HomeSort by: relevance | last modified time | path
    Searched defs:rsn (Results 1 - 13 of 13) sorted by relevancy

  /src/external/bsd/wpa/dist/wpa_supplicant/
mesh_rsn.c 2 * WPA Supplicant - Mesh RSN routines
149 struct mesh_rsn *rsn = ctx; local
153 hapd = rsn->wpa_s->ifmsh->bss[0];
162 static int __mesh_rsn_auth_init(struct mesh_rsn *rsn, const u8 *addr,
180 conf.wpa_pairwise = rsn->pairwise_cipher;
181 conf.rsn_pairwise = rsn->pairwise_cipher;
182 conf.wpa_group = rsn->group_cipher;
189 conf.group_mgmt_cipher = rsn->mgmt_group_cipher;
194 rsn->auth = wpa_init(addr, &conf, &cb, rsn);
    [all...]
dpp_supplicant.c 4497 const u8 *rsn; local
4503 rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
4504 if (rsn && wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 &&
sme.c 643 const u8 *rsn; local
646 rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
647 if (!rsn) {
649 "SAE enabled, but target BSS does not advertise RSN");
651 } else if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 &&
656 } else if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 &&
667 "SAE enabled, but target BSS does not advertise SAE AKM for RSN");
719 /* No PMKSA caching, but otherwise similar to RSN/WPA *
839 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local
    [all...]
events.c 472 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from "
481 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate "
485 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR
687 " skip RSN IE - parse failed");
711 " selected based on TSN in RSN IE");
720 " skip RSN IE - proto mismatch");
727 " skip RSN IE - PTK cipher mismatch");
734 " skip RSN IE - GTK cipher mismatch");
742 " skip RSN IE - group mgmt cipher mismatch");
764 " skip RSN IE - key mgmt mismatch")
2114 const u8 *ssid, *rsn; local
    [all...]
wpa_supplicant.c 322 * RSN IBSS authentication is per-STA and we can disable the
1680 * @wpa_ie: Buffer for the WPA/RSN IE
1714 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using IEEE 802.11i/D9.0");
1736 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using OSEN (within RSN)");
1740 wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to select WPA/RSN");
1749 bss_rsn ? " RSN" : "",
1752 wpa_hexdump(MSG_DEBUG, "RSN", bss_rsn, 2 + bss_rsn[1]);
1755 "Could not parse RSN element");
1758 "RSN: pairwise_cipher=0x%x group_cipher=0x%x key_mgmt=0x%x"
4500 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local
    [all...]
  /src/dist/pf/usr.sbin/authpf/
authpf.c 650 char *rsn = NULL, *fn = NULL; local
660 if (asprintf(&rsn, "%s/%s", anchorname, rulesetname) == -1)
682 pargv[5] = rsn;
725 free(rsn);
  /src/sys/net80211/
ieee80211_ioctl.c 1429 const struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; local
1452 ireq->i_val = rsn->rsn_mcastcipher;
1455 ireq->i_val = rsn->rsn_mcastkeylen;
1460 if (rsn->rsn_ucastcipherset & m)
1464 ireq->i_val = rsn->rsn_ucastcipher;
1467 ireq->i_val = rsn->rsn_ucastkeylen;
1470 ireq->i_val = rsn->rsn_keymgmtset;
1473 ireq->i_val = rsn->rsn_caps;
2051 struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; local
2347 rsn->rsn_mcastcipher = ireq->i_val
    [all...]
ieee80211_input.c 1634 struct ieee80211_rsnparms *rsn, const struct ieee80211_frame *wh)
1673 w = wpa_cipher(frm, &rsn->rsn_mcastkeylen);
1674 if (w != rsn->rsn_mcastcipher) {
1678 w, rsn->rsn_mcastcipher);
1695 w |= 1 << wpa_cipher(frm, &rsn->rsn_ucastkeylen);
1698 w &= rsn->rsn_ucastcipherset;
1706 rsn->rsn_ucastcipher = IEEE80211_CIPHER_TKIP;
1708 rsn->rsn_ucastcipher = IEEE80211_CIPHER_AES_CCM;
1725 w &= rsn->rsn_keymgmtset;
1733 rsn->rsn_keymgmt = WPA_ASE_8021X_UNSPEC
2542 struct ieee80211_rsnparms rsn; local
    [all...]
ieee80211_node.c 132 struct ieee80211_rsnparms *rsn; local
155 rsn = &ic->ic_bss->ni_rsn;
157 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_WEP;
158 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_TKIP;
159 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_AES_CCM;
161 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_AES_OCB;
163 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_CKIP;
169 rsn->rsn_ucastcipher = IEEE80211_CIPHER_WEP;
170 rsn->rsn_ucastkeylen = 104 / NBBY;
176 rsn->rsn_mcastcipher = IEEE80211_CIPHER_TKIP
    [all...]
ieee80211_output.c 1098 const struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; local
1111 if (rsn->rsn_mcastcipher == IEEE80211_CIPHER_WEP &&
1112 rsn->rsn_mcastkeylen >= 13)
1115 ADDSELECTOR(frm, cipher_suite[rsn->rsn_mcastcipher]);
1120 if (rsn->rsn_ucastcipherset & (1 << IEEE80211_CIPHER_AES_CCM)) {
1124 if (rsn->rsn_ucastcipherset & (1 << IEEE80211_CIPHER_TKIP)) {
1132 if (rsn->rsn_keymgmtset & WPA_ASE_8021X_UNSPEC) {
1136 if (rsn->rsn_keymgmtset & WPA_ASE_8021X_PSK) {
1142 if (rsn->rsn_caps != 0 && rsn->rsn_caps != RSN_CAP_PREAUTH
1183 const struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; local
    [all...]
  /src/external/bsd/wpa/dist/src/rsn_supp/
wpa.c 80 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
299 "RSN: Cannot set low order 256 bits of MSK for key management offload");
304 "RSN: Cannot set PMK for key management offload");
318 /* When using drivers that generate RSN IE, wpa_supplicant may
327 "RSN: found matching PMKID from PMKSA cache");
330 "RSN: no matching PMKID found");
337 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN);
339 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache",
442 "RSN: the new PMK matches with the "
454 "RSN: PMKID mismatch - authentication server may have derived different MSK?!")
2061 struct wpa_ie_data rsn; local
4787 struct wpa_ie_data rsn; local
4810 struct wpa_ie_data rsn; local
4837 struct wpa_ie_data rsn; local
5560 struct wpa_ie_data rsn; local
6309 struct wpa_ie_data rsn; local
    [all...]
  /src/external/bsd/wpa/dist/src/ap/
ieee802_11.c 1826 struct wpa_ie_data rsn; local
1918 wpa_hexdump(MSG_DEBUG, "FILS: RSN element",
1922 &rsn) < 0) {
1923 wpa_printf(MSG_DEBUG, "FILS: No valid RSN element");
1933 "FILS: Failed to initialize RSN state machine");
1958 if (rsn.pmkid && rsn.num_pmkid > 0) {
1963 rsn.pmkid, rsn.num_pmkid * PMKID_LEN);
1965 pmkid = rsn.pmkid
7975 const u8 *auth, *rsn = NULL, *rsnx = NULL; local
8104 const u8 *auth, *rsn = NULL, *rsnx = NULL; local
    [all...]
  /src/external/bsd/wpa/dist/src/common/
wpa_common.h 171 /* IEEE 802.11, 7.3.2.25.3 RSN Capabilities */
214 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */
224 #define WPA_KEY_INFO_ENCR_KEY_DATA BIT(12) /* IEEE 802.11i/RSN only */
237 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */
314 * 2/4: RSN IE
315 * 3/4: one or two RSN IEs + GTK IE (encrypted)
321 /* RSN IE version 1
331 * RSN Capabilities (2 octets, little endian) (default: 0)
583 const u8 *rsn; member in struct:wpa_ft_ies

Completed in 48 milliseconds