Home | History | Annotate | Download | only in drivers

Lines Matching defs:Data

430     UCHAR Data[sizeof(ULONG)];
436 UCHAR Data[sizeof(ULONG)];
452 char *data, size_t len)
476 hdrlen = sizeof(NDISUIO_QUERY_OID) - sizeof(o->Data);
490 os_memcpy(data, o->Data, written);
518 os_memcpy(data, o->Data, o->Length);
527 const char *data, size_t len)
536 wpa_hexdump_key(MSG_MSGDUMP, txt, (const u8 *) data, len);
539 reallen = buflen - sizeof(o->Data);
547 if (data)
548 os_memcpy(o->Data, data, len);
564 wpa_hexdump_key(MSG_MSGDUMP, txt, (const u8 *) data, len);
572 if (data)
573 os_memcpy(o->Data, data, len);
798 return r; /* No valid SSID inside scan data */
1337 union wpa_event_data data;
1350 * data. Limit the length to the current buffer size to avoid
1351 * crashing in hexdump. The data seems to be otherwise valid,
1394 os_memset(&data, 0, sizeof(data));
1395 data.assoc_info.req_ies = (u8 *) buf + ai->OffsetRequestIEs;
1396 data.assoc_info.req_ies_len = ai->RequestIELength;
1397 data.assoc_info.resp_ies = (u8 *) buf + ai->OffsetResponseIEs;
1398 data.assoc_info.resp_ies_len = ai->ResponseIELength;
1419 data.assoc_info.beacon_ies =
1422 data.assoc_info.beacon_ies_len =
1425 data.assoc_info.beacon_ies,
1426 data.assoc_info.beacon_ies_len);
1435 wpa_supplicant_event(drv->ctx, EVENT_ASSOCINFO, &data);
1518 const u8 *data, size_t data_len)
1529 req = (NDIS_802_11_AUTHENTICATION_REQUEST *) data;
1552 const u8 *data, size_t data_len)
1563 pmkid = (NDIS_802_11_PMKID_CANDIDATE_LIST *) data;
1597 const u8 *data, size_t data_len)
1601 if (data == NULL || data_len < sizeof(*status))
1605 data, data_len);
1607 status = (NDIS_802_11_STATUS_INDICATION *) data;
1608 data += sizeof(status);
1613 wpa_driver_ndis_event_auth(drv, data, data_len);
1616 wpa_driver_ndis_event_pmkid(drv, data, data_len);
1756 "OID_802_11_CAPABILITY data");
2662 * mechanism available to pass data from driver interface to l2_packet wrapper.