HomeSort by relevance Sort by last modified time
    Searched refs:rsn (Results 1 - 14 of 14) sorted by null

  /external/wpa_supplicant_8/src/rsn_supp/
preauth.h 2 * wpa_supplicant - WPA2/RSN pre-authentication functions
22 const u8 *ssid, const u8 *rsn);
56 const u8 *ssid, const u8 *rsn)
preauth.c 2 * RSN pre-authentication (supplicant)
63 wpa_printf(MSG_WARNING, "RSN pre-auth frame received from "
93 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
102 "RSN: failed to get master session key from "
108 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with "
122 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with "
156 * rsn_preauth_init - Start new RSN pre-authentication
164 * This function request an RSN pre-authentication with a given destination
179 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst));
185 wpa_printf(MSG_WARNING, "RSN: Failed to initialize L2 packet
    [all...]
wpa.c 27 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
148 /* When using drivers that generate RSN IE, wpa_supplicant may
156 "RSN: found matching PMKID from PMKSA cache");
159 "RSN: no matching PMKID found");
166 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN);
168 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache",
213 "RSN: the new PMK matches with the "
227 "RSN: Cancelled PMKSA caching "
245 "RSN: no PMKSA entry found - trigger "
264 * wpa_supplicant_send_2_of_4 - Send message 2 of WPA/RSN 4-Way Handshak
893 struct wpa_ie_data rsn; local
2432 struct wpa_ie_data rsn; local
2452 struct wpa_ie_data rsn; local
    [all...]
wpa_ft.c 135 * @pmk_name: PMKR0Name or PMKR1Name to be added into the RSN IE PMKID List
220 /* RSN Capabilities */
293 * RSN IE
776 parse.rsn - 2, parse.rsn_len + 2,
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
daogetrw.h 88 STDMETHOD(OnBeforeNotify) (THIS_ REFIID riid,DWORD cat,DWORD rsn,VARIANT v1,VARIANT v2);
89 STDMETHOD(OnAfterNotify) (THIS_ REFIID riid,DWORD cat,DWORD rsn,VARIANT v1,VARIANT v2,HRESULT hr);
  /external/wpa_supplicant_8/wpa_supplicant/
sme.c 203 const u8 *rsn; local
206 rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
207 if (rsn &&
208 wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0) {
331 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local
333 if (rsn && wpa_parse_wpa_ie(rsn, 2 + rsn[1], &_ie) == 0 &&
    [all...]
events.c 251 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from "
260 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate "
264 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR
443 wpa_dbg(wpa_s, MSG_DEBUG, " skip RSN IE - parse "
452 "in RSN IE");
457 wpa_dbg(wpa_s, MSG_DEBUG, " skip RSN IE - proto "
463 wpa_dbg(wpa_s, MSG_DEBUG, " skip RSN IE - PTK "
469 wpa_dbg(wpa_s, MSG_DEBUG, " skip RSN IE - GTK "
475 wpa_dbg(wpa_s, MSG_DEBUG, " skip RSN IE - key mgmt "
485 wpa_dbg(wpa_s, MSG_DEBUG, " skip RSN IE - no mgmt
1158 const u8 *ssid, *rsn; local
    [all...]
wpa_supplicant.c 262 * RSN IBSS authentication is per-STA and we can disable the
953 * @wpa_ie: Buffer for the WPA/RSN IE
982 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using IEEE 802.11i/D9.0");
1002 wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to select WPA/RSN");
1087 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using KEY_MGMT SAE");
1090 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using KEY_MGMT FT/SAE");
1916 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local
    [all...]
  /packages/apps/Bluetooth/src/com/android/bluetooth/opp/
TestActivity.java 468 TestTcpSessionNotifier rsn = new TestTcpSessionNotifier(port); local
471 rsn.acceptAndOpen(this);
  /external/wpa_supplicant_8/src/common/
wpa_common.c 2 * WPA/RSN - Shared functions for supplicant and authenticator
262 parse->rsn = pos + 2;
264 ret = wpa_parse_wpa_ie_rsn(parse->rsn - 2,
269 "RSN IE: %d", ret);
307 if (parse->rsn)
427 * wpa_parse_wpa_ie_rsn - Parse RSN IE
428 * @rsn_ie: Buffer containing RSN IE
429 * @rsn_ie_len: RSN IE buffer length (including IE number and length octets)
456 /* No RSN IE - fail silently */
1044 * The PMKID-List in RSN IE is different between Beacon/Prob
    [all...]
wpa_common.h 135 /* IEEE 802.11, 7.3.2.25.3 RSN Capabilities */
165 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */
175 #define WPA_KEY_INFO_ENCR_KEY_DATA BIT(12) /* IEEE 802.11i/RSN only */
188 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */
235 * 2/4: RSN IE
236 * 3/4: one or two RSN IEs + GTK IE (encrypted)
242 /* RSN IE version 1
252 * RSN Capabilities (2 octets, little endian) (default: 0)
396 const u8 *rsn; member in struct:wpa_ft_ies
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ft.c 662 * RSN (only present if this is a Reassociation Response and
1008 if (parse.rsn == NULL) {
1113 parse.rsn - 2, parse.rsn_len + 2,
1130 wpa_hexdump(MSG_MSGDUMP, "FT: RSN",
1131 parse.rsn - 2, parse.rsn_len + 2);
    [all...]
  /external/chromium_org/third_party/icu/source/i18n/
rbnf.cpp 1006 UnicodeString rsn(ruleSetName);
1007 int32_t ix = localizations->indexForRuleSet(rsn.getTerminatedBuffer());
    [all...]
  /external/icu/icu4c/source/i18n/
rbnf.cpp 1038 UnicodeString rsn(ruleSetName);
1039 int32_t ix = localizations->indexForRuleSet(rsn.getTerminatedBuffer());
    [all...]

Completed in 1360 milliseconds