/external/wpa_supplicant_8/src/ap/ |
wnm_ap.c | 204 u8 ie_len = pos[1]; local 205 if (pos + 2 + ie_len > frm + len) 216 pos += ie_len + 2;
|
beacon.c | 510 size_t ie_len; local 519 ie_len = len - (IEEE80211_HDRLEN + sizeof(mgmt->u.probe_req)); 524 ie, ie_len, ssi_signal) > 0) 530 if (ieee802_11_parse_elems(ie, ie_len, &elems, 0) == ParseFailed) { 546 wps = ieee802_11_vendor_ie_concat(ie, ie_len, WPS_DEV_OUI_WFA); 559 p2p = ieee802_11_vendor_ie_concat(ie, ie_len, P2P_IE_VENDOR_TYPE);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
bss.h | 92 size_t ie_len; member in struct:wpa_bss 95 /* followed by ie_len octets of IEs */
|
wnm_sta.c | 260 u8 ie_len = *(pos + 1); local 261 if (pos + 2 + ie_len > frm + len) { 262 wpa_printf(MSG_INFO, "WNM: Invalid IE len %u", ie_len); 265 wpa_hexdump(MSG_DEBUG, "WNM: Element", pos, 2 + ie_len); 274 pos += ie_len + 2; 773 u8 ie, ie_len; local 780 ie_len = *pos++; 782 ie, ie_len); 783 if (ie_len > end - pos) { 788 next = pos + ie_len; [all...] |
events.c | 2649 size_t ie_len = 0; local 2703 size_t ie_len = 0; local 3220 size_t ie_len = data->rx_mgmt.frame_len - local 3255 size_t ie_len = data->rx_mgmt.frame_len - local [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_privsep.c | 174 if (sizeof(*r) + r->ie_len > (size_t) len) { 314 int ie_len; local 323 os_memcpy(&ie_len, pos, sizeof(int)); 325 if (ie_len < 0 || ie_len > end - pos) 327 if (ie_len) { 329 data.assoc_info.req_ies_len = ie_len; 330 pos += ie_len;
|
driver_wext.c | 1108 size_t ie_len; member in struct:wext_scan_data [all...] |
driver.h | 205 * @ie_len: length of the following IE field in octets 228 size_t ie_len; member in struct:wpa_scan_res 231 * Followed by ie_len octets of IEs from Probe Response frame (or if 391 size_t ie_len; member in struct:wpa_driver_auth_params 3649 size_t ie_len; member in struct:wpa_event_data::disassoc_info 3680 size_t ie_len; member in struct:wpa_event_data::deauth_info 3964 size_t ie_len; member in struct:wpa_event_data::rx_probe_req [all...] |
driver_nl80211.c | 5481 size_t ie_len, beacon_ie_len; local [all...] |
/external/tcpdump/ |
print-fr.c | 395 u_int8_t ie_len; member in struct:ie_tlv_header_t 403 u_int8_t ie_type,ie_len; local 437 ie_len=tptr[1]; 442 ie_len); 445 if (ie_type == 0 || ie_len <= sizeof(struct ie_tlv_header_t)) 448 TCHECK2(*tptr,ie_len); 451 ie_len-=sizeof(struct ie_tlv_header_t); 462 for (idx = 0; idx < ie_len && idx < MFR_ID_STRING_MAXLEN; idx++) { 471 if (ie_len == sizeof(struct timeval)) { 487 print_unknown_data(tptr,"\n\t ",ie_len); [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 52 u8 ie_len; member in struct:wpa_tdls_ftie 62 u8 ie_len; member in struct:wpa_tdls_timeoutie 69 u8 ie_len; member in struct:wpa_tdls_lnkid 82 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs); 165 static u8 * wpa_add_ie(u8 *pos, const u8 *ie, size_t ie_len) 167 os_memcpy(pos, ie, ie_len); 168 return pos + ie_len; 708 lnkid->ie_len = 3 * ETH_ALEN; 773 ftie->ie_len = sizeof(struct wpa_tdls_ftie) - 2; 779 ftie->ie_len += 170 [all...] |
/hardware/broadcom/wlan/bcmdhd/dhdutil/ |
bcmutils.c | 2091 uint8 ie_len; local [all...] |