/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.h | 2 * wpa_supplicant - WPA2/RSN pre-authentication functions 22 const u8 *ssid, const u8 *rsn); 56 const u8 *ssid, const u8 *rsn)
|
preauth.c | 2 * RSN pre-authentication (supplicant) 63 wpa_printf(MSG_WARNING, "RSN pre-auth frame received from " 93 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 102 "RSN: failed to get master session key from " 108 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with " 122 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with " 156 * rsn_preauth_init - Start new RSN pre-authentication 164 * This function request an RSN pre-authentication with a given destination 179 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); 185 wpa_printf(MSG_WARNING, "RSN: Failed to initialize L2 packet [all...] |
wpa.c | 27 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message 148 /* When using drivers that generate RSN IE, wpa_supplicant may 156 "RSN: found matching PMKID from PMKSA cache"); 159 "RSN: no matching PMKID found"); 166 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN); 168 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache", 213 "RSN: the new PMK matches with the " 227 "RSN: Cancelled PMKSA caching " 245 "RSN: no PMKSA entry found - trigger " 264 * wpa_supplicant_send_2_of_4 - Send message 2 of WPA/RSN 4-Way Handshak 893 struct wpa_ie_data rsn; local 2432 struct wpa_ie_data rsn; local 2452 struct wpa_ie_data rsn; local [all...] |
wpa_ft.c | 135 * @pmk_name: PMKR0Name or PMKR1Name to be added into the RSN IE PMKID List 220 /* RSN Capabilities */ 293 * RSN IE 776 parse.rsn - 2, parse.rsn_len + 2,
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
daogetrw.h | 88 STDMETHOD(OnBeforeNotify) (THIS_ REFIID riid,DWORD cat,DWORD rsn,VARIANT v1,VARIANT v2); 89 STDMETHOD(OnAfterNotify) (THIS_ REFIID riid,DWORD cat,DWORD rsn,VARIANT v1,VARIANT v2,HRESULT hr);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
sme.c | 203 const u8 *rsn; local 206 rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); 207 if (rsn && 208 wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0) { 331 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local 333 if (rsn && wpa_parse_wpa_ie(rsn, 2 + rsn[1], &_ie) == 0 && [all...] |
events.c | 251 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from " 260 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate " 264 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR 443 wpa_dbg(wpa_s, MSG_DEBUG, " skip RSN IE - parse " 452 "in RSN IE"); 457 wpa_dbg(wpa_s, MSG_DEBUG, " skip RSN IE - proto " 463 wpa_dbg(wpa_s, MSG_DEBUG, " skip RSN IE - PTK " 469 wpa_dbg(wpa_s, MSG_DEBUG, " skip RSN IE - GTK " 475 wpa_dbg(wpa_s, MSG_DEBUG, " skip RSN IE - key mgmt " 485 wpa_dbg(wpa_s, MSG_DEBUG, " skip RSN IE - no mgmt 1158 const u8 *ssid, *rsn; local [all...] |
wpa_supplicant.c | 262 * RSN IBSS authentication is per-STA and we can disable the 953 * @wpa_ie: Buffer for the WPA/RSN IE 982 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using IEEE 802.11i/D9.0"); 1002 wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to select WPA/RSN"); 1087 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using KEY_MGMT SAE"); 1090 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using KEY_MGMT FT/SAE"); 1916 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local [all...] |
/packages/apps/Bluetooth/src/com/android/bluetooth/opp/ |
TestActivity.java | 468 TestTcpSessionNotifier rsn = new TestTcpSessionNotifier(port); local 471 rsn.acceptAndOpen(this);
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 2 * WPA/RSN - Shared functions for supplicant and authenticator 262 parse->rsn = pos + 2; 264 ret = wpa_parse_wpa_ie_rsn(parse->rsn - 2, 269 "RSN IE: %d", ret); 307 if (parse->rsn) 427 * wpa_parse_wpa_ie_rsn - Parse RSN IE 428 * @rsn_ie: Buffer containing RSN IE 429 * @rsn_ie_len: RSN IE buffer length (including IE number and length octets) 456 /* No RSN IE - fail silently */ 1044 * The PMKID-List in RSN IE is different between Beacon/Prob [all...] |
wpa_common.h | 135 /* IEEE 802.11, 7.3.2.25.3 RSN Capabilities */ 165 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */ 175 #define WPA_KEY_INFO_ENCR_KEY_DATA BIT(12) /* IEEE 802.11i/RSN only */ 188 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ 235 * 2/4: RSN IE 236 * 3/4: one or two RSN IEs + GTK IE (encrypted) 242 /* RSN IE version 1 252 * RSN Capabilities (2 octets, little endian) (default: 0) 396 const u8 *rsn; member in struct:wpa_ft_ies
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 662 * RSN (only present if this is a Reassociation Response and 1008 if (parse.rsn == NULL) { 1113 parse.rsn - 2, parse.rsn_len + 2, 1130 wpa_hexdump(MSG_MSGDUMP, "FT: RSN", 1131 parse.rsn - 2, parse.rsn_len + 2); [all...] |
/external/chromium_org/third_party/icu/source/i18n/ |
rbnf.cpp | 1006 UnicodeString rsn(ruleSetName); 1007 int32_t ix = localizations->indexForRuleSet(rsn.getTerminatedBuffer()); [all...] |
/external/icu/icu4c/source/i18n/ |
rbnf.cpp | 1038 UnicodeString rsn(ruleSetName); 1039 int32_t ix = localizations->indexForRuleSet(rsn.getTerminatedBuffer()); [all...] |