| /src/external/bsd/wpa/dist/src/ap/ |
| mbo_ap.c | 103 u8 ie_len = pos[1]; local 105 if (2 + ie_len > end - pos) 109 mbo_ap_parse_non_pref_chan(sta, pos + 2, ie_len); 212 u8 ie_len; local 227 ie_len = pos[1]; 229 if (2 + ie_len > end - pos) 233 ie_len >= 4 && WPA_GET_BE24(pos + 2) == OUI_WFA) 235 pos + 6, ie_len - 4,
|
| taxonomy.c | 104 size_t ie_len; local 121 ie_len = wpabuf_len(ies); 123 while (ie_len >= 2) { 129 ie_len -= 2; 131 if (elen > ie_len) 226 ie_len -= elen; 270 const u8 *ie, size_t ie_len) 273 sta->probe_ie_taxonomy = wpabuf_alloc_copy(ie, ie_len); 279 const u8 *ie, size_t ie_len) 282 info->probe_ie_taxonomy = wpabuf_alloc_copy(ie, ie_len); [all...] |
| wnm_ap.c | 308 u8 ie_len = pos[1]; local 309 if (pos + 2 + ie_len > frm + len) 312 ie_len >= (int) sizeof(*wnmsleep_ie) - 2) 319 } else if (*pos == WLAN_EID_EXTENSION && ie_len >= 1 && 322 oci_ie_len = ie_len - 1; 327 pos += ie_len + 2;
|
| drv_callbacks.c | 189 size_t ie_len = 2 + pos[1]; local 191 if (rem_len < ie_len) 240 pos += ie_len; 241 rem_len -= ie_len; 1514 const u8 *bssid, const u8 *ie, size_t ie_len, 1526 sa, da, bssid, ie, ie_len, 2284 size_t ie_len, const u8 *link_addr) 2303 if (ieee802_11_parse_elems(ie, ie_len, &elems, 1) == ParseFailed) { 2522 data->rx_probe_req.ie_len, 2584 data->update_dh.ie_len, [all...] |
| beacon.c | 1347 size_t ie_len; local 1370 ie_len = len - IEEE80211_HDRLEN; 1384 ie, ie_len, ssi_signal) > 0) 1390 if (ieee802_11_parse_elems(ie, ie_len, &elems, 0) == ParseFailed) { 1427 wps = ieee802_11_vendor_ie_concat(ie, ie_len, WPS_DEV_OUI_WFA); 1440 p2p = ieee802_11_vendor_ie_concat(ie, ie_len, P2P_IE_VENDOR_TYPE); 1474 taxonomy_sta_info_probe_req(hapd, sta, ie, ie_len); 1478 ie, ie_len);
|
| dpp_hostapd.c | 3719 size_t ie_len = bss->ie_len; local 3721 if (!ie_len) 3722 ie_len = bss->beacon_ie_len; 3723 if (get_vendor_ie((const u8 *) (bss + 1), ie_len,
|
| /src/external/bsd/wpa/dist/src/p2p/ |
| p2p_build.c | 484 const char *svc_name, u8 **ie_len, u8 **pos, 509 if (*ie_len) { 510 int ie_data_len = (*pos - *ie_len) - 1; 524 *ie_len = p2p_buf_add_ie_hdr(buf); 544 p2p_buf_update_ie_hdr(buf, *ie_len); 545 *ie_len = p2p_buf_add_ie_hdr(buf); 566 p2p_buf_update_ie_hdr(buf, *ie_len); 567 *ie_len = p2p_buf_add_ie_hdr(buf); 574 p2p_buf_update_ie_hdr(buf, *ie_len); 575 *ie_len = p2p_buf_add_ie_hdr(buf) 608 u8 *pos, *attr_len, *ie_len = NULL; local [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| mesh_rsn.c | 252 size_t ie_len; local 290 ie = wpa_auth_get_wpa_ie(mesh_rsn->auth, &ie_len); 292 conf->rsn_ie_len = ie_len;
|
| op_classes.c | 517 ies_len = bss->ie_len ? bss->ie_len : bss->beacon_ie_len; 529 u8 *ie_len; local 555 ie_len = wpabuf_put(buf, 1); 605 *ie_len = wpabuf_len(buf) - 2; 606 if (*ie_len < 2) {
|
| bss.h | 124 size_t ie_len; member in struct:wpa_bss 142 /* followed by ie_len octets of IEs */
|
| mbo.c | 45 u8 ie_len = mbo_ie[1]; local 47 if (ie_len < MBO_IE_HEADER - 2) 51 return get_ie(mbo, 2 + ie_len - MBO_IE_HEADER, attr);
|
| mesh_mpm.c | 219 u8 ie_len, add_plid = 0; local 329 ie_len = 4; 331 ie_len += PMKID_LEN; 336 ie_len += 2; 340 ie_len += 2; 342 ie_len += 2; /* reason code */ 347 wpabuf_put_u8(buf, ie_len); 1166 size_t ie_len; local 1180 ie_len = (const u8 *) mgmt + len - 1184 if (ie_len < 2 + 2) [all...] |
| robust_av.c | 1531 int rem_attrs_len, ie_len; local 1533 ie_len = 2 + qos_ie[1]; 1534 if (rem_len < ie_len) 1540 rem_len -= ie_len; 1541 qos_ie += ie_len; 1562 rem_len -= ie_len; 1563 qos_ie += ie_len;
|
| wnm_sta.c | 345 u8 ie_len = *(pos + 1); local 346 if (2 + ie_len > frm + len - pos) { 347 wpa_printf(MSG_INFO, "WNM: Invalid IE len %u", ie_len); 350 wpa_hexdump(MSG_DEBUG, "WNM: Element", pos, 2 + ie_len); 351 if (*pos == WLAN_EID_WNMSLEEP && ie_len >= 4) 358 } else if (*pos == WLAN_EID_EXTENSION && ie_len >= 1 && 361 oci_ie_len = ie_len - 1; 365 pos += ie_len + 2; 1732 u8 ie, ie_len; local 1739 ie_len = *pos++ [all...] |
| scan.c | 2091 size_t ie_len = res->ie_len; local 2093 /* Use the Beacon frame IEs if res->ie_len is not available */ 2094 if (!ie_len) 2095 ie_len = res->beacon_ie_len; 2097 return get_ie((const u8 *) (res + 1), ie_len, ie); 2103 size_t ie_len = res->ie_len; local 2105 /* Use the Beacon frame IEs if res->ie_len is not available */ 2106 if (!ie_len) 3153 size_t ie_len = res->ie_len; local [all...] |
| events.c | 2153 size_t ie_len = bss->ie_len ? bss->ie_len : bss->beacon_ie_len; local 2156 return wpas_get_est_tpt(wpa_s, ies, ie_len, rate, snr, bss->freq, 2185 size_t cur_ie_len = current_bss->ie_len ? current_bss->ie_len : 2187 size_t sel_ie_len = selected->ie_len ? selected->ie_len : 3093 const u8 *ie, size_t ie_len) 3097 if (!ie || !ie_len || !wpa_s->fst 5088 size_t ie_len = 0; local 5143 size_t ie_len = 0; local 6450 size_t ie_len; local 6512 size_t ie_len; local [all...] |
| /src/external/bsd/wpa/dist/src/common/ |
| privsep_commands.h | 49 size_t ie_len; member in struct:privsep_cmd_authenticate 56 /* followed by ie_len bytes of ie */
|
| ieee802_11_common.h | 28 u8 ie_len; member in struct:mb_ies_info::__anon8262
|
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver_nl80211_scan.c | 701 const u8 *ie, size_t ie_len) 709 ssid = get_ie(ie, ie_len, WLAN_EID_SSID); 750 size_t ie_len, beacon_ie_len; local 765 ie_len = nla_len(bss[NL80211_BSS_INFORMATION_ELEMENTS]); 768 ie_len = 0; 779 ie ? ie_len : beacon_ie_len)) 782 r = os_zalloc(sizeof(*r) + ie_len + beacon_ie_len); 832 r->ie_len = ie_len; 835 os_memcpy(pos, ie, ie_len); [all...] |
| driver_privsep.c | 191 if (sizeof(*r) + r->ie_len + r->beacon_ie_len > (size_t) len) { 194 (int) sizeof(*r), (int) r->ie_len, 262 buflen = sizeof(*data) + params->ie_len + params->auth_data_len; 272 data->ie_len = params->ie_len; 283 if (params->ie_len) { 284 os_memcpy(pos, params->ie, params->ie_len); 285 pos += params->ie_len; 420 int ie_len; local 429 os_memcpy(&ie_len, pos, sizeof(int)) [all...] |
| driver_wext.c | 1199 size_t ie_len; member in struct:wext_scan_data 1353 tmp = os_realloc(res->ie, res->ie_len + gend - gpos); 1356 os_memcpy(tmp + res->ie_len, gpos, gend - gpos); 1358 res->ie_len += gend - gpos; 1381 tmp = os_realloc(res->ie, res->ie_len + bytes); 1385 if (hexstr2bin(spos, tmp + res->ie_len, bytes) < 0) 1387 res->ie_len += bytes; 1396 tmp = os_realloc(res->ie, res->ie_len + bytes); 1400 if (hexstr2bin(spos, tmp + res->ie_len, bytes) < 0) 1402 res->ie_len += bytes [all...] |
| driver_nl80211_event.c | 602 size_t ie_len = 2 + pos[1]; local 604 if (rem_len < ie_len) 630 pos += ie_len; 631 rem_len -= ie_len; 1542 event.disassoc_info.ie_len = frame + len - 1567 event.deauth_info.ie_len = frame + len - 1957 data.update_dh.ie_len = nla_len(tb[NL80211_ATTR_IE]); 2171 data.mesh_peer.ie_len = nla_len(tb[NL80211_ATTR_IE]);
|
| /src/external/bsd/tcpdump/dist/ |
| print-802_15_4.c | 681 uint16_t ie_len, 688 if (ie_len < 3) { 694 for(i = 3; i < ie_len; i++) { 700 if (ie_len < 4) { 705 if (ie_len >= 6) { 709 if (ie_len != 4 && ie_len != 6) { 715 if (ie_len < 4) { 727 if (ie_len < 2) { 738 if (ie_len < 3) 937 uint16_t ie_len; local 1423 uint16_t ie_len; local [all...] |
| print-fr.c | 442 uint8_t ie_len; member in struct:ie_tlv_header_t 451 uint8_t ie_type,ie_len; local 492 ie_len=GET_U_1(tptr + 1); 497 ie_len); 500 if (ie_type == 0 || ie_len <= sizeof(struct ie_tlv_header_t)) 503 ND_TCHECK_LEN(tptr, ie_len); 506 ie_len-=sizeof(struct ie_tlv_header_t); 513 if (ie_len != 4) { 514 ND_PRINT("[IE data length %d != 4]", ie_len); 523 for (idx = 0; idx < ie_len && idx < MFR_ID_STRING_MAXLEN; idx++) [all...] |
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| tdls.c | 54 u8 ie_len; member in struct:wpa_tdls_ftie 64 u8 ie_len; member in struct:wpa_tdls_timeoutie 71 u8 ie_len; member in struct:wpa_tdls_lnkid 84 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs); 188 static u8 * wpa_add_ie(u8 *pos, const u8 *ie, size_t ie_len) 190 os_memcpy(pos, ie, ie_len); 191 return pos + ie_len; 768 lnkid->ie_len = 3 * ETH_ALEN; 841 ftie->ie_len = sizeof(struct wpa_tdls_ftie) - 2; 847 ftie->ie_len += 170 [all...] |