| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| mesh_rsn.c | 2 * WPA Supplicant - Mesh RSN routines 149 struct mesh_rsn *rsn = ctx; local 153 hapd = rsn->wpa_s->ifmsh->bss[0]; 162 static int __mesh_rsn_auth_init(struct mesh_rsn *rsn, const u8 *addr, 180 conf.wpa_pairwise = rsn->pairwise_cipher; 181 conf.rsn_pairwise = rsn->pairwise_cipher; 182 conf.wpa_group = rsn->group_cipher; 189 conf.group_mgmt_cipher = rsn->mgmt_group_cipher; 194 rsn->auth = wpa_init(addr, &conf, &cb, rsn); [all...] |
| mesh_rsn.h | 2 * WPA Supplicant - Mesh RSN routines 34 void mesh_rsn_get_pmkid(struct mesh_rsn *rsn, struct sta_info *sta, u8 *pmkid); 37 int mesh_rsn_protect_frame(struct mesh_rsn *rsn, struct sta_info *sta,
|
| sme.c | 643 const u8 *rsn; local 646 rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); 647 if (!rsn) { 649 "SAE enabled, but target BSS does not advertise RSN"); 651 } else if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 && 656 } else if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 && 667 "SAE enabled, but target BSS does not advertise SAE AKM for RSN"); 719 /* No PMKSA caching, but otherwise similar to RSN/WPA * 839 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local [all...] |
| dpp_supplicant.c | 4497 const u8 *rsn; local 4503 rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); 4504 if (rsn && wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 &&
|
| events.c | 472 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from " 481 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate " 485 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR 687 " skip RSN IE - parse failed"); 711 " selected based on TSN in RSN IE"); 720 " skip RSN IE - proto mismatch"); 727 " skip RSN IE - PTK cipher mismatch"); 734 " skip RSN IE - GTK cipher mismatch"); 742 " skip RSN IE - group mgmt cipher mismatch"); 764 " skip RSN IE - key mgmt mismatch") 2114 const u8 *ssid, *rsn; local [all...] |
| wpa_supplicant.c | 322 * RSN IBSS authentication is per-STA and we can disable the 1680 * @wpa_ie: Buffer for the WPA/RSN IE 1714 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using IEEE 802.11i/D9.0"); 1736 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using OSEN (within RSN)"); 1740 wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to select WPA/RSN"); 1749 bss_rsn ? " RSN" : "", 1752 wpa_hexdump(MSG_DEBUG, "RSN", bss_rsn, 2 + bss_rsn[1]); 1755 "Could not parse RSN element"); 1758 "RSN: pairwise_cipher=0x%x group_cipher=0x%x key_mgmt=0x%x" 4500 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local [all...] |
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| preauth.h | 2 * wpa_supplicant - WPA2/RSN pre-authentication functions 22 const u8 *ssid, const u8 *rsn); 56 const u8 *ssid, const u8 *rsn)
|
| preauth.c | 2 * RSN pre-authentication (supplicant) 73 wpa_printf(MSG_WARNING, "RSN pre-auth frame received from " 104 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth", 114 "RSN: failed to get master session key from " 120 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with " 134 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with " 168 * rsn_preauth_init - Start new RSN pre-authentication 176 * This function request an RSN pre-authentication with a given destination 192 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst)); 198 wpa_printf(MSG_WARNING, "RSN: Failed to initialize L2 packet [all...] |
| wpa.c | 80 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message 299 "RSN: Cannot set low order 256 bits of MSK for key management offload"); 304 "RSN: Cannot set PMK for key management offload"); 318 /* When using drivers that generate RSN IE, wpa_supplicant may 327 "RSN: found matching PMKID from PMKSA cache"); 330 "RSN: no matching PMKID found"); 337 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN); 339 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache", 442 "RSN: the new PMK matches with the " 454 "RSN: PMKID mismatch - authentication server may have derived different MSK?!") 2061 struct wpa_ie_data rsn; local 4787 struct wpa_ie_data rsn; local 4810 struct wpa_ie_data rsn; local 4837 struct wpa_ie_data rsn; local 5560 struct wpa_ie_data rsn; local 6309 struct wpa_ie_data rsn; local [all...] |
| wpa_ft.c | 194 * @pmk_name: PMKR0Name or PMKR1Name to be added into the RSN IE PMKID List 298 /* RSN Capabilities */ 462 * RSN IE 1157 parse.rsn - 2, parse.rsn_len + 2, 1196 parse.rsn - 2, parse.rsn_len + 2)) { 1203 parse.rsn ? parse.rsn - 2 : NULL, 1204 parse.rsn ? parse.rsn_len + 2 : 0);
|
| /src/sys/net80211/ |
| ieee80211_input.c | 1634 struct ieee80211_rsnparms *rsn, const struct ieee80211_frame *wh) 1673 w = wpa_cipher(frm, &rsn->rsn_mcastkeylen); 1674 if (w != rsn->rsn_mcastcipher) { 1678 w, rsn->rsn_mcastcipher); 1695 w |= 1 << wpa_cipher(frm, &rsn->rsn_ucastkeylen); 1698 w &= rsn->rsn_ucastcipherset; 1706 rsn->rsn_ucastcipher = IEEE80211_CIPHER_TKIP; 1708 rsn->rsn_ucastcipher = IEEE80211_CIPHER_AES_CCM; 1725 w &= rsn->rsn_keymgmtset; 1733 rsn->rsn_keymgmt = WPA_ASE_8021X_UNSPEC 2542 struct ieee80211_rsnparms rsn; local [all...] |
| ieee80211_output.c | 1098 const struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; local 1111 if (rsn->rsn_mcastcipher == IEEE80211_CIPHER_WEP && 1112 rsn->rsn_mcastkeylen >= 13) 1115 ADDSELECTOR(frm, cipher_suite[rsn->rsn_mcastcipher]); 1120 if (rsn->rsn_ucastcipherset & (1 << IEEE80211_CIPHER_AES_CCM)) { 1124 if (rsn->rsn_ucastcipherset & (1 << IEEE80211_CIPHER_TKIP)) { 1132 if (rsn->rsn_keymgmtset & WPA_ASE_8021X_UNSPEC) { 1136 if (rsn->rsn_keymgmtset & WPA_ASE_8021X_PSK) { 1142 if (rsn->rsn_caps != 0 && rsn->rsn_caps != RSN_CAP_PREAUTH 1183 const struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; local [all...] |
| ieee80211_node.c | 132 struct ieee80211_rsnparms *rsn; local 155 rsn = &ic->ic_bss->ni_rsn; 157 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_WEP; 158 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_TKIP; 159 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_AES_CCM; 161 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_AES_OCB; 163 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_CKIP; 169 rsn->rsn_ucastcipher = IEEE80211_CIPHER_WEP; 170 rsn->rsn_ucastkeylen = 104 / NBBY; 176 rsn->rsn_mcastcipher = IEEE80211_CIPHER_TKIP [all...] |
| ieee80211_ioctl.c | 1429 const struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; local 1452 ireq->i_val = rsn->rsn_mcastcipher; 1455 ireq->i_val = rsn->rsn_mcastkeylen; 1460 if (rsn->rsn_ucastcipherset & m) 1464 ireq->i_val = rsn->rsn_ucastcipher; 1467 ireq->i_val = rsn->rsn_ucastkeylen; 1470 ireq->i_val = rsn->rsn_keymgmtset; 1473 ireq->i_val = rsn->rsn_caps; 2051 struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; local 2347 rsn->rsn_mcastcipher = ireq->i_val [all...] |
| /src/dist/pf/usr.sbin/authpf/ |
| authpf.c | 650 char *rsn = NULL, *fn = NULL; local 660 if (asprintf(&rsn, "%s/%s", anchorname, rulesetname) == -1) 682 pargv[5] = rsn; 725 free(rsn);
|
| /src/external/bsd/wpa/dist/src/ap/ |
| ieee802_11.c | 1826 struct wpa_ie_data rsn; local 1918 wpa_hexdump(MSG_DEBUG, "FILS: RSN element", 1922 &rsn) < 0) { 1923 wpa_printf(MSG_DEBUG, "FILS: No valid RSN element"); 1933 "FILS: Failed to initialize RSN state machine"); 1958 if (rsn.pmkid && rsn.num_pmkid > 0) { 1963 rsn.pmkid, rsn.num_pmkid * PMKID_LEN); 1965 pmkid = rsn.pmkid 7975 const u8 *auth, *rsn = NULL, *rsnx = NULL; local 8104 const u8 *auth, *rsn = NULL, *rsnx = NULL; local [all...] |
| drv_callbacks.c | 315 wpa_printf(MSG_DEBUG, "STA included RSN IE in (Re)AssocReq"); 330 "STA did not include WPS/RSN/WPA IE in (Re)AssocReq"); 476 "STA did not include WPA/RSN IE in (Re)Association Request - possible WPS use"); 482 wpa_printf(MSG_DEBUG, "No WPA/RSN IE from STA"); 519 "MLD: Set ML info in RSN Authenticator"); 590 "WPA/RSN information element rejected? (res %u)", 1983 const u8 *src, bool rsn, 1997 (!rsn || sta->wpa_sm)) { 2012 (!rsn || sta->wpa_sm)) {
|
| wpa_auth_ft.c | 2628 * RSN (only present if this is a Reassociation Response and 3515 if (parse.rsn == NULL) { 3651 parse.rsn - 2, parse.rsn_len + 2, 3672 wpa_hexdump(MSG_MSGDUMP, "FT: RSN", 3673 parse.rsn - 2, parse.rsn_len + 2);
|
| /src/external/bsd/wpa/dist/src/common/ |
| wpa_common.c | 2 * WPA/RSN - Shared functions for supplicant and authenticator 1250 parse->rsn = pos; 1252 ret = wpa_parse_wpa_ie_rsn(parse->rsn - 2, 1257 "RSN IE: %d", ret); 1360 if (parse->rsn) 1367 if (parse->rsn) 1849 * wpa_parse_wpa_ie_rsn - Parse RSN IE 1850 * @rsn_ie: Buffer containing RSN IE 1851 * @rsn_ie_len: RSN IE buffer length (including IE number and length octets) 1873 /* No RSN IE - fail silently * [all...] |
| wpa_common.h | 171 /* IEEE 802.11, 7.3.2.25.3 RSN Capabilities */ 214 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */ 224 #define WPA_KEY_INFO_ENCR_KEY_DATA BIT(12) /* IEEE 802.11i/RSN only */ 237 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */ 314 * 2/4: RSN IE 315 * 3/4: one or two RSN IEs + GTK IE (encrypted) 321 /* RSN IE version 1 331 * RSN Capabilities (2 octets, little endian) (default: 0) 583 const u8 *rsn; member in struct:wpa_ft_ies
|