HomeSort by: relevance | last modified time | path
    Searched refs:rsn (Results 1 - 20 of 20) sorted by relevancy

  /src/external/bsd/wpa/dist/wpa_supplicant/
mesh_rsn.c 2 * WPA Supplicant - Mesh RSN routines
149 struct mesh_rsn *rsn = ctx; local
153 hapd = rsn->wpa_s->ifmsh->bss[0];
162 static int __mesh_rsn_auth_init(struct mesh_rsn *rsn, const u8 *addr,
180 conf.wpa_pairwise = rsn->pairwise_cipher;
181 conf.rsn_pairwise = rsn->pairwise_cipher;
182 conf.wpa_group = rsn->group_cipher;
189 conf.group_mgmt_cipher = rsn->mgmt_group_cipher;
194 rsn->auth = wpa_init(addr, &conf, &cb, rsn);
    [all...]
mesh_rsn.h 2 * WPA Supplicant - Mesh RSN routines
34 void mesh_rsn_get_pmkid(struct mesh_rsn *rsn, struct sta_info *sta, u8 *pmkid);
37 int mesh_rsn_protect_frame(struct mesh_rsn *rsn, struct sta_info *sta,
sme.c 643 const u8 *rsn; local
646 rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
647 if (!rsn) {
649 "SAE enabled, but target BSS does not advertise RSN");
651 } else if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 &&
656 } else if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 &&
667 "SAE enabled, but target BSS does not advertise SAE AKM for RSN");
719 /* No PMKSA caching, but otherwise similar to RSN/WPA *
839 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local
    [all...]
dpp_supplicant.c 4497 const u8 *rsn; local
4503 rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
4504 if (rsn && wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0 &&
events.c 472 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from "
481 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: No data in PMKID candidate "
485 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID candidate event - bssid=" MACSTR
687 " skip RSN IE - parse failed");
711 " selected based on TSN in RSN IE");
720 " skip RSN IE - proto mismatch");
727 " skip RSN IE - PTK cipher mismatch");
734 " skip RSN IE - GTK cipher mismatch");
742 " skip RSN IE - group mgmt cipher mismatch");
764 " skip RSN IE - key mgmt mismatch")
2114 const u8 *ssid, *rsn; local
    [all...]
wpa_supplicant.c 322 * RSN IBSS authentication is per-STA and we can disable the
1680 * @wpa_ie: Buffer for the WPA/RSN IE
1714 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using IEEE 802.11i/D9.0");
1736 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using OSEN (within RSN)");
1740 wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to select WPA/RSN");
1749 bss_rsn ? " RSN" : "",
1752 wpa_hexdump(MSG_DEBUG, "RSN", bss_rsn, 2 + bss_rsn[1]);
1755 "Could not parse RSN element");
1758 "RSN: pairwise_cipher=0x%x group_cipher=0x%x key_mgmt=0x%x"
4500 const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN); local
    [all...]
  /src/external/bsd/wpa/dist/src/rsn_supp/
preauth.h 2 * wpa_supplicant - WPA2/RSN pre-authentication functions
22 const u8 *ssid, const u8 *rsn);
56 const u8 *ssid, const u8 *rsn)
preauth.c 2 * RSN pre-authentication (supplicant)
73 wpa_printf(MSG_WARNING, "RSN pre-auth frame received from "
104 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
114 "RSN: failed to get master session key from "
120 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with "
134 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with "
168 * rsn_preauth_init - Start new RSN pre-authentication
176 * This function request an RSN pre-authentication with a given destination
192 "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst));
198 wpa_printf(MSG_WARNING, "RSN: Failed to initialize L2 packet
    [all...]
wpa.c 80 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
299 "RSN: Cannot set low order 256 bits of MSK for key management offload");
304 "RSN: Cannot set PMK for key management offload");
318 /* When using drivers that generate RSN IE, wpa_supplicant may
327 "RSN: found matching PMKID from PMKSA cache");
330 "RSN: no matching PMKID found");
337 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN);
339 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache",
442 "RSN: the new PMK matches with the "
454 "RSN: PMKID mismatch - authentication server may have derived different MSK?!")
2061 struct wpa_ie_data rsn; local
4787 struct wpa_ie_data rsn; local
4810 struct wpa_ie_data rsn; local
4837 struct wpa_ie_data rsn; local
5560 struct wpa_ie_data rsn; local
6309 struct wpa_ie_data rsn; local
    [all...]
wpa_ft.c 194 * @pmk_name: PMKR0Name or PMKR1Name to be added into the RSN IE PMKID List
298 /* RSN Capabilities */
462 * RSN IE
1157 parse.rsn - 2, parse.rsn_len + 2,
1196 parse.rsn - 2, parse.rsn_len + 2)) {
1203 parse.rsn ? parse.rsn - 2 : NULL,
1204 parse.rsn ? parse.rsn_len + 2 : 0);
  /src/sys/net80211/
ieee80211_input.c 1634 struct ieee80211_rsnparms *rsn, const struct ieee80211_frame *wh)
1673 w = wpa_cipher(frm, &rsn->rsn_mcastkeylen);
1674 if (w != rsn->rsn_mcastcipher) {
1678 w, rsn->rsn_mcastcipher);
1695 w |= 1 << wpa_cipher(frm, &rsn->rsn_ucastkeylen);
1698 w &= rsn->rsn_ucastcipherset;
1706 rsn->rsn_ucastcipher = IEEE80211_CIPHER_TKIP;
1708 rsn->rsn_ucastcipher = IEEE80211_CIPHER_AES_CCM;
1725 w &= rsn->rsn_keymgmtset;
1733 rsn->rsn_keymgmt = WPA_ASE_8021X_UNSPEC
2542 struct ieee80211_rsnparms rsn; local
    [all...]
ieee80211_output.c 1098 const struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; local
1111 if (rsn->rsn_mcastcipher == IEEE80211_CIPHER_WEP &&
1112 rsn->rsn_mcastkeylen >= 13)
1115 ADDSELECTOR(frm, cipher_suite[rsn->rsn_mcastcipher]);
1120 if (rsn->rsn_ucastcipherset & (1 << IEEE80211_CIPHER_AES_CCM)) {
1124 if (rsn->rsn_ucastcipherset & (1 << IEEE80211_CIPHER_TKIP)) {
1132 if (rsn->rsn_keymgmtset & WPA_ASE_8021X_UNSPEC) {
1136 if (rsn->rsn_keymgmtset & WPA_ASE_8021X_PSK) {
1142 if (rsn->rsn_caps != 0 && rsn->rsn_caps != RSN_CAP_PREAUTH
1183 const struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; local
    [all...]
ieee80211_node.c 132 struct ieee80211_rsnparms *rsn; local
155 rsn = &ic->ic_bss->ni_rsn;
157 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_WEP;
158 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_TKIP;
159 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_AES_CCM;
161 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_AES_OCB;
163 rsn->rsn_ucastcipherset |= 1<<IEEE80211_CIPHER_CKIP;
169 rsn->rsn_ucastcipher = IEEE80211_CIPHER_WEP;
170 rsn->rsn_ucastkeylen = 104 / NBBY;
176 rsn->rsn_mcastcipher = IEEE80211_CIPHER_TKIP
    [all...]
ieee80211_ioctl.c 1429 const struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; local
1452 ireq->i_val = rsn->rsn_mcastcipher;
1455 ireq->i_val = rsn->rsn_mcastkeylen;
1460 if (rsn->rsn_ucastcipherset & m)
1464 ireq->i_val = rsn->rsn_ucastcipher;
1467 ireq->i_val = rsn->rsn_ucastkeylen;
1470 ireq->i_val = rsn->rsn_keymgmtset;
1473 ireq->i_val = rsn->rsn_caps;
2051 struct ieee80211_rsnparms *rsn = &ic->ic_bss->ni_rsn; local
2347 rsn->rsn_mcastcipher = ireq->i_val
    [all...]
  /src/dist/pf/usr.sbin/authpf/
authpf.c 650 char *rsn = NULL, *fn = NULL; local
660 if (asprintf(&rsn, "%s/%s", anchorname, rulesetname) == -1)
682 pargv[5] = rsn;
725 free(rsn);
  /src/external/bsd/wpa/dist/src/ap/
ieee802_11.c 1826 struct wpa_ie_data rsn; local
1918 wpa_hexdump(MSG_DEBUG, "FILS: RSN element",
1922 &rsn) < 0) {
1923 wpa_printf(MSG_DEBUG, "FILS: No valid RSN element");
1933 "FILS: Failed to initialize RSN state machine");
1958 if (rsn.pmkid && rsn.num_pmkid > 0) {
1963 rsn.pmkid, rsn.num_pmkid * PMKID_LEN);
1965 pmkid = rsn.pmkid
7975 const u8 *auth, *rsn = NULL, *rsnx = NULL; local
8104 const u8 *auth, *rsn = NULL, *rsnx = NULL; local
    [all...]
drv_callbacks.c 315 wpa_printf(MSG_DEBUG, "STA included RSN IE in (Re)AssocReq");
330 "STA did not include WPS/RSN/WPA IE in (Re)AssocReq");
476 "STA did not include WPA/RSN IE in (Re)Association Request - possible WPS use");
482 wpa_printf(MSG_DEBUG, "No WPA/RSN IE from STA");
519 "MLD: Set ML info in RSN Authenticator");
590 "WPA/RSN information element rejected? (res %u)",
1983 const u8 *src, bool rsn,
1997 (!rsn || sta->wpa_sm)) {
2012 (!rsn || sta->wpa_sm)) {
wpa_auth_ft.c 2628 * RSN (only present if this is a Reassociation Response and
3515 if (parse.rsn == NULL) {
3651 parse.rsn - 2, parse.rsn_len + 2,
3672 wpa_hexdump(MSG_MSGDUMP, "FT: RSN",
3673 parse.rsn - 2, parse.rsn_len + 2);
  /src/external/bsd/wpa/dist/src/common/
wpa_common.c 2 * WPA/RSN - Shared functions for supplicant and authenticator
1250 parse->rsn = pos;
1252 ret = wpa_parse_wpa_ie_rsn(parse->rsn - 2,
1257 "RSN IE: %d", ret);
1360 if (parse->rsn)
1367 if (parse->rsn)
1849 * wpa_parse_wpa_ie_rsn - Parse RSN IE
1850 * @rsn_ie: Buffer containing RSN IE
1851 * @rsn_ie_len: RSN IE buffer length (including IE number and length octets)
1873 /* No RSN IE - fail silently *
    [all...]
wpa_common.h 171 /* IEEE 802.11, 7.3.2.25.3 RSN Capabilities */
214 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */
224 #define WPA_KEY_INFO_ENCR_KEY_DATA BIT(12) /* IEEE 802.11i/RSN only */
237 u8 key_id[8]; /* Reserved in IEEE 802.11i/RSN */
314 * 2/4: RSN IE
315 * 3/4: one or two RSN IEs + GTK IE (encrypted)
321 /* RSN IE version 1
331 * RSN Capabilities (2 octets, little endian) (default: 0)
583 const u8 *rsn; member in struct:wpa_ft_ies

Completed in 84 milliseconds