| /src/external/bsd/wpa/dist/src/p2p/ |
| p2p_dev_disc.c | 313 struct wpabuf *ies; local 317 ies = p2p_build_probe_resp_ies(p2p, NULL, 0); 318 if (ies == NULL) 325 ies) < 0) { 328 wpabuf_free(ies);
|
| p2p.c | 257 struct wpabuf *ies; local 291 ies = p2p_build_probe_resp_ies(p2p, NULL, 0); 292 if (ies == NULL) 300 ies) < 0) { 306 wpabuf_free(ies); 313 struct wpabuf *ies; local 342 ies = p2p_build_probe_resp_ies(p2p, NULL, 0); 343 if (ies == NULL) 348 if (p2p->cfg->start_listen(p2p->cfg->cb_ctx, freq, timeout, ies) < 0) { 351 wpabuf_free(ies); 2380 struct wpabuf *ies; local 5599 struct wpabuf *ies, *buf; local [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| op_classes.c | 510 const u8 *ies; local 516 ies = wpa_bss_ie_ptr(bss); 518 return wpas_get_op_chan_phy(bss->freq, ies, ies_len, current, 536 * accurate guess based on frequency if the needed IEs are not available
|
| bss.h | 142 /* followed by ie_len octets of IEs */ 143 /* followed by beacon_ie_len octets of IEs */ 144 u8 ies[]; member in struct:wpa_bss 149 return bss->ies;
|
| mesh_mpm.c | 1165 const u8 *ies; local 1179 ies = mgmt->u.action.u.slf_prot_action.variable; 1194 WPA_GET_LE16(ies)); 1195 ies += 2; /* capability */ 1199 aid = WPA_GET_LE16(ies); 1201 ies += 2; /* aid */ 1205 /* check for mesh peering, mesh id and mesh config IEs */ 1206 if (ieee802_11_parse_elems(ies, ie_len, &elems, 0) == ParseFailed) { 1207 wpa_printf(MSG_DEBUG, "MPM: Failed to parse PLINK IEs"); 1281 ies, ie_len) [all...] |
| rrm.c | 712 int wpas_get_op_chan_phy(int freq, const u8 *ies, size_t ies_len, 721 ie = get_ie(ies, ies_len, WLAN_EID_HT_OPERATION); 735 ie = get_ie(ies, ies_len, WLAN_EID_VHT_OPERATION); 787 const u8 *ies = *ies_buf; local 832 * IE. So even when required to report all IEs, add elements one after 836 while (ies_len > 2 && 2U + ies[1] <= ies_len && rem_len > 0) { 838 (eids && bitfield_is_set(eids, ies[0])) || 839 (ext_eids && ies[0] == WLAN_EID_EXTENSION && ies[1] && 840 bitfield_is_set(ext_eids, ies[2]))) 939 const u8 *ies = wpa_bss_ie_ptr(bss); local [all...] |
| bss.c | 494 os_memcpy(bss->ies, res + 1, res->ie_len + res->beacon_ie_len); 567 wpa_printf(MSG_DEBUG, "bss: %s: cannot compare IEs", __func__); 572 /* in case of multiple IEs stored in buffer */ 729 * Do not update the IEs in this BSS entry to avoid such loss of 733 wpa_dbg(wpa_s, MSG_DEBUG, "BSS: Do not update scan IEs for " 740 os_memcpy(bss->ies, res + 1, res->ie_len + res->beacon_ie_len); 775 os_memcpy(bss->ies, res + 1, 1242 const u8 *ies; local 1247 ies = wpa_bss_ie_ptr(bss); 1248 ies += bss->ie_len 1279 const u8 *ies; local 1309 const u8 *ies; local [all...] |
| scan.c | 285 * @default_ies: Whether or not to use the default IEs in the Probe Request 286 * frames. Note that this will free any existing IEs set in @params, so this 287 * shouldn't be set if the IEs have already been set with 298 struct wpabuf *ies = NULL; local 311 ies = wpa_supplicant_extra_ies(wpa_s); 312 if (ies) { 313 params->extra_ies = wpabuf_head(ies); 314 params->extra_ies_len = wpabuf_len(ies); 318 if (ies) { 319 wpabuf_free(ies); 2125 const u8 *ies; local 2155 const u8 *ies; local 3152 const u8 *ies = (const void *) (res + 1); local [all...] |
| events.c | 2152 const u8 *ies = wpa_bss_ie_ptr(bss); local 2156 return wpas_get_est_tpt(wpa_s, ies, ie_len, rate, snr, bss->freq, 2931 const u8 *ies, size_t ies_len) 2935 if (ies == NULL) 2938 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) 2995 const u8 *ies, size_t ies_len) 2999 if (ies == NULL) 3002 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) 3033 const u8 *ies, size_t ies_len) 3041 if (!ies || [all...] |
| p2p_supplicant.c | 295 const u8 *ies; local 302 ies = (const u8 *) (bss + 1); 309 ies = ies + ies_len; 316 ies, ies_len) > 0) 428 struct wpabuf *wps_ie, *ies; local 512 ies = wpabuf_alloc(wpabuf_len(wps_ie) + ielen); 513 if (ies == NULL) { 517 wpabuf_put_buf(ies, wps_ie); 521 p2p_scan_ie(wpa_s->global->p2p, ies, dev_id, bands) 5571 struct wpabuf *wps_ie, *ies; local [all...] |
| /src/external/bsd/wpa/dist/src/ap/ |
| ieee802_11_shared.c | 283 const u8 *ies; local 285 ies = mgmt->u.action.u.sa_query_resp.variable; 286 ies_len = len - (ies - (u8 *) mgmt); 287 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) ==
|
| beacon.c | 310 const u8 *ies; local 313 ies = wpa_auth_get_wpa_ie(hapd->wpa_auth, &ies_len); 314 if (!ies) 317 return get_ie(ies, ies_len, eid); 324 const u8 *ies; local 327 ies = wpa_auth_get_wpa_ie(hapd->wpa_auth, &ies_len); 328 if (!ies) 331 return get_vendor_ie(ies, ies_len, vendor_type); 603 /* Generated IEs will be included inside an ML element */
|
| wpa_auth_ft.c | 1965 const u8 *ies, size_t ies_len, 2065 ft_pending_req_ies = wpabuf_alloc_copy(ies, ies_len); 2429 const u8 *ies, size_t ies_len) 2437 ies, ies_len); 2452 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) == 2454 wpa_printf(MSG_DEBUG, "FT: Failed to parse request IEs"); 3169 const u8 *ies, size_t ies_len, 3193 wpa_hexdump(MSG_DEBUG, "FT: Received authentication frame IEs", 3194 ies, ies_len); 3196 if (wpa_ft_parse_ies(ies, ies_len, &parse, 0, false)) 3740 const u8 *ies; local [all...] |
| /src/external/bsd/wpa/dist/src/common/ |
| ieee802_11_common.h | 29 } ies[MAX_NOF_MB_IES_SUPPORTED]; member in struct:mb_ies_info 207 int ieee802_11_ie_count(const u8 *ies, size_t ies_len); 208 struct wpabuf * ieee802_11_vendor_ie_concat(const u8 *ies, size_t ies_len, 272 const u8 * get_ie(const u8 *ies, size_t len, u8 eid); 273 const u8 * get_ie_ext(const u8 *ies, size_t len, u8 ext); 274 const u8 * get_vendor_ie(const u8 *ies, size_t len, u32 vendor_type); 370 const u8 * get_ml_ie(const u8 *ies, size_t len, u8 type);
|
| /src/external/bsd/wpa/dist/wpa_supplicant/dbus/ |
| dbus_new_handlers.c | 1439 u8 *ies = NULL, *nies; local 1447 "%s[dbus]: ies must be an array of arrays of bytes", 1451 "Wrong IEs value type. Array of arrays of bytes required"); 1460 "%s[dbus]: ies must be an array of arrays of bytes", 1463 message, "Wrong IEs value type. Array required"); 1476 nies = os_realloc(ies, ies_len + len); 1478 os_free(ies); 1482 ies = nies; 1483 os_memcpy(ies + ies_len, val, len); 1489 params->extra_ies = ies; [all...] |
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver.h | 367 * If the driver does not support reporting all IEs, the IE data structure is 368 * constructed of the IEs that are available. This field will also need to 370 * report all IEs to make it easier to support future additions. 372 * This structure data is followed by ie_len octets of IEs from Probe Response 373 * frame (or if the driver does not indicate source of IEs, these may also be 374 * from Beacon frame). After the first set of IEs, another set of IEs may follow 958 * For the association link, the ies and ies_len should be NULL and 964 const u8 *ies; member in struct:wpa_driver_mld_params::__anon8332 1408 * head - Beacon head from IEEE 802.11 header to IEs before TIM I 1877 const u8 *ies; member in struct:wpa_driver_mesh_join_params 6246 const u8 *ies; member in struct:wpa_event_data::ft_ies 6272 const u8 *ies; member in struct:wpa_event_data::auth_info 6689 const u8 *ies; member in struct:wpa_event_data::mesh_peer [all...] |