/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.h | 55 size_t ies_len); 57 const u8 *ies, size_t ies_len); 423 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len); 425 int wpa_ft_add_mdie(struct wpa_sm *sm, u8 *ies, size_t ies_len, 428 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, 435 size_t ies_len, const u8 *src_addr); 451 wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) in wpa_sm_set_ft_params() argument 462 static inline int wpa_ft_add_mdie(struct wpa_sm *sm, u8 *ies, size_t ies_len, in wpa_ft_add_mdie() argument 469 wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, in wpa_ft_process_response() argument 496 wpa_ft_validate_reassoc_resp(struct wpa_sm *sm, const u8 *ies, size_t ies_len, in wpa_ft_validate_reassoc_resp() argument
|
D | wpa_ft.c | 92 int wpa_sm_set_ft_params(struct wpa_sm *sm, const u8 *ies, size_t ies_len) in wpa_sm_set_ft_params() argument 100 if (!get_ie(ies, ies_len, WLAN_EID_MOBILITY_DOMAIN)) { in wpa_sm_set_ft_params() 112 if (wpa_ft_parse_ies(ies, ies_len, &ft, use_sha384) < 0) in wpa_sm_set_ft_params() 537 int wpa_ft_process_response(struct wpa_sm *sm, const u8 *ies, size_t ies_len, in wpa_ft_process_response() argument 553 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); in wpa_ft_process_response() 577 if (wpa_ft_parse_ies(ies, ies_len, &parse, use_sha384) < 0) { in wpa_ft_process_response() 995 size_t ies_len, const u8 *src_addr) in wpa_ft_validate_reassoc_resp() argument 1008 wpa_hexdump(MSG_DEBUG, "FT: Response IEs", ies, ies_len); in wpa_ft_validate_reassoc_resp() 1021 if (wpa_ft_parse_ies(ies, ies_len, &parse, use_sha384) < 0) { in wpa_ft_validate_reassoc_resp()
|
D | wpa_i.h | 327 const u8 *ies, size_t ies_len) in wpa_sm_update_ft_ies() argument 330 return sm->ctx->update_ft_ies(sm->ctx->ctx, md, ies, ies_len); in wpa_sm_update_ft_ies() 336 const u8 *ies, size_t ies_len) in wpa_sm_send_ft_action() argument 340 ies, ies_len); in wpa_sm_send_ft_action()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | robust_av.c | 129 const u8 *ies, size_t ies_len) in wpas_handle_assoc_resp_mscs() argument 136 if (!ies || ies_len == 0 || !wpa_s->robust_av.valid_config) in wpas_handle_assoc_resp_mscs() 139 mscs_desc_ie = get_ie_ext(ies, ies_len, WLAN_EID_EXT_MSCS_DESCRIPTOR); in wpas_handle_assoc_resp_mscs()
|
D | rrm.c | 707 int wpas_get_op_chan_phy(int freq, const u8 *ies, size_t ies_len, in wpas_get_op_chan_phy() argument 716 ie = get_ie(ies, ies_len, WLAN_EID_HT_OPERATION); in wpas_get_op_chan_phy() 730 ie = get_ie(ies, ies_len, WLAN_EID_VHT_OPERATION); in wpas_get_op_chan_phy() 782 size_t ies_len = *ie_len; in wpas_beacon_rep_add_frame_body() local 830 while (ies_len > 2 && 2U + ies[1] <= ies_len && rem_len > 0) { in wpas_beacon_rep_add_frame_body() 846 ies_len -= 2 + ies[1]; in wpas_beacon_rep_add_frame_body() 850 *ie_len = ies_len; in wpas_beacon_rep_add_frame_body() 932 size_t ies_len = bss->ie_len ? bss->ie_len : bss->beacon_ie_len; in wpas_add_beacon_rep() local 945 if (wpas_get_op_chan_phy(bss->freq, ies, ies_len, &rep.op_class, in wpas_add_beacon_rep() 961 &pos, &ies_len, idx++); in wpas_add_beacon_rep() [all …]
|
D | sme.h | 20 const u8 *ies, size_t ies_len); 62 const u8 *ies, size_t ies_len) in sme_update_ft_ies() argument
|
D | wmm_ac.c | 419 size_t ies_len) in wmm_ac_process_param_elem() argument 427 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) { in wmm_ac_process_param_elem() 464 size_t ies_len, const struct wmm_params *wmm_params) in wmm_ac_init() argument 483 assoc_data = wmm_ac_process_param_elem(wpa_s, ies, ies_len); in wmm_ac_init() 529 size_t ies_len, const struct wmm_params *wmm_params) in wmm_ac_notify_assoc() argument 531 if (wmm_ac_init(wpa_s, ies, ies_len, wmm_params)) in wmm_ac_notify_assoc()
|
D | mesh.h | 19 int wpas_mesh_scan_result_text(const u8 *ies, size_t ies_len, char *buf,
|
D | wmm_ac.h | 164 size_t ies_len, const struct wmm_params *wmm_params);
|
D | op_classes.c | 442 size_t ies_len; in wpas_sta_secondary_channel_offset() local 447 ies_len = bss->ie_len ? bss->ie_len : bss->beacon_ie_len; in wpas_sta_secondary_channel_offset() 448 return wpas_get_op_chan_phy(bss->freq, ies, ies_len, current, in wpas_sta_secondary_channel_offset()
|
D | scan.h | 86 const u8 *ies, size_t ies_len, int rate,
|
D | wpa_priv.c | 893 size_t buflen = sizeof(struct privsep_event_auth) + data->auth.ies_len; in wpa_priv_send_auth() 910 os_memcpy(pos, data->auth.ies, data->auth.ies_len); in wpa_priv_send_auth() 911 auth->ies_len = data->auth.ies_len; in wpa_priv_send_auth() 1022 len = sizeof(int) + ETH_ALEN + data->ft_ies.ies_len; in wpa_priv_send_ft_response() 1032 os_memcpy(pos, data->ft_ies.ies, data->ft_ies.ies_len); in wpa_priv_send_ft_response()
|
D | wpas_glue.c | 661 const u8 *ies, size_t ies_len) in wpa_supplicant_update_ft_ies() argument 665 return sme_update_ft_ies(wpa_s, md, ies, ies_len); in wpa_supplicant_update_ft_ies() 666 return wpa_drv_update_ft_ies(wpa_s, md, ies, ies_len); in wpa_supplicant_update_ft_ies() 672 const u8 *ies, size_t ies_len) in wpa_supplicant_send_ft_action() argument 694 data_len = 2 + 2 * ETH_ALEN + ies_len; in wpa_supplicant_send_ft_action() 705 os_memcpy(pos, ies, ies_len); in wpa_supplicant_send_ft_action()
|
D | mesh.c | 692 static int mesh_attr_text(const u8 *ies, size_t ies_len, char *buf, char *end) in mesh_attr_text() argument 699 if (ieee802_11_parse_elems(ies, ies_len, &elems, 0) == ParseFailed) in mesh_attr_text() 780 int wpas_mesh_scan_result_text(const u8 *ies, size_t ies_len, char *buf, in wpas_mesh_scan_result_text() argument 783 return mesh_attr_text(ies, ies_len, buf, end); in wpas_mesh_scan_result_text()
|
D | sme.c | 1530 data->auth.ies, data->auth.ies_len); in sme_event_auth() 1539 data->auth.ies_len, 0, NULL); in sme_event_auth() 1556 if (data->auth.ies && data->auth.ies_len) { in sme_event_auth() 1557 size_t buflen = 2 * data->auth.ies_len + 1; in sme_event_auth() 1561 data->auth.ies_len); in sme_event_auth() 1621 data->auth.ies_len, 0, in sme_event_auth() 1661 data->auth.ies, data->auth.ies_len) < 0) { in sme_event_auth() 2116 const u8 *ies, size_t ies_len) in sme_update_ft_ies() argument 2128 wpa_hexdump(MSG_DEBUG, "SME: FT IEs", ies, ies_len); in sme_update_ft_ies() 2130 wpa_s->sme.ft_ies = os_memdup(ies, ies_len); in sme_update_ft_ies() [all …]
|
D | wps_supplicant.h | 48 int wpas_wps_scan_result_text(const u8 *ies, size_t ies_len, char *pos,
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth.h | 462 u16 auth_transaction, const u8 *ies, size_t ies_len, 465 const u8 *ies, size_t ies_len), 468 size_t ies_len); 521 const u8 *ies, size_t ies_len, 524 size_t ies_len);
|
D | wpa_auth_ft.c | 1931 const u8 *ies, size_t ies_len, in wpa_ft_pull_pmk_r1() argument 2031 ft_pending_req_ies = wpabuf_alloc_copy(ies, ies_len); in wpa_ft_pull_pmk_r1() 2376 const u8 *ies, size_t ies_len) in wpa_ft_process_rdie() argument 2384 ies, ies_len); in wpa_ft_process_rdie() 2399 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) == in wpa_ft_process_rdie() 3053 const u8 *ies, size_t ies_len, in wpa_ft_process_auth_req() argument 3078 ies, ies_len); in wpa_ft_process_auth_req() 3080 if (wpa_ft_parse_ies(ies, ies_len, &parse, -1)) { in wpa_ft_process_auth_req() 3170 if (wpa_ft_pull_pmk_r1(sm, ies, ies_len, parse.rsn_pmkid) < 0) { in wpa_ft_process_auth_req() 3268 u16 auth_transaction, const u8 *ies, size_t ies_len, in wpa_ft_process_auth() argument [all …]
|
/external/wpa_supplicant_8/src/common/ |
D | ieee802_11_common.h | 184 int ieee802_11_ie_count(const u8 *ies, size_t ies_len); 185 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len, 225 size_t ies_len);
|
D | ieee802_11_common.c | 622 int ieee802_11_ie_count(const u8 *ies, size_t ies_len) in ieee802_11_ie_count() argument 630 for_each_element(elem, ies, ies_len) in ieee802_11_ie_count() 637 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len, in ieee802_11_vendor_ie_concat() argument 643 for_each_element_id(elem, WLAN_EID_VENDOR_SPECIFIC, ies, ies_len) { in ieee802_11_vendor_ie_concat() 654 buf = wpabuf_alloc(ies_len); in ieee802_11_vendor_ie_concat() 662 for_each_element_id(elem, WLAN_EID_VENDOR_SPECIFIC, ies, ies_len) { in ieee802_11_vendor_ie_concat() 1814 size_t ies_len) in mb_ies_info_by_ies() argument 1823 for_each_element_id(elem, WLAN_EID_MULTI_BAND, ies_buf, ies_len) { in mb_ies_info_by_ies() 1834 if (!for_each_element_completed(elem, ies_buf, ies_len)) { in mb_ies_info_by_ies() 1835 wpa_hexdump(MSG_DEBUG, "Truncated IEs", ies_buf, ies_len); in mb_ies_info_by_ies()
|
D | privsep_commands.h | 108 size_t ies_len; member
|
D | sae_pk.c | 771 int sae_check_confirm_pk(struct sae_data *sae, const u8 *ies, size_t ies_len) in sae_check_confirm_pk() argument 803 wpa_hexdump(MSG_DEBUG, "SAE-PK: Received confirm IEs", ies, ies_len); in sae_check_confirm_pk() 804 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) { in sae_check_confirm_pk()
|
D | sae.h | 167 int sae_check_confirm_pk(struct sae_data *sae, const u8 *ies, size_t ies_len);
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_privsep.c | 396 if (len < sizeof(*auth) + auth->ies_len) in wpa_driver_privsep_event_auth() 404 if (auth->ies_len) { in wpa_driver_privsep_event_auth() 406 data.auth.ies_len = auth->ies_len; in wpa_driver_privsep_event_auth() 504 data.ft_ies.ies_len = len - sizeof(int) - ETH_ALEN; in wpa_driver_privsep_event_ft_response()
|
/external/iw/ |
D | scan.c | 359 size_t ies_len = 0, meshid_len = 0; in handle_scan() local 424 ies = parse_hex(argv[i], &ies_len); in handle_scan() 447 tmpies = (unsigned char *) malloc(ies_len + meshid_len); in handle_scan() 451 memcpy(tmpies, ies, ies_len); in handle_scan() 455 memcpy(&tmpies[ies_len], meshid, meshid_len); in handle_scan() 458 NLA_PUT(msg, NL80211_ATTR_IE, ies_len + meshid_len, tmpies); in handle_scan()
|