/external/tcpdump/ |
D | print-fr.c | 385 u_int8_t ie_len; member 393 u_int8_t ie_type,ie_len; in mfr_print() local 427 ie_len=tptr[1]; in mfr_print() 432 ie_len); in mfr_print() 435 if (ie_type == 0 || ie_len <= sizeof(struct ie_tlv_header_t)) in mfr_print() 438 TCHECK2(*tptr,ie_len); in mfr_print() 441 ie_len-=sizeof(struct ie_tlv_header_t); in mfr_print() 452 for (idx = 0; idx < ie_len && idx < MFR_ID_STRING_MAXLEN; idx++) { in mfr_print() 461 if (ie_len == sizeof(struct timeval)) { in mfr_print() 477 print_unknown_data(tptr,"\n\t ",ie_len); in mfr_print() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | bss.c | 333 bss = os_zalloc(sizeof(*bss) + res->ie_len + res->beacon_ie_len); in wpa_bss_add() 341 bss->ie_len = res->ie_len; in wpa_bss_add() 343 os_memcpy(bss + 1, res + 1, res->ie_len + res->beacon_ie_len); in wpa_bss_add() 439 if (old->ie_len == new->ie_len && in wpa_bss_compare_res() 440 os_memcmp(old + 1, new + 1, old->ie_len) == 0) in wpa_bss_compare_res() 505 if (bss->ie_len + bss->beacon_ie_len >= in wpa_bss_update() 506 res->ie_len + res->beacon_ie_len) { in wpa_bss_update() 507 os_memcpy(bss + 1, res + 1, res->ie_len + res->beacon_ie_len); in wpa_bss_update() 508 bss->ie_len = res->ie_len; in wpa_bss_update() 514 nbss = os_realloc(bss, sizeof(*bss) + res->ie_len + in wpa_bss_update() [all …]
|
D | p2p_supplicant.h | 71 const u8 *ie, size_t ie_len, 126 u16 reason_code, const u8 *ie, size_t ie_len, 129 u16 reason_code, const u8 *ie, size_t ie_len,
|
D | events.c | 2465 const u8 *ie, size_t ie_len, int deauth) argument 2489 if (wpas_p2p_deauth_notif(wpa_s, addr, reason_code, ie, ie_len, 2512 size_t ie_len = 0; local 2519 ie_len = info->ie_len; 2528 ie, ie_len); 2546 wpa_s, info->addr, reason_code, info->ie, info->ie_len, 2555 ie, ie_len, 0); 2566 size_t ie_len = 0; local 2573 ie_len = info->ie_len; 2584 ie, ie_len); [all …]
|
D | wnm_sta.c | 255 u8 ie_len = *(pos + 1); in ieee802_11_rx_wnmsleep_resp() local 256 if (pos + 2 + ie_len > frm + len) { in ieee802_11_rx_wnmsleep_resp() 257 wpa_printf(MSG_INFO, "WNM: Invalid IE len %u", ie_len); in ieee802_11_rx_wnmsleep_resp() 260 wpa_hexdump(MSG_DEBUG, "WNM: Element", pos, 2 + ie_len); in ieee802_11_rx_wnmsleep_resp() 269 pos += ie_len + 2; in ieee802_11_rx_wnmsleep_resp()
|
D | scan.c | 1303 end = pos + res->ie_len; in wpa_scan_get_ie() 1332 end = pos + res->ie_len; in wpa_scan_get_vendor_ie() 1363 buf = wpabuf_alloc(res->ie_len); in wpa_scan_get_vendor_ie_multi() 1368 end = pos + res->ie_len; in wpa_scan_get_vendor_ie_multi() 1542 if (r->ie_len) in dump_scan_res() 1543 wpa_hexdump(MSG_EXCESSIVE, "IEs", pos, r->ie_len); in dump_scan_res() 1544 pos += r->ie_len; in dump_scan_res()
|
D | bss.h | 91 size_t ie_len; member
|
D | notify.c | 628 const u8 *ie, size_t ie_len, u32 ssi_signal) in wpas_notify_preq() argument 631 wpas_dbus_signal_preq(wpa_s, addr, dst, bssid, ie, ie_len, ssi_signal); in wpas_notify_preq()
|
D | notify.h | 127 const u8 *ie, size_t ie_len, u32 ssi_signal);
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_privsep.c | 174 if (sizeof(*r) + r->ie_len > (size_t) len) { in wpa_driver_privsep_get_scan_results2() 314 int ie_len; in wpa_driver_privsep_event_assoc() local 323 os_memcpy(&ie_len, pos, sizeof(int)); in wpa_driver_privsep_event_assoc() 325 if (ie_len < 0 || ie_len > end - pos) in wpa_driver_privsep_event_assoc() 327 if (ie_len) { in wpa_driver_privsep_event_assoc() 329 data.assoc_info.req_ies_len = ie_len; in wpa_driver_privsep_event_assoc() 330 pos += ie_len; in wpa_driver_privsep_event_assoc()
|
D | driver_wext.c | 1126 size_t ie_len; member 1280 tmp = os_realloc(res->ie, res->ie_len + gend - gpos); in wext_get_scan_iwevgenie() 1283 os_memcpy(tmp + res->ie_len, gpos, gend - gpos); in wext_get_scan_iwevgenie() 1285 res->ie_len += gend - gpos; in wext_get_scan_iwevgenie() 1308 tmp = os_realloc(res->ie, res->ie_len + bytes); in wext_get_scan_custom() 1312 if (hexstr2bin(spos, tmp + res->ie_len, bytes) < 0) in wext_get_scan_custom() 1314 res->ie_len += bytes; in wext_get_scan_custom() 1323 tmp = os_realloc(res->ie, res->ie_len + bytes); in wext_get_scan_custom() 1327 if (hexstr2bin(spos, tmp + res->ie_len, bytes) < 0) in wext_get_scan_custom() 1329 res->ie_len += bytes; in wext_get_scan_custom() [all …]
|
D | driver_atheros.c | 636 atheros_set_opt_ie(void *priv, const u8 *ie, size_t ie_len) in atheros_set_opt_ie() argument 643 (unsigned long) ie_len); in atheros_set_opt_ie() 644 wpa_hexdump(MSG_DEBUG, "atheros: set_generic_elem", ie, ie_len); in atheros_set_opt_ie() 647 drv->wpa_ie = wpabuf_alloc_copy(ie, ie_len); in atheros_set_opt_ie() 650 os_memcpy(&(app_ie->app_buf[0]), ie, ie_len); in atheros_set_opt_ie() 651 app_ie->app_buflen = ie_len; in atheros_set_opt_ie() 657 os_memcpy(&(app_ie->app_buf[ie_len]), in atheros_set_opt_ie() 660 app_ie->app_buflen = ie_len + wpabuf_len(drv->wps_beacon_ie); in atheros_set_opt_ie() 671 os_memcpy(&(app_ie->app_buf[ie_len]), in atheros_set_opt_ie() 674 app_ie->app_buflen = ie_len + in atheros_set_opt_ie() [all …]
|
D | driver.h | 204 size_t ie_len; member 344 size_t ie_len; member 3433 size_t ie_len; member 3464 size_t ie_len; member 3770 size_t ie_len; member
|
D | driver_bsd.c | 628 bsd_set_opt_ie(void *priv, const u8 *ie, size_t ie_len) in bsd_set_opt_ie() argument 632 (unsigned long)ie_len); in bsd_set_opt_ie() 634 ie, ie_len); in bsd_set_opt_ie() 1378 result->ie_len = pos - (u8 *)(result + 1); in wpa_driver_bsd_add_scan_entry()
|
D | driver_test.c | 554 event.rx_probe_req.ie_len = ielen; in test_driver_scan() 1328 bss->ie_len) > 0) in wpa_driver_test_scan_timeout() 1493 r = os_malloc(sizeof(*r) + drv->scanres[i]->ie_len); in wpa_driver_test_get_scan_results2() 1497 sizeof(*r) + drv->scanres[i]->ie_len); in wpa_driver_test_get_scan_results2() 1724 end = pos + res->ie_len; in wpa_scan_get_ie() 1811 res->ie_len = ie_pos - ie_start; in wpa_driver_test_scanresp() 1948 event.rx_probe_req.ie_len = in wpa_driver_test_mlme() 1957 event.rx_probe_req.ie_len); in wpa_driver_test_mlme()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | tdls.c | 51 u8 ie_len; member 61 u8 ie_len; member 68 u8 ie_len; member 81 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs); 153 static u8 * wpa_add_ie(u8 *pos, const u8 *ie, size_t ie_len) in wpa_add_ie() argument 155 os_memcpy(pos, ie, ie_len); in wpa_add_ie() 156 return pos + ie_len; in wpa_add_ie() 649 lnkid->ie_len = 3 * ETH_ALEN; in wpa_tdls_linkid() 713 ftie->ie_len = sizeof(struct wpa_tdls_ftie) - 2; in wpa_tdls_send_teardown() 719 ftie->ie_len += 170; in wpa_tdls_send_teardown() [all …]
|
/external/wpa_supplicant_8/src/ap/ |
D | wnm_ap.c | 201 u8 ie_len = pos[1]; in ieee802_11_rx_wnmsleep_req() local 202 if (pos + 2 + ie_len > frm + len) in ieee802_11_rx_wnmsleep_req() 213 pos += ie_len + 2; in ieee802_11_rx_wnmsleep_req()
|
D | hostapd.h | 58 const u8 *ie, size_t ie_len, int ssi_signal); 361 const u8 *ie, size_t ie_len, 374 const u8 *bssid, const u8 *ie, size_t ie_len,
|
D | beacon.c | 360 size_t ie_len; in handle_probe_req() local 369 ie_len = len - (IEEE80211_HDRLEN + sizeof(mgmt->u.probe_req)); in handle_probe_req() 374 ie, ie_len, ssi_signal) > 0) in handle_probe_req() 380 if (ieee802_11_parse_elems(ie, ie_len, &elems, 0) == ParseFailed) { in handle_probe_req() 396 wps = ieee802_11_vendor_ie_concat(ie, ie_len, WPS_DEV_OUI_WFA); in handle_probe_req() 409 p2p = ieee802_11_vendor_ie_concat(ie, ie_len, P2P_IE_VENDOR_TYPE); in handle_probe_req()
|
D | utils.c | 20 const u8 *ie, size_t ie_len, in hostapd_register_probereq_cb() argument
|
D | drv_callbacks.c | 419 const u8 *bssid, const u8 *ie, size_t ie_len, in hostapd_probe_req_rx() argument 431 sa, da, bssid, ie, ie_len, in hostapd_probe_req_rx() 873 data->rx_probe_req.ie_len, in wpa_supplicant_event()
|
/external/wpa_supplicant_8/src/p2p/ |
D | p2p.h | 1187 const u8 *bssid, const u8 *ie, size_t ie_len); 1292 const u8 *ie, size_t ie_len); 1295 const u8 *ie, size_t ie_len);
|
D | p2p.c | 1813 const u8 *ie, size_t ie_len) in p2p_add_dev_from_probe_req() argument 1819 if (p2p_parse_ies(ie, ie_len, &msg) < 0 || msg.p2p_attributes == NULL) in p2p_add_dev_from_probe_req() 2004 const u8 *bssid, const u8 *ie, size_t ie_len) in p2p_reply_probe() argument 2017 if (ieee802_11_parse_elems((u8 *) ie, ie_len, &elems, 0) == in p2p_reply_probe() 2053 if (p2p_parse_ies(ie, ie_len, &msg) < 0) { in p2p_reply_probe() 2144 const u8 *bssid, const u8 *ie, size_t ie_len) in p2p_probe_req_rx() argument 2148 p2p_add_dev_from_probe_req(p2p, addr, ie, ie_len); in p2p_probe_req_rx() 2150 res = p2p_reply_probe(p2p, addr, dst, bssid, ie, ie_len); in p2p_probe_req_rx() 3927 const u8 *ie, size_t ie_len) in p2p_deauth_notif() argument 3935 if (p2p_parse_ies(ie, ie_len, &msg)) in p2p_deauth_notif() [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
D | dbus_new.h | 222 const u8 *ie, size_t ie_len, u32 ssi_signal); 489 const u8 *ie, size_t ie_len, in wpas_dbus_signal_preq() argument
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.c | 189 static int wpa_ft_parse_ftie(const u8 *ie, size_t ie_len, in wpa_ft_parse_ftie() argument 195 parse->ftie_len = ie_len; in wpa_ft_parse_ftie() 198 end = ie + ie_len; in wpa_ft_parse_ftie()
|