HomeSort by relevance Sort by last modified time
    Searched refs:ies (Results 1 - 25 of 33) sorted by null

1 2

  /external/wpa_supplicant_8/wpa_supplicant/
sme.h 20 const u8 *ies, size_t ies_len);
55 const u8 *ies, size_t ies_len)
wps_supplicant.h 47 int wpas_wps_scan_result_text(const u8 *ies, size_t ies_len, char *pos,
p2p_supplicant.h 52 int wpas_p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf,
64 void wpas_p2p_scan_ie(struct wpa_supplicant *wpa_s, struct wpabuf *ies);
sme.c 649 wpa_hexdump(MSG_MSGDUMP, "SME: Authentication response IEs",
650 data->auth.ies, data->auth.ies_len);
658 data->auth.status_code, data->auth.ies,
715 edata.ft_ies.ies = data->auth.ies;
790 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Could not parse own IEs?!");
830 const u8 *ies, size_t ies_len)
832 if (md == NULL || ies == NULL) {
842 wpa_hexdump(MSG_DEBUG, "SME: FT IEs", ies, ies_len)
    [all...]
wpas_glue.c 499 const u8 *ies, size_t ies_len)
503 return sme_update_ft_ies(wpa_s, md, ies, ies_len);
504 return wpa_drv_update_ft_ies(wpa_s, md, ies, ies_len);
510 const u8 *ies, size_t ies_len)
513 return wpa_drv_send_ft_action(wpa_s, action, target_ap, ies, ies_len);
600 * TDLS Setup frames do not contain WMM IEs, hence need to depend on
driver_i.h 283 const u8 *ies, size_t ies_len)
287 ies, ies_len);
293 const u8 *ies, size_t ies_len)
297 target_ap, ies, ies_len);
p2p_supplicant.c 222 const u8 *ies; local
229 ies = (const u8 *) (bss + 1);
236 ies = ies + ies_len;
243 ies, ies_len) > 0)
288 struct wpabuf *wps_ie, *ies; local
321 ies = wpabuf_alloc(wpabuf_len(wps_ie) + ielen);
322 if (ies == NULL) {
326 wpabuf_put_buf(ies, wps_ie);
329 p2p_scan_ie(wpa_s->global->p2p, ies, dev_id)
4471 struct wpabuf *wps_ie, *ies; local
    [all...]
events.c     [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
wpa.h 47 int (*update_ft_ies)(void *ctx, const u8 *md, const u8 *ies,
50 const u8 *ies, size_t ies_len);
325 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len);
327 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
332 int wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies,
340 wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len)
352 wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
368 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
378 void wpa_tdls_ap_ies(struct wpa_sm *sm, const u8 *ies, size_t len);
379 void wpa_tdls_assoc_resp_ies(struct wpa_sm *sm, const u8 *ies, size_t len)
    [all...]
wpa_i.h 224 const u8 *ies, size_t ies_len)
227 return sm->ctx->update_ft_ies(sm->ctx->ctx, md, ies, ies_len);
233 const u8 *ies, size_t ies_len)
237 ies, ies_len);
wpa_ft.c 59 * @ies: Association Response IEs or %NULL to clear FT parameters
60 * @ies_len: Length of ies buffer in octets
63 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len)
70 if (wpa_ft_parse_ies(ies, ies_len, &ft) < 0)
131 * wpa_ft_gen_req_ies - Generate FT (IEEE 802.11r) IEs for Auth/ReAssoc Request
133 * @len: Buffer for returning the length of the IEs
141 * Returns: Pointer to buffer with IEs or %NULL on failure
374 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
387 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len)
    [all...]
tdls.c 926 wpa_printf(MSG_INFO, "TDLS: Failed to parse IEs in Teardown");
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_dev_disc.c 313 struct wpabuf *ies; local
317 ies = p2p_build_probe_resp_ies(p2p);
318 if (ies == NULL)
325 ies) < 0) {
328 wpabuf_free(ies);
p2p.c 245 struct wpabuf *ies; local
278 ies = p2p_build_probe_resp_ies(p2p);
279 if (ies == NULL)
287 ies) < 0) {
291 wpabuf_free(ies);
298 struct wpabuf *ies; local
327 ies = p2p_build_probe_resp_ies(p2p);
328 if (ies == NULL)
333 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) {
336 wpabuf_free(ies);
2053 struct wpabuf *ies; local
    [all...]
p2p.h 476 * pointer can be %NULL). The WPS and P2P IEs to be added for Probe
532 * the IEs from probe_resp_ie need to be added to the end of the Probe
    [all...]
  /external/wpa_supplicant_8/src/common/
ieee802_11_common.h 81 int ieee802_11_ie_count(const u8 *ies, size_t ies_len);
82 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len,
ieee802_11_common.c 63 * IEs.
154 * @start: Pointer to the start of IEs
183 wpa_hexdump(MSG_MSGDUMP, "IEs", start, len);
314 int ieee802_11_ie_count(const u8 *ies, size_t ies_len)
319 if (ies == NULL)
322 pos = ies;
323 end = ies + ies_len;
336 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len,
342 pos = ies;
343 end = ies + ies_len
    [all...]
wpa_common.c 244 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len,
254 if (ies == NULL)
257 pos = ies;
258 end = ies + ies_len;
304 * Check that the protected IE count matches with IEs included in the
314 wpa_printf(MSG_DEBUG, "FT: Some required IEs not included in "
334 wpa_printf(MSG_DEBUG, "FT: %d protected IEs missing from "
1038 return 0; /* identical IEs */
1047 * for this, but verify that other parts of the RSN IEs are
1068 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid
    [all...]
wpa_common.h 236 * 3/4: one or two RSN IEs + GTK IE (encrypted)
384 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid);
407 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, struct wpa_ft_ies *parse);
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ft.c 304 const u8 *ies, size_t ies_len,
352 sm->ft_pending_req_ies = wpabuf_alloc_copy(ies, ies_len);
508 const u8 *ies, size_t ies_len)
516 ies, ies_len);
531 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) ==
533 wpa_printf(MSG_DEBUG, "FT: Failed to parse request IEs");
799 const u8 *ies, size_t ies_len,
819 wpa_hexdump(MSG_DEBUG, "FT: Received authentication frame IEs",
820 ies, ies_len);
822 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0)
1141 const u8 *ies; local
    [all...]
wpa_auth.h 290 u16 auth_transaction, const u8 *ies, size_t ies_len,
293 const u8 *ies, size_t ies_len),
295 u16 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies,
ieee802_11.c 263 const u8 *ies, size_t ies_len)
285 if (ies && ies_len)
286 os_memcpy(reply->u.auth.variable, ies, ies_len);
302 const u8 *ies, size_t ies_len)
308 status, ies, ies_len);
877 const u8 *ies, size_t ies_len, int reassoc)
885 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) {
940 sta->p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len,
969 sta->wps_ie = ieee802_11_vendor_ie_concat(ies, ies_len,
1066 resp = wpa_ft_validate_reassoc(sta->wpa_sm, ies,
    [all...]
wpa_auth_i.h 124 const u8 *ies, size_t ies_len);
drv_callbacks.c 549 const u8 *ies, size_t ies_len)
562 hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len);
598 rx_auth->auth_transaction, rx_auth->ies,
  /external/wpa_supplicant_8/src/drivers/
driver.h 212 * If the driver does not support reporting all IEs, the IE data structure is
213 * constructed of the IEs that are available. This field will also need to
215 * report all IEs to make it easier to support future additions.
231 * Followed by ie_len octets of IEs from Probe Response frame (or if
232 * the driver does not indicate source of IEs, these may also be from
233 * Beacon frame). After the first set of IEs, another set of IEs may
559 * for fast transition, this parameter is set to include the IEs that
561 * update_ft_ies() handler is called to update the IEs for further
564 * The driver should use these IEs only if the target AP is advertisin
3742 const u8 *ies; member in struct:wpa_event_data::ft_ies
3768 const u8 *ies; member in struct:wpa_event_data::auth_info
    [all...]

Completed in 486 milliseconds

1 2