/external/wpa_supplicant_8/wpa_supplicant/ |
p2p_supplicant.c | 231 const u8 *ies; local 238 ies = (const u8 *) (bss + 1); 245 ies = ies + ies_len; 252 ies, ies_len) > 0) 315 struct wpabuf *wps_ie, *ies; local 350 ies = wpabuf_alloc(wpabuf_len(wps_ie) + ielen); 351 if (ies == NULL) { 355 wpabuf_put_buf(ies, wps_ie); 358 p2p_scan_ie(wpa_s->global->p2p, ies, dev_id) 4525 struct wpabuf *wps_ie, *ies; local [all...] |
sme.c | 777 wpa_hexdump(MSG_MSGDUMP, "SME: Authentication response IEs", 778 data->auth.ies, data->auth.ies_len); 786 data->auth.status_code, data->auth.ies, 842 if (wpa_ft_process_response(wpa_s->wpa, data->auth.ies, 928 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Could not parse own IEs?!"); 968 const u8 *ies, size_t ies_len) 970 if (md == NULL || ies == NULL) { 980 wpa_hexdump(MSG_DEBUG, "SME: FT IEs", ies, ies_len); 985 os_memcpy(wpa_s->sme.ft_ies, ies, ies_len) [all...] |
driver_i.h | 301 const u8 *ies, size_t ies_len) 305 ies, ies_len);
|
events.c | [all...] |
wpa_priv.c | 800 if (data == NULL || data->ft_ies.ies == NULL) 813 os_memcpy(pos, data->ft_ies.ies, data->ft_ies.ies_len);
|
mesh_rsn.c | 218 conf->ies = (u8 *) ie;
|
wps_supplicant.c | [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver.h | 227 * If the driver does not support reporting all IEs, the IE data structure is 228 * constructed of the IEs that are available. This field will also need to 230 * report all IEs to make it easier to support future additions. 232 * This structure data is followed by ie_len octets of IEs from Probe Response 233 * frame (or if the driver does not indicate source of IEs, these may also be 234 * from Beacon frame). After the first set of IEs, another set of IEs may follow 674 * for fast transition, this parameter is set to include the IEs that 676 * update_ft_ies() handler is called to update the IEs for further 679 * The driver should use these IEs only if the target AP is advertisin 1074 const u8 *ies; member in struct:wpa_driver_mesh_join_params 4190 const u8 *ies; member in struct:wpa_event_data::ft_ies 4216 const u8 *ies; member in struct:wpa_event_data::auth_info 4557 const u8 *ies; member in struct:wpa_event_data::mesh_peer [all...] |
driver_nl80211_event.c | 175 event.auth.ies = mgmt->u.auth.variable; 950 data.ft_ies.ies = nla_data(tb[NL80211_ATTR_IE]); 1117 data.mesh_peer.ies = nla_data(tb[NL80211_ATTR_IE]); 1136 u8 *ies = NULL; local [all...] |
driver_privsep.c | 415 data.ft_ies.ies = buf + sizeof(int) + ETH_ALEN;
|
driver_nl80211.c | [all...] |
driver_atheros.c | 905 event.auth.ies = mgmt->u.auth.variable; [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 944 * Don't reject the message if failing to parse IEs. The IEs we need are 946 * end of short TDLS frames and that would look like invalid IEs. 950 "TDLS: Failed to parse IEs in Teardown - ignore as an interop workaround"); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
dbus_new_handlers.c | 1079 u8 *ies = NULL, *nies; local 1087 "%s[dbus]: ies must be an array of arrays of bytes", 1091 "Wrong IEs value type. Array of arrays of bytes required"); 1100 "%s[dbus]: ies must be an array of arrays of bytes", 1103 message, "Wrong IEs value type. Array required"); 1116 nies = os_realloc(ies, ies_len + len); 1118 os_free(ies); 1122 ies = nies; 1123 os_memcpy(ies + ies_len, val, len); 1129 params->extra_ies = ies; [all...] |
/external/wpa_supplicant_8/src/ap/ |
drv_callbacks.c | 648 const u8 *ies, size_t ies_len) 661 hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len); 697 rx_auth->auth_transaction, rx_auth->ies, [all...] |
ap_config.h | 35 u8 *ies; member in struct:mesh_conf
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_i.h | 840 struct os_reltime *rx_time, int level, const u8 *ies,
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
penwin.h | 1555 WORD ies; member in struct:tagCTLINITIEDIT [all...] |