/external/wpa_supplicant_8/src/ap/ |
taxonomy.h | 14 const u8 *ie, size_t ie_len); 17 const u8 *ie, size_t ie_len); 20 const u8 *ie, size_t ie_len);
|
taxonomy.c | 104 size_t ie_len; local 121 ie_len = wpabuf_len(ies); 123 while (ie_len >= 2) { 129 ie_len -= 2; 131 if (elen > ie_len) 226 ie_len -= elen; 270 const u8 *ie, size_t ie_len) 273 sta->probe_ie_taxonomy = wpabuf_alloc_copy(ie, ie_len); 279 const u8 *ie, size_t ie_len) 282 info->probe_ie_taxonomy = wpabuf_alloc_copy(ie, ie_len); [all...] |
mbo_ap.c | 103 u8 ie_len = pos[1]; local 105 if (2 + ie_len > end - pos) 109 mbo_ap_parse_non_pref_chan(sta, pos + 2, ie_len); 212 u8 ie_len; local 227 ie_len = pos[1]; 229 if (2 + ie_len > end - pos) 233 ie_len >= 4 && WPA_GET_BE24(pos + 2) == OUI_WFA) 235 pos + 6, ie_len - 4,
|
utils.c | 21 const u8 *ie, size_t ie_len,
|
hostapd.h | 70 const u8 *ie, size_t ie_len, int ssi_signal); 567 const u8 *ie, size_t ie_len, 582 const u8 *bssid, const u8 *ie, size_t ie_len,
|
wnm_ap.c | 205 u8 ie_len = pos[1]; local 206 if (pos + 2 + ie_len > frm + len) 209 ie_len >= (int) sizeof(*wnmsleep_ie) - 2) 218 pos += ie_len + 2;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
mesh.h | 28 const u8 *ies, size_t ie_len); 36 const u8 *ies, size_t ie_len)
|
bss.c | 431 bss = os_zalloc(sizeof(*bss) + res->ie_len + res->beacon_ie_len); 439 bss->ie_len = res->ie_len; 441 os_memcpy(bss + 1, res + 1, res->ie_len + res->beacon_ie_len); 538 if (old->ie_len == new_res->ie_len && 539 os_memcmp(old + 1, new_res + 1, old->ie_len) == 0) 661 if (bss->ie_len + bss->beacon_ie_len >= 662 res->ie_len + res->beacon_ie_len) { 663 os_memcpy(bss + 1, res + 1, res->ie_len + res->beacon_ie_len) [all...] |
op_classes.c | 281 u8 *ie_len; local 303 ie_len = wpabuf_put(buf, 1); 311 *ie_len = wpabuf_len(buf) - 2; 312 if (*ie_len < 2 || wpabuf_len(buf) > len) {
|
wnm_sta.c | 280 u8 ie_len = *(pos + 1); local 281 if (2 + ie_len > frm + len - pos) { 282 wpa_printf(MSG_INFO, "WNM: Invalid IE len %u", ie_len); 285 wpa_hexdump(MSG_DEBUG, "WNM: Element", pos, 2 + ie_len); 286 if (*pos == WLAN_EID_WNMSLEEP && ie_len >= 4) 294 pos += ie_len + 2; 1552 u8 ie, ie_len; local [all...] |
mesh_mpm.c | 217 u8 ie_len, add_plid = 0; local 302 ie_len = 4; 304 ie_len += PMKID_LEN; 309 ie_len += 2; 313 ie_len += 2; 315 ie_len += 2; /* reason code */ 320 wpabuf_put_u8(buf, ie_len); 1071 size_t ie_len; local 1085 ie_len = (const u8 *) mgmt + len - 1089 if (ie_len < 2 + 2) [all...] |
p2p_supplicant.h | 128 u16 reason_code, const u8 *ie, size_t ie_len, 131 u16 reason_code, const u8 *ie, size_t ie_len, 177 const u8 *ie, size_t ie_len, 238 const u8 *ie, size_t ie_len,
|
events.c | 3408 size_t ie_len = 0; local 3462 size_t ie_len = 0; local 4197 size_t ie_len; local 4243 size_t ie_len; local [all...] |
bss.h | 106 size_t ie_len; member in struct:wpa_bss 109 /* followed by ie_len octets of IEs */
|
rrm.c | 713 size_t ies_len = bss->ie_len ? bss->ie_len : bss->beacon_ie_len; 797 size_t ie_len = bss->ie_len + bss->beacon_ie_len; local 813 buf = os_malloc(sizeof(*rep) + 14 + ie_len); 818 if (wpas_get_op_chan_phy(bss->freq, ie, ie_len, &rep->op_class, 833 bss, rep->variable, 14 + ie_len); [all...] |
/external/tcpdump/ |
print-fr.c | 433 uint8_t ie_len; member in struct:ie_tlv_header_t 442 uint8_t ie_type,ie_len; local 476 ie_len=tptr[1]; 481 ie_len)); 484 if (ie_type == 0 || ie_len <= sizeof(struct ie_tlv_header_t)) 487 ND_TCHECK2(*tptr, ie_len); 490 ie_len-=sizeof(struct ie_tlv_header_t); 501 for (idx = 0; idx < ie_len && idx < MFR_ID_STRING_MAXLEN; idx++) { 510 if (ie_len == sizeof(struct timeval)) { 526 print_unknown_data(ndo, tptr, "\n\t ", ie_len); [all...] |
/external/wpa_supplicant_8/src/p2p/ |
p2p_build.c | 478 const char *svc_name, u8 **ie_len, u8 **pos, 503 if (*ie_len) { 504 int ie_data_len = (*pos - *ie_len) - 1; 518 *ie_len = p2p_buf_add_ie_hdr(buf); 538 p2p_buf_update_ie_hdr(buf, *ie_len); 539 *ie_len = p2p_buf_add_ie_hdr(buf); 560 p2p_buf_update_ie_hdr(buf, *ie_len); 561 *ie_len = p2p_buf_add_ie_hdr(buf); 568 p2p_buf_update_ie_hdr(buf, *ie_len); 569 *ie_len = p2p_buf_add_ie_hdr(buf) 602 u8 *pos, *attr_len, *ie_len = NULL; local [all...] |
/external/wpa_supplicant_8/src/common/ |
privsep_commands.h | 49 size_t ie_len; member in struct:privsep_cmd_authenticate 56 /* followed by ie_len bytes of ie */
|
hw_features_common.c | 154 ieee802_11_parse_elems((u8 *) (bss + 1), bss->ie_len, &elems, 0); 247 ieee802_11_parse_elems((u8 *) (bss + 1), bss->ie_len, &elems, 0); 331 ieee802_11_parse_elems((u8 *) (bss + 1), bss->ie_len, &elems,
|
ieee802_11_common.c | 461 elems->mb_ies.ies[elems->mb_ies.nof_ies].ie_len = elen; 1287 info->ies[info->nof_ies].ie_len = ies_buf[1]; 1310 mb_ies_size += 2 + info->ies[i].ie_len; 1316 wpabuf_put_u8(mb_ies, info->ies[i].ie_len); 1319 info->ies[i].ie_len); [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_privsep.c | 191 if (sizeof(*r) + r->ie_len + r->beacon_ie_len > (size_t) len) { 194 (int) sizeof(*r), (int) r->ie_len, 256 buflen = sizeof(*data) + params->ie_len + params->auth_data_len; 266 data->ie_len = params->ie_len; 277 if (params->ie_len) { 278 os_memcpy(pos, params->ie, params->ie_len); 279 pos += params->ie_len; 414 int ie_len; local 423 os_memcpy(&ie_len, pos, sizeof(int)) [all...] |
driver_nl80211_scan.c | 656 const u8 *ie, size_t ie_len) 664 ssid = get_ie(ie, ie_len, WLAN_EID_SSID); 704 size_t ie_len, beacon_ie_len; local 716 ie_len = nla_len(bss[NL80211_BSS_INFORMATION_ELEMENTS]); 719 ie_len = 0; 730 ie ? ie_len : beacon_ie_len)) 733 r = os_zalloc(sizeof(*r) + ie_len + beacon_ie_len); 781 r->ie_len = ie_len; 784 os_memcpy(pos, ie, ie_len); [all...] |
driver_wext.c | 1191 size_t ie_len; member in struct:wext_scan_data [all...] |
driver.h | 275 * @ie_len: length of the following IE field in octets 287 * This structure data is followed by ie_len octets of IEs from Probe Response 307 size_t ie_len; member in struct:wpa_scan_res 309 /* Followed by ie_len + beacon_ie_len octets of IE data */ 588 size_t ie_len; member in struct:wpa_driver_auth_params 1383 int ie_len; member in struct:wpa_driver_mesh_join_params 4747 size_t ie_len; member in struct:wpa_event_data::disassoc_info 4778 size_t ie_len; member in struct:wpa_event_data::deauth_info 5066 size_t ie_len; member in struct:wpa_event_data::rx_probe_req 5258 size_t ie_len; member in struct:wpa_event_data::mesh_peer [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
tdls.c | 53 u8 ie_len; member in struct:wpa_tdls_ftie 63 u8 ie_len; member in struct:wpa_tdls_timeoutie 70 u8 ie_len; member in struct:wpa_tdls_lnkid 83 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs); 170 static u8 * wpa_add_ie(u8 *pos, const u8 *ie, size_t ie_len) 172 os_memcpy(pos, ie, ie_len); 173 return pos + ie_len; 734 lnkid->ie_len = 3 * ETH_ALEN; 806 ftie->ie_len = sizeof(struct wpa_tdls_ftie) - 2; 812 ftie->ie_len += 170 [all...] |