/hardware/ti/wlan/wl1271/Test/ |
H A D | rsnDbg.c | 69 void rsnDebugFunction(TI_HANDLE hRsn, TI_UINT32 funcType, void *pParam) argument 88 rsn_setParam(hRsn, ¶m); 98 rsn_setParam(hRsn, ¶m); 105 rsn_reportMicFailure(hRsn, (TI_UINT8*)&value,1); 114 rsn_getParam(hRsn, ¶m); 124 rsn_getParam(hRsn, pRsnParam); 129 rsn_resetPMKIDList(hRsn); 134 printRogueApTable(((XCCMngr_t*)((rsn_t*)hRsn)->hXCCMngr)->hRogueAp); 140 rsn_setPortStatus(hRsn,TI_TRUE); 146 portStatus = rsn_getPortStatus(((rsn_t*)hRsn)); [all...] |
H A D | rsnDbg.h | 54 void rsnDebugFunction(TI_HANDLE hRsn, TI_UINT32 funcType, void *pParam);
|
H A D | debug.c | 188 rsnDebugFunction(pStadHandles->hRsn, functionNumber % 100, pParam);
|
/hardware/ti/wlan/wl1271/stad/src/Connection_Managment/ |
H A D | rsnApi.h | 224 TI_STATUS rsn_unload(TI_HANDLE hRsn); 228 TI_STATUS rsn_SetDefaults (TI_HANDLE hRsn, TRsnInitParams *pInitParam); 230 TI_STATUS rsn_reconfig(TI_HANDLE hRsn); 232 TI_STATUS rsn_start(TI_HANDLE hRsn); 234 TI_STATUS rsn_stop(TI_HANDLE hRsn, TI_BOOL removeKeys); 236 TI_STATUS rsn_eventRecv(TI_HANDLE hRsn, ERsnEvent event, void* pData); 240 TI_STATUS rsn_getParamEncryptionStatus(TI_HANDLE hRsn, ECipherSuite *rsnStatus); 243 TI_STATUS rsn_evalSite(TI_HANDLE hRsn, TRsnData *pRsnData, TRsnSiteParams *pRsnSiteParams, TI_UINT32 *pMetric); 245 TI_STATUS rsn_setSite(TI_HANDLE hRsn, TRsnData *pRsnData, TI_UINT8 *pAssocIe, TI_UINT8 *pAssocIeLen); 247 TI_STATUS rsn_getInfoElement(TI_HANDLE hRsn, TI_UINT [all...] |
H A D | rsn.c | 94 void rsn_pairwiseReKeyTimeout(TI_HANDLE hRsn, TI_BOOL bTwdInitOccured); 95 void rsn_groupReKeyTimeout(TI_HANDLE hRsn, TI_BOOL bTwdInitOccured); 96 void rsn_micFailureReportTimeout (TI_HANDLE hRsn, TI_BOOL bTwdInitOccured); 97 static rsn_siteBanEntry_t * findEntryForInsert(TI_HANDLE hRsn); 98 static rsn_siteBanEntry_t * findBannedSiteAndCleanup(TI_HANDLE hRsn, TMacAddr siteBssid); 171 * I - hRsn - rsniation SM context \n 179 TI_STATUS rsn_unload (TI_HANDLE hRsn) argument 184 if (hRsn == NULL) 189 pRsn = (rsn_t*)hRsn; 207 os_memoryFree (pRsn->hOs, hRsn, sizeo 268 rsn_SetDefaults(TI_HANDLE hRsn, TRsnInitParams *pInitParam) argument 359 rsn_reconfig(TI_HANDLE hRsn) argument 448 rsn_start(TI_HANDLE hRsn) argument 536 rsn_removedDefKeys(TI_HANDLE hRsn) argument 582 rsn_stop(TI_HANDLE hRsn, TI_BOOL removeKeys) argument 640 rsn_getParamEncryptionStatus(TI_HANDLE hRsn, ECipherSuite *rsnStatus) argument 672 rsn_getParam(TI_HANDLE hRsn, void *param) argument 808 rsn_setParam(TI_HANDLE hRsn, void *param) argument 1411 rsn_evalSite(TI_HANDLE hRsn, TRsnData *pRsnData, TRsnSiteParams *pRsnSiteParams, TI_UINT32 *pMetric) argument 1465 rsn_getInfoElement(TI_HANDLE hRsn, TI_UINT8 *pRsnIe, TI_UINT32 *pRsnIeLen) argument 1522 rsn_getXCCExtendedInfoElement(TI_HANDLE hRsn, TI_UINT8 *pRsnIe, TI_UINT8 *pRsnIeLen) argument 1562 rsn_setSite(TI_HANDLE hRsn, TRsnData *pRsnData, TI_UINT8 *pAssocIe, TI_UINT8 *pAssocIeLen) argument 1828 rsn_reportAuthFailure(TI_HANDLE hRsn, EAuthStatus authStatus) argument 1868 rsn_reportMicFailure(TI_HANDLE hRsn, TI_UINT8 *pType, TI_UINT32 Length) argument 1964 rsn_groupReKeyTimeout(TI_HANDLE hRsn, TI_BOOL bTwdInitOccured) argument 1979 rsn_pairwiseReKeyTimeout(TI_HANDLE hRsn, TI_BOOL bTwdInitOccured) argument 1993 rsn_micFailureReportTimeout(TI_HANDLE hRsn, TI_BOOL bTwdInitOccured) argument 2027 rsn_resetPMKIDList(TI_HANDLE hRsn) argument 2038 rsn_debugFunc(TI_HANDLE hRsn) argument 2072 rsn_startPreAuth(TI_HANDLE hRsn, TBssidList4PreAuth *pBssidList) argument 2110 rsn_isSiteBanned(TI_HANDLE hRsn, TMacAddr siteBssid) argument 2145 rsn_setPortStatus(TI_HANDLE hRsn, TI_BOOL state) argument 2181 rsn_banSite(TI_HANDLE hRsn, TMacAddr siteBssid, ERsnSiteBanLevel banLevel, TI_UINT32 durationMs) argument 2231 findEntryForInsert(TI_HANDLE hRsn) argument 2270 findBannedSiteAndCleanup(TI_HANDLE hRsn, TMacAddr siteBssid) argument 2424 rsn_reAuth(TI_HANDLE hRsn) argument [all...] |
H A D | smePrivate.h | 67 TI_HANDLE hRsn; member in struct:__anon2992
|
H A D | mainKeysSm.h | 100 TI_HANDLE hRsn; member in struct:_mainKeys_t 139 TI_HANDLE hRsn,
|
H A D | conn.h | 97 TI_HANDLE hRsn; member in struct:__anon2948
|
H A D | rsn.h | 101 typedef TI_STATUS (*rsn_setPortStatus_t)(TI_HANDLE hRsn, TI_BOOL state); 210 TI_STATUS rsn_setPortStatus(TI_HANDLE hRsn, TI_BOOL state);
|
H A D | connIbss.c | 241 return rsn_start (pConn->hRsn); 302 return rsn_start (pConn->hRsn); 443 tStatus = rsn_stop(((conn_t *)pData)->hRsn, TI_FALSE); 566 return rsn_start(((conn_t *)pData)->hRsn);
|
H A D | mainKeysSm.c | 172 TI_HANDLE hRsn, 227 pMainKeys->hRsn = hRsn; 924 rsn_banSite(pMainKeys->hRsn, param.content.ctrlDataCurrentBSSID, RSN_SITE_BAN_LEVEL_FULL, RSN_MAIN_KEYS_SESSION_TIMEOUT); 956 rsn_reportAuthFailure(pMainKeys->hRsn, RSN_AUTH_STATUS_TIMEOUT); 979 rsn_reAuth(pMainKeys->hRsn); 164 mainKeys_config(mainKeys_t *pMainKeys, TRsnPaeConfig *pPaeConfig, void *pParent, TI_HANDLE hReport, TI_HANDLE hOs, TI_HANDLE hCtrlData, TI_HANDLE hEvHandler, TI_HANDLE hConn, TI_HANDLE hRsn, TI_HANDLE hTimer) argument
|
H A D | connInfra.c | 454 status = rsn_start(pConn->hRsn); 467 status = rsn_stop(pConn->hRsn, pConn->disConEraseKeys); 506 status = rsn_stop(pConn->hRsn, pConn->disConEraseKeys ); 548 status = rsn_stop(pConn->hRsn, pConn->disConEraseKeys); 937 status = rsn_stop(pConn->hRsn, pConn->disConEraseKeys);
|
H A D | conn.c | 155 pConn->hRsn = pStadHandles->hRsn;
|
/hardware/ti/wlan/wl1271/stad/src/Sta_Management/ |
H A D | authSm.h | 85 TI_HANDLE hRsn; member in struct:__anon3065
|
H A D | openAuthSm.c | 221 rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE); 227 rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE); 237 rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE); 325 rsn_reportAuthFailure(hAuth->hRsn, RSN_AUTH_STATUS_TIMEOUT);
|
H A D | AssocSM.h | 116 TI_HANDLE hRsn; member in struct:__anon3046
|
H A D | healthMonitor.c | 76 TI_HANDLE hRsn; /* handle to the RSN */ member in struct:__anon3067 175 pHealthMonitor->hRsn = pStadHandles->hRsn;
|
H A D | siteHash.h | 99 TI_HANDLE hRsn; member in struct:__anon3111
|
H A D | authSm.c | 200 pHandle->hRsn = pStadHandles->hRsn;
|
H A D | assocSM.c | 279 pHandle->hRsn = pStadHandles->hRsn; 513 rsn_setSite(pHandle->hRsn, &rsnData, NULL, &rsnAssocIeLen); 563 rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE); 567 rsn_reportAuthFailure(pHandle->hRsn, RSN_AUTH_STATUS_INVALID_TYPE); 1052 rsn_clearGenInfoElement(pAssoc->hRsn); 1092 status = rsn_getParam(pCtx->hRsn, ¶m); 1478 status = rsn_getXCCExtendedInfoElement(pCtx->hRsn, pRequest, (TI_UINT8*)&len); 1522 status = rsn_getInfoElement(pCtx->hRsn, pRequest, &len); 1534 status = rsn_getParam(pCtx->hRsn, [all...] |
/hardware/ti/wlan/wl1271/stad/src/Ctrl_Interface/ |
H A D | DrvMainModules.h | 62 TI_HANDLE hRsn; member in struct:__anon3005
|
H A D | CmdDispatcher.c | 92 TI_HANDLE hRsn; member in struct:__anon2999 190 pCmdDispatch->hRsn = pStadHandles->hRsn; 288 pCmdDispatch->paramAccessTable[GET_PARAM_MODULE_NUMBER(RSN_MODULE_PARAM) - 1].handle = pCmdDispatch->hRsn;
|
H A D | DrvMain.c | 408 pDrvMain->tStadHandles.hRsn = rsn_create (hOs); 409 if (pDrvMain->tStadHandles.hRsn == NULL) 660 if (pDrvMain->tStadHandles.hRsn != NULL) 662 rsn_unload (pDrvMain->tStadHandles.hRsn); 895 rsn_SetDefaults (pDrvMain->tStadHandles.hRsn, &pInitTable->rsnInitParams);
|
/hardware/ti/wlan/wl1271/stad/src/Data_link/ |
H A D | rx.h | 88 TI_HANDLE hRsn; member in struct:__anon3027
|
H A D | rx.c | 179 pRxData->hRsn = pStadHandles->hRsn; 1698 rsn_reportMicFailure (pRxData->hRsn, &uKeyType, sizeof(uKeyType)); 1880 WLAN_OS_REPORT(("hRsn = 0x%X\n", pRxData->hRsn)); 1887 WLAN_OS_REPORT(("hRsn = 0x%X\n", pRxData->hRsn));
|