HomeSort by relevance Sort by last modified time
    Searched refs:ies (Results 1 - 25 of 43) sorted by null

1 2

  /external/wpa_supplicant_8/wpa_supplicant/
mesh.h 17 int wpas_mesh_scan_result_text(const u8 *ies, size_t ies_len, char *buf,
25 const u8 *ies, size_t ie_len);
33 const u8 *ies, size_t ie_len)
sme.h 20 const u8 *ies, size_t ies_len);
56 const u8 *ies, size_t ies_len)
wmm_ac.h 163 void wmm_ac_notify_assoc(struct wpa_supplicant *wpa_s, const u8 *ies,
mesh.c 50 if (ifmsh->mconf->ies) {
51 ifmsh->mconf->ies = NULL;
277 const u8 *ies, size_t ie_len)
284 if (ieee802_11_parse_elems(ies, ie_len, &elems, 0) == ParseFailed) {
353 params.ies = wpa_s->ifmsh->mconf->ies;
391 static int mesh_attr_text(const u8 *ies, size_t ies_len, char *buf, char *end)
398 if (ieee802_11_parse_elems(ies, ies_len, &elems, 0) == ParseFailed)
479 int wpas_mesh_scan_result_text(const u8 *ies, size_t ies_len, char *buf,
482 return mesh_attr_text(ies, ies_len, buf, end)
    [all...]
mesh_mpm.c 876 const u8 *ies; local
889 ies = mgmt->u.action.u.slf_prot_action.variable;
904 WPA_GET_LE16(ies));
905 ies += 2; /* capability */
909 wpa_printf(MSG_DEBUG, "MPM: AID 0x%x", WPA_GET_LE16(ies));
910 ies += 2; /* aid */
914 /* check for mesh peering, mesh id and mesh config IEs */
915 if (ieee802_11_parse_elems(ies, ie_len, &elems, 0) == ParseFailed) {
916 wpa_printf(MSG_DEBUG, "MPM: Failed to parse PLINK IEs");
982 ies, ie_len))
    [all...]
wmm_ac.c 421 wmm_ac_process_param_elem(struct wpa_supplicant *wpa_s, const u8 *ies,
430 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) {
431 wpa_printf(MSG_DEBUG, "WMM AC: could not parse assoc ies");
466 static int wmm_ac_init(struct wpa_supplicant *wpa_s, const u8 *ies,
477 if (!ies) {
478 wpa_printf(MSG_ERROR, "WMM AC: Missing IEs");
491 assoc_data = wmm_ac_process_param_elem(wpa_s, ies, ies_len);
536 void wmm_ac_notify_assoc(struct wpa_supplicant *wpa_s, const u8 *ies,
539 if (wmm_ac_init(wpa_s, ies, ies_len, wmm_params))
wps_supplicant.h 47 int wpas_wps_scan_result_text(const u8 *ies, size_t ies_len, char *pos,
wpas_glue.c 532 const u8 *ies, size_t ies_len)
536 return sme_update_ft_ies(wpa_s, md, ies, ies_len);
537 return wpa_drv_update_ft_ies(wpa_s, md, ies, ies_len);
543 const u8 *ies, size_t ies_len)
562 * FT IEs
576 os_memcpy(pos, ies, ies_len);
p2p_supplicant.h 55 int wpas_p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf,
68 void wpas_p2p_scan_ie(struct wpa_supplicant *wpa_s, struct wpabuf *ies);
  /external/wpa_supplicant_8/src/rsn_supp/
wpa.h 48 int (*update_ft_ies)(void *ctx, const u8 *md, const u8 *ies,
51 const u8 *ies, size_t ies_len);
348 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len);
350 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
355 int wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies,
363 wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len)
375 wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
391 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
401 void wpa_tdls_ap_ies(struct wpa_sm *sm, const u8 *ies, size_t len);
402 void wpa_tdls_assoc_resp_ies(struct wpa_sm *sm, const u8 *ies, size_t len)
    [all...]
wpa_i.h 229 const u8 *ies, size_t ies_len)
232 return sm->ctx->update_ft_ies(sm->ctx->ctx, md, ies, ies_len);
238 const u8 *ies, size_t ies_len)
242 ies, ies_len);
wpa_ft.c 54 * @ies: Association Response IEs or %NULL to clear FT parameters
55 * @ies_len: Length of ies buffer in octets
58 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len)
65 if (wpa_ft_parse_ies(ies, ies_len, &ft) < 0)
126 * wpa_ft_gen_req_ies - Generate FT (IEEE 802.11r) IEs for Auth/ReAssoc Request
128 * @len: Buffer for returning the length of the IEs
137 * Returns: Pointer to buffer with IEs or %NULL on failure
371 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len,
384 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len)
    [all...]
  /external/wpa_supplicant_8/src/p2p/
p2p_dev_disc.c 313 struct wpabuf *ies; local
317 ies = p2p_build_probe_resp_ies(p2p, NULL, 0);
318 if (ies == NULL)
325 ies) < 0) {
328 wpabuf_free(ies);
p2p.c 266 struct wpabuf *ies; local
300 ies = p2p_build_probe_resp_ies(p2p, NULL, 0);
301 if (ies == NULL)
309 ies) < 0) {
313 wpabuf_free(ies);
320 struct wpabuf *ies; local
349 ies = p2p_build_probe_resp_ies(p2p, NULL, 0);
350 if (ies == NULL)
355 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) {
358 wpabuf_free(ies);
2260 struct wpabuf *ies; local
    [all...]
p2p.h 585 * pointer can be %NULL). The WPS and P2P IEs to be added for Probe
642 * the IEs from probe_resp_ie need to be added to the end of the Probe
    [all...]
  /external/wpa_supplicant_8/src/common/
ieee802_11_common.h 86 int ieee802_11_ie_count(const u8 *ies, size_t ies_len);
87 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len,
ieee802_11_common.c 64 * IEs.
164 * @start: Pointer to the start of IEs
193 wpa_hexdump(MSG_MSGDUMP, "IEs", start, len);
363 int ieee802_11_ie_count(const u8 *ies, size_t ies_len)
368 if (ies == NULL)
371 pos = ies;
372 end = ies + ies_len;
385 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len,
391 pos = ies;
392 end = ies + ies_len
    [all...]
wpa_common.c 327 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len,
337 if (ies == NULL)
340 pos = ies;
341 end = ies + ies_len;
391 * Check that the protected IE count matches with IEs included in the
401 wpa_printf(MSG_DEBUG, "FT: Some required IEs not included in "
421 wpa_printf(MSG_DEBUG, "FT: %d protected IEs missing from "
1228 return 0; /* identical IEs */
1237 * for this, but verify that other parts of the RSN IEs are
    [all...]
wpa_common.h 243 * 3/4: one or two RSN IEs + GTK IE (encrypted)
410 int wpa_insert_pmkid(u8 *ies, size_t ies_len, const u8 *pmkid);
433 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, struct wpa_ft_ies *parse);
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ft.c 305 const u8 *ies, size_t ies_len,
354 sm->ft_pending_req_ies = wpabuf_alloc_copy(ies, ies_len);
506 const u8 *ies, size_t ies_len)
514 ies, ies_len);
529 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) ==
531 wpa_printf(MSG_DEBUG, "FT: Failed to parse request IEs");
799 const u8 *ies, size_t ies_len,
819 wpa_hexdump(MSG_DEBUG, "FT: Received authentication frame IEs",
820 ies, ies_len);
822 if (wpa_ft_parse_ies(ies, ies_len, &parse) < 0)
1142 const u8 *ies; local
    [all...]
wpa_auth.h 296 u16 auth_transaction, const u8 *ies, size_t ies_len,
299 const u8 *ies, size_t ies_len),
301 u16 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies,
ieee802_11.c 252 const u8 *ies, size_t ies_len)
274 if (ies && ies_len)
275 os_memcpy(reply->u.auth.variable, ies, ies_len);
291 const u8 *ies, size_t ies_len)
297 status, ies, ies_len);
    [all...]
wpa_auth_i.h 127 const u8 *ies, size_t ies_len);
  /external/wpa_supplicant_8/src/drivers/
driver_nl80211_scan.c 137 wpa_hexdump(MSG_MSGDUMP, "nl80211: Scan extra IEs",
436 const u8 * nl80211_get_ie(const u8 *ies, size_t ies_len, u8 ie)
440 if (ies == NULL)
443 pos = ies;
444 end = ies + ies_len;
driver_nl80211.h 272 const u8 * nl80211_get_ie(const u8 *ies, size_t ies_len, u8 ie);

Completed in 269 milliseconds

1 2