HomeSort by relevance Sort by last modified time
    Searched refs:ies (Results 26 - 43 of 43) sorted by null

12

  /external/wpa_supplicant_8/wpa_supplicant/
p2p_supplicant.c 231 const u8 *ies; local
238 ies = (const u8 *) (bss + 1);
245 ies = ies + ies_len;
252 ies, ies_len) > 0)
315 struct wpabuf *wps_ie, *ies; local
350 ies = wpabuf_alloc(wpabuf_len(wps_ie) + ielen);
351 if (ies == NULL) {
355 wpabuf_put_buf(ies, wps_ie);
358 p2p_scan_ie(wpa_s->global->p2p, ies, dev_id)
4525 struct wpabuf *wps_ie, *ies; local
    [all...]
sme.c 777 wpa_hexdump(MSG_MSGDUMP, "SME: Authentication response IEs",
778 data->auth.ies, data->auth.ies_len);
786 data->auth.status_code, data->auth.ies,
842 if (wpa_ft_process_response(wpa_s->wpa, data->auth.ies,
928 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Could not parse own IEs?!");
968 const u8 *ies, size_t ies_len)
970 if (md == NULL || ies == NULL) {
980 wpa_hexdump(MSG_DEBUG, "SME: FT IEs", ies, ies_len);
985 os_memcpy(wpa_s->sme.ft_ies, ies, ies_len)
    [all...]
driver_i.h 301 const u8 *ies, size_t ies_len)
305 ies, ies_len);
events.c     [all...]
wpa_priv.c 800 if (data == NULL || data->ft_ies.ies == NULL)
813 os_memcpy(pos, data->ft_ies.ies, data->ft_ies.ies_len);
mesh_rsn.c 218 conf->ies = (u8 *) ie;
wps_supplicant.c     [all...]
  /external/wpa_supplicant_8/src/drivers/
driver.h 227 * If the driver does not support reporting all IEs, the IE data structure is
228 * constructed of the IEs that are available. This field will also need to
230 * report all IEs to make it easier to support future additions.
232 * This structure data is followed by ie_len octets of IEs from Probe Response
233 * frame (or if the driver does not indicate source of IEs, these may also be
234 * from Beacon frame). After the first set of IEs, another set of IEs may follow
674 * for fast transition, this parameter is set to include the IEs that
676 * update_ft_ies() handler is called to update the IEs for further
679 * The driver should use these IEs only if the target AP is advertisin
1074 const u8 *ies; member in struct:wpa_driver_mesh_join_params
4190 const u8 *ies; member in struct:wpa_event_data::ft_ies
4216 const u8 *ies; member in struct:wpa_event_data::auth_info
4557 const u8 *ies; member in struct:wpa_event_data::mesh_peer
    [all...]
driver_nl80211_event.c 175 event.auth.ies = mgmt->u.auth.variable;
950 data.ft_ies.ies = nla_data(tb[NL80211_ATTR_IE]);
1117 data.mesh_peer.ies = nla_data(tb[NL80211_ATTR_IE]);
1136 u8 *ies = NULL; local
    [all...]
driver_privsep.c 415 data.ft_ies.ies = buf + sizeof(int) + ETH_ALEN;
driver_nl80211.c     [all...]
driver_atheros.c 905 event.auth.ies = mgmt->u.auth.variable;
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
tdls.c 944 * Don't reject the message if failing to parse IEs. The IEs we need are
946 * end of short TDLS frames and that would look like invalid IEs.
950 "TDLS: Failed to parse IEs in Teardown - ignore as an interop workaround");
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/dbus/
dbus_new_handlers.c 1079 u8 *ies = NULL, *nies; local
1087 "%s[dbus]: ies must be an array of arrays of bytes",
1091 "Wrong IEs value type. Array of arrays of bytes required");
1100 "%s[dbus]: ies must be an array of arrays of bytes",
1103 message, "Wrong IEs value type. Array required");
1116 nies = os_realloc(ies, ies_len + len);
1118 os_free(ies);
1122 ies = nies;
1123 os_memcpy(ies + ies_len, val, len);
1129 params->extra_ies = ies;
    [all...]
  /external/wpa_supplicant_8/src/ap/
drv_callbacks.c 648 const u8 *ies, size_t ies_len)
661 hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len);
697 rx_auth->auth_transaction, rx_auth->ies,
    [all...]
ap_config.h 35 u8 *ies; member in struct:mesh_conf
  /external/wpa_supplicant_8/src/p2p/
p2p_i.h 840 struct os_reltime *rx_time, int level, const u8 *ies,
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
penwin.h 1555 WORD ies; member in struct:tagCTLINITIEDIT
    [all...]

Completed in 609 milliseconds

12