Searched refs:pAd (Results 51 - 63 of 63) sorted by relevance

123

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/
H A Drtusb_io.h122 #define RTMP_STA_ENTRY_MAC_RESET(pAd, Wcid) \
127 RTUSBEnqueueInternalCmd(pAd, CMDTHREAD_SET_ASIC_WCID, \
131 #define RTMP_STA_ENTRY_ADD(pAd, pEntry) \
132 RTUSBEnqueueInternalCmd(pAd, CMDTHREAD_SET_CLIENT_MAC_ENTRY, \
137 #define RTMP_UPDATE_PROTECT(pAd) \
138 RTUSBEnqueueInternalCmd(pAd, CMDTHREAD_UPDATE_PROTECT, NULL, 0);
143 #define RTMP_STA_ENTRY_KEY_DEL(pAd, BssIdx, Wcid)
146 #define RTMP_STA_SECURITY_INFO_ADD(pAd, apidx, KeyID, pEntry) \
147 { RTMP_STA_ENTRY_MAC_RESET(pAd, pEntry->Aid); \
154 SetAsicWcidAttri.Cipher = pAd
[all...]
H A Dsta_ioctl.c80 void RTMPAddKey(struct rt_rtmp_adapter *pAd, struct rt_ndis_802_11_key *pKey) argument
87 if (pAd->StaCfg.AuthMode >= Ndis802_11AuthModeWPA) {
89 if (pAd->StaCfg.AuthMode == Ndis802_11AuthModeWPANone) {
90 NdisZeroMemory(pAd->StaCfg.PMK, 32);
91 NdisMoveMemory(pAd->StaCfg.PMK,
97 NdisZeroMemory(&pAd->SharedKey[BSS0][0],
99 pAd->SharedKey[BSS0][0].KeyLen = LEN_TKIP_EK;
100 NdisMoveMemory(pAd->SharedKey[BSS0][0].Key,
103 if (pAd->StaCfg.PairCipher ==
105 NdisMoveMemory(pAd
1505 getBaInfo(struct rt_rtmp_adapter *pAd, char *pOutBuf) argument
1565 struct rt_rtmp_adapter *pAd = NULL; local
2017 struct rt_rtmp_adapter *pAd = NULL; local
2095 struct rt_rtmp_adapter *pAd = NULL; local
2122 struct rt_rtmp_adapter *pAd = NULL; local
2162 struct rt_rtmp_adapter *pAd = NULL; local
2266 struct rt_rtmp_adapter *pAd = NULL; local
2322 struct rt_rtmp_adapter *pAd = NULL; local
2450 struct rt_rtmp_adapter *pAd = NULL; local
[all...]
H A Drtmp_timer.h74 void *pAd; member in struct:rt_ralink_timer
101 _pAd = (struct rt_rtmp_adapter *)_pTimer->pAd; \
H A Dmlme.h128 #define ASIC_LED_ACT_ON(pAd) RTMP_IO_WRITE32(pAd, MAC_CSR14, 0x00031e46)
129 #define ASIC_LED_ACT_OFF(pAd) RTMP_IO_WRITE32(pAd, MAC_CSR14, 0x00001e46)
859 /* Once this attemp succeeds, all settings will be copy to pAd->StaActive. */
862 /* separate this under-trial settings away from pAd->StaActive so that once */
H A Drt_linux.h227 pAd->irq_disabled |= 1; \
232 pAd->irq_disabled &= 0; \
459 dma_addr_t linux_pci_map_single(struct rt_rtmp_adapter *pAd, void *ptr,
461 void linux_pci_unmap_single(struct rt_rtmp_adapter *pAd, dma_addr_t dma_addr,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/common/
H A Dcmm_wpa.c69 static void WpaEAPPacketAction(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem);
71 static void WpaEAPOLASFAlertAction(struct rt_rtmp_adapter *pAd,
74 static void WpaEAPOLLogoffAction(struct rt_rtmp_adapter *pAd,
77 static void WpaEAPOLStartAction(struct rt_rtmp_adapter *pAd,
80 static void WpaEAPOLKeyAction(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem);
90 void WpaStateMachineInit(struct rt_rtmp_adapter *pAd, argument
118 void WpaEAPPacketAction(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem) argument
122 void WpaEAPOLASFAlertAction(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem) argument
126 void WpaEAPOLLogoffAction(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem) argument
137 void WpaEAPOLStartAction(struct rt_rtmp_adapter *pAd, struc argument
190 WpaEAPOLKeyAction(struct rt_rtmp_adapter *pAd, struct rt_mlme_queue_elem *Elem) argument
360 RTMPToWirelessSta(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, u8 *pHeader802_3, u32 HdrLen, u8 *pData, u32 DataLen, IN BOOLEAN bClearFrame) argument
436 WPAStart4WayHS(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, unsigned long TimeInterval) argument
519 PeerPairMsg1Action(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, struct rt_mlme_queue_elem *Elem) argument
612 PeerPairMsg2Action(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, struct rt_mlme_queue_elem *Elem) argument
727 PeerPairMsg3Action(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, struct rt_mlme_queue_elem *Elem) argument
874 PeerPairMsg4Action(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, struct rt_mlme_queue_elem *Elem) argument
993 WPAStart2WayGroupHS(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry) argument
1055 PeerGroupMsg1Action(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, struct rt_mlme_queue_elem *Elem) argument
1134 PeerGroupMsg2Action(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, void * Msg, u32 MsgLen) argument
1402 WpaDerivePTK(struct rt_rtmp_adapter *pAd, u8 * PMK, u8 * ANonce, u8 * AA, u8 * SNonce, u8 * SA, u8 * output, u32 len) argument
1481 GenRandom(struct rt_rtmp_adapter *pAd, u8 * macAddr, u8 * random) argument
1540 RTMPMakeRsnIeCipher(struct rt_rtmp_adapter *pAd, u8 ElementID, u32 WepStatus, IN BOOLEAN bMixCipher, u8 FlexibleCipher, u8 *pRsnIe, u8 * rsn_len) argument
1725 RTMPMakeRsnIeAKM(struct rt_rtmp_adapter *pAd, u8 ElementID, u32 AuthMode, u8 apidx, u8 *pRsnIe, u8 * rsn_len) argument
1806 RTMPMakeRsnIeCap(struct rt_rtmp_adapter *pAd, u8 ElementID, u8 apidx, u8 *pRsnIe, u8 * rsn_len) argument
1843 RTMPMakeRSNIE(struct rt_rtmp_adapter *pAd, u32 AuthMode, u32 WepStatus, u8 apidx) argument
1935 RTMPCheckWPAframe(struct rt_rtmp_adapter *pAd, struct rt_mac_table_entry *pEntry, u8 *pData, unsigned long DataByteCount, u8 FromWhichBSSID) argument
2047 RTMPCheckRSNIE(struct rt_rtmp_adapter *pAd, u8 *pData, u8 DataLen, struct rt_mac_table_entry *pEntry, u8 * Offset) argument
2121 RTMPParseEapolKeyData(struct rt_rtmp_adapter *pAd, u8 *pKeyData, u8 KeyDataLen, u8 GroupKeyIndex, u8 MsgType, IN BOOLEAN bWPA2, struct rt_mac_table_entry *pEntry) argument
2499 struct rt_rtmp_adapter *pAd = pEntry->pAd; local
2717 RTMPSoftDecryptBroadCastData(struct rt_rtmp_adapter *pAd, struct rt_rx_blk *pRxBlk, IN NDIS_802_11_ENCRYPTION_STATUS GroupCipher, struct rt_cipher_key *pShard_key) argument
[all...]
H A Dcmm_wep.c123 pAd Pointer to our adapter
138 void RTMPInitWepEngine(struct rt_rtmp_adapter *pAd, argument
151 pAd->PrivateInfo.FCSCRC32 = PPPINITFCS32; /*Init crc32. */
157 WEPKEY[i] = RandomByte(pAd); /*Call mlme RandomByte() function. */
158 ARCFOUR_INIT(&pAd->PrivateInfo.WEPCONTEXT, WEPKEY, KeyLen + 3); /*INIT SBOX, KEYLEN+3(IV) */
173 pAd Pointer to our adapter
187 void RTMPEncryptData(struct rt_rtmp_adapter *pAd, argument
190 pAd->PrivateInfo.FCSCRC32 =
191 RTMP_CALC_FCS32(pAd->PrivateInfo.FCSCRC32, pSrc, Len);
192 ARCFOUR_ENCRYPT(&pAd
214 RTMPSoftDecryptWEP(struct rt_rtmp_adapter *pAd, u8 *pData, unsigned long DataByteCnt, struct rt_cipher_key *pGroupKey) argument
466 RTMPSetICV(struct rt_rtmp_adapter *pAd, u8 *pDest) argument
[all...]
H A Dcmm_sanity.c61 BOOLEAN MlmeAddBAReqSanity(struct rt_rtmp_adapter *pAd, argument
100 BOOLEAN MlmeDelBAReqSanity(struct rt_rtmp_adapter *pAd, void * Msg, unsigned long MsgLen) argument
124 (pAd->MacTab.Content[pInfo->Wcid].Addr, pInfo->Addr,
134 BOOLEAN PeerAddBAReqActionSanity(struct rt_rtmp_adapter *pAd, argument
174 BOOLEAN PeerAddBARspActionSanity(struct rt_rtmp_adapter *pAd, argument
209 BOOLEAN PeerDelBAActionSanity(struct rt_rtmp_adapter *pAd, argument
243 BOOLEAN PeerBeaconAndProbeRspSanity(struct rt_rtmp_adapter *pAd, void * Msg, unsigned long MsgLen, u8 MsgChannel, u8 *pAddr2, u8 *pBssid, char Ssid[], u8 * pSsidLen, u8 * pBssType, u16 * pBeaconPeriod, u8 * pChannel, u8 * pNewChannel, OUT LARGE_INTEGER * pTimestamp, struct rt_cf_parm * pCfParm, u16 * pAtimWin, u16 * pCapabilityInfo, u8 * pErp, u8 * pDtimCount, u8 * pDtimPeriod, u8 * pBcastFlag, u8 * pMessageToMe, u8 SupRate[], u8 * pSupRateLen, u8 ExtRate[], u8 * pExtRateLen, u8 * pCkipFlag, u8 * pAironetCellPowerLimit, struct rt_edca_parm *pEdcaParm, struct rt_qbss_load_parm *pQbssLoad, struct rt_qos_capability_parm *pQosCapability, unsigned long * pRalinkIe, u8 * pHtCapabilityLen, u8 * pPreNHtCapabilityLen, struct rt_ht_capability_ie * pHtCapability, u8 * AddHtInfoLen, struct rt_add_ht_info_ie * AddHtInfo, u8 * NewExtChannelOffset, /* Ht extension channel offset(above or below) */ argument
276 if (pAd->OpMode == OPMODE_STA)
364 /* RTMPCheckRates(pAd, SupRate, pSupRateLen); */
452 if (ChannelSanity(pAd, *pChanne
733 MlmeScanReqSanity(struct rt_rtmp_adapter *pAd, void * Msg, unsigned long MsgLen, u8 * pBssType, char Ssid[], u8 * pSsidLen, u8 * pScanType) argument
760 ChannelSanity(struct rt_rtmp_adapter *pAd, u8 channel) argument
782 PeerDeauthSanity(struct rt_rtmp_adapter *pAd, void * Msg, unsigned long MsgLen, u8 *pAddr2, u16 * pReason) argument
806 PeerAuthSanity(struct rt_rtmp_adapter *pAd, void * Msg, unsigned long MsgLen, u8 *pAddr, u16 * pAlg, u16 * pSeq, u16 * pStatus, char * pChlgText) argument
856 MlmeAuthReqSanity(struct rt_rtmp_adapter *pAd, void * Msg, unsigned long MsgLen, u8 *pAddr, unsigned long * pTimeout, u16 * pAlg) argument
890 MlmeAssocReqSanity(struct rt_rtmp_adapter *pAd, void * Msg, unsigned long MsgLen, u8 *pApAddr, u16 * pCapabilityInfo, unsigned long * pTimeout, u16 * pListenIntv) argument
919 PeerDisassocSanity(struct rt_rtmp_adapter *pAd, void * Msg, unsigned long MsgLen, u8 *pAddr2, u16 * pReason) argument
1015 PeerWpaMessageSanity(struct rt_rtmp_adapter *pAd, struct rt_eapol_packet * pMsg, unsigned long MsgLen, u8 MsgType, struct rt_mac_table_entry *pEntry) argument
[all...]
H A Dcmm_tkip.c205 pAd Pointer to our adapter
236 pAd Pointer to our adapter
279 pAd Pointer to our adapter
308 pAd Pointer to our adapter
316 the MIC Value is store in pAd->PrivateInfo.MIC
343 pAd Pointer to our adapter
358 void RTMPInitTkipEngine(struct rt_rtmp_adapter *pAd, argument
389 pAd Pointer to our adapter
402 void RTMPInitMICEngine(struct rt_rtmp_adapter *pAd, argument
410 RTMPTkipSetMICKey(&pAd
443 RTMPTkipCompareMICValue(struct rt_rtmp_adapter *pAd, u8 *pSrc, u8 *pDA, u8 *pSA, u8 *pMICKey, u8 UserPriority, u32 Len) argument
503 RTMPCalculateMICValue(struct rt_rtmp_adapter *pAd, void *pPacket, u8 *pEncap, struct rt_cipher_key *pKey, u8 apidx) argument
701 RTMPSoftDecryptTKIP(struct rt_rtmp_adapter *pAd, u8 *pData, unsigned long DataByteCnt, u8 UserPriority, struct rt_cipher_key *pWpaKey) argument
[all...]
H A Dcmm_aes.c411 BOOLEAN RTMPSoftDecryptAES(struct rt_rtmp_adapter *pAd, argument
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/iface/
H A Drtmp_usb.h122 #define RTUSBMlmeUp(pAd) \
124 struct rt_rtmp_os_task *_pTask = &((pAd)->mlmeTask);\
132 #define RTUSBMlmeUp(pAd) \
134 struct rt_rtmp_os_task *_pTask = &((pAd)->mlmeTask);\
143 #define RTUSBCMDUp(pAd) \
145 struct rt_rtmp_os_task *_pTask = &((pAd)->cmdQTask); \
153 #define RTUSBCMDUp(pAd) \
155 struct rt_rtmp_os_task *_pTask = &((pAd)->cmdQTask); \
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/sta/
H A Dsanity.c57 BOOLEAN MlmeStartReqSanity(struct rt_rtmp_adapter *pAd, argument
89 BOOLEAN PeerAssocRspSanity(struct rt_rtmp_adapter *pAd, void * pMsg, unsigned long MsgLen, u8 *pAddr2, u16 * pCapabilityInfo, u16 * pStatus, u16 * pAid, u8 SupRate[], u8 * pSupRateLen, u8 ExtRate[], u8 * pExtRateLen, struct rt_ht_capability_ie * pHtCapability, struct rt_add_ht_info_ie * pAddHtInfo, /* AP might use this additional ht info IE */ argument
257 BOOLEAN PeerProbeReqSanity(struct rt_rtmp_adapter *pAd, argument
292 if ((pAd->CommonCfg.PhyMode == PHY_11G) && (RateLen < 8))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/Micromax/Linux/
H A Djre-1_5_0_15-linux-i586.bin[all...]

Completed in 332 milliseconds

123