• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/vt6655/

Lines Matching refs:pBSSList

63  *      pBSSList - BSS list.
73 PKnownBSS pBSSList
77 pBSSList->byGKType = WPA_TKIP;
79 pBSSList->abyPKType[ii] = WPA_TKIP;
80 pBSSList->wPKCount = 0;
82 pBSSList->abyAuthType[ii] = WPA_AUTH_IEEE802_1X;
83 pBSSList->wAuthCount = 0;
84 pBSSList->byDefaultK_as_PK = 0;
85 pBSSList->byReplayIdx = 0;
86 pBSSList->sRSNCapObj.bRSNCapExist = false;
87 pBSSList->sRSNCapObj.wRSNCap = 0;
88 pBSSList->bWPAValid = false;
99 * pBSSList - BSS list.
109 PKnownBSS pBSSList,
117 WPA_ClearRSN(pBSSList);
131 pBSSList->byGKType = WPA_WEP40;
133 pBSSList->byGKType = WPA_TKIP;
135 pBSSList->byGKType = WPA_AESWRAP;
137 pBSSList->byGKType = WPA_AESCCMP;
139 pBSSList->byGKType = WPA_WEP104;
142 pBSSList->byGKType = WPA_NONE;
144 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"byGKType: %x\n", pBSSList->byGKType);
150 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"wPKCount: %d, sizeof(pBSSList->abyPKType): %zu\n", pRSN->wPKCount, sizeof(pBSSList->abyPKType));
151 for(i = 0; (i < pRSN->wPKCount) && (j < sizeof(pBSSList->abyPKType)/sizeof(unsigned char)); i++) {
154 pBSSList->abyPKType[j++] = WPA_NONE;
156 pBSSList->abyPKType[j++] = WPA_TKIP;
158 pBSSList->abyPKType[j++] = WPA_AESWRAP;
160 pBSSList->abyPKType[j++] = WPA_AESCCMP;
167 //DBG_PRN_GRP14(("abyPKType[%d]: %X\n", j-1, pBSSList->abyPKType[j-1]));
169 pBSSList->wPKCount = (unsigned short)j;
170 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"wPKCount: %d\n", pBSSList->wPKCount);
181 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"wAuthCount: %d, sizeof(pBSSList->abyAuthType): %zu\n",
182 pIE_RSN_Auth->wAuthCount, sizeof(pBSSList->abyAuthType));
183 for(i = 0; (i < pIE_RSN_Auth->wAuthCount) && (j < sizeof(pBSSList->abyAuthType)/sizeof(unsigned char)); i++) {
186 pBSSList->abyAuthType[j++] = WPA_AUTH_IEEE802_1X;
188 pBSSList->abyAuthType[j++] = WPA_AUTH_PSK;
195 //DBG_PRN_GRP14(("abyAuthType[%d]: %X\n", j-1, pBSSList->abyAuthType[j-1]));
198 pBSSList->wAuthCount = (unsigned short)j;
199 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"wAuthCount: %d\n", pBSSList->wAuthCount);
211 pBSSList->byDefaultK_as_PK = (*pbyCaps) & WPA_GROUPFLAG;
212 pBSSList->byReplayIdx = 2 << ((*pbyCaps >> WPA_REPLAYBITSSHIFT) & WPA_REPLAYBITS);
213 pBSSList->sRSNCapObj.bRSNCapExist = true;
214 pBSSList->sRSNCapObj.wRSNCap = *(unsigned short *)pbyCaps;
216 //DBG_PRN_GRP14(("byDefaultK_as_PK: %X\n", pBSSList->byDefaultK_as_PK));
217 //DBG_PRN_GRP14(("byReplayIdx: %X\n", pBSSList->byReplayIdx));
220 pBSSList->bWPAValid = true;
233 * pBSSList - BSS list
244 PKnownBSS pBSSList
250 if (pBSSList->bWPAValid == false)
256 if (byEncrypt != pBSSList->byGKType)
259 if (pBSSList->wPKCount > 0) {
260 for (ii = 0; ii < pBSSList->wPKCount; ii ++) {
261 if (pBSSList->abyPKType[ii] == WPA_AESCCMP)
263 else if ((pBSSList->abyPKType[ii] == WPA_TKIP) && (byPKType != WPA_AESCCMP))
265 else if ((pBSSList->abyPKType[ii] == WPA_WEP40) && (byPKType != WPA_AESCCMP) && (byPKType != WPA_TKIP))
267 else if ((pBSSList->abyPKType[ii] == WPA_WEP104) && (byPKType != WPA_AESCCMP) && (byPKType != WPA_TKIP))
274 // if (pBSSList->wAuthCount > 0)
275 // for (ii=0; ii < pBSSList->wAuthCount; ii ++)
276 // if (byAuth == pBSSList->abyAuthType[ii])