HomeSort by relevance Sort by last modified time
    Searched defs:rsn (Results 1 - 11 of 11) sorted by null

  /external/syslinux/gpxe/src/net/80211/
sec80211.c 37 /** Mapping from net80211 crypto/secprot types to RSN OUI descriptors */
146 * Determine net80211 crypto or handshaking type value to return for RSN info
148 * @v rsnp Pointer to next descriptor count field in RSN IE
149 * @v rsn_end Pointer to end of RSN IE
169 * RSN-checking code. Don't try to use it for anything else.
178 u8 *rsn = *rsnp; local
198 /* RSN sanity checks */
199 if ( rsn + 2 > rsn_end ) {
200 DBG ( "RSN detect: malformed descriptor count\n" );
204 ndesc = *( u16 * ) rsn;
271 u8 *rsn = NULL; local
332 u8 *rsn = start; local
398 u8 *rsn, *rsn_end; local
    [all...]
wpa.c 103 * Construct RSN or WPA information element
106 * @ret ie_ret RSN or WPA information element
109 * This function allocates, fills, and returns a RSN or WPA
118 * The returned IE will be of the same type (RSN or WPA) as was
123 u8 *rsn, *rsn_end; local
134 DBG ( "WPA: Can't make RSN IE for a non-associating device\n" );
140 rsn = sec80211_find_rsn ( beacon->info_element,
143 if ( ! rsn ) {
144 DBG ( "WPA: Can't make RSN IE when we didn't get one\n" );
148 rsn += 2; /* skip version *
    [all...]
  /packages/apps/Bluetooth/src/com/android/bluetooth/opp/
TestActivity.java 468 TestTcpSessionNotifier rsn = new TestTcpSessionNotifier(port); local
471 rsn.acceptAndOpen(this);
  /system/extras/libfec/
fec_private.h 70 int rsn; member in struct:ecc_info
  /external/wpa_supplicant_8/wpa_supplicant/
sme.c 269 const u8 *rsn; local
272 rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
273 if (!rsn) {
275 "SAE enabled, but target BSS does not advertise RSN");
276 } else if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 &&
282 "SAE enabled, but target BSS does not advertise SAE AKM for RSN");
400 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local
402 if (rsn && wpa_parse_wpa_ie(rsn, 2 + rsn[1], &_ie) == 0 &
    [all...]
events.c 337 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from "
346 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate "
350 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR
531 " skip RSN IE - parse failed");
540 " selected based on TSN in RSN IE");
547 " skip RSN IE - proto mismatch");
554 " skip RSN IE - PTK cipher mismatch");
561 " skip RSN IE - GTK cipher mismatch");
568 " skip RSN IE - key mgmt mismatch");
578 " skip RSN IE - no mgmt frame protection")
1471 const u8 *ssid, *rsn; local
    [all...]
wpa_supplicant.c 272 * RSN IBSS authentication is per-STA and we can disable the
1105 * @wpa_ie: Buffer for the WPA/RSN IE
1134 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using IEEE 802.11i/D9.0");
2599 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_11.c 1024 struct wpa_ie_data rsn; local
1047 wpa_hexdump(MSG_DEBUG, "FILS: RSN element",
1051 &rsn) < 0) {
1052 wpa_printf(MSG_DEBUG, "FILS: No valid RSN element");
1062 "FILS: Failed to initialize RSN state machine");
1087 if (rsn.pmkid && rsn.num_pmkid > 0) {
1092 rsn.pmkid, rsn.num_pmkid * PMKID_LEN);
1094 pmkid = rsn.pmkid
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.h 138 /* IEEE 802.11, 7.3.2.25.3 RSN Capabilities */
168 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */
178 #define WPA_KEY_INFO_ENCR_KEY_DATA BIT(12) /* IEEE 802.11i/RSN only */
191 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */
252 * 2/4: RSN IE
253 * 3/4: one or two RSN IEs + GTK IE (encrypted)
259 /* RSN IE version 1
269 * RSN Capabilities (2 octets, little endian) (default: 0)
446 const u8 *rsn; member in struct:wpa_ft_ies
  /external/wpa_supplicant_8/src/rsn_supp/
wpa.c 35 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
243 "RSN: Cannot set low order 256 bits of MSK for key management offload");
248 "RSN: Cannot set PMK for key management offload");
262 /* When using drivers that generate RSN IE, wpa_supplicant may
270 "RSN: found matching PMKID from PMKSA cache");
273 "RSN: no matching PMKID found");
280 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN);
282 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache",
336 "RSN: the new PMK matches with the "
348 "RSN: PMKID mismatch - authentication server may have derived different MSK?!")
1131 struct wpa_ie_data rsn; local
2874 struct wpa_ie_data rsn; local
2894 struct wpa_ie_data rsn; local
3388 struct wpa_ie_data rsn; local
    [all...]
  /external/syslinux/gpxe/src/include/gpxe/
ieee80211.h 804 /** RSN information element version */
822 /** Security capabilities field (RSN only) */
835 /** Calculate necessary size of RSN information element
840 * @v is_rsn If TRUE, calculate RSN IE size; if FALSE, calculate WPA IE size
861 /** Organization part for OUIs in standard RSN IE */
871 /** 802.11 RSN IE: expected version number */
874 /** 802.11 RSN IE: cipher type for 40-bit WEP */
877 /** 802.11 RSN IE: cipher type for 104-bit WEP */
880 /** 802.11 RSN IE: cipher type for TKIP ("WPA") */
883 /** 802.11 RSN IE: cipher type for CCMP ("WPA2") *
999 struct ieee80211_ie_rsn rsn; member in union:ieee80211_ie
    [all...]

Completed in 740 milliseconds