HomeSort by relevance Sort by last modified time
    Searched refs:rsn (Results 1 - 23 of 23) sorted by null

  /external/syslinux/gpxe/src/net/80211/
sec80211.c 37 /** Mapping from net80211 crypto/secprot types to RSN OUI descriptors */
146 * Determine net80211 crypto or handshaking type value to return for RSN info
148 * @v rsnp Pointer to next descriptor count field in RSN IE
149 * @v rsn_end Pointer to end of RSN IE
169 * RSN-checking code. Don't try to use it for anything else.
178 u8 *rsn = *rsnp; local
198 /* RSN sanity checks */
199 if ( rsn + 2 > rsn_end ) {
200 DBG ( "RSN detect: malformed descriptor count\n" );
204 ndesc = *( u16 * ) rsn;
271 u8 *rsn = NULL; local
332 u8 *rsn = start; local
398 u8 *rsn, *rsn_end; local
    [all...]
wpa.c 103 * Construct RSN or WPA information element
106 * @ret ie_ret RSN or WPA information element
109 * This function allocates, fills, and returns a RSN or WPA
118 * The returned IE will be of the same type (RSN or WPA) as was
123 u8 *rsn, *rsn_end; local
134 DBG ( "WPA: Can't make RSN IE for a non-associating device\n" );
140 rsn = sec80211_find_rsn ( beacon->info_element,
143 if ( ! rsn ) {
144 DBG ( "WPA: Can't make RSN IE when we didn't get one\n" );
148 rsn += 2; /* skip version *
    [all...]
  /system/extras/libfec/include/fec/
ecc.h 51 inline uint64_t fec_ecc_interleave(uint64_t offset, int rsn, uint64_t rounds)
53 return (offset / rsn) + (offset % rsn) * rounds * FEC_BLOCKSIZE;
  /external/wpa_supplicant_8/wpa_supplicant/
mesh_rsn.c 2 * WPA Supplicant - Mesh RSN routines
139 static int __mesh_rsn_auth_init(struct mesh_rsn *rsn, const u8 *addr,
156 conf.wpa_pairwise = rsn->pairwise_cipher;
157 conf.rsn_pairwise = rsn->pairwise_cipher;
158 conf.wpa_group = rsn->group_cipher;
166 conf.group_mgmt_cipher = rsn->mgmt_group_cipher;
169 rsn->auth = wpa_init(addr, &conf, &cb, rsn);
170 if (rsn->auth == NULL) {
176 rsn->mgtk_len = wpa_cipher_key_len(conf.wpa_group)
    [all...]
mesh_rsn.h 2 * WPA Supplicant - Mesh RSN routines
34 void mesh_rsn_get_pmkid(struct mesh_rsn *rsn, struct sta_info *sta, u8 *pmkid);
37 int mesh_rsn_protect_frame(struct mesh_rsn *rsn, struct sta_info *sta,
sme.c 269 const u8 *rsn; local
272 rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
273 if (!rsn) {
275 "SAE enabled, but target BSS does not advertise RSN");
276 } else if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 &&
282 "SAE enabled, but target BSS does not advertise SAE AKM for RSN");
400 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local
402 if (rsn && wpa_parse_wpa_ie(rsn, 2 + rsn[1], &_ie) == 0 &
    [all...]
events.c 337 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from "
346 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate "
350 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR
531 " skip RSN IE - parse failed");
540 " selected based on TSN in RSN IE");
547 " skip RSN IE - proto mismatch");
554 " skip RSN IE - PTK cipher mismatch");
561 " skip RSN IE - GTK cipher mismatch");
568 " skip RSN IE - key mgmt mismatch");
578 " skip RSN IE - no mgmt frame protection")
1471 const u8 *ssid, *rsn; local
    [all...]
wpa_supplicant.c 272 * RSN IBSS authentication is per-STA and we can disable the
1105 * @wpa_ie: Buffer for the WPA/RSN IE
1134 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using IEEE 802.11i/D9.0");
2599 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
preauth.h 2 * wpa_supplicant - WPA2/RSN pre-authentication functions
22 const u8 *ssid, const u8 *rsn);
56 const u8 *ssid, const u8 *rsn)
preauth.c 2 * RSN pre-authentication (supplicant)
63 wpa_printf(MSG_WARNING, "RSN pre-auth frame received from "
93 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
103 "RSN: failed to get master session key from "
109 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with "
123 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with "
157 * rsn_preauth_init - Start new RSN pre-authentication
165 * This function request an RSN pre-authentication with a given destination
181 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst));
187 wpa_printf(MSG_WARNING, "RSN: Failed to initialize L2 packet
    [all...]
wpa.c 35 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
243 "RSN: Cannot set low order 256 bits of MSK for key management offload");
248 "RSN: Cannot set PMK for key management offload");
262 /* When using drivers that generate RSN IE, wpa_supplicant may
270 "RSN: found matching PMKID from PMKSA cache");
273 "RSN: no matching PMKID found");
280 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN);
282 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache",
336 "RSN: the new PMK matches with the "
348 "RSN: PMKID mismatch - authentication server may have derived different MSK?!")
1131 struct wpa_ie_data rsn; local
2874 struct wpa_ie_data rsn; local
2894 struct wpa_ie_data rsn; local
3388 struct wpa_ie_data rsn; local
    [all...]
wpa_ft.c 130 * @pmk_name: PMKR0Name or PMKR1Name to be added into the RSN IE PMKID List
216 /* RSN Capabilities */
289 * RSN IE
776 parse.rsn - 2, parse.rsn_len + 2,
  /prebuilts/gcc/linux-x86/host/x86_64-w64-mingw32-4.8/x86_64-w64-mingw32/include/
daogetrw.h 88 STDMETHOD(OnBeforeNotify) (THIS_ REFIID riid,DWORD cat,DWORD rsn,VARIANT v1,VARIANT v2);
89 STDMETHOD(OnAfterNotify) (THIS_ REFIID riid,DWORD cat,DWORD rsn,VARIANT v1,VARIANT v2,HRESULT hr);
  /system/extras/libfec/
fec_open.cpp 103 check(f->ecc.rsn > 0 && f->ecc.rsn < FEC_RSM);
152 f->ecc.rounds = fec_div_round_up(f->ecc.blocks, f->ecc.rsn);
538 f->ecc.rsn = FEC_RSM - roots;
fec_read.cpp 118 int erasures[e->rsn];
124 for (int i = 0; i < e->rsn; ++i) {
125 uint64_t interleaved = fec_ecc_interleave(rsb * e->rsn + i, e->rsn,
163 if (!raw_pread(f, &ecc_data[i * FEC_RSM + e->rsn], e->roots,
fec_private.h 70 int rsn; member in struct:ecc_info
  /packages/apps/Bluetooth/src/com/android/bluetooth/opp/
TestActivity.java 468 TestTcpSessionNotifier rsn = new TestTcpSessionNotifier(port); local
471 rsn.acceptAndOpen(this);
  /external/syslinux/gpxe/src/include/gpxe/
ieee80211.h 804 /** RSN information element version */
822 /** Security capabilities field (RSN only) */
835 /** Calculate necessary size of RSN information element
840 * @v is_rsn If TRUE, calculate RSN IE size; if FALSE, calculate WPA IE size
861 /** Organization part for OUIs in standard RSN IE */
871 /** 802.11 RSN IE: expected version number */
874 /** 802.11 RSN IE: cipher type for 40-bit WEP */
877 /** 802.11 RSN IE: cipher type for 104-bit WEP */
880 /** 802.11 RSN IE: cipher type for TKIP ("WPA") */
883 /** 802.11 RSN IE: cipher type for CCMP ("WPA2") *
999 struct ieee80211_ie_rsn rsn; member in union:ieee80211_ie
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_11.c 1024 struct wpa_ie_data rsn; local
1047 wpa_hexdump(MSG_DEBUG, "FILS: RSN element",
1051 &rsn) < 0) {
1052 wpa_printf(MSG_DEBUG, "FILS: No valid RSN element");
1062 "FILS: Failed to initialize RSN state machine");
1087 if (rsn.pmkid && rsn.num_pmkid > 0) {
1092 rsn.pmkid, rsn.num_pmkid * PMKID_LEN);
1094 pmkid = rsn.pmkid
    [all...]
wpa_auth_ft.c 677 * RSN (only present if this is a Reassociation Response and
1118 if (parse.rsn == NULL) {
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.c 2 * WPA/RSN - Shared functions for supplicant and authenticator
612 parse->rsn = pos;
614 ret = wpa_parse_wpa_ie_rsn(parse->rsn - 2,
619 "RSN IE: %d", ret);
663 if (parse->rsn)
793 * wpa_parse_wpa_ie_rsn - Parse RSN IE
794 * @rsn_ie: Buffer containing RSN IE
795 * @rsn_ie_len: RSN IE buffer length (including IE number and length octets)
821 /* No RSN IE - fail silently */
    [all...]
wpa_common.h 138 /* IEEE 802.11, 7.3.2.25.3 RSN Capabilities */
168 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */
178 #define WPA_KEY_INFO_ENCR_KEY_DATA BIT(12) /* IEEE 802.11i/RSN only */
191 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */
252 * 2/4: RSN IE
253 * 3/4: one or two RSN IEs + GTK IE (encrypted)
259 /* RSN IE version 1
269 * RSN Capabilities (2 octets, little endian) (default: 0)
446 const u8 *rsn; member in struct:wpa_ft_ies
  /external/icu/icu4c/source/i18n/
rbnf.cpp 1057 UnicodeString rsn(ruleSetName);
1058 int32_t ix = localizations->indexForRuleSet(rsn.getTerminatedBuffer());
    [all...]

Completed in 548 milliseconds