/external/syslinux/gpxe/src/net/80211/ |
sec80211.c | 37 /** Mapping from net80211 crypto/secprot types to RSN OUI descriptors */ 146 * Determine net80211 crypto or handshaking type value to return for RSN info 148 * @v rsnp Pointer to next descriptor count field in RSN IE 149 * @v rsn_end Pointer to end of RSN IE 169 * RSN-checking code. Don't try to use it for anything else. 178 u8 *rsn = *rsnp; local 198 /* RSN sanity checks */ 199 if ( rsn + 2 > rsn_end ) { 200 DBG ( "RSN detect: malformed descriptor count\n" ); 204 ndesc = *( u16 * ) rsn; 271 u8 *rsn = NULL; local 332 u8 *rsn = start; local 398 u8 *rsn, *rsn_end; local [all...] |
wpa.c | 103 * Construct RSN or WPA information element 106 * @ret ie_ret RSN or WPA information element 109 * This function allocates, fills, and returns a RSN or WPA 118 * The returned IE will be of the same type (RSN or WPA) as was 123 u8 *rsn, *rsn_end; local 134 DBG ( "WPA: Can't make RSN IE for a non-associating device\n" ); 140 rsn = sec80211_find_rsn ( beacon->info_element, 143 if ( ! rsn ) { 144 DBG ( "WPA: Can't make RSN IE when we didn't get one\n" ); 148 rsn += 2; /* skip version * [all...] |
/packages/apps/Bluetooth/src/com/android/bluetooth/opp/ |
TestActivity.java | 468 TestTcpSessionNotifier rsn = new TestTcpSessionNotifier(port); local 471 rsn.acceptAndOpen(this);
|
/system/extras/libfec/ |
fec_private.h | 70 int rsn; member in struct:ecc_info
|
/external/wpa_supplicant_8/wpa_supplicant/ |
sme.c | 269 const u8 *rsn; local 272 rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); 273 if (!rsn) { 275 "SAE enabled, but target BSS does not advertise RSN"); 276 } else if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 && 282 "SAE enabled, but target BSS does not advertise SAE AKM for RSN"); 400 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local 402 if (rsn && wpa_parse_wpa_ie(rsn, 2 + rsn[1], &_ie) == 0 & [all...] |
events.c | 337 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from " 346 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate " 350 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR 531 " skip RSN IE - parse failed"); 540 " selected based on TSN in RSN IE"); 547 " skip RSN IE - proto mismatch"); 554 " skip RSN IE - PTK cipher mismatch"); 561 " skip RSN IE - GTK cipher mismatch"); 568 " skip RSN IE - key mgmt mismatch"); 578 " skip RSN IE - no mgmt frame protection") 1471 const u8 *ssid, *rsn; local [all...] |
wpa_supplicant.c | 272 * RSN IBSS authentication is per-STA and we can disable the 1105 * @wpa_ie: Buffer for the WPA/RSN IE 1134 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using IEEE 802.11i/D9.0"); 2599 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11.c | 1024 struct wpa_ie_data rsn; local 1047 wpa_hexdump(MSG_DEBUG, "FILS: RSN element", 1051 &rsn) < 0) { 1052 wpa_printf(MSG_DEBUG, "FILS: No valid RSN element"); 1062 "FILS: Failed to initialize RSN state machine"); 1087 if (rsn.pmkid && rsn.num_pmkid > 0) { 1092 rsn.pmkid, rsn.num_pmkid * PMKID_LEN); 1094 pmkid = rsn.pmkid [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 138 /* IEEE 802.11, 7.3.2.25.3 RSN Capabilities */ 168 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */ 178 #define WPA_KEY_INFO_ENCR_KEY_DATA BIT(12) /* IEEE 802.11i/RSN only */ 191 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ 252 * 2/4: RSN IE 253 * 3/4: one or two RSN IEs + GTK IE (encrypted) 259 /* RSN IE version 1 269 * RSN Capabilities (2 octets, little endian) (default: 0) 446 const u8 *rsn; member in struct:wpa_ft_ies
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa.c | 35 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message 243 "RSN: Cannot set low order 256 bits of MSK for key management offload"); 248 "RSN: Cannot set PMK for key management offload"); 262 /* When using drivers that generate RSN IE, wpa_supplicant may 270 "RSN: found matching PMKID from PMKSA cache"); 273 "RSN: no matching PMKID found"); 280 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN); 282 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache", 336 "RSN: the new PMK matches with the " 348 "RSN: PMKID mismatch - authentication server may have derived different MSK?!") 1131 struct wpa_ie_data rsn; local 2874 struct wpa_ie_data rsn; local 2894 struct wpa_ie_data rsn; local 3388 struct wpa_ie_data rsn; local [all...] |
/external/syslinux/gpxe/src/include/gpxe/ |
ieee80211.h | 804 /** RSN information element version */ 822 /** Security capabilities field (RSN only) */ 835 /** Calculate necessary size of RSN information element 840 * @v is_rsn If TRUE, calculate RSN IE size; if FALSE, calculate WPA IE size 861 /** Organization part for OUIs in standard RSN IE */ 871 /** 802.11 RSN IE: expected version number */ 874 /** 802.11 RSN IE: cipher type for 40-bit WEP */ 877 /** 802.11 RSN IE: cipher type for 104-bit WEP */ 880 /** 802.11 RSN IE: cipher type for TKIP ("WPA") */ 883 /** 802.11 RSN IE: cipher type for CCMP ("WPA2") * 999 struct ieee80211_ie_rsn rsn; member in union:ieee80211_ie [all...] |