/external/tcpdump/ |
print-fr.c | 395 u_int8_t ie_len; member in struct:ie_tlv_header_t 403 u_int8_t ie_type,ie_len; local 437 ie_len=tptr[1]; 442 ie_len); 445 if (ie_type == 0 || ie_len <= sizeof(struct ie_tlv_header_t)) 448 TCHECK2(*tptr,ie_len); 451 ie_len-=sizeof(struct ie_tlv_header_t); 462 for (idx = 0; idx < ie_len && idx < MFR_ID_STRING_MAXLEN; idx++) { 471 if (ie_len == sizeof(struct timeval)) { 487 print_unknown_data(tptr,"\n\t ",ie_len); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
bss.c | 361 bss = os_zalloc(sizeof(*bss) + res->ie_len + res->beacon_ie_len); 369 bss->ie_len = res->ie_len; 371 os_memcpy(bss + 1, res + 1, res->ie_len + res->beacon_ie_len); 467 if (old->ie_len == new->ie_len && 468 os_memcmp(old + 1, new + 1, old->ie_len) == 0) 551 if (bss->ie_len + bss->beacon_ie_len >= 552 res->ie_len + res->beacon_ie_len) { 553 os_memcpy(bss + 1, res + 1, res->ie_len + res->beacon_ie_len) [all...] |
wnm_sta.c | 260 u8 ie_len = *(pos + 1); local 261 if (pos + 2 + ie_len > frm + len) { 262 wpa_printf(MSG_INFO, "WNM: Invalid IE len %u", ie_len); 265 wpa_hexdump(MSG_DEBUG, "WNM: Element", pos, 2 + ie_len); 274 pos += ie_len + 2; 773 u8 ie, ie_len; local 780 ie_len = *pos++; 782 ie, ie_len); 783 if (ie_len > end - pos) { 788 next = pos + ie_len; [all...] |
p2p_supplicant.h | 98 u16 reason_code, const u8 *ie, size_t ie_len, 101 u16 reason_code, const u8 *ie, size_t ie_len, 145 const u8 *ie, size_t ie_len, 198 const u8 *ie, size_t ie_len,
|
bss.h | 92 size_t ie_len; member in struct:wpa_bss 95 /* followed by ie_len octets of IEs */
|
events.c | 2649 size_t ie_len = 0; local 2703 size_t ie_len = 0; local 3220 size_t ie_len = data->rx_mgmt.frame_len - local 3255 size_t ie_len = data->rx_mgmt.frame_len - local [all...] |
notify.h | 128 const u8 *ie, size_t ie_len, u32 ssi_signal);
|
notify.c | 620 const u8 *ie, size_t ie_len, u32 ssi_signal) 623 wpas_dbus_signal_preq(wpa_s, addr, dst, bssid, ie, ie_len, ssi_signal);
|
scan.c | [all...] |
/external/wpa_supplicant_8/src/ap/ |
utils.c | 20 const u8 *ie, size_t ie_len,
|
hostapd.h | 58 const u8 *ie, size_t ie_len, int ssi_signal); 409 const u8 *ie, size_t ie_len, 422 const u8 *bssid, const u8 *ie, size_t ie_len,
|
beacon.c | 510 size_t ie_len; local 519 ie_len = len - (IEEE80211_HDRLEN + sizeof(mgmt->u.probe_req)); 524 ie, ie_len, ssi_signal) > 0) 530 if (ieee802_11_parse_elems(ie, ie_len, &elems, 0) == ParseFailed) { 546 wps = ieee802_11_vendor_ie_concat(ie, ie_len, WPS_DEV_OUI_WFA); 559 p2p = ieee802_11_vendor_ie_concat(ie, ie_len, P2P_IE_VENDOR_TYPE);
|
wnm_ap.c | 204 u8 ie_len = pos[1]; local 205 if (pos + 2 + ie_len > frm + len) 216 pos += ie_len + 2;
|
drv_callbacks.c | 526 const u8 *bssid, const u8 *ie, size_t ie_len, 538 sa, da, bssid, ie, ie_len, 1040 data->rx_probe_req.ie_len,
|
hw_features.c | 309 ieee802_11_parse_elems((u8 *) (bss + 1), bss->ie_len, &elems, 0); 407 ieee802_11_parse_elems((u8 *) (bss + 1), bss->ie_len, &elems, 0); 489 ieee802_11_parse_elems((u8 *) (bss + 1), bss->ie_len, &elems,
|
/external/wpa_supplicant_8/src/drivers/ |
driver_privsep.c | 174 if (sizeof(*r) + r->ie_len > (size_t) len) { 314 int ie_len; local 323 os_memcpy(&ie_len, pos, sizeof(int)); 325 if (ie_len < 0 || ie_len > end - pos) 327 if (ie_len) { 329 data.assoc_info.req_ies_len = ie_len; 330 pos += ie_len;
|
driver_wext.c | 1108 size_t ie_len; member in struct:wext_scan_data [all...] |
driver.h | 205 * @ie_len: length of the following IE field in octets 228 size_t ie_len; member in struct:wpa_scan_res 231 * Followed by ie_len octets of IEs from Probe Response frame (or if 391 size_t ie_len; member in struct:wpa_driver_auth_params 3649 size_t ie_len; member in struct:wpa_event_data::disassoc_info 3680 size_t ie_len; member in struct:wpa_event_data::deauth_info 3964 size_t ie_len; member in struct:wpa_event_data::rx_probe_req [all...] |
driver_atheros.c | 674 atheros_set_opt_ie(void *priv, const u8 *ie, size_t ie_len) 681 (unsigned long) ie_len); 682 wpa_hexdump(MSG_DEBUG, "atheros: set_generic_elem", ie, ie_len); 685 drv->wpa_ie = wpabuf_alloc_copy(ie, ie_len); 688 os_memcpy(&(app_ie->app_buf[0]), ie, ie_len); 689 app_ie->app_buflen = ie_len; 695 os_memcpy(&(app_ie->app_buf[ie_len]), 698 app_ie->app_buflen = ie_len + wpabuf_len(drv->wps_beacon_ie); 709 os_memcpy(&(app_ie->app_buf[ie_len]), 712 app_ie->app_buflen = ie_len [all...] |
driver_test.c | 510 event.rx_probe_req.ie_len = ielen; [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 52 u8 ie_len; member in struct:wpa_tdls_ftie 62 u8 ie_len; member in struct:wpa_tdls_timeoutie 69 u8 ie_len; member in struct:wpa_tdls_lnkid 82 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs); 165 static u8 * wpa_add_ie(u8 *pos, const u8 *ie, size_t ie_len) 167 os_memcpy(pos, ie, ie_len); 168 return pos + ie_len; 708 lnkid->ie_len = 3 * ETH_ALEN; 773 ftie->ie_len = sizeof(struct wpa_tdls_ftie) - 2; 779 ftie->ie_len += 170 [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new.h | 222 const u8 *ie, size_t ie_len, u32 ssi_signal); 495 const u8 *ie, size_t ie_len,
|
/external/wpa_supplicant_8/src/p2p/ |
p2p.h | [all...] |
p2p.c | [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 195 static int wpa_ft_parse_ftie(const u8 *ie, size_t ie_len, 201 parse->ftie_len = ie_len; 204 end = ie + ie_len; [all...] |