• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/vt6656/

Lines Matching refs:pBSSList

63  *      pBSSList - BSS list.
73 PKnownBSS pBSSList
77 pBSSList->byGKType = WPA_TKIP;
79 pBSSList->abyPKType[ii] = WPA_TKIP;
80 pBSSList->wPKCount = 0;
82 pBSSList->abyAuthType[ii] = WPA_AUTH_IEEE802_1X;
83 pBSSList->wAuthCount = 0;
84 pBSSList->byDefaultK_as_PK = 0;
85 pBSSList->byReplayIdx = 0;
86 pBSSList->sRSNCapObj.bRSNCapExist = FALSE;
87 pBSSList->sRSNCapObj.wRSNCap = 0;
88 pBSSList->bWPAValid = FALSE;
99 * pBSSList - BSS list.
109 PKnownBSS pBSSList,
117 WPA_ClearRSN(pBSSList);
131 pBSSList->byGKType = WPA_WEP40;
133 pBSSList->byGKType = WPA_TKIP;
135 pBSSList->byGKType = WPA_AESWRAP;
137 pBSSList->byGKType = WPA_AESCCMP;
139 pBSSList->byGKType = WPA_WEP104;
142 pBSSList->byGKType = WPA_NONE;
144 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"byGKType: %x\n", pBSSList->byGKType);
150 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"wPKCount: %d, sizeof(pBSSList->abyPKType): %zu\n", pRSN->wPKCount, sizeof(pBSSList->abyPKType));
152 (j < sizeof(pBSSList->abyPKType)/sizeof(BYTE)); i++) {
155 pBSSList->abyPKType[j++] = WPA_NONE;
157 pBSSList->abyPKType[j++] = WPA_TKIP;
159 pBSSList->abyPKType[j++] = WPA_AESWRAP;
161 pBSSList->abyPKType[j++] = WPA_AESCCMP;
168 //DBG_PRN_GRP14(("abyPKType[%d]: %X\n", j-1, pBSSList->abyPKType[j-1]));
170 pBSSList->wPKCount = (WORD)j;
171 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"wPKCount: %d\n", pBSSList->wPKCount);
182 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"wAuthCount: %d, sizeof(pBSSList->abyAuthType): %zu\n",
183 pIE_RSN_Auth->wAuthCount, sizeof(pBSSList->abyAuthType));
185 (j < sizeof(pBSSList->abyAuthType)/sizeof(BYTE)); i++) {
188 pBSSList->abyAuthType[j++] = WPA_AUTH_IEEE802_1X;
190 pBSSList->abyAuthType[j++] = WPA_AUTH_PSK;
197 //DBG_PRN_GRP14(("abyAuthType[%d]: %X\n", j-1, pBSSList->abyAuthType[j-1]));
200 pBSSList->wAuthCount = (WORD)j;
201 DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO"wAuthCount: %d\n", pBSSList->wAuthCount);
213 pBSSList->byDefaultK_as_PK = (*pbyCaps) & WPA_GROUPFLAG;
214 pBSSList->byReplayIdx = 2 << ((*pbyCaps >> WPA_REPLAYBITSSHIFT) & WPA_REPLAYBITS);
215 pBSSList->sRSNCapObj.bRSNCapExist = TRUE;
216 pBSSList->sRSNCapObj.wRSNCap = *(PWORD)pbyCaps;
218 //DBG_PRN_GRP14(("byDefaultK_as_PK: %X\n", pBSSList->byDefaultK_as_PK));
219 //DBG_PRN_GRP14(("byReplayIdx: %X\n", pBSSList->byReplayIdx));
222 pBSSList->bWPAValid = TRUE;
235 * pBSSList - BSS list
246 PKnownBSS pBSSList
252 if (pBSSList->bWPAValid == FALSE)
258 if (byEncrypt != pBSSList->byGKType)
261 if (pBSSList->wPKCount > 0) {
262 for (ii = 0; ii < pBSSList->wPKCount; ii ++) {
263 if (pBSSList->abyPKType[ii] == WPA_AESCCMP)
265 else if ((pBSSList->abyPKType[ii] == WPA_TKIP) && (byPKType != WPA_AESCCMP))
267 else if ((pBSSList->abyPKType[ii] == WPA_WEP40) && (byPKType != WPA_AESCCMP) && (byPKType != WPA_TKIP))
269 else if ((pBSSList->abyPKType[ii] == WPA_WEP104) && (byPKType != WPA_AESCCMP) && (byPKType != WPA_TKIP))
276 // if (pBSSList->wAuthCount > 0)
277 // for (ii=0; ii < pBSSList->wAuthCount; ii ++)
278 // if (byAuth == pBSSList->abyAuthType[ii])