe_resp_ies(p2p); 314 if (ies == NULL) 321 ies) < 0) { 324 wpabuf_free(ies);
|
p2p.c | 269 struct wpabuf *ies; local 300 ies = p2p_build_probe_resp_ies(p2p); 301 if (ies == NULL) 305 ies) < 0) { 309 wpabuf_free(ies); 316 struct wpabuf *ies; local 340 ies = p2p_build_probe_resp_ies(p2p); 341 if (ies == NULL) 344 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) { 347 wpabuf_free(ies); 2010 struct wpabuf *ies; local [all...] |
p2p.h | 436 * pointer can be %NULL). The WPS and P2P IEs to be added for Probe 492 * the IEs from probe_resp_ie need to be added to the end of the Probe [all...] |
/external/wpa_supplicant_8/src/common/ |
ieee802_11_common.h | 86 int ieee802_11_ie_count(const u8 *ies, size_t ies_len); 87 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len,
|
ieee802_11_common.c | 63 * IEs. 149 * @start: Pointer to the start of IEs 178 wpa_hexdump(MSG_MSGDUMP, "IEs", start, len); 313 int ieee802_11_ie_count(const u8 *ies, size_t ies_len) 318 if (ies == NULL) 321 pos = ies; 322 end = ies + ies_len; 335 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len, 341 pos = ies; 342 end = ies + ies_len [all...] |
wpa_common.c | 238 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, 248 if (ies == NULL) 251 pos = ies; 252 end = ies + ies_len; 298 * Check that the protected IE count matches with IEs included in the 308 wpa_printf(MSG_DEBUG, "FT: Some required IEs not included in " 328 wpa_printf(MSG_DEBUG, "FT: %d protected IEs missing from " 970 return 0; /* identical IEs */ 979 * for this, but verify that other parts of the RSN IEs are 1000 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid [all...] |
wpa_common.h | 221 * 3/4: one or two RSN IEs + GTK IE (encrypted) 367 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid); 390 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, struct wpa_ft_ies *parse);
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth.h | 279 u16 auth_transaction, const u8 *ies, size_t ies_len, 282 const u8 *ies, size_t ies_len), 284 u16 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies,
|
wpa_auth_ft.c | 490 const u8 *ies, size_t ies_len) 498 ies, ies_len); 513 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) == 515 wpa_printf(MSG_DEBUG, "FT: Failed to parse request IEs"); 782 const u8 *ies, size_t ies_len, 802 wpa_hexdump(MSG_DEBUG, "FT: Received authentication frame IEs", 803 ies, ies_len); 805 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) { 806 wpa_printf(MSG_DEBUG, "FT: Failed to parse FT IEs"); 935 u16 auth_transaction, const u8 *ies, size_t ies_len 1118 const u8 *ies; local [all...] |
ieee802_11.c | 259 const u8 *ies, size_t ies_len) 281 if (ies && ies_len) 282 os_memcpy(reply->u.auth.variable, ies, ies_len); 298 const u8 *ies, size_t ies_len) 304 status, ies, ies_len); 863 const u8 *ies, size_t ies_len, int reassoc) 871 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) { 918 sta->p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, 947 sta->wps_ie = ieee802_11_vendor_ie_concat(ies, ies_len, 1044 resp = wpa_ft_validate_reassoc(sta->wpa_sm, ies, [all...] |
drv_callbacks.c | 447 const u8 *ies, size_t ies_len) 460 hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len); 496 rx_auth->auth_transaction, rx_auth->ies,
|
/external/wpa_supplicant_8/src/drivers/ |
driver.h | 188 * If the driver does not support reporting all IEs, the IE data structure is 189 * constructed of the IEs that are available. This field will also need to 191 * report all IEs to make it easier to support future additions. 207 * Followed by ie_len octets of IEs from Probe Response frame (or if 208 * the driver does not indicate source of IEs, these may also be from 209 * Beacon frame). After the first set of IEs, another set of IEs may 487 * for fast transition, this parameter is set to include the IEs that 489 * update_ft_ies() handler is called to update the IEs for further 492 * The driver should use these IEs only if the target AP is advertisin 3549 const u8 *ies; member in struct:wpa_event_data::ft_ies 3575 const u8 *ies; member in struct:wpa_event_data::auth_info [all...] |
driver_test.c | 526 /* data: optional [ ' ' | STA-addr | ' ' | IEs(hex) ] */ 549 wpa_hexdump(MSG_MSGDUMP, "test_driver: scan IEs", ie, ielen); 566 /* reply: SCANRESP BSSID SSID IEs */ 605 /* data: STA-addr SSID(hex) IEs(hex) */ 2914 struct wpabuf *wps_ie, *ies; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers.c | 1071 u8 *ies = NULL, *nies; local 1078 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ies must " 1081 message, "Wrong IEs value type. Array of arrays of " 1091 wpa_printf(MSG_DEBUG, "wpas_dbus_handler_scan[dbus]: ies must " 1094 message, "Wrong IEs value type. Array required"); 1108 nies = os_realloc(ies, ies_len + len); 1113 os_free(ies); 1118 ies = nies; 1119 os_memcpy(ies + ies_len, val, len); 1125 params->extra_ies = ies; [all...] |