/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/ |
H A D | rtusb_io.h | 122 #define RTMP_STA_ENTRY_MAC_RESET(pAd, Wcid) \ 127 RTUSBEnqueueInternalCmd(pAd, CMDTHREAD_SET_ASIC_WCID, \ 131 #define RTMP_STA_ENTRY_ADD(pAd, pEntry) \ 132 RTUSBEnqueueInternalCmd(pAd, CMDTHREAD_SET_CLIENT_MAC_ENTRY, \ 137 #define RTMP_UPDATE_PROTECT(pAd) \ 138 RTUSBEnqueueInternalCmd(pAd, CMDTHREAD_UPDATE_PROTECT, NULL, 0); 143 #define RTMP_STA_ENTRY_KEY_DEL(pAd, BssIdx, Wcid) 146 #define RTMP_STA_SECURITY_INFO_ADD(pAd, apidx, KeyID, pEntry) \ 147 { RTMP_STA_ENTRY_MAC_RESET(pAd, pEntry->Aid); \ 154 SetAsicWcidAttri.Cipher = pAd [all...] |
H A D | sta_ioctl.c | 80 void RTMPAddKey(struct rt_rtmp_adapter *pAd, struct rt_ndis_802_11_key *pKey) argument 87 if (pAd->StaCfg.AuthMode >= Ndis802_11AuthModeWPA) { 89 if (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPANone) { 90 NdisZeroMemory(pAd->StaCfg.PMK, 32); 91 NdisMoveMemory(pAd->StaCfg.PMK, 97 NdisZeroMemory(&pAd->SharedKey[BSS0][0], 99 pAd->SharedKey[BSS0][0].KeyLen = LEN_TKIP_EK; 100 NdisMoveMemory(pAd->SharedKey[BSS0][0].Key, 103 if (pAd->StaCfg.PairCipher == 105 NdisMoveMemory(pAd 1505 getBaInfo(struct rt_rtmp_adapter *pAd, char *pOutBuf) argument 1565 struct rt_rtmp_adapter *pAd = NULL; local 2017 struct rt_rtmp_adapter *pAd = NULL; local 2095 struct rt_rtmp_adapter *pAd = NULL; local 2122 struct rt_rtmp_adapter *pAd = NULL; local 2162 struct rt_rtmp_adapter *pAd = NULL; local 2266 struct rt_rtmp_adapter *pAd = NULL; local 2322 struct rt_rtmp_adapter *pAd = NULL; local 2450 struct rt_rtmp_adapter *pAd = NULL; local [all...] |
H A D | rtmp_timer.h | 74 void *pAd; member in struct:rt_ralink_timer 101 _pAd = (struct rt_rtmp_adapter *)_pTimer->pAd; \
|
H A D | mlme.h | 128 #define ASIC_LED_ACT_ON(pAd) RTMP_IO_WRITE32(pAd, MAC_CSR14, 0x00031e46) 129 #define ASIC_LED_ACT_OFF(pAd) RTMP_IO_WRITE32(pAd, MAC_CSR14, 0x00001e46) 859 /* Once this attemp succeeds, all settings will be copy to pAd->StaActive. */ 862 /* separate this under-trial settings away from pAd->StaActive so that once */
|
H A D | rt_linux.h | 227 pAd->irq_disabled |= 1; \ 232 pAd->irq_disabled &= 0; \ 459 dma_addr_t linux_pci_map_single(struct rt_rtmp_adapter *pAd, void *ptr, 461 void linux_pci_unmap_single(struct rt_rtmp_adapter *pAd, dma_addr_t dma_addr,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/common/ |
H A D | cmm_wpa.c | 69 static void WpaEAPPacketAction(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem); 71 static void WpaEAPOLASFAlertAction(struct rt_rtmp_adapter *pAd, 74 static void WpaEAPOLLogoffAction(struct rt_rtmp_adapter *pAd, 77 static void WpaEAPOLStartAction(struct rt_rtmp_adapter *pAd, 80 static void WpaEAPOLKeyAction(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem); 90 void WpaStateMachineInit(struct rt_rtmp_adapter *pAd, argument 118 void WpaEAPPacketAction(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem) argument 122 void WpaEAPOLASFAlertAction(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem) argument 126 void WpaEAPOLLogoffAction(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem) argument 137 void WpaEAPOLStartAction(struct rt_rtmp_adapter *pAd, struc argument 190 WpaEAPOLKeyAction(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem) argument 360 RTMPToWirelessSta(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, u8 *pHeader802_3, u32 HdrLen, u8 *pData, u32 DataLen, IN BOOLEAN bClearFrame) argument 436 WPAStart4WayHS(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, unsigned long TimeInterval) argument 519 PeerPairMsg1Action(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, struct rt_mlme_queue_elem *Elem) argument 612 PeerPairMsg2Action(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, struct rt_mlme_queue_elem *Elem) argument 727 PeerPairMsg3Action(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, struct rt_mlme_queue_elem *Elem) argument 874 PeerPairMsg4Action(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, struct rt_mlme_queue_elem *Elem) argument 993 WPAStart2WayGroupHS(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry) argument 1055 PeerGroupMsg1Action(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, struct rt_mlme_queue_elem *Elem) argument 1134 PeerGroupMsg2Action(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, void * Msg, u32 MsgLen) argument 1402 WpaDerivePTK(struct rt_rtmp_adapter *pAd, u8 * PMK, u8 * ANonce, u8 * AA, u8 * SNonce, u8 * SA, u8 * output, u32 len) argument 1481 GenRandom(struct rt_rtmp_adapter *pAd, u8 * macAddr, u8 * random) argument 1540 RTMPMakeRsnIeCipher(struct rt_rtmp_adapter *pAd, u8 ElementID, u32 WepStatus, IN BOOLEAN bMixCipher, u8 FlexibleCipher, u8 *pRsnIe, u8 * rsn_len) argument 1725 RTMPMakeRsnIeAKM(struct rt_rtmp_adapter *pAd, u8 ElementID, u32 AuthMode, u8 apidx, u8 *pRsnIe, u8 * rsn_len) argument 1806 RTMPMakeRsnIeCap(struct rt_rtmp_adapter *pAd, u8 ElementID, u8 apidx, u8 *pRsnIe, u8 * rsn_len) argument 1843 RTMPMakeRSNIE(struct rt_rtmp_adapter *pAd, u32 AuthMode, u32 WepStatus, u8 apidx) argument 1935 RTMPCheckWPAframe(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, u8 *pData, unsigned long DataByteCount, u8 FromWhichBSSID) argument 2047 RTMPCheckRSNIE(struct rt_rtmp_adapter *pAd, u8 *pData, u8 DataLen, struct rt_mac_table_entry *pEntry, u8 * Offset) argument 2121 RTMPParseEapolKeyData(struct rt_rtmp_adapter *pAd, u8 *pKeyData, u8 KeyDataLen, u8 GroupKeyIndex, u8 MsgType, IN BOOLEAN bWPA2, struct rt_mac_table_entry *pEntry) argument 2499 struct rt_rtmp_adapter *pAd = pEntry->pAd; local 2717 RTMPSoftDecryptBroadCastData(struct rt_rtmp_adapter *pAd, struct rt_rx_blk *pRxBlk, IN NDIS_802_11_ENCRYPTION_STATUS GroupCipher, struct rt_cipher_key *pShard_key) argument [all...] |
H A D | cmm_wep.c | 123 pAd Pointer to our adapter 138 void RTMPInitWepEngine(struct rt_rtmp_adapter *pAd, argument 151 pAd->PrivateInfo.FCSCRC32 = PPPINITFCS32; /*Init crc32. */ 157 WEPKEY[i] = RandomByte(pAd); /*Call mlme RandomByte() function. */ 158 ARCFOUR_INIT(&pAd->PrivateInfo.WEPCONTEXT, WEPKEY, KeyLen + 3); /*INIT SBOX, KEYLEN+3(IV) */ 173 pAd Pointer to our adapter 187 void RTMPEncryptData(struct rt_rtmp_adapter *pAd, argument 190 pAd->PrivateInfo.FCSCRC32 = 191 RTMP_CALC_FCS32(pAd->PrivateInfo.FCSCRC32, pSrc, Len); 192 ARCFOUR_ENCRYPT(&pAd 214 RTMPSoftDecryptWEP(struct rt_rtmp_adapter *pAd, u8 *pData, unsigned long DataByteCnt, struct rt_cipher_key *pGroupKey) argument 466 RTMPSetICV(struct rt_rtmp_adapter *pAd, u8 *pDest) argument [all...] |
H A D | cmm_sanity.c | 61 BOOLEAN MlmeAddBAReqSanity(struct rt_rtmp_adapter *pAd, argument 100 BOOLEAN MlmeDelBAReqSanity(struct rt_rtmp_adapter *pAd, void * Msg, unsigned long MsgLen) argument 124 (pAd->MacTab.Content[pInfo->Wcid].Addr, pInfo->Addr, 134 BOOLEAN PeerAddBAReqActionSanity(struct rt_rtmp_adapter *pAd, argument 174 BOOLEAN PeerAddBARspActionSanity(struct rt_rtmp_adapter *pAd, argument 209 BOOLEAN PeerDelBAActionSanity(struct rt_rtmp_adapter *pAd, argument 243 BOOLEAN PeerBeaconAndProbeRspSanity(struct rt_rtmp_adapter *pAd, void * Msg, unsigned long MsgLen, u8 MsgChannel, u8 *pAddr2, u8 *pBssid, char Ssid[], u8 * pSsidLen, u8 * pBssType, u16 * pBeaconPeriod, u8 * pChannel, u8 * pNewChannel, OUT LARGE_INTEGER * pTimestamp, struct rt_cf_parm * pCfParm, u16 * pAtimWin, u16 * pCapabilityInfo, u8 * pErp, u8 * pDtimCount, u8 * pDtimPeriod, u8 * pBcastFlag, u8 * pMessageToMe, u8 SupRate[], u8 * pSupRateLen, u8 ExtRate[], u8 * pExtRateLen, u8 * pCkipFlag, u8 * pAironetCellPowerLimit, struct rt_edca_parm *pEdcaParm, struct rt_qbss_load_parm *pQbssLoad, struct rt_qos_capability_parm *pQosCapability, unsigned long * pRalinkIe, u8 * pHtCapabilityLen, u8 * pPreNHtCapabilityLen, struct rt_ht_capability_ie * pHtCapability, u8 * AddHtInfoLen, struct rt_add_ht_info_ie * AddHtInfo, u8 * NewExtChannelOffset, /* Ht extension channel offset(above or below) */ argument 276 if (pAd->OpMode == OPMODE_STA) 364 /* RTMPCheckRates(pAd, SupRate, pSupRateLen); */ 452 if (ChannelSanity(pAd, *pChanne 733 MlmeScanReqSanity(struct rt_rtmp_adapter *pAd, void * Msg, unsigned long MsgLen, u8 * pBssType, char Ssid[], u8 * pSsidLen, u8 * pScanType) argument 760 ChannelSanity(struct rt_rtmp_adapter *pAd, u8 channel) argument 782 PeerDeauthSanity(struct rt_rtmp_adapter *pAd, void * Msg, unsigned long MsgLen, u8 *pAddr2, u16 * pReason) argument 806 PeerAuthSanity(struct rt_rtmp_adapter *pAd, void * Msg, unsigned long MsgLen, u8 *pAddr, u16 * pAlg, u16 * pSeq, u16 * pStatus, char * pChlgText) argument 856 MlmeAuthReqSanity(struct rt_rtmp_adapter *pAd, void * Msg, unsigned long MsgLen, u8 *pAddr, unsigned long * pTimeout, u16 * pAlg) argument 890 MlmeAssocReqSanity(struct rt_rtmp_adapter *pAd, void * Msg, unsigned long MsgLen, u8 *pApAddr, u16 * pCapabilityInfo, unsigned long * pTimeout, u16 * pListenIntv) argument 919 PeerDisassocSanity(struct rt_rtmp_adapter *pAd, void * Msg, unsigned long MsgLen, u8 *pAddr2, u16 * pReason) argument 1015 PeerWpaMessageSanity(struct rt_rtmp_adapter *pAd, struct rt_eapol_packet * pMsg, unsigned long MsgLen, u8 MsgType, struct rt_mac_table_entry *pEntry) argument [all...] |
H A D | cmm_tkip.c | 205 pAd Pointer to our adapter 236 pAd Pointer to our adapter 279 pAd Pointer to our adapter 308 pAd Pointer to our adapter 316 the MIC Value is store in pAd->PrivateInfo.MIC 343 pAd Pointer to our adapter 358 void RTMPInitTkipEngine(struct rt_rtmp_adapter *pAd, argument 389 pAd Pointer to our adapter 402 void RTMPInitMICEngine(struct rt_rtmp_adapter *pAd, argument 410 RTMPTkipSetMICKey(&pAd 443 RTMPTkipCompareMICValue(struct rt_rtmp_adapter *pAd, u8 *pSrc, u8 *pDA, u8 *pSA, u8 *pMICKey, u8 UserPriority, u32 Len) argument 503 RTMPCalculateMICValue(struct rt_rtmp_adapter *pAd, void *pPacket, u8 *pEncap, struct rt_cipher_key *pKey, u8 apidx) argument 701 RTMPSoftDecryptTKIP(struct rt_rtmp_adapter *pAd, u8 *pData, unsigned long DataByteCnt, u8 UserPriority, struct rt_cipher_key *pWpaKey) argument [all...] |
H A D | cmm_aes.c | 411 BOOLEAN RTMPSoftDecryptAES(struct rt_rtmp_adapter *pAd, argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/iface/ |
H A D | rtmp_usb.h | 122 #define RTUSBMlmeUp(pAd) \ 124 struct rt_rtmp_os_task *_pTask = &((pAd)->mlmeTask);\ 132 #define RTUSBMlmeUp(pAd) \ 134 struct rt_rtmp_os_task *_pTask = &((pAd)->mlmeTask);\ 143 #define RTUSBCMDUp(pAd) \ 145 struct rt_rtmp_os_task *_pTask = &((pAd)->cmdQTask); \ 153 #define RTUSBCMDUp(pAd) \ 155 struct rt_rtmp_os_task *_pTask = &((pAd)->cmdQTask); \
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/sta/ |
H A D | sanity.c | 57 BOOLEAN MlmeStartReqSanity(struct rt_rtmp_adapter *pAd, argument 89 BOOLEAN PeerAssocRspSanity(struct rt_rtmp_adapter *pAd, void * pMsg, unsigned long MsgLen, u8 *pAddr2, u16 * pCapabilityInfo, u16 * pStatus, u16 * pAid, u8 SupRate[], u8 * pSupRateLen, u8 ExtRate[], u8 * pExtRateLen, struct rt_ht_capability_ie * pHtCapability, struct rt_add_ht_info_ie * pAddHtInfo, /* AP might use this additional ht info IE */ argument 257 BOOLEAN PeerProbeReqSanity(struct rt_rtmp_adapter *pAd, argument 292 if ((pAd->CommonCfg.PhyMode == PHY_11G) && (RateLen < 8))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/Micromax/Linux/ |
H A D | jre-1_5_0_15-linux-i586.bin | [all...] |