/hardware/ti/wlan/wl1271/stad/src/Connection_Managment/ |
rsnApi.h | 224 TI_STATUS rsn_unload(TI_HANDLE hRsn); 228 TI_STATUS rsn_SetDefaults (TI_HANDLE hRsn, TRsnInitParams *pInitParam); 230 TI_STATUS rsn_reconfig(TI_HANDLE hRsn); 232 TI_STATUS rsn_start(TI_HANDLE hRsn); 234 TI_STATUS rsn_stop(TI_HANDLE hRsn, TI_BOOL removeKeys); 236 TI_STATUS rsn_eventRecv(TI_HANDLE hRsn, ERsnEvent event, void* pData); 240 TI_STATUS rsn_getParamEncryptionStatus(TI_HANDLE hRsn, ECipherSuite *rsnStatus); 243 TI_STATUS rsn_evalSite(TI_HANDLE hRsn, TRsnData *pRsnData, TRsnSiteParams *pRsnSiteParams, TI_UINT32 *pMetric); 245 TI_STATUS rsn_setSite(TI_HANDLE hRsn, TRsnData *pRsnData, TI_UINT8 *pAssocIe, TI_UINT8 *pAssocIeLen); 247 TI_STATUS rsn_getInfoElement(TI_HANDLE hRsn, TI_UINT8 *pRsnIe, TI_UINT32 *pRsnIeLen) [all...] |
rsn.c | 94 void rsn_pairwiseReKeyTimeout(TI_HANDLE hRsn, TI_BOOL bTwdInitOccured); 95 void rsn_groupReKeyTimeout(TI_HANDLE hRsn, TI_BOOL bTwdInitOccured); 96 void rsn_micFailureReportTimeout (TI_HANDLE hRsn, TI_BOOL bTwdInitOccured); 97 static rsn_siteBanEntry_t * findEntryForInsert(TI_HANDLE hRsn); 98 static rsn_siteBanEntry_t * findBannedSiteAndCleanup(TI_HANDLE hRsn, TMacAddr siteBssid); 171 * I - hRsn - rsniation SM context \n 179 TI_STATUS rsn_unload (TI_HANDLE hRsn) 184 if (hRsn == NULL) 189 pRsn = (rsn_t*)hRsn; 207 os_memoryFree (pRsn->hOs, hRsn, sizeof(rsn_t)) [all...] |
mainKeysSm.h | 100 TI_HANDLE hRsn; 139 TI_HANDLE hRsn,
|
rsn.h | 101 typedef TI_STATUS (*rsn_setPortStatus_t)(TI_HANDLE hRsn, TI_BOOL state); 210 TI_STATUS rsn_setPortStatus(TI_HANDLE hRsn, TI_BOOL state);
|
mainKeysSm.c | 172 TI_HANDLE hRsn, 227 pMainKeys->hRsn = hRsn; 924 rsn_banSite(pMainKeys->hRsn, param.content.ctrlDataCurrentBSSID, RSN_SITE_BAN_LEVEL_FULL, RSN_MAIN_KEYS_SESSION_TIMEOUT); 956 rsn_reportAuthFailure(pMainKeys->hRsn, RSN_AUTH_STATUS_TIMEOUT); 979 rsn_reAuth(pMainKeys->hRsn);
|
connIbss.c | 241 return rsn_start (pConn->hRsn); 302 return rsn_start (pConn->hRsn); 443 tStatus = rsn_stop(((conn_t *)pData)->hRsn, TI_FALSE); 566 return rsn_start(((conn_t *)pData)->hRsn);
|
smePrivate.h | 67 TI_HANDLE hRsn;
|
/system/wlan/ti/wilink_6_1/stad/src/Connection_Managment/ |
rsnApi.h | 224 TI_STATUS rsn_unload(TI_HANDLE hRsn); 228 TI_STATUS rsn_SetDefaults (TI_HANDLE hRsn, TRsnInitParams *pInitParam); 230 TI_STATUS rsn_reconfig(TI_HANDLE hRsn); 232 TI_STATUS rsn_start(TI_HANDLE hRsn); 234 TI_STATUS rsn_stop(TI_HANDLE hRsn, TI_BOOL removeKeys); 236 TI_STATUS rsn_eventRecv(TI_HANDLE hRsn, ERsnEvent event, void* pData); 240 TI_STATUS rsn_getParamEncryptionStatus(TI_HANDLE hRsn, ECipherSuite *rsnStatus); 243 TI_STATUS rsn_evalSite(TI_HANDLE hRsn, TRsnData *pRsnData, TRsnSiteParams *pRsnSiteParams, TI_UINT32 *pMetric); 245 TI_STATUS rsn_setSite(TI_HANDLE hRsn, TRsnData *pRsnData, TI_UINT8 *pAssocIe, TI_UINT8 *pAssocIeLen); 247 TI_STATUS rsn_getInfoElement(TI_HANDLE hRsn, TI_UINT8 *pRsnIe, TI_UINT32 *pRsnIeLen) [all...] |
rsn.c | 94 void rsn_pairwiseReKeyTimeout(TI_HANDLE hRsn, TI_BOOL bTwdInitOccured); 95 void rsn_groupReKeyTimeout(TI_HANDLE hRsn, TI_BOOL bTwdInitOccured); 96 void rsn_micFailureReportTimeout (TI_HANDLE hRsn, TI_BOOL bTwdInitOccured); 97 static rsn_siteBanEntry_t * findEntryForInsert(TI_HANDLE hRsn); 98 static rsn_siteBanEntry_t * findBannedSiteAndCleanup(TI_HANDLE hRsn, TMacAddr siteBssid); 171 * I - hRsn - rsniation SM context \n 179 TI_STATUS rsn_unload (TI_HANDLE hRsn) 184 if (hRsn == NULL) 189 pRsn = (rsn_t*)hRsn; 207 os_memoryFree (pRsn->hOs, hRsn, sizeof(rsn_t)) [all...] |
mainKeysSm.h | 100 TI_HANDLE hRsn; 139 TI_HANDLE hRsn,
|
mainKeysSm.c | 172 TI_HANDLE hRsn, 227 pMainKeys->hRsn = hRsn; 924 rsn_banSite(pMainKeys->hRsn, param.content.ctrlDataCurrentBSSID, RSN_SITE_BAN_LEVEL_FULL, RSN_MAIN_KEYS_SESSION_TIMEOUT); 956 rsn_reportAuthFailure(pMainKeys->hRsn, RSN_AUTH_STATUS_TIMEOUT); 979 rsn_reAuth(pMainKeys->hRsn);
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/inc/ |
rsnApi.h | 142 TI_STATUS rsn_unload(TI_HANDLE hRsn); 144 TI_STATUS rsn_config(TI_HANDLE hRsn, 162 TI_STATUS rsn_reconfig(TI_HANDLE hRsn); 164 TI_STATUS rsn_start(TI_HANDLE hRsn); 166 TI_STATUS rsn_stop(TI_HANDLE hRsn, BOOL removeKeys); 168 TI_STATUS rsn_eventRecv(TI_HANDLE hRsn, rsn_event_e event, void* pData); 174 TI_STATUS rsn_getParamPartial(TI_HANDLE hRsn, paramInfoPartial_t *pParam); 176 TI_STATUS rsn_evalSite(TI_HANDLE hRsn, rsnData_t *pRsnData, bssType_e bssType, macAddress_t bssid, UINT32 *pMetric); 178 TI_STATUS rsn_setSite(TI_HANDLE hRsn, rsnData_t *pRsnData, UINT8 *pAssocIe, UINT8 *pAssocIeLen); 180 TI_STATUS rsn_recvEapol(TI_HANDLE hRsn, mem_MSDU_T *pMsdu) [all...] |
/hardware/ti/wlan/wl1271/Test/ |
rsnDbg.c | 69 void rsnDebugFunction(TI_HANDLE hRsn, TI_UINT32 funcType, void *pParam) 88 rsn_setParam(hRsn, ¶m); 98 rsn_setParam(hRsn, ¶m); 105 rsn_reportMicFailure(hRsn, (TI_UINT8*)&value,1); 114 rsn_getParam(hRsn, ¶m); 124 rsn_getParam(hRsn, pRsnParam); 129 rsn_resetPMKIDList(hRsn); 134 printRogueApTable(((XCCMngr_t*)((rsn_t*)hRsn)->hXCCMngr)->hRogueAp); 140 rsn_setPortStatus(hRsn,TI_TRUE); 146 portStatus = rsn_getPortStatus(((rsn_t*)hRsn)); [all...] |
rsnDbg.h | 54 void rsnDebugFunction(TI_HANDLE hRsn, TI_UINT32 funcType, void *pParam);
|
/system/wlan/ti/wilink_6_1/Test/ |
rsnDbg.c | 69 void rsnDebugFunction(TI_HANDLE hRsn, TI_UINT32 funcType, void *pParam) 88 rsn_setParam(hRsn, ¶m); 98 rsn_setParam(hRsn, ¶m); 105 rsn_reportMicFailure(hRsn, (TI_UINT8*)&value,1); 114 rsn_getParam(hRsn, ¶m); 124 rsn_getParam(hRsn, pRsnParam); 129 rsn_resetPMKIDList(hRsn); 134 printRogueApTable(((XCCMngr_t*)((rsn_t*)hRsn)->hXCCMngr)->hRogueAp); 140 rsn_setPortStatus(hRsn,TI_TRUE); 146 portStatus = rsn_getPortStatus(((rsn_t*)hRsn)); [all...] |
rsnDbg.h | 54 void rsnDebugFunction(TI_HANDLE hRsn, TI_UINT32 funcType, void *pParam);
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/ |
rsn.c | 89 void rsn_groupReKeyTimeout(TI_HANDLE hRsn); 90 void rsn_micFailureReportTimeout(TI_HANDLE hRsn); 91 static rsn_siteBanEntry_t * findEntryForInsert(TI_HANDLE hRsn); 92 static rsn_siteBanEntry_t * findBannedSiteAndCleanup(TI_HANDLE hRsn, macAddress_t siteBssid); 94 /*static void clearBannedSiteList(TI_HANDLE hRsn);*/ 188 * I - hRsn - rsniation SM context \n 196 TI_STATUS rsn_unload (TI_HANDLE hRsn) 201 if (hRsn == NULL) 206 pRsn = (rsn_t*)hRsn; 216 os_memoryFree (pRsn->hOs, hRsn, sizeof(rsn_t)) [all...] |
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/inc/ |
mainKeysSm.h | 102 TI_HANDLE hRsn; 138 TI_HANDLE hRsn);
|
/hardware/ti/wlan/wl1271/stad/src/Ctrl_Interface/ |
DrvMainModules.h | 62 TI_HANDLE hRsn;
|
/hardware/ti/wlan/wl1271/stad/src/Sta_Management/ |
openAuthSm.c | 221 rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE); 227 rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE); 237 rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE); 325 rsn_reportAuthFailure(hAuth->hRsn, RSN_AUTH_STATUS_TIMEOUT);
|
authSm.h | 85 TI_HANDLE hRsn;
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/mlme/Auth/open/ |
openAuthSm.c | 250 rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE); 256 rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE); 267 rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE); 332 rsn_reportAuthFailure(hAuth->hRsn, RSN_AUTH_STATUS_TIMEOUT);
|
/system/wlan/ti/wilink_6_1/stad/src/Ctrl_Interface/ |
DrvMainModules.h | 62 TI_HANDLE hRsn;
|
/system/wlan/ti/wilink_6_1/stad/src/Sta_Management/ |
openAuthSm.c | 221 rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE); 227 rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE); 237 rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE); 325 rsn_reportAuthFailure(hAuth->hRsn, RSN_AUTH_STATUS_TIMEOUT);
|
/hardware/ti/wlan/wl1271/stad/src/Data_link/ |
rx.h | 88 TI_HANDLE hRsn;
|