/external/wpa_supplicant_8/src/ap/ |
preauth_auth.c | 69 wpa_printf(MSG_DEBUG, "RSN: pre-auth for already association "
|
drv_callbacks.c | 194 "STA did not include WPA/RSN IE in (Re)Association Request - possible WPS use"); 274 * association attempt temporarily and start SA Query, 345 "No HS 2.0 OSEN element in association request"); 349 wpa_printf(MSG_DEBUG, "HS 2.0: OSEN association"); 369 "MBO: Reject WPA2 association without PMF"); [all...] |
/external/wpa_supplicant_8/src/common/ |
gas.c | 92 * @pame_bi: Pre-Association Message Exchange BSSID Independent (0/1)
|
/external/wpa_supplicant_8/src/l2_packet/ |
l2_packet.h | 134 * association has been completed, in order to prepare l2_packet implementation
|
/external/wpa_supplicant_8/src/p2p/ |
p2p_group.c | 511 * @p2p_ie: P2P IE from (Re)Association Request 517 * available from (Re)Association Request frame. Group owner can use this to 660 * (Re)Association Response - P2P IE 661 * Status attribute (shall be present when association request is
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 54 * @ies: Association Response IEs or %NULL to clear FT parameters 117 "(Re)Association Response", 502 "association - try again after reassociation"); 510 * The caller is expected trigger re-association with the
|
/external/wpa_supplicant_8/wpa_supplicant/ |
todo.txt | 51 - try to work around race in receiving association event and first EAPOL
|
config.h | 394 * 802.11 association information from the driver. 399 * association parameters (e.g., WPA IE generation); this mode can 402 * to control association). This mode must also be used when using 409 * one by one until the driver reports successful association; each 597 * dot11RSNAConfigSATimeout - Security association timeout 599 * dot11 MIB variable for the maximum time a security association [all...] |
ChangeLog | 48 - indicate group completion in P2P Client role after data association 635 * improved reassociation behavior in cases where association is rejected [all...] |
/frameworks/base/core/tests/ConnectivityManagerTest/ |
AndroidManifest.xml | 66 android:label="Test runner for Wifi association test"
|
/frameworks/base/drm/java/android/drm/ |
package.html | 77 <p>After you make an association between the rights-protected content and its license,
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
HardwareConfig.java | 107 * modemUuid - unique association to a modem for a sim.
|
/packages/apps/Nfc/res/values-fr/ |
strings.xml | 24 <string name="pairing_peripheral" msgid="6983626861540899365">"Association de l\'appareil <xliff:g id="DEVICE_NAME">%1$s</xliff:g> en cours?"</string>
|
/packages/apps/Nfc/res/values-fr-rCA/ |
strings.xml | 24 <string name="pairing_peripheral" msgid="6983626861540899365">"Association de « <xliff:g id="DEVICE_NAME">%1$s</xliff:g> » en cours"</string>
|
/system/bt/stack/include/ |
smp_api_types.h | 84 /* Unknown IO capability, unable to decide association model */
|
/system/connectivity/wificond/ |
client_interface_impl.cpp | 204 // Association frequency.
|
/tools/tradefederation/core/src/com/android/tradefed/invoker/ |
IInvocationContext.java | 59 * Return the map of Device/build info association
|
/external/wpa_supplicant_8/hostapd/ |
ChangeLog | 62 to be added into (Re)Association Response frames 143 - allow PMKSA cache entry to be removed without association 391 this association) 412 hostapd to reject association with any station that does not support 524 * fix WPS association with both WPS IE and WPA/RSN IE present with 640 (adds a new association ping to protect against unauthenticate [all...] |
/external/tcpdump/tests/ |
forces2vv.out | 40 ForCES Association Setup 55 ForCES Association Response 256 ForCES Association TearDown 337 ForCES Association Setup 352 ForCES Association Response
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/ |
nl80211.h | 266 * does not support starting an association or a normal scan while running 310 * the SSID (mainly for association, but is included in authentication 327 * @NL80211_CMD_ASSOCIATE: association request and notification; like 328 * NL80211_CMD_AUTHENTICATE but for Association and Reassociation 365 * %NL80211_ATTR_SSID attribute, and can optionally specify the association [all...] |
/system/bt/stack/smp/ |
smp_act.cc | [all...] |
/development/ndk/platforms/ |
README.CRT.TXT | 41 in association with either crtbegin_static.[cS] or crtbegin_dynamic.[cS] 53 i.e. used in association with crtbegin_so.[cS] only.
|
/external/autotest/server/cros/network/ |
wpa_cli_proxy.py | 313 # Wait on association to finish. 318 assoc_result.failure_reason = 'Association timed out'
|
/external/freetype/include/freetype/config/ |
ftheader.h | 28 /* This macro is used in association with @FT_END_HEADER in header */ 46 /* This macro is used in association with @FT_BEGIN_HEADER in header */
|
/external/google-breakpad/src/processor/ |
fast_source_line_resolver_unittest.cc | 122 // Verify that, for every association in ACTUAL, EXPECTED has the same 123 // association. (That is, ACTUAL's associations should be a subset of
|