/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | taxonomy.h | 14 const u8 *ie, size_t ie_len); 17 const u8 *ie, size_t ie_len); 20 const u8 *ie, size_t ie_len);
|
H A D | taxonomy.c | 104 size_t ie_len; local 121 ie_len = wpabuf_len(ies); 123 while (ie_len >= 2) { 129 ie_len -= 2; 131 if (elen > ie_len) 226 ie_len -= elen; 270 const u8 *ie, size_t ie_len) 273 sta->probe_ie_taxonomy = wpabuf_alloc_copy(ie, ie_len); 279 const u8 *ie, size_t ie_len) 282 info->probe_ie_taxonomy = wpabuf_alloc_copy(ie, ie_len); 268 taxonomy_sta_info_probe_req(const struct hostapd_data *hapd, struct sta_info *sta, const u8 *ie, size_t ie_len) argument 277 taxonomy_hostapd_sta_info_probe_req(const struct hostapd_data *hapd, struct hostapd_sta_info *info, const u8 *ie, size_t ie_len) argument 286 taxonomy_sta_info_assoc_req(const struct hostapd_data *hapd, struct sta_info *sta, const u8 *ie, size_t ie_len) argument [all...] |
H A D | mbo_ap.c | 103 u8 ie_len = pos[1]; local 105 if (2 + ie_len > end - pos) 109 mbo_ap_parse_non_pref_chan(sta, pos + 2, ie_len); 212 u8 ie_len; local 227 ie_len = pos[1]; 229 if (2 + ie_len > end - pos) 233 ie_len >= 4 && WPA_GET_BE24(pos + 2) == OUI_WFA) 235 pos + 6, ie_len - 4,
|
H A D | utils.c | 21 const u8 *ie, size_t ie_len, 18 hostapd_register_probereq_cb(struct hostapd_data *hapd, int (*cb)(void *ctx, const u8 *sa, const u8 *da, const u8 *bssid, const u8 *ie, size_t ie_len, int ssi_signal), void *ctx) argument
|
H A D | hostapd.h | 85 const u8 *ie, size_t ie_len, int ssi_signal); 617 const u8 *ie, size_t ie_len, 632 const u8 *bssid, const u8 *ie, size_t ie_len,
|
H A D | wnm_ap.c | 267 u8 ie_len = pos[1]; local 268 if (pos + 2 + ie_len > frm + len) 271 ie_len >= (int) sizeof(*wnmsleep_ie) - 2) 278 } else if (*pos == WLAN_EID_EXTENSION && ie_len >= 1 && 281 oci_ie_len = ie_len - 1; 286 pos += ie_len + 2;
|
/freebsd-11-stable/contrib/wpa/wpa_supplicant/ |
H A D | mesh.h | 28 const u8 *ies, size_t ie_len); 36 const u8 *ies, size_t ie_len) 34 wpa_mesh_notify_peer(struct wpa_supplicant *wpa_s, const u8 *addr, const u8 *ies, size_t ie_len) argument
|
H A D | bss.c | 436 bss = os_zalloc(sizeof(*bss) + res->ie_len + res->beacon_ie_len); 444 bss->ie_len = res->ie_len; 446 os_memcpy(bss + 1, res + 1, res->ie_len + res->beacon_ie_len); 548 if (old->ie_len == new_res->ie_len && 549 os_memcmp(old + 1, new_res + 1, old->ie_len) == 0) 671 if (bss->ie_len + bss->beacon_ie_len >= 672 res->ie_len + res->beacon_ie_len) { 673 os_memcpy(bss + 1, res + 1, res->ie_len [all...] |
H A D | op_classes.c | 343 u8 *ie_len; local 365 ie_len = wpabuf_put(buf, 1); 373 *ie_len = wpabuf_len(buf) - 2; 374 if (*ie_len < 2 || wpabuf_len(buf) > len) {
|
H A D | mesh_mpm.c | 218 u8 ie_len, add_plid = 0; local 319 ie_len = 4; 321 ie_len += PMKID_LEN; 326 ie_len += 2; 330 ie_len += 2; 332 ie_len += 2; /* reason code */ 337 wpabuf_put_u8(buf, ie_len); 1127 size_t ie_len; local 1141 ie_len = (const u8 *) mgmt + len - 1145 if (ie_len < [all...] |
H A D | wnm_sta.c | 329 u8 ie_len = *(pos + 1); local 330 if (2 + ie_len > frm + len - pos) { 331 wpa_printf(MSG_INFO, "WNM: Invalid IE len %u", ie_len); 334 wpa_hexdump(MSG_DEBUG, "WNM: Element", pos, 2 + ie_len); 335 if (*pos == WLAN_EID_WNMSLEEP && ie_len >= 4) 342 } else if (*pos == WLAN_EID_EXTENSION && ie_len >= 1 && 345 oci_ie_len = ie_len - 1; 349 pos += ie_len + 2; 1641 u8 ie, ie_len; local 1648 ie_len [all...] |
H A D | p2p_supplicant.h | 128 u16 reason_code, const u8 *ie, size_t ie_len, 131 u16 reason_code, const u8 *ie, size_t ie_len, 177 const u8 *ie, size_t ie_len, 239 const u8 *ie, size_t ie_len, 236 wpas_p2p_probe_req_rx(struct wpa_supplicant *wpa_s, const u8 *addr, const u8 *dst, const u8 *bssid, const u8 *ie, size_t ie_len, unsigned int rx_freq, int ssi_signal) argument
|
H A D | events.c | 2338 const u8 *ie, size_t ie_len) 2342 if (!ie || !ie_len || !wpa_s->fst) 2347 while (ie_len >= 2 && mb_ies.nof_ies < MAX_NOF_MB_IES_SUPPORTED) { 2351 if (len > ie_len) { 2353 ie, ie_len); 2361 mb_ies.ies[mb_ies.nof_ies].ie_len = len - 2; 2365 ie_len -= len; 2710 iebcn = ieprb + bss->ie_len; 2712 if (!wpas_fst_update_mbie(wpa_s, ieprb, bss->ie_len)) 3538 const u8 *ie, size_t ie_len, in 2337 wpas_fst_update_mbie(struct wpa_supplicant *wpa_s, const u8 *ie, size_t ie_len) argument 3536 wpas_event_disconnect(struct wpa_supplicant *wpa_s, const u8 *addr, u16 reason_code, int locally_generated, const u8 *ie, size_t ie_len, int deauth) argument 3589 size_t ie_len = 0; local 3644 size_t ie_len = 0; local 4576 size_t ie_len; local 4632 size_t ie_len; local [all...] |
H A D | rrm.c | 760 size_t *ie_len, int add_fixed) 763 size_t ies_len = *ie_len; 831 *ie_len = ies_len; 844 u8 **ie, size_t *ie_len, u8 idx) 855 buf = os_malloc(sizeof(*rep) + 14 + *ie_len + subelems_len); 863 14 + *ie_len, ie, ie_len, 881 if (data->report_detail != BEACON_REPORT_DETAIL_NONE && *ie_len) 913 size_t ies_len = bss->ie_len ? bss->ie_len 756 wpas_beacon_rep_add_frame_body(struct bitfield *eids, enum beacon_report_detail detail, struct wpa_bss *bss, u8 *buf, size_t buf_len, u8 **ies_buf, size_t *ie_len, int add_fixed) argument 840 wpas_add_beacon_rep_elem(struct beacon_rep_data *data, struct wpa_bss *bss, struct wpabuf **wpa_buf, struct rrm_measurement_beacon_report *rep, u8 **ie, size_t *ie_len, u8 idx) argument [all...] |
H A D | mbo.c | 44 u8 ie_len = mbo_ie[1]; local 46 if (ie_len < MBO_IE_HEADER - 2) 50 return get_ie(mbo, 2 + ie_len - MBO_IE_HEADER, attr);
|
H A D | bss.h | 108 size_t ie_len; member in struct:wpa_bss 111 /* followed by ie_len octets of IEs */
|
H A D | scan.c | 1818 size_t ie_len = res->ie_len; local 1820 /* Use the Beacon frame IEs if res->ie_len is not available */ 1821 if (!ie_len) 1822 ie_len = res->beacon_ie_len; 1824 return get_ie((const u8 *) (res + 1), ie_len, ie); 1843 end = pos + res->ie_len; 1879 pos += res->ie_len; 1911 buf = wpabuf_alloc(res->ie_len); 1916 end = pos + res->ie_len; [all...] |
/freebsd-11-stable/contrib/tcpdump/ |
H A D | print-fr.c | 433 uint8_t ie_len; member in struct:ie_tlv_header_t 442 uint8_t ie_type,ie_len; local 480 ie_len=tptr[1]; 485 ie_len)); 488 if (ie_type == 0 || ie_len <= sizeof(struct ie_tlv_header_t)) 491 ND_TCHECK2(*tptr, ie_len); 494 ie_len-=sizeof(struct ie_tlv_header_t); 501 if (ie_len != 4) { 510 for (idx = 0; idx < ie_len && idx < MFR_ID_STRING_MAXLEN; idx++) { 519 if (ie_len [all...] |
/freebsd-11-stable/contrib/wpa/src/p2p/ |
H A D | p2p_build.c | 478 const char *svc_name, u8 **ie_len, u8 **pos, 503 if (*ie_len) { 504 int ie_data_len = (*pos - *ie_len) - 1; 518 *ie_len = p2p_buf_add_ie_hdr(buf); 538 p2p_buf_update_ie_hdr(buf, *ie_len); 539 *ie_len = p2p_buf_add_ie_hdr(buf); 560 p2p_buf_update_ie_hdr(buf, *ie_len); 561 *ie_len = p2p_buf_add_ie_hdr(buf); 568 p2p_buf_update_ie_hdr(buf, *ie_len); 569 *ie_len 476 p2p_buf_add_service_info(struct wpabuf *buf, struct p2p_data *p2p, u32 adv_id, u16 config_methods, const char *svc_name, u8 **ie_len, u8 **pos, size_t *total_len, u8 *attr_len) argument 602 u8 *pos, *attr_len, *ie_len = NULL; local [all...] |
/freebsd-11-stable/contrib/wpa/src/common/ |
H A D | privsep_commands.h | 49 size_t ie_len; member in struct:privsep_cmd_authenticate 56 /* followed by ie_len bytes of ie */
|
H A D | hw_features_common.c | 163 ieee802_11_parse_elems((u8 *) (bss + 1), bss->ie_len, &elems, 0); 256 ieee802_11_parse_elems((u8 *) (bss + 1), bss->ie_len, &elems, 0); 340 ieee802_11_parse_elems((u8 *) (bss + 1), bss->ie_len, &elems,
|
/freebsd-11-stable/contrib/wpa/src/drivers/ |
H A D | driver_privsep.c | 191 if (sizeof(*r) + r->ie_len + r->beacon_ie_len > (size_t) len) { 194 (int) sizeof(*r), (int) r->ie_len, 256 buflen = sizeof(*data) + params->ie_len + params->auth_data_len; 266 data->ie_len = params->ie_len; 277 if (params->ie_len) { 278 os_memcpy(pos, params->ie, params->ie_len); 279 pos += params->ie_len; 414 int ie_len; local 423 os_memcpy(&ie_len, po [all...] |
H A D | driver_nl80211_scan.c | 671 const u8 *ie, size_t ie_len) 679 ssid = get_ie(ie, ie_len, WLAN_EID_SSID); 719 size_t ie_len, beacon_ie_len; local 731 ie_len = nla_len(bss[NL80211_BSS_INFORMATION_ELEMENTS]); 734 ie_len = 0; 745 ie ? ie_len : beacon_ie_len)) 748 r = os_zalloc(sizeof(*r) + ie_len + beacon_ie_len); 796 r->ie_len = ie_len; 799 os_memcpy(pos, ie, ie_len); 670 nl80211_scan_filtered(struct wpa_driver_nl80211_data *drv, const u8 *ie, size_t ie_len) argument [all...] |
H A D | driver.h | 315 * @ie_len: length of the following IE field in octets 327 * This structure data is followed by ie_len octets of IEs from Probe Response 347 size_t ie_len; member in struct:wpa_scan_res 349 /* Followed by ie_len + beacon_ie_len octets of IE data */ 640 size_t ie_len; member in struct:wpa_driver_auth_params 1470 int ie_len; member in struct:wpa_driver_mesh_join_params 4245 * @ie_len: DH IE length in bytes 4252 const u8 *ie, size_t ie_len); 5049 * ie_len - Length of ie buffer in octets 5051 size_t ie_len; member in struct:wpa_event_data::disassoc_info 5082 size_t ie_len; member in struct:wpa_event_data::deauth_info 5370 size_t ie_len; member in struct:wpa_event_data::rx_probe_req 5562 size_t ie_len; member in struct:wpa_event_data::mesh_peer 5643 size_t ie_len; member in struct:wpa_event_data::update_dh [all...] |
/freebsd-11-stable/contrib/wpa/src/rsn_supp/ |
H A D | tdls.c | 54 u8 ie_len; member in struct:wpa_tdls_ftie 64 u8 ie_len; member in struct:wpa_tdls_timeoutie 71 u8 ie_len; member in struct:wpa_tdls_lnkid 84 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs); 171 static u8 * wpa_add_ie(u8 *pos, const u8 *ie, size_t ie_len) argument 173 os_memcpy(pos, ie, ie_len); 174 return pos + ie_len; 735 lnkid->ie_len = 3 * ETH_ALEN; 807 ftie->ie_len = sizeof(struct wpa_tdls_ftie) - 2; 813 ftie->ie_len 2629 wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs) argument [all...] |