/external/wpa_supplicant_8/wpa_supplicant/ |
sme.h | 20 const u8 *ies, size_t ies_len); 55 const u8 *ies, size_t ies_len)
|
wps_supplicant.h | 47 int wpas_wps_scan_result_text(const u8 *ies, size_t ies_len, char *pos,
|
p2p_supplicant.h | 53 int wpas_p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf, 65 void wpas_p2p_scan_ie(struct wpa_supplicant *wpa_s, struct wpabuf *ies);
|
sme.c | 650 wpa_hexdump(MSG_MSGDUMP, "SME: Authentication response IEs", 651 data->auth.ies, data->auth.ies_len); 659 data->auth.status_code, data->auth.ies, 716 edata.ft_ies.ies = data->auth.ies; 791 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Could not parse own IEs?!"); 831 const u8 *ies, size_t ies_len) 833 if (md == NULL || ies == NULL) { 843 wpa_hexdump(MSG_DEBUG, "SME: FT IEs", ies, ies_len) [all...] |
wpas_glue.c | 517 const u8 *ies, size_t ies_len) 521 return sme_update_ft_ies(wpa_s, md, ies, ies_len); 522 return wpa_drv_update_ft_ies(wpa_s, md, ies, ies_len); 528 const u8 *ies, size_t ies_len) 531 return wpa_drv_send_ft_action(wpa_s, action, target_ap, ies, ies_len);
|
driver_i.h | 283 const u8 *ies, size_t ies_len) 287 ies, ies_len); 293 const u8 *ies, size_t ies_len) 297 target_ap, ies, ies_len);
|
p2p_supplicant.c | 222 const u8 *ies; local 229 ies = (const u8 *) (bss + 1); 236 ies = ies + ies_len; 243 ies, ies_len) > 0) 288 struct wpabuf *wps_ie, *ies; local 323 ies = wpabuf_alloc(wpabuf_len(wps_ie) + ielen); 324 if (ies == NULL) { 328 wpabuf_put_buf(ies, wps_ie); 331 p2p_scan_ie(wpa_s->global->p2p, ies, dev_id) 4490 struct wpabuf *wps_ie, *ies; local [all...] |
events.c | [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.h | 47 int (*update_ft_ies)(void *ctx, const u8 *md, const u8 *ies, 50 const u8 *ies, size_t ies_len); 325 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len); 327 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 332 int wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, 340 wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) 352 wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 368 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 378 void wpa_tdls_ap_ies(struct wpa_sm *sm, const u8 *ies, size_t len); 379 void wpa_tdls_assoc_resp_ies(struct wpa_sm *sm, const u8 *ies, size_t len) [all...] |
wpa_i.h | 224 const u8 *ies, size_t ies_len) 227 return sm->ctx->update_ft_ies(sm->ctx->ctx, md, ies, ies_len); 233 const u8 *ies, size_t ies_len) 237 ies, ies_len);
|
wpa_ft.c | 59 * @ies: Association Response IEs or %NULL to clear FT parameters 60 * @ies_len: Length of ies buffer in octets 63 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) 70 if (wpa_ft_parse_ies(ies, ies_len, &ft) < 0) 131 * wpa_ft_gen_req_ies - Generate FT (IEEE 802.11r) IEs for Auth/ReAssoc Request 133 * @len: Buffer for returning the length of the IEs 141 * Returns: Pointer to buffer with IEs or %NULL on failure 374 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 387 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len) [all...] |
tdls.c | 930 wpa_printf(MSG_INFO, "TDLS: Failed to parse IEs in Teardown"); [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_dev_disc.c | 313 struct wpabuf *ies; local 317 ies = p2p_build_probe_resp_ies(p2p); 318 if (ies == NULL) 325 ies) < 0) { 328 wpabuf_free(ies);
|
p2p.c | 245 struct wpabuf *ies; local 279 ies = p2p_build_probe_resp_ies(p2p); 280 if (ies == NULL) 288 ies) < 0) { 292 wpabuf_free(ies); 299 struct wpabuf *ies; local 328 ies = p2p_build_probe_resp_ies(p2p); 329 if (ies == NULL) 334 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) { 337 wpabuf_free(ies); 2068 struct wpabuf *ies; local [all...] |
p2p.h | 476 * pointer can be %NULL). The WPS and P2P IEs to be added for Probe 532 * the IEs from probe_resp_ie need to be added to the end of the Probe [all...] |
/external/wpa_supplicant_8/src/common/ |
ieee802_11_common.h | 81 int ieee802_11_ie_count(const u8 *ies, size_t ies_len); 82 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len,
|
ieee802_11_common.c | 63 * IEs. 154 * @start: Pointer to the start of IEs 183 wpa_hexdump(MSG_MSGDUMP, "IEs", start, len); 314 int ieee802_11_ie_count(const u8 *ies, size_t ies_len) 319 if (ies == NULL) 322 pos = ies; 323 end = ies + ies_len; 336 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len, 342 pos = ies; 343 end = ies + ies_len [all...] |
wpa_common.c | 244 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, 254 if (ies == NULL) 257 pos = ies; 258 end = ies + ies_len; 304 * Check that the protected IE count matches with IEs included in the 314 wpa_printf(MSG_DEBUG, "FT: Some required IEs not included in " 334 wpa_printf(MSG_DEBUG, "FT: %d protected IEs missing from " 1038 return 0; /* identical IEs */ 1047 * for this, but verify that other parts of the RSN IEs are 1068 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid [all...] |
wpa_common.h | 236 * 3/4: one or two RSN IEs + GTK IE (encrypted) 384 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid); 407 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, struct wpa_ft_ies *parse);
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 304 const u8 *ies, size_t ies_len, 353 sm->ft_pending_req_ies = wpabuf_alloc_copy(ies, ies_len); 509 const u8 *ies, size_t ies_len) 517 ies, ies_len); 532 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) == 534 wpa_printf(MSG_DEBUG, "FT: Failed to parse request IEs"); 800 const u8 *ies, size_t ies_len, 820 wpa_hexdump(MSG_DEBUG, "FT: Received authentication frame IEs", 821 ies, ies_len); 823 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) 1142 const u8 *ies; local [all...] |
wpa_auth.h | 290 u16 auth_transaction, const u8 *ies, size_t ies_len, 293 const u8 *ies, size_t ies_len), 295 u16 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies,
|
ieee802_11.c | 263 const u8 *ies, size_t ies_len) 285 if (ies && ies_len) 286 os_memcpy(reply->u.auth.variable, ies, ies_len); 302 const u8 *ies, size_t ies_len) 308 status, ies, ies_len); 877 const u8 *ies, size_t ies_len, int reassoc) 885 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) { 940 sta->p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, 969 sta->wps_ie = ieee802_11_vendor_ie_concat(ies, ies_len, 1066 resp = wpa_ft_validate_reassoc(sta->wpa_sm, ies, [all...] |
wpa_auth_i.h | 124 const u8 *ies, size_t ies_len);
|
drv_callbacks.c | 554 const u8 *ies, size_t ies_len) 567 hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len); 603 rx_auth->auth_transaction, rx_auth->ies,
|
/external/wpa_supplicant_8/src/drivers/ |
driver.h | 212 * If the driver does not support reporting all IEs, the IE data structure is 213 * constructed of the IEs that are available. This field will also need to 215 * report all IEs to make it easier to support future additions. 231 * Followed by ie_len octets of IEs from Probe Response frame (or if 232 * the driver does not indicate source of IEs, these may also be from 233 * Beacon frame). After the first set of IEs, another set of IEs may 576 * for fast transition, this parameter is set to include the IEs that 578 * update_ft_ies() handler is called to update the IEs for further 581 * The driver should use these IEs only if the target AP is advertisin 3765 const u8 *ies; member in struct:wpa_event_data::ft_ies 3791 const u8 *ies; member in struct:wpa_event_data::auth_info [all...] |