Lines Matching defs:wpa
1570 * Convert a WPA cipher selector OUI to an internal
1601 * Convert a WPA key management/authentication algorithm
1623 * Parse a WPA information element to collect parameters
1638 wh, "WPA", "not WPA, flags 0x%x", ic->ic_flags);
1650 wh, "WPA", "too short, len %u", len);
1662 wh, "WPA", "bad version %u", w);
1672 wh, "WPA", "mcast cipher mismatch; got %u, expected %u",
1684 wh, "WPA", "ucast cipher data too short; len %u, n %u",
1697 wh, "WPA", "%s", "ucast cipher set empty");
1711 wh, "WPA", "key mgmt alg data too short; len %u, n %u",
1724 wh, "WPA", "%s", "no acceptable key mgmt alg");
1794 * Parse a WPA/RSN information element to collect parameters
1809 wh, "WPA", "not RSN, flags 0x%x", ic->ic_flags);
2099 * [tlv] WPA or RSN
2532 u_int8_t *ssid, *rates, *xrates, *wpa, *wme;
2566 * [tlv] WPA or RSN
2584 ssid = rates = xrates = wpa = wme = NULL;
2598 /* XXX verify only one of RSN and WPA ie's? */
2600 wpa = frm;
2604 wpa = frm;
2631 if (wpa == NULL && (ic->ic_flags & IEEE80211_F_WPA)) {
2634 "[%s] no WPA/RSN IE in association request\n",
2642 /* XXX distinguish WPA/RSN? */
2647 if (wpa != NULL) {
2649 * Parse WPA information element. Note that
2656 if (wpa[0] != IEEE80211_ELEMID_RSN)
2657 reason = ieee80211_parse_wpa(ic, wpa, &rsn, wh);
2659 reason = ieee80211_parse_rsn(ic, wpa, &rsn, wh);
2666 /* XXX distinguish WPA/RSN? */
2675 wpa[0] != IEEE80211_ELEMID_RSN ? "WPA" : "RSN",
2731 if (wpa != NULL) {
2733 * Record WPA/RSN parameters for station, mark
2734 * node as using WPA and record information element
2738 ieee80211_saveie(&ni->ni_wpa_ie, wpa);