/external/syslinux/gpxe/src/net/80211/ |
sec80211.c | 37 /** Mapping from net80211 crypto/secprot types to RSN OUI descriptors */ 146 * Determine net80211 crypto or handshaking type value to return for RSN info 148 * @v rsnp Pointer to next descriptor count field in RSN IE 149 * @v rsn_end Pointer to end of RSN IE 169 * RSN-checking code. Don't try to use it for anything else. 178 u8 *rsn = *rsnp; local 198 /* RSN sanity checks */ 199 if ( rsn + 2 > rsn_end ) { 200 DBG ( "RSN detect: malformed descriptor count\n" ); 204 ndesc = *( u16 * ) rsn; 271 u8 *rsn = NULL; local 332 u8 *rsn = start; local 398 u8 *rsn, *rsn_end; local [all...] |
wpa.c | 103 * Construct RSN or WPA information element 106 * @ret ie_ret RSN or WPA information element 109 * This function allocates, fills, and returns a RSN or WPA 118 * The returned IE will be of the same type (RSN or WPA) as was 123 u8 *rsn, *rsn_end; local 134 DBG ( "WPA: Can't make RSN IE for a non-associating device\n" ); 140 rsn = sec80211_find_rsn ( beacon->info_element, 143 if ( ! rsn ) { 144 DBG ( "WPA: Can't make RSN IE when we didn't get one\n" ); 148 rsn += 2; /* skip version * [all...] |
/system/extras/libfec/include/fec/ |
ecc.h | 51 inline uint64_t fec_ecc_interleave(uint64_t offset, int rsn, uint64_t rounds) 53 return (offset / rsn) + (offset % rsn) * rounds * FEC_BLOCKSIZE;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
mesh_rsn.c | 2 * WPA Supplicant - Mesh RSN routines 139 static int __mesh_rsn_auth_init(struct mesh_rsn *rsn, const u8 *addr, 156 conf.wpa_pairwise = rsn->pairwise_cipher; 157 conf.rsn_pairwise = rsn->pairwise_cipher; 158 conf.wpa_group = rsn->group_cipher; 166 conf.group_mgmt_cipher = rsn->mgmt_group_cipher; 169 rsn->auth = wpa_init(addr, &conf, &cb, rsn); 170 if (rsn->auth == NULL) { 176 rsn->mgtk_len = wpa_cipher_key_len(conf.wpa_group) [all...] |
mesh_rsn.h | 2 * WPA Supplicant - Mesh RSN routines 34 void mesh_rsn_get_pmkid(struct mesh_rsn *rsn, struct sta_info *sta, u8 *pmkid); 37 int mesh_rsn_protect_frame(struct mesh_rsn *rsn, struct sta_info *sta,
|
sme.c | 269 const u8 *rsn; local 272 rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); 273 if (!rsn) { 275 "SAE enabled, but target BSS does not advertise RSN"); 276 } else if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 && 282 "SAE enabled, but target BSS does not advertise SAE AKM for RSN"); 400 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local 402 if (rsn && wpa_parse_wpa_ie(rsn, 2 + rsn[1], &_ie) == 0 & [all...] |
events.c | 337 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from " 346 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate " 350 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR 531 " skip RSN IE - parse failed"); 540 " selected based on TSN in RSN IE"); 547 " skip RSN IE - proto mismatch"); 554 " skip RSN IE - PTK cipher mismatch"); 561 " skip RSN IE - GTK cipher mismatch"); 568 " skip RSN IE - key mgmt mismatch"); 578 " skip RSN IE - no mgmt frame protection") 1471 const u8 *ssid, *rsn; local [all...] |
wpa_supplicant.c | 272 * RSN IBSS authentication is per-STA and we can disable the 1105 * @wpa_ie: Buffer for the WPA/RSN IE 1134 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using IEEE 802.11i/D9.0"); 2599 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
preauth.h | 2 * wpa_supplicant - WPA2/RSN pre-authentication functions 22 const u8 *ssid, const u8 *rsn); 56 const u8 *ssid, const u8 *rsn)
|
preauth.c | 2 * RSN pre-authentication (supplicant) 63 wpa_printf(MSG_WARNING, "RSN pre-auth frame received from " 93 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 103 "RSN: failed to get master session key from " 109 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with " 123 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with " 157 * rsn_preauth_init - Start new RSN pre-authentication 165 * This function request an RSN pre-authentication with a given destination 181 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); 187 wpa_printf(MSG_WARNING, "RSN: Failed to initialize L2 packet [all...] |
wpa.c | 35 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message 243 "RSN: Cannot set low order 256 bits of MSK for key management offload"); 248 "RSN: Cannot set PMK for key management offload"); 262 /* When using drivers that generate RSN IE, wpa_supplicant may 270 "RSN: found matching PMKID from PMKSA cache"); 273 "RSN: no matching PMKID found"); 280 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN); 282 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache", 336 "RSN: the new PMK matches with the " 348 "RSN: PMKID mismatch - authentication server may have derived different MSK?!") 1131 struct wpa_ie_data rsn; local 2874 struct wpa_ie_data rsn; local 2894 struct wpa_ie_data rsn; local 3388 struct wpa_ie_data rsn; local [all...] |
wpa_ft.c | 130 * @pmk_name: PMKR0Name or PMKR1Name to be added into the RSN IE PMKID List 216 /* RSN Capabilities */ 289 * RSN IE 776 parse.rsn - 2, parse.rsn_len + 2,
|
/prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/ |
daogetrw.h | 88 STDMETHOD(OnBeforeNotify) (THIS_ REFIID riid,DWORD cat,DWORD rsn,VARIANT v1,VARIANT v2); 89 STDMETHOD(OnAfterNotify) (THIS_ REFIID riid,DWORD cat,DWORD rsn,VARIANT v1,VARIANT v2,HRESULT hr);
|
/system/extras/libfec/ |
fec_open.cpp | 103 check(f->ecc.rsn > 0 && f->ecc.rsn < FEC_RSM); 152 f->ecc.rounds = fec_div_round_up(f->ecc.blocks, f->ecc.rsn); 538 f->ecc.rsn = FEC_RSM - roots;
|
fec_read.cpp | 118 int erasures[e->rsn]; 124 for (int i = 0; i < e->rsn; ++i) { 125 uint64_t interleaved = fec_ecc_interleave(rsb * e->rsn + i, e->rsn, 163 if (!raw_pread(f, &ecc_data[i * FEC_RSM + e->rsn], e->roots,
|
fec_private.h | 70 int rsn; member in struct:ecc_info
|
/packages/apps/Bluetooth/src/com/android/bluetooth/opp/ |
TestActivity.java | 468 TestTcpSessionNotifier rsn = new TestTcpSessionNotifier(port); local 471 rsn.acceptAndOpen(this);
|
/external/syslinux/gpxe/src/include/gpxe/ |
ieee80211.h | 804 /** RSN information element version */ 822 /** Security capabilities field (RSN only) */ 835 /** Calculate necessary size of RSN information element 840 * @v is_rsn If TRUE, calculate RSN IE size; if FALSE, calculate WPA IE size 861 /** Organization part for OUIs in standard RSN IE */ 871 /** 802.11 RSN IE: expected version number */ 874 /** 802.11 RSN IE: cipher type for 40-bit WEP */ 877 /** 802.11 RSN IE: cipher type for 104-bit WEP */ 880 /** 802.11 RSN IE: cipher type for TKIP ("WPA") */ 883 /** 802.11 RSN IE: cipher type for CCMP ("WPA2") * 999 struct ieee80211_ie_rsn rsn; member in union:ieee80211_ie [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11.c | 1024 struct wpa_ie_data rsn; local 1047 wpa_hexdump(MSG_DEBUG, "FILS: RSN element", 1051 &rsn) < 0) { 1052 wpa_printf(MSG_DEBUG, "FILS: No valid RSN element"); 1062 "FILS: Failed to initialize RSN state machine"); 1087 if (rsn.pmkid && rsn.num_pmkid > 0) { 1092 rsn.pmkid, rsn.num_pmkid * PMKID_LEN); 1094 pmkid = rsn.pmkid [all...] |
wpa_auth_ft.c | 677 * RSN (only present if this is a Reassociation Response and 1118 if (parse.rsn == NULL) { [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 2 * WPA/RSN - Shared functions for supplicant and authenticator 612 parse->rsn = pos; 614 ret = wpa_parse_wpa_ie_rsn(parse->rsn - 2, 619 "RSN IE: %d", ret); 663 if (parse->rsn) 793 * wpa_parse_wpa_ie_rsn - Parse RSN IE 794 * @rsn_ie: Buffer containing RSN IE 795 * @rsn_ie_len: RSN IE buffer length (including IE number and length octets) 821 /* No RSN IE - fail silently */ [all...] |
wpa_common.h | 138 /* IEEE 802.11, 7.3.2.25.3 RSN Capabilities */ 168 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */ 178 #define WPA_KEY_INFO_ENCR_KEY_DATA BIT(12) /* IEEE 802.11i/RSN only */ 191 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ 252 * 2/4: RSN IE 253 * 3/4: one or two RSN IEs + GTK IE (encrypted) 259 /* RSN IE version 1 269 * RSN Capabilities (2 octets, little endian) (default: 0) 446 const u8 *rsn; member in struct:wpa_ft_ies
|
/external/icu/icu4c/source/i18n/ |
rbnf.cpp | 1057 UnicodeString rsn(ruleSetName); 1058 int32_t ix = localizations->indexForRuleSet(rsn.getTerminatedBuffer()); [all...] |