/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/ |
H A D | admCtrlWep.c | 118 if ((pAdmCtrl->unicastSuite != RSN_CIPHER_WEP) && 119 (pAdmCtrl->unicastSuite != RSN_CIPHER_CKIP)) 121 pAdmCtrl->unicastSuite = RSN_CIPHER_WEP; 144 paeConfig.unicastSuite = pAdmCtrl->unicastSuite; 223 pAdmCtrl->unicastSuite = RSN_CIPHER_WEP;
|
H A D | admCtrlWpa.c | 403 TI_STATUS admCtrlWpa_checkCipherSuiteValidity (cipherSuite_e unicastSuite, cipherSuite_e broadcastSuite, cipherSuite_e encryptionStatus); 432 if (pAdmCtrl->unicastSuite == RSN_CIPHER_NONE) 434 pAdmCtrl->unicastSuite = RSN_CIPHER_TKIP; 471 paeConfig.unicastSuite = pAdmCtrl->unicastSuite; 509 paeConfig.unicastSuite = pWpaData->unicastSuite[0]; 563 if (pAdmCtrl->unicastSuite == RSN_CIPHER_WEP) 594 if (pAdmCtrl->unicastSuite == RSN_CIPHER_TKIP) 668 if ((pAdmCtrl->pRsn->paeConfig.unicastSuite 1321 admCtrlWpa_checkCipherSuiteValidity(cipherSuite_e unicastSuite, cipherSuite_e broadcastSuite, cipherSuite_e encryptionStatus) argument [all...] |
H A D | unicastKeySM.c | 194 if (pPaeConfig->unicastSuite == RSN_CIPHER_NONE) 206 status = keyDerive_config(pUnicastKey->pKeyDerive, pPaeConfig->unicastSuite, pParent, hReport, hOs);
|
H A D | admCtrlNone.c | 140 pAdmCtrl->unicastSuite = RSN_CIPHER_NONE; 145 paeConfig.unicastSuite = pAdmCtrl->unicastSuite;
|
H A D | admCtrl.c | 256 pAdmCtrl->unicastSuite = RSN_CIPHER_WEP; 259 pAdmCtrl->unicastSuite = RSN_CIPHER_NONE; 342 if(pAdmCtrl->unicastSuite==RSN_CIPHER_NONE) 598 if (suite == pAdmCtrl->unicastSuite) 605 pAdmCtrl->unicastSuite = suite; 676 *pSuite = (pAdmCtrl->broadcastSuite > pAdmCtrl->unicastSuite) ? pAdmCtrl->broadcastSuite :pAdmCtrl->unicastSuite;
|
H A D | admCtrlWpa2.c | 410 TI_STATUS admCtrlWpa2_checkCipherSuiteValidity(cipherSuite_e unicastSuite, cipherSuite_e broadcastSuite, cipherSuite_e encryptionStatus); 457 if (pAdmCtrl->unicastSuite == RSN_CIPHER_NONE) 459 pAdmCtrl->unicastSuite = RSN_CIPHER_AES_CCMP; 494 paeConfig.unicastSuite = pAdmCtrl->unicastSuite; 587 pWpa2IePacket->pairwiseSuite[3] = (UINT8)pAdmCtrl->pRsn->paeConfig.unicastSuite; 782 if ((wpa2DataIE.unicastSuite[0]>=MAX_WPA2_CIPHER_SUITE) || 784 (pAdmCtrl->unicastSuite>=MAX_WPA2_CIPHER_SUITE)) 828 paeConfig.unicastSuite = uSuite; /* Updated value */ 866 whalParam.content.rsnEncryptionStatus = (halCtrl_CipherSuite_e)paeConfig.unicastSuite; 1296 admCtrlWpa2_checkCipherSuiteValidity(cipherSuite_e unicastSuite, cipherSuite_e broadcastSuite, cipherSuite_e encryptionStatus) argument 1316 cipherSuite_e unicastSuite = RSN_CIPHER_NONE, brdcstSuite = RSN_CIPHER_NONE; local [all...] |
H A D | mainSecSm.c | 193 ("MainSec SM: config, authProtocol = %d, keyExchangeProtocol=%d, unicastSuite=%d, broadcastSuite=%d\n", 195 pInitData->pPaeConfig->unicastSuite, pInitData->pPaeConfig->broadcastSuite));
|
H A D | keyParserExternal.c | 238 if ((pKeyDesc->KeyLength == CKIP_KEY_LEN) && (pKeyParser->pPaeConfig->unicastSuite == RSN_CIPHER_CKIP))
|
H A D | rsn.c | 1188 switch (pRsn->paeConfig.unicastSuite) 1265 ("RSN: Calling set PAE config..., unicastSuite = %d, broadcastSuite = %d \n", 1266 pPaeConfig->unicastSuite, pPaeConfig->broadcastSuite)); 1746 if (((pRsn->paeConfig.unicastSuite == RSN_CIPHER_TKIP) && (failureType == KEY_TKIP_MIC_PAIRWISE)) ||
|
/system/wlan/ti/wilink_6_1/stad/src/Connection_Managment/ |
H A D | admCtrlWep.c | 113 if ((pAdmCtrl->unicastSuite != TWD_CIPHER_WEP) && 114 (pAdmCtrl->unicastSuite != TWD_CIPHER_CKIP)) 116 pAdmCtrl->unicastSuite = TWD_CIPHER_WEP; 139 paeConfig.unicastSuite = pAdmCtrl->unicastSuite; 218 pAdmCtrl->unicastSuite = TWD_CIPHER_WEP;
|
H A D | admCtrlWpa.c | 388 TI_STATUS admCtrlWpa_checkCipherSuiteValidity (ECipherSuite unicastSuite, ECipherSuite broadcastSuite, ECipherSuite encryptionStatus); 417 if (pAdmCtrl->unicastSuite == TWD_CIPHER_NONE) 419 pAdmCtrl->unicastSuite = TWD_CIPHER_TKIP; 456 paeConfig.unicastSuite = pAdmCtrl->unicastSuite; 494 paeConfig.unicastSuite = pWpaData->unicastSuite[0]; 544 (pAdmCtrl->unicastSuite == TWD_CIPHER_NONE)) 558 if (pAdmCtrl->unicastSuite == TWD_CIPHER_WEP) 585 if (pAdmCtrl->unicastSuite 1346 admCtrlWpa_checkCipherSuiteValidity(ECipherSuite unicastSuite, ECipherSuite broadcastSuite, ECipherSuite encryptionStatus) argument [all...] |
H A D | unicastKeySM.c | 195 if (pPaeConfig->unicastSuite == TWD_CIPHER_NONE) 207 status = keyDerive_config(pUnicastKey->pKeyDerive, pPaeConfig->unicastSuite, pParent, hReport, hOs);
|
H A D | admCtrlNone.c | 135 pAdmCtrl->unicastSuite = TWD_CIPHER_NONE; 140 paeConfig.unicastSuite = pAdmCtrl->unicastSuite;
|
H A D | admCtrlWpa.h | 116 ECipherSuite unicastSuite[MAX_WPA_UNICAST_SUITES]; member in struct:__anon1744
|
H A D | admCtrl.c | 254 pAdmCtrl->unicastSuite = TWD_CIPHER_WEP; 257 pAdmCtrl->unicastSuite = TWD_CIPHER_NONE; 347 if(pAdmCtrl->unicastSuite==TWD_CIPHER_NONE) 603 if (suite == pAdmCtrl->unicastSuite) 610 pAdmCtrl->unicastSuite = suite; 681 *pSuite = (pAdmCtrl->broadcastSuite > pAdmCtrl->unicastSuite) ? pAdmCtrl->broadcastSuite :pAdmCtrl->unicastSuite;
|
H A D | admCtrlWpa2.c | 401 TI_STATUS admCtrlWpa2_checkCipherSuiteValidity(ECipherSuite unicastSuite, ECipherSuite broadcastSuite, ECipherSuite encryptionStatus); 448 if (pAdmCtrl->unicastSuite == TWD_CIPHER_NONE) 450 pAdmCtrl->unicastSuite = TWD_CIPHER_AES_CCMP; 485 paeConfig.unicastSuite = pAdmCtrl->unicastSuite; 554 pWpa2IePacket->pairwiseSuite[3] = (TI_UINT8)pAdmCtrl->pRsn->paeConfig.unicastSuite; 703 if ((wpa2Data.unicastSuite[0]>=MAX_WPA2_CIPHER_SUITE) || 705 (pAdmCtrl->unicastSuite>=MAX_WPA2_CIPHER_SUITE)) 749 paeConfig.unicastSuite = uSuite; /* Updated value */ 787 tTwdParam.content.rsnEncryptionStatus = (ECipherSuite)paeConfig.unicastSuite; 1201 admCtrlWpa2_checkCipherSuiteValidity(ECipherSuite unicastSuite, ECipherSuite broadcastSuite, ECipherSuite encryptionStatus) argument 1221 ECipherSuite unicastSuite = TWD_CIPHER_NONE, brdcstSuite = TWD_CIPHER_NONE; local [all...] |
H A D | admCtrlWpa2.h | 161 ECipherSuite unicastSuite[MAX_WPA2_UNICAST_SUITES]; member in struct:__anon1747
|
H A D | rsnApi.h | 163 ECipherSuite unicastSuite; member in struct:__anon1795
|
H A D | admCtrl.h | 167 ECipherSuite unicastSuite; member in struct:_admCtrl_t
|
H A D | keyParserExternal.c | 231 if ((pKeyDesc->KeyLength == CKIP_KEY_LEN) && (pKeyParser->pPaeConfig->unicastSuite == TWD_CIPHER_CKIP))
|
H A D | mainSecSm.c | 192 TRACE4(pMainSec->hReport, REPORT_SEVERITY_SM, "MainSec SM: config, authProtocol = %d, keyExchangeProtocol=%d, unicastSuite=%d, broadcastSuite=%d\n", pInitData->pPaeConfig->authProtocol, pInitData->pPaeConfig->keyExchangeProtocol, pInitData->pPaeConfig->unicastSuite, pInitData->pPaeConfig->broadcastSuite);
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/rsn/inc/ |
H A D | admCtrlWpa.h | 117 cipherSuite_e unicastSuite[MAX_WPA_UNICAST_SUITES]; member in struct:__anon744
|
H A D | admCtrlWpa2.h | 161 cipherSuite_e unicastSuite[MAX_WPA2_UNICAST_SUITES]; member in struct:__anon745
|
H A D | admCtrl.h | 166 cipherSuite_e unicastSuite; member in struct:_admCtrl_t
|
/system/wlan/ti/sta_dk_4_0_4_32/common/src/core/inc/ |
H A D | rsnApi.h | 112 cipherSuite_e unicastSuite; member in struct:__anon725
|