/external/wpa_supplicant_8/wpa_supplicant/ |
dpp_supplicant.c | 1974 const u8 *rsn; local [all...] |
sme.c | 312 const u8 *rsn; local 315 rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); 316 if (!rsn) { 318 "SAE enabled, but target BSS does not advertise RSN"); 320 } else if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 && 325 } else if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 && 331 "SAE enabled, but target BSS does not advertise SAE AKM for RSN"); 380 /* No PMKSA caching, but otherwise similar to RSN/WPA * 498 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local [all...] |
events.c | 361 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from " 370 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate " 374 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR 560 " skip RSN IE - parse failed"); 573 " selected based on TSN in RSN IE"); 581 " skip RSN IE - proto mismatch"); 588 " skip RSN IE - PTK cipher mismatch"); 595 " skip RSN IE - GTK cipher mismatch"); 603 " skip RSN IE - group mgmt cipher mismatch"); 610 " skip RSN IE - key mgmt mismatch") 1639 const u8 *ssid, *rsn; local [all...] |
wpa_supplicant.c | 309 * RSN IBSS authentication is per-STA and we can disable the 3249 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11.c | 1439 struct wpa_ie_data rsn; local [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 139 /* IEEE 802.11, 7.3.2.25.3 RSN Capabilities */ 170 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */ 180 #define WPA_KEY_INFO_ENCR_KEY_DATA BIT(12) /* IEEE 802.11i/RSN only */ 193 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ 259 * 2/4: RSN IE 260 * 3/4: one or two RSN IEs + GTK IE (encrypted) 266 /* RSN IE version 1 276 * RSN Capabilities (2 octets, little endian) (default: 0) 454 const u8 *rsn; member in struct:wpa_ft_ies
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 39 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message 249 "RSN: Cannot set low order 256 bits of MSK for key management offload"); 254 "RSN: Cannot set PMK for key management offload"); 268 /* When using drivers that generate RSN IE, wpa_supplicant may 276 "RSN: found matching PMKID from PMKSA cache"); 279 "RSN: no matching PMKID found"); 286 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN); 288 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache", 369 "RSN: the new PMK matches with the " 381 "RSN: PMKID mismatch - authentication server may have derived different MSK?!") 1228 struct wpa_ie_data rsn; local 3068 struct wpa_ie_data rsn; local 3091 struct wpa_ie_data rsn; local 3106 struct wpa_ie_data rsn; local 3647 struct wpa_ie_data rsn; local 4338 struct wpa_ie_data rsn; local [all...] |