Lines Matching refs:rsn_cap
1854 wl_get_mfp_capability(u8 rsn_cap, u32 *wpa_auth, u32 *mfp_val) in wl_get_mfp_capability() argument
1857 if (rsn_cap & RSN_CAP_MFPR) { in wl_get_mfp_capability()
1868 } else if (rsn_cap & RSN_CAP_MFPC) { in wl_get_mfp_capability()
1911 u8 rsn_cap[2]; in wl_validate_wpa2ie() local
2029 rsn_cap[0] = *(const u8 *)&mgmt->list[suite_count]; in wl_validate_wpa2ie()
2030 rsn_cap[1] = *((const u8 *)&mgmt->list[suite_count] + 1); in wl_validate_wpa2ie()
2032 if (rsn_cap[0] & (RSN_CAP_16_REPLAY_CNTRS << RSN_CAP_PTK_REPLAY_CNTR_SHIFT)) { in wl_validate_wpa2ie()
2039 if (wl_get_mfp_capability(rsn_cap[0], &wpa_auth, &mfp) != BCME_OK) { in wl_validate_wpa2ie()
2040 WL_ERR(("mfp configuration invalid. rsn_cap:0x%x\n", rsn_cap[0])); in wl_validate_wpa2ie()
2365 u8 rsn_cap[2]; in wl_validate_wpaie_wpa2ie() local
2491 rsn_cap[0] = *(const u8 *)&mgmt->list[suite_count]; in wl_validate_wpaie_wpa2ie()
2492 rsn_cap[1] = *((const u8 *)&mgmt->list[suite_count] + 1); in wl_validate_wpaie_wpa2ie()
2493 if (rsn_cap[0] & (RSN_CAP_16_REPLAY_CNTRS << RSN_CAP_PTK_REPLAY_CNTR_SHIFT)) { in wl_validate_wpaie_wpa2ie()
2498 WL_DBG(("P:rsn_cap[0]=[0x%X]:wme_bss_disabled[%d]\n", rsn_cap[0], wme_bss_disable)); in wl_validate_wpaie_wpa2ie()
2501 if (wl_get_mfp_capability(rsn_cap[0], &wpa_auth, &mfp) != BCME_OK) { in wl_validate_wpaie_wpa2ie()
2502 WL_ERR(("mfp configuration invalid. rsn_cap:0x%x\n", rsn_cap[0])); in wl_validate_wpaie_wpa2ie()