/external/wpa_supplicant_8/wpa_supplicant/ |
mesh.h | 17 int wpas_mesh_scan_result_text(const u8 *ies, size_t ies_len, char *buf, 25 const u8 *ies, size_t ie_len); 33 const u8 *ies, size_t ie_len)
|
sme.h | 20 const u8 *ies, size_t ies_len); 56 const u8 *ies, size_t ies_len)
|
wmm_ac.h | 163 void wmm_ac_notify_assoc(struct wpa_supplicant *wpa_s, const u8 *ies,
|
mesh.c | 50 if (ifmsh->mconf->ies) { 51 ifmsh->mconf->ies = NULL; 277 const u8 *ies, size_t ie_len) 284 if (ieee802_11_parse_elems(ies, ie_len, &elems, 0) == ParseFailed) { 353 params.ies = wpa_s->ifmsh->mconf->ies; 391 static int mesh_attr_text(const u8 *ies, size_t ies_len, char *buf, char *end) 398 if (ieee802_11_parse_elems(ies, ies_len, &elems, 0) == ParseFailed) 479 int wpas_mesh_scan_result_text(const u8 *ies, size_t ies_len, char *buf, 482 return mesh_attr_text(ies, ies_len, buf, end) [all...] |
mesh_mpm.c | 876 const u8 *ies; local 889 ies = mgmt->u.action.u.slf_prot_action.variable; 904 WPA_GET_LE16(ies)); 905 ies += 2; /* capability */ 909 wpa_printf(MSG_DEBUG, "MPM: AID 0x%x", WPA_GET_LE16(ies)); 910 ies += 2; /* aid */ 914 /* check for mesh peering, mesh id and mesh config IEs */ 915 if (ieee802_11_parse_elems(ies, ie_len, &elems, 0) == ParseFailed) { 916 wpa_printf(MSG_DEBUG, "MPM: Failed to parse PLINK IEs"); 982 ies, ie_len)) [all...] |
wmm_ac.c | 421 wmm_ac_process_param_elem(struct wpa_supplicant *wpa_s, const u8 *ies, 430 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) { 431 wpa_printf(MSG_DEBUG, "WMM AC: could not parse assoc ies"); 466 static int wmm_ac_init(struct wpa_supplicant *wpa_s, const u8 *ies, 477 if (!ies) { 478 wpa_printf(MSG_ERROR, "WMM AC: Missing IEs"); 491 assoc_data = wmm_ac_process_param_elem(wpa_s, ies, ies_len); 536 void wmm_ac_notify_assoc(struct wpa_supplicant *wpa_s, const u8 *ies, 539 if (wmm_ac_init(wpa_s, ies, ies_len, wmm_params))
|
wps_supplicant.h | 47 int wpas_wps_scan_result_text(const u8 *ies, size_t ies_len, char *pos,
|
wpas_glue.c | 532 const u8 *ies, size_t ies_len) 536 return sme_update_ft_ies(wpa_s, md, ies, ies_len); 537 return wpa_drv_update_ft_ies(wpa_s, md, ies, ies_len); 543 const u8 *ies, size_t ies_len) 562 * FT IEs 576 os_memcpy(pos, ies, ies_len);
|
p2p_supplicant.h | 55 int wpas_p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf, 68 void wpas_p2p_scan_ie(struct wpa_supplicant *wpa_s, struct wpabuf *ies);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.h | 48 int (*update_ft_ies)(void *ctx, const u8 *md, const u8 *ies, 51 const u8 *ies, size_t ies_len); 348 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len); 350 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 355 int wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, 363 wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) 375 wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 391 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 401 void wpa_tdls_ap_ies(struct wpa_sm *sm, const u8 *ies, size_t len); 402 void wpa_tdls_assoc_resp_ies(struct wpa_sm *sm, const u8 *ies, size_t len) [all...] |
wpa_i.h | 229 const u8 *ies, size_t ies_len) 232 return sm->ctx->update_ft_ies(sm->ctx->ctx, md, ies, ies_len); 238 const u8 *ies, size_t ies_len) 242 ies, ies_len);
|
wpa_ft.c | 54 * @ies: Association Response IEs or %NULL to clear FT parameters 55 * @ies_len: Length of ies buffer in octets 58 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) 65 if (wpa_ft_parse_ies(ies, ies_len, &ft) < 0) 126 * wpa_ft_gen_req_ies - Generate FT (IEEE 802.11r) IEs for Auth/ReAssoc Request 128 * @len: Buffer for returning the length of the IEs 137 * Returns: Pointer to buffer with IEs or %NULL on failure 371 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 384 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len) [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_dev_disc.c | 313 struct wpabuf *ies; local 317 ies = p2p_build_probe_resp_ies(p2p, NULL, 0); 318 if (ies == NULL) 325 ies) < 0) { 328 wpabuf_free(ies);
|
p2p.c | 266 struct wpabuf *ies; local 300 ies = p2p_build_probe_resp_ies(p2p, NULL, 0); 301 if (ies == NULL) 309 ies) < 0) { 313 wpabuf_free(ies); 320 struct wpabuf *ies; local 349 ies = p2p_build_probe_resp_ies(p2p, NULL, 0); 350 if (ies == NULL) 355 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) { 358 wpabuf_free(ies); 2260 struct wpabuf *ies; local [all...] |
p2p.h | 585 * pointer can be %NULL). The WPS and P2P IEs to be added for Probe 642 * the IEs from probe_resp_ie need to be added to the end of the Probe [all...] |
/external/wpa_supplicant_8/src/common/ |
ieee802_11_common.h | 86 int ieee802_11_ie_count(const u8 *ies, size_t ies_len); 87 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len,
|
ieee802_11_common.c | 64 * IEs. 164 * @start: Pointer to the start of IEs 193 wpa_hexdump(MSG_MSGDUMP, "IEs", start, len); 363 int ieee802_11_ie_count(const u8 *ies, size_t ies_len) 368 if (ies == NULL) 371 pos = ies; 372 end = ies + ies_len; 385 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len, 391 pos = ies; 392 end = ies + ies_len [all...] |
wpa_common.c | 327 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, 337 if (ies == NULL) 340 pos = ies; 341 end = ies + ies_len; 391 * Check that the protected IE count matches with IEs included in the 401 wpa_printf(MSG_DEBUG, "FT: Some required IEs not included in " 421 wpa_printf(MSG_DEBUG, "FT: %d protected IEs missing from " 1228 return 0; /* identical IEs */ 1237 * for this, but verify that other parts of the RSN IEs are [all...] |
wpa_common.h | 243 * 3/4: one or two RSN IEs + GTK IE (encrypted) 410 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid); 433 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, struct wpa_ft_ies *parse);
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 305 const u8 *ies, size_t ies_len, 354 sm->ft_pending_req_ies = wpabuf_alloc_copy(ies, ies_len); 506 const u8 *ies, size_t ies_len) 514 ies, ies_len); 529 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) == 531 wpa_printf(MSG_DEBUG, "FT: Failed to parse request IEs"); 799 const u8 *ies, size_t ies_len, 819 wpa_hexdump(MSG_DEBUG, "FT: Received authentication frame IEs", 820 ies, ies_len); 822 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0) 1142 const u8 *ies; local [all...] |
wpa_auth.h | 296 u16 auth_transaction, const u8 *ies, size_t ies_len, 299 const u8 *ies, size_t ies_len), 301 u16 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies,
|
ieee802_11.c | 252 const u8 *ies, size_t ies_len) 274 if (ies && ies_len) 275 os_memcpy(reply->u.auth.variable, ies, ies_len); 291 const u8 *ies, size_t ies_len) 297 status, ies, ies_len); [all...] |
wpa_auth_i.h | 127 const u8 *ies, size_t ies_len);
|
/external/wpa_supplicant_8/src/drivers/ |
driver_nl80211_scan.c | 137 wpa_hexdump(MSG_MSGDUMP, "nl80211: Scan extra IEs", 436 const u8 * nl80211_get_ie(const u8 *ies, size_t ies_len, u8 ie) 440 if (ies == NULL) 443 pos = ies; 444 end = ies + ies_len;
|
driver_nl80211.h | 272 const u8 * nl80211_get_ie(const u8 *ies, size_t ies_len, u8 ie);
|