| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| mesh_rsn.c | 2 * WPA Supplicant - Mesh RSN routines 149 struct mesh_rsn *rsn = ctx; local 153 hapd = rsn->wpa_s->ifmsh->bss[0]; 162 static int __mesh_rsn_auth_init(struct mesh_rsn *rsn, const u8 *addr, 180 conf.wpa_pairwise = rsn->pairwise_cipher; 181 conf.rsn_pairwise = rsn->pairwise_cipher; 182 conf.wpa_group = rsn->group_cipher; 189 conf.group_mgmt_cipher = rsn->mgmt_group_cipher; 194 rsn->auth = wpa_init(addr, &conf, &cb, rsn); [all...] |
| dpp_supplicant.c | 4497 const u8 *rsn; local 4503 rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); 4504 if (rsn && wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 &&
|
| sme.c | 643 const u8 *rsn; local 646 rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); 647 if (!rsn) { 649 "SAE enabled, but target BSS does not advertise RSN"); 651 } else if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 && 656 } else if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 && 667 "SAE enabled, but target BSS does not advertise SAE AKM for RSN"); 719 /* No PMKSA caching, but otherwise similar to RSN/WPA * 839 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local [all...] |
| events.c | 472 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from " 481 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate " 485 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR 687 " skip RSN IE - parse failed"); 711 " selected based on TSN in RSN IE"); 720 " skip RSN IE - proto mismatch"); 727 " skip RSN IE - PTK cipher mismatch"); 734 " skip RSN IE - GTK cipher mismatch"); 742 " skip RSN IE - group mgmt cipher mismatch"); 764 " skip RSN IE - key mgmt mismatch") 2114 const u8 *ssid, *rsn; local [all...] |
| wpa_supplicant.c | 322 * RSN IBSS authentication is per-STA and we can disable the 1680 * @wpa_ie: Buffer for the WPA/RSN IE 1714 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using IEEE 802.11i/D9.0"); 1736 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using OSEN (within RSN)"); 1740 wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to select WPA/RSN"); 1749 bss_rsn ? " RSN" : "", 1752 wpa_hexdump(MSG_DEBUG, "RSN", bss_rsn, 2 + bss_rsn[1]); 1755 "Could not parse RSN element"); 1758 "RSN: pairwise_cipher=0x%x group_cipher=0x%x key_mgmt=0x%x" 4500 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local [all...] |
| /src/dist/pf/usr.sbin/authpf/ |
| authpf.c | 650 char *rsn = NULL, *fn = NULL; local 660 if (asprintf(&rsn, "%s/%s", anchorname, rulesetname) == -1) 682 pargv[5] = rsn; 725 free(rsn);
|
| /src/sys/net80211/ |
| ieee80211_ioctl.c | 1429 const struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; local 1452 ireq->i_val = rsn->rsn_mcastcipher; 1455 ireq->i_val = rsn->rsn_mcastkeylen; 1460 if (rsn->rsn_ucastcipherset & m) 1464 ireq->i_val = rsn->rsn_ucastcipher; 1467 ireq->i_val = rsn->rsn_ucastkeylen; 1470 ireq->i_val = rsn->rsn_keymgmtset; 1473 ireq->i_val = rsn->rsn_caps; 2051 struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; local 2347 rsn->rsn_mcastcipher = ireq->i_val [all...] |
| ieee80211_input.c | 1634 struct ieee80211_rsnparms *rsn, const struct ieee80211_frame *wh) 1673 w = wpa_cipher(frm, &rsn->rsn_mcastkeylen); 1674 if (w != rsn->rsn_mcastcipher) { 1678 w, rsn->rsn_mcastcipher); 1695 w |= 1 << wpa_cipher(frm, &rsn->rsn_ucastkeylen); 1698 w &= rsn->rsn_ucastcipherset; 1706 rsn->rsn_ucastcipher = IEEE80211_CIPHER_TKIP; 1708 rsn->rsn_ucastcipher = IEEE80211_CIPHER_AES_CCM; 1725 w &= rsn->rsn_keymgmtset; 1733 rsn->rsn_keymgmt = WPA_ASE_8021X_UNSPEC 2542 struct ieee80211_rsnparms rsn; local [all...] |
| ieee80211_node.c | 132 struct ieee80211_rsnparms *rsn; local 155 rsn = &ic->ic_bss->ni_rsn; 157 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_WEP; 158 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_TKIP; 159 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_AES_CCM; 161 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_AES_OCB; 163 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_CKIP; 169 rsn->rsn_ucastcipher = IEEE80211_CIPHER_WEP; 170 rsn->rsn_ucastkeylen = 104 / NBBY; 176 rsn->rsn_mcastcipher = IEEE80211_CIPHER_TKIP [all...] |
| ieee80211_output.c | 1098 const struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; local 1111 if (rsn->rsn_mcastcipher == IEEE80211_CIPHER_WEP && 1112 rsn->rsn_mcastkeylen >= 13) 1115 ADDSELECTOR(frm, cipher_suite[rsn->rsn_mcastcipher]); 1120 if (rsn->rsn_ucastcipherset & (1 << IEEE80211_CIPHER_AES_CCM)) { 1124 if (rsn->rsn_ucastcipherset & (1 << IEEE80211_CIPHER_TKIP)) { 1132 if (rsn->rsn_keymgmtset & WPA_ASE_8021X_UNSPEC) { 1136 if (rsn->rsn_keymgmtset & WPA_ASE_8021X_PSK) { 1142 if (rsn->rsn_caps != 0 && rsn->rsn_caps != RSN_CAP_PREAUTH 1183 const struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; local [all...] |
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| wpa.c | 80 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message 299 "RSN: Cannot set low order 256 bits of MSK for key management offload"); 304 "RSN: Cannot set PMK for key management offload"); 318 /* When using drivers that generate RSN IE, wpa_supplicant may 327 "RSN: found matching PMKID from PMKSA cache"); 330 "RSN: no matching PMKID found"); 337 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN); 339 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache", 442 "RSN: the new PMK matches with the " 454 "RSN: PMKID mismatch - authentication server may have derived different MSK?!") 2061 struct wpa_ie_data rsn; local 4787 struct wpa_ie_data rsn; local 4810 struct wpa_ie_data rsn; local 4837 struct wpa_ie_data rsn; local 5560 struct wpa_ie_data rsn; local 6309 struct wpa_ie_data rsn; local [all...] |
| /src/external/bsd/wpa/dist/src/ap/ |
| ieee802_11.c | 1826 struct wpa_ie_data rsn; local 1918 wpa_hexdump(MSG_DEBUG, "FILS: RSN element", 1922 &rsn) < 0) { 1923 wpa_printf(MSG_DEBUG, "FILS: No valid RSN element"); 1933 "FILS: Failed to initialize RSN state machine"); 1958 if (rsn.pmkid && rsn.num_pmkid > 0) { 1963 rsn.pmkid, rsn.num_pmkid * PMKID_LEN); 1965 pmkid = rsn.pmkid 7975 const u8 *auth, *rsn = NULL, *rsnx = NULL; local 8104 const u8 *auth, *rsn = NULL, *rsnx = NULL; local [all...] |
| /src/external/bsd/wpa/dist/src/common/ |
| wpa_common.h | 171 /* IEEE 802.11, 7.3.2.25.3 RSN Capabilities */ 214 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */ 224 #define WPA_KEY_INFO_ENCR_KEY_DATA BIT(12) /* IEEE 802.11i/RSN only */ 237 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ 314 * 2/4: RSN IE 315 * 3/4: one or two RSN IEs + GTK IE (encrypted) 321 /* RSN IE version 1 331 * RSN Capabilities (2 octets, little endian) (default: 0) 583 const u8 *rsn; member in struct:wpa_ft_ies
|