/freebsd-11-stable/contrib/wpa/src/p2p/ |
H A D | p2p.h | 1596 * @ies: Pointer to IEs from the scan result 1597 * @ies_len: Length of the ies buffer 1605 * driver/firmware designs. The ies buffer need to include at least the P2P IE, 1615 struct os_reltime *rx_time, int level, const u8 *ies, 1872 * @ies: Information elements from scan results 1873 * @ies_len: ies buffer length in octets 1881 int p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf, char *end); 1894 * @ies: Information elements from scan results 1895 * @ies_len: ies buffer length in octets 1899 int p2p_parse_dev_addr(const u8 *ies, size_ [all...] |
H A D | p2p_i.h | 864 struct os_reltime *rx_time, int level, const u8 *ies,
|
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | ieee802_11_shared.c | 233 const u8 *ies; local 235 ies = mgmt->u.action.u.sa_query_resp.variable; 236 ies_len = len - (ies - (u8 *) mgmt); 237 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) ==
|
H A D | wpa_auth_i.h | 134 const u8 *ies, size_t ies_len);
|
H A D | wpa_auth_ft.c | 1929 const u8 *ies, size_t ies_len, 2028 ft_pending_req_ies = wpabuf_alloc_copy(ies, ies_len); 2287 const u8 *ies, size_t ies_len) 2295 ies, ies_len); 2310 if (ieee802_11_parse_elems((u8 *) ies, ies_len, &parse, 1) == 2862 const u8 *ies, size_t ies_len, 2887 ies, ies_len); 2889 if (wpa_ft_parse_ies(ies, ies_len, &parse, -1)) { 2981 if (wpa_ft_pull_pmk_r1(sm, ies, ies_len, parse.rsn_pmkid) < 0) { 3070 u16 auth_transaction, const u8 *ies, size_ 1928 wpa_ft_pull_pmk_r1(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len, const u8 *pmk_r0_name) argument 2285 wpa_ft_process_rdie(struct wpa_state_machine *sm, u8 *pos, u8 *end, u8 id, u8 descr_count, const u8 *ies, size_t ies_len) argument 2861 wpa_ft_process_auth_req(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len, u8 **resp_ies, size_t *resp_ies_len) argument 3069 wpa_ft_process_auth(struct wpa_state_machine *sm, const u8 *bssid, u16 auth_transaction, const u8 *ies, size_t ies_len, void (*cb)(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len), void *ctx) argument 3113 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len) argument 3329 const u8 *ies; local 3402 wpa_ft_rrb_rx_request_cb(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len) argument [all...] |
H A D | ieee802_11.c | 302 const u8 *ies, size_t ies_len, const char *dbg) 325 if (ies && ies_len) 326 os_memcpy(reply->u.auth.variable, ies, ies_len); 346 const u8 *ies, size_t ies_len) 353 auth_transaction, status, ies, ies_len, 2920 const u8 *ies, size_t ies_len, int reassoc) 2928 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) { 3004 sta->p2p_ie = ieee802_11_vendor_ie_concat(ies, ies_len, 3033 sta->wps_ie = ieee802_11_vendor_ie_concat(ies, ies_len, 3120 resp = wpa_ft_validate_reassoc(sta->wpa_sm, ies, 299 send_auth_reply(struct hostapd_data *hapd, const u8 *dst, const u8 *bssid, u16 auth_alg, u16 auth_transaction, u16 resp, const u8 *ies, size_t ies_len, const char *dbg) argument 344 handle_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument 2919 check_assoc_ies(struct hostapd_data *hapd, struct sta_info *sta, const u8 *ies, size_t ies_len, int reassoc) argument 3456 send_assoc_resp(struct hostapd_data *hapd, struct sta_info *sta, const u8 *addr, u16 status_code, int reassoc, const u8 *ies, size_t ies_len, int rssi) argument [all...] |
H A D | drv_callbacks.c | 1031 const u8 *ies, size_t ies_len) 1044 hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len); 1106 rx_auth->auth_transaction, rx_auth->ies, 1116 handle_auth_fils(hapd, sta, rx_auth->ies, rx_auth->ies_len, 1028 hostapd_notify_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid, u16 auth_transaction, u16 status, const u8 *ies, size_t ies_len) argument
|
H A D | wpa_auth.c | 2380 const u8 *ies, size_t ies_len, 2393 ie = ies; 2433 int wpa_fils_validate_key_confirm(struct wpa_state_machine *sm, const u8 *ies, argument 2438 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) { 2379 wpa_fils_validate_fils_session(struct wpa_state_machine *sm, const u8 *ies, size_t ies_len, const u8 *fils_session) argument
|
/freebsd-11-stable/contrib/wpa/src/drivers/ |
H A D | driver_nl80211.h | 308 int nl80211_set_default_scan_ies(void *priv, const u8 *ies, size_t ies_len);
|
H A D | driver_nl80211_scan.c | 1239 * @ies: Pointer to IEs buffer 1243 int nl80211_set_default_scan_ies(void *priv, const u8 *ies, size_t ies_len) argument 1264 wpa_hexdump(MSG_MSGDUMP, "nl80211: Scan default IEs", ies, ies_len); 1266 ies_len, ies))
|
H A D | driver_nl80211_event.c | 181 event.auth.ies = mgmt->u.auth.variable; 1089 data.ft_ies.ies = nla_data(tb[NL80211_ATTR_IE]); 1326 data.mesh_peer.ies = nla_data(tb[NL80211_ATTR_IE]); 1345 u8 *ies = NULL; local 1348 ies = nla_data(tb[NL80211_ATTR_IE]); 1351 wpa_hexdump(MSG_DEBUG, "nl80211: Assoc Req IEs", ies, ies_len); 1352 drv_event_assoc(bss->ctx, addr, ies, ies_len, 0);
|
H A D | driver_privsep.c | 399 data.auth.ies = (u8 *) (auth + 1); 497 data.ft_ies.ies = buf + sizeof(int) + ETH_ALEN;
|
H A D | driver_atheros.c | 947 event.auth.ies = mgmt->u.auth.variable;
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | sme.c | 1271 data->auth.ies, data->auth.ies_len); 1279 data->auth.status_code, data->auth.ies, 1299 if (data->auth.ies && data->auth.ies_len) { 1303 wpa_snprintf_hex(ie_txt, buflen, data->auth.ies, 1363 if (wpa_ft_process_response(wpa_s->wpa, data->auth.ies, 1404 data->auth.ies, data->auth.ies_len) < 0) { 1812 const u8 *ies, size_t ies_len) 1814 if (md == NULL || ies == NULL) { 1824 wpa_hexdump(MSG_DEBUG, "SME: FT IEs", ies, ies_len); 1826 wpa_s->sme.ft_ies = os_memdup(ies, ies_le 1811 sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md, const u8 *ies, size_t ies_len) argument [all...] |
H A D | events.c | 2202 const u8 *ies, size_t ies_len) 2206 if (ies == NULL) 2209 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) 2266 const u8 *ies, size_t ies_len) 2270 if (ies == NULL) 2273 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) 2286 const u8 *ies, size_t ies_len) 2294 !ies || 2295 ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) 2360 mb_ies.ies[mb_ie 2201 wnm_process_assoc_resp(struct wpa_supplicant *wpa_s, const u8 *ies, size_t ies_len) argument 2265 interworking_process_assoc_resp(struct wpa_supplicant *wpa_s, const u8 *ies, size_t ies_len) argument 2285 multi_ap_process_assoc_resp(struct wpa_supplicant *wpa_s, const u8 *ies, size_t ies_len) argument [all...] |
H A D | wpa_priv.c | 902 if (data->auth.ies) { 903 os_memcpy(pos, data->auth.ies, data->auth.ies_len); 1012 if (data == NULL || data->ft_ies.ies == NULL) 1025 os_memcpy(pos, data->ft_ies.ies, data->ft_ies.ies_len);
|
H A D | p2p_supplicant.c | 265 const u8 *ies; local 272 ies = (const u8 *) (bss + 1); 279 ies = ies + ies_len; 286 ies, ies_len) > 0) 357 struct wpabuf *wps_ie, *ies; local 433 ies = wpabuf_alloc(wpabuf_len(wps_ie) + ielen); 434 if (ies == NULL) { 438 wpabuf_put_buf(ies, wps_ie); 442 p2p_scan_ie(wpa_s->global->p2p, ies, dev_i 5100 struct wpabuf *wps_ie, *ies; local 6796 wpas_p2p_scan_result_text(const u8 *ies, size_t ies_len, char *buf, char *end) argument 7019 wpas_p2p_scan_ie(struct wpa_supplicant *wpa_s, struct wpabuf *ies) argument [all...] |
H A D | wpa_supplicant_i.h | 1392 const u8 * mbo_get_attr_from_ies(const u8 *ies, size_t ies_len,
|
H A D | wps_supplicant.c | 1910 int wpas_wps_scan_result_text(const u8 *ies, size_t ies_len, char *buf, argument 1916 wps_ie = ieee802_11_vendor_ie_concat(ies, ies_len, WPS_DEV_OUI_WFA);
|
/freebsd-11-stable/contrib/wpa/src/common/ |
H A D | wpa_common.h | 442 int wpa_insert_pmkid(u8 *ies, size_t *ies_len, const u8 *pmkid); 471 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, struct wpa_ft_ies *parse,
|
H A D | wpa_common.c | 919 int wpa_ft_parse_ies(const u8 *ies, size_t ies_len, argument 935 if (ies == NULL) 938 pos = ies; 939 end = ies + ies_len; 2130 int wpa_insert_pmkid(u8 *ies, size_t *ies_len, const u8 *pmkid) argument 2135 start = ies; 2136 end = ies + *ies_len;
|
/freebsd-11-stable/contrib/wpa/src/rsn_supp/ |
H A D | tdls.c | 2932 void wpa_tdls_ap_ies(struct wpa_sm *sm, const u8 *ies, size_t len) argument 2939 if (ies == NULL || 2940 ieee802_11_parse_elems(ies, len, &elems, 0) == ParseFailed || 2954 void wpa_tdls_assoc_resp_ies(struct wpa_sm *sm, const u8 *ies, size_t len) argument 2958 if (ies == NULL || 2959 ieee802_11_parse_elems(ies, len, &elems, 0) == ParseFailed ||
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers.c | 1141 u8 *ies = NULL, *nies; local 1149 "%s[dbus]: ies must be an array of arrays of bytes", 1162 "%s[dbus]: ies must be an array of arrays of bytes", 1178 nies = os_realloc(ies, ies_len + len); 1180 os_free(ies); 1184 ies = nies; 1185 os_memcpy(ies + ies_len, val, len); 1191 params->extra_ies = ies; 5068 (ie && ie_len && !wpa_dbus_dict_append_byte_array(&dict_iter, "ies",
|
/freebsd-11-stable/sys/net80211/ |
H A D | ieee80211_input.c | 532 scan->ies = frm;
|
H A D | ieee80211_scan_sta.c | 372 (void) ieee80211_ies_init(&ise->se_ies, sp->ies, sp->ies_len);
|