/external/wpa_supplicant_8/src/ap/ |
taxonomy.h | 14 const u8 *ie, size_t ie_len); 17 const u8 *ie, size_t ie_len); 20 const u8 *ie, size_t ie_len);
|
taxonomy.c | 104 size_t ie_len; local 121 ie_len = wpabuf_len(ies); 123 while (ie_len >= 2) { 129 ie_len -= 2; 131 if (elen > ie_len) 226 ie_len -= elen; 270 const u8 *ie, size_t ie_len) 273 sta->probe_ie_taxonomy = wpabuf_alloc_copy(ie, ie_len); 279 const u8 *ie, size_t ie_len) 282 info->probe_ie_taxonomy = wpabuf_alloc_copy(ie, ie_len); [all...] |
mbo_ap.c | 103 u8 ie_len = pos[1]; local 105 if (2 + ie_len > end - pos) 109 mbo_ap_parse_non_pref_chan(sta, pos + 2, ie_len); 212 u8 ie_len; local 227 ie_len = pos[1]; 229 if (2 + ie_len > end - pos) 233 ie_len >= 4 && WPA_GET_BE24(pos + 2) == OUI_WFA) 235 pos + 6, ie_len - 4,
|
utils.c | 21 const u8 *ie, size_t ie_len,
|
hostapd.h | 67 const u8 *ie, size_t ie_len, int ssi_signal); 509 const u8 *ie, size_t ie_len, 522 const u8 *bssid, const u8 *ie, size_t ie_len,
|
wnm_ap.c | 205 u8 ie_len = pos[1]; local 206 if (pos + 2 + ie_len > frm + len) 209 ie_len >= (int) sizeof(*wnmsleep_ie) - 2) 218 pos += ie_len + 2;
|
beacon.c | 724 size_t ie_len; local 737 ie_len = len - IEEE80211_HDRLEN; 742 ie, ie_len, ssi_signal) > 0) 748 if (ieee802_11_parse_elems(ie, ie_len, &elems, 0) == ParseFailed) { 785 wps = ieee802_11_vendor_ie_concat(ie, ie_len, WPS_DEV_OUI_WFA); 798 p2p = ieee802_11_vendor_ie_concat(ie, ie_len, P2P_IE_VENDOR_TYPE); 832 taxonomy_sta_info_probe_req(hapd, sta, ie, ie_len); 836 ie, ie_len); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
mesh.h | 28 const u8 *ies, size_t ie_len); 36 const u8 *ies, size_t ie_len)
|
bss.c | 431 bss = os_zalloc(sizeof(*bss) + res->ie_len + res->beacon_ie_len); 439 bss->ie_len = res->ie_len; 441 os_memcpy(bss + 1, res + 1, res->ie_len + res->beacon_ie_len); 538 if (old->ie_len == new_res->ie_len && 539 os_memcmp(old + 1, new_res + 1, old->ie_len) == 0) 661 if (bss->ie_len + bss->beacon_ie_len >= 662 res->ie_len + res->beacon_ie_len) { 663 os_memcpy(bss + 1, res + 1, res->ie_len + res->beacon_ie_len) [all...] |
op_classes.c | 281 u8 *ie_len; local 303 ie_len = wpabuf_put(buf, 1); 311 *ie_len = wpabuf_len(buf) - 2; 312 if (*ie_len < 2 || wpabuf_len(buf) > len) {
|
wnm_sta.c | 280 u8 ie_len = *(pos + 1); local 281 if (2 + ie_len > frm + len - pos) { 282 wpa_printf(MSG_INFO, "WNM: Invalid IE len %u", ie_len); 285 wpa_hexdump(MSG_DEBUG, "WNM: Element", pos, 2 + ie_len); 286 if (*pos == WLAN_EID_WNMSLEEP && ie_len >= 4) 294 pos += ie_len + 2; 1374 u8 ie, ie_len; local [all...] |
mesh_mpm.c | 216 u8 ie_len, add_plid = 0; local 301 ie_len = 4; 303 ie_len += PMKID_LEN; 308 ie_len += 2; 312 ie_len += 2; 314 ie_len += 2; /* reason code */ 319 wpabuf_put_u8(buf, ie_len); 1063 size_t ie_len; local 1077 ie_len = (const u8 *) mgmt + len - 1081 if (ie_len < 2 + 2) [all...] |
p2p_supplicant.h | 128 u16 reason_code, const u8 *ie, size_t ie_len, 131 u16 reason_code, const u8 *ie, size_t ie_len, 177 const u8 *ie, size_t ie_len, 238 const u8 *ie, size_t ie_len,
|
events.c | 3282 size_t ie_len = 0; local 3336 size_t ie_len = 0; local 4009 size_t ie_len; local 4055 size_t ie_len; local [all...] |
bss.h | 106 size_t ie_len; member in struct:wpa_bss 109 /* followed by ie_len octets of IEs */
|
/external/tcpdump/ |
print-fr.c | 431 uint8_t ie_len; member in struct:ie_tlv_header_t 440 uint8_t ie_type,ie_len; local 474 ie_len=tptr[1]; 479 ie_len)); 482 if (ie_type == 0 || ie_len <= sizeof(struct ie_tlv_header_t)) 485 ND_TCHECK2(*tptr, ie_len); 488 ie_len-=sizeof(struct ie_tlv_header_t); 499 for (idx = 0; idx < ie_len && idx < MFR_ID_STRING_MAXLEN; idx++) { 508 if (ie_len == sizeof(struct timeval)) { 524 print_unknown_data(ndo, tptr, "\n\t ", ie_len); [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_build.c | 478 const char *svc_name, u8 **ie_len, u8 **pos, 503 if (*ie_len) { 504 int ie_data_len = (*pos - *ie_len) - 1; 518 *ie_len = p2p_buf_add_ie_hdr(buf); 538 p2p_buf_update_ie_hdr(buf, *ie_len); 539 *ie_len = p2p_buf_add_ie_hdr(buf); 560 p2p_buf_update_ie_hdr(buf, *ie_len); 561 *ie_len = p2p_buf_add_ie_hdr(buf); 568 p2p_buf_update_ie_hdr(buf, *ie_len); 569 *ie_len = p2p_buf_add_ie_hdr(buf) 602 u8 *pos, *attr_len, *ie_len = NULL; local [all...] |
/external/wpa_supplicant_8/src/common/ |
privsep_commands.h | 49 size_t ie_len; member in struct:privsep_cmd_authenticate 56 /* followed by ie_len bytes of ie */
|
hw_features_common.c | 154 ieee802_11_parse_elems((u8 *) (bss + 1), bss->ie_len, &elems, 0); 247 ieee802_11_parse_elems((u8 *) (bss + 1), bss->ie_len, &elems, 0); 331 ieee802_11_parse_elems((u8 *) (bss + 1), bss->ie_len, &elems,
|
ieee802_11_common.c | 455 elems->mb_ies.ies[elems->mb_ies.nof_ies].ie_len = elen; 1281 info->ies[info->nof_ies].ie_len = ies_buf[1]; 1304 mb_ies_size += 2 + info->ies[i].ie_len; 1310 wpabuf_put_u8(mb_ies, info->ies[i].ie_len); 1313 info->ies[i].ie_len); [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_privsep.c | 192 if (sizeof(*r) + r->ie_len + r->beacon_ie_len > (size_t) len) { 195 (int) sizeof(*r), (int) r->ie_len, 257 buflen = sizeof(*data) + params->ie_len + params->auth_data_len; 267 data->ie_len = params->ie_len; 278 if (params->ie_len) { 279 os_memcpy(pos, params->ie, params->ie_len); 280 pos += params->ie_len; 415 int ie_len; local 424 os_memcpy(&ie_len, pos, sizeof(int)) [all...] |
driver_nl80211_scan.c | 650 const u8 *ie, size_t ie_len) 658 ssid = get_ie(ie, ie_len, WLAN_EID_SSID); 697 size_t ie_len, beacon_ie_len; local 709 ie_len = nla_len(bss[NL80211_BSS_INFORMATION_ELEMENTS]); 712 ie_len = 0; 723 ie ? ie_len : beacon_ie_len)) 726 r = os_zalloc(sizeof(*r) + ie_len + beacon_ie_len); 757 r->ie_len = ie_len; 760 os_memcpy(pos, ie, ie_len); [all...] |
driver_wext.c | 1202 size_t ie_len; member in struct:wext_scan_data [all...] |
driver.h | 270 * @ie_len: length of the following IE field in octets 282 * This structure data is followed by ie_len octets of IEs from Probe Response 302 size_t ie_len; member in struct:wpa_scan_res 304 /* Followed by ie_len + beacon_ie_len octets of IE data */ 574 size_t ie_len; member in struct:wpa_driver_auth_params 1298 int ie_len; member in struct:wpa_driver_mesh_join_params 4525 size_t ie_len; member in struct:wpa_event_data::disassoc_info 4556 size_t ie_len; member in struct:wpa_event_data::deauth_info 4845 size_t ie_len; member in struct:wpa_event_data::rx_probe_req 5037 size_t ie_len; member in struct:wpa_event_data::mesh_peer [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 53 u8 ie_len; member in struct:wpa_tdls_ftie 63 u8 ie_len; member in struct:wpa_tdls_timeoutie 70 u8 ie_len; member in struct:wpa_tdls_lnkid 83 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs); 169 static u8 * wpa_add_ie(u8 *pos, const u8 *ie, size_t ie_len) 171 os_memcpy(pos, ie, ie_len); 172 return pos + ie_len; 719 lnkid->ie_len = 3 * ETH_ALEN; 791 ftie->ie_len = sizeof(struct wpa_tdls_ftie) - 2; 797 ftie->ie_len += 170 [all...] |