HomeSort by relevance Sort by last modified time
    Searched defs:rsn (Results 1 - 7 of 7) sorted by null

  /external/wpa_supplicant_8/wpa_supplicant/
dpp_supplicant.c 1974 const u8 *rsn; local
    [all...]
sme.c 312 const u8 *rsn; local
315 rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
316 if (!rsn) {
318 "SAE enabled, but target BSS does not advertise RSN");
320 } else if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 &&
325 } else if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 &&
331 "SAE enabled, but target BSS does not advertise SAE AKM for RSN");
380 /* No PMKSA caching, but otherwise similar to RSN/WPA *
498 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local
    [all...]
events.c 361 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from "
370 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate "
374 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR
560 " skip RSN IE - parse failed");
573 " selected based on TSN in RSN IE");
581 " skip RSN IE - proto mismatch");
588 " skip RSN IE - PTK cipher mismatch");
595 " skip RSN IE - GTK cipher mismatch");
603 " skip RSN IE - group mgmt cipher mismatch");
610 " skip RSN IE - key mgmt mismatch")
1639 const u8 *ssid, *rsn; local
    [all...]
wpa_supplicant.c 309 * RSN IBSS authentication is per-STA and we can disable the
3249 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_11.c 1439 struct wpa_ie_data rsn; local
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.h 139 /* IEEE 802.11, 7.3.2.25.3 RSN Capabilities */
170 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */
180 #define WPA_KEY_INFO_ENCR_KEY_DATA BIT(12) /* IEEE 802.11i/RSN only */
193 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */
259 * 2/4: RSN IE
260 * 3/4: one or two RSN IEs + GTK IE (encrypted)
266 /* RSN IE version 1
276 * RSN Capabilities (2 octets, little endian) (default: 0)
454 const u8 *rsn; member in struct:wpa_ft_ies
  /external/wpa_supplicant_8/src/rsn_supp/
wpa.c 39 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
249 "RSN: Cannot set low order 256 bits of MSK for key management offload");
254 "RSN: Cannot set PMK for key management offload");
268 /* When using drivers that generate RSN IE, wpa_supplicant may
276 "RSN: found matching PMKID from PMKSA cache");
279 "RSN: no matching PMKID found");
286 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN);
288 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache",
369 "RSN: the new PMK matches with the "
381 "RSN: PMKID mismatch - authentication server may have derived different MSK?!")
1228 struct wpa_ie_data rsn; local
3068 struct wpa_ie_data rsn; local
3091 struct wpa_ie_data rsn; local
3106 struct wpa_ie_data rsn; local
3647 struct wpa_ie_data rsn; local
4338 struct wpa_ie_data rsn; local
    [all...]

Completed in 358 milliseconds