Lines Matching refs:sme

454 	struct cfg80211_connect_params *sme);
457 struct cfg80211_connect_params *sme, u32 changed);
681 struct cfg80211_connect_params *sme);
683 struct cfg80211_connect_params *sme);
685 struct cfg80211_connect_params *sme);
687 struct cfg80211_connect_params *sme);
689 struct cfg80211_connect_params *sme);
692 struct cfg80211_connect_params *sme);
697 struct cfg80211_connect_params *sme);
4465 wl_set_wpa_version(struct net_device *dev, struct cfg80211_connect_params *sme) in wl_set_wpa_version() argument
4478 if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_1) in wl_set_wpa_version()
4481 else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2) in wl_set_wpa_version()
4487 if (is_wps_conn(sme)) in wl_set_wpa_version()
4497 sec->wpa_versions = sme->crypto.wpa_versions; in wl_set_wpa_version()
4503 wl_set_set_wapi_ie(struct net_device *dev, struct cfg80211_connect_params *sme) in wl_set_set_wapi_ie() argument
4515 err = wldev_iovar_setbuf_bsscfg(dev, "wapiie", (const void *)sme->ie, sme->ie_len, in wl_set_set_wapi_ie()
4527 wl_set_auth_type(struct net_device *dev, struct cfg80211_connect_params *sme) in wl_set_auth_type() argument
4540 switch (sme->auth_type) { in wl_set_auth_type()
4570 if (!wl_is_pmkid_available(dev, sme->bssid)) in wl_set_auth_type()
4586 WL_ERR(("invalid auth type (%d)\n", sme->auth_type)); in wl_set_auth_type()
4597 sec->auth_type = sme->auth_type; in wl_set_auth_type()
4642 wl_set_set_cipher(struct net_device *dev, struct cfg80211_connect_params *sme) in wl_set_set_cipher() argument
4666 if (sme->crypto.n_ciphers_pairwise) { in wl_set_set_cipher()
4667 pval = wl_rsn_cipher_wsec_algo_lookup(sme->crypto.ciphers_pairwise[0]); in wl_set_set_cipher()
4670 sme->crypto.ciphers_pairwise[0])); in wl_set_set_cipher()
4673 switch (sme->crypto.ciphers_pairwise[0]) { in wl_set_set_cipher()
4678 if (!IS_WAPI_VER(sme->crypto.wpa_versions)) { in wl_set_set_cipher()
4679 WL_ERR(("Invalid WAPI version %d\n", sme->crypto.wpa_versions)); in wl_set_set_cipher()
4684 err = wl_set_set_wapi_ie(dev, sme); in wl_set_set_cipher()
4705 sme->crypto.ciphers_pairwise[0])); in wl_set_set_cipher()
4729 if (sme->crypto.cipher_group) { in wl_set_set_cipher()
4730 gval = wl_rsn_cipher_wsec_algo_lookup(sme->crypto.cipher_group); in wl_set_set_cipher()
4732 WL_ERR(("invalid cipher group (0x%x)\n", sme->crypto.cipher_group)); in wl_set_set_cipher()
4735 switch (sme->crypto.cipher_group) { in wl_set_set_cipher()
4747 wl_rsn_cipher_wsec_key_algo_lookup(sme->crypto.cipher_group)); in wl_set_set_cipher()
4761 if (is_wps_conn(sme)) { in wl_set_set_cipher()
4762 if (sme->privacy) { in wl_set_set_cipher()
4771 if (sme->crypto.cipher_group == WLAN_CIPHER_SUITE_SMS4) { in wl_set_set_cipher()
4795 sec->cipher_pairwise = sme->crypto.ciphers_pairwise[0]; in wl_set_set_cipher()
4796 sec->cipher_group = sme->crypto.cipher_group; in wl_set_set_cipher()
4911 struct cfg80211_connect_params *sme) in wl_cfg80211_set_mfp() argument
4924 if (!sme) { in wl_cfg80211_set_mfp()
4936 if (((wpa2_ie = bcm_parse_tlvs((const u8 *)sme->ie, sme->ie_len, in wl_cfg80211_set_mfp()
4942 if (sme->mfp) in wl_cfg80211_set_mfp()
5078 wl_set_fils_params(struct net_device *dev, struct cfg80211_connect_params *sme) in wl_set_fils_params() argument
5086 if ((sme->auth_type != NL80211_AUTHTYPE_FILS_SK) && in wl_set_fils_params()
5087 (sme->auth_type != NL80211_AUTHTYPE_FILS_SK_PFS) && in wl_set_fils_params()
5088 (sme->auth_type != NL80211_AUTHTYPE_FILS_PK)) { in wl_set_fils_params()
5091 if (sme->fils_erp_rrk_len > WL_MAX_FILS_KEY_LEN) { in wl_set_fils_params()
5097 buf_size = sme->fils_erp_username_len + sme->fils_erp_realm_len + sme->fils_erp_rrk_len + in wl_set_fils_params()
5098 sizeof(sme->fils_erp_next_seq_num) + in wl_set_fils_params()
5123 if (sme->fils_erp_username_len && sme->fils_erp_username != NULL) { in wl_set_fils_params()
5125 sme->fils_erp_username, sme->fils_erp_username_len); in wl_set_fils_params()
5131 if (sme->fils_erp_realm_len && sme->fils_erp_realm != NULL) { in wl_set_fils_params()
5133 sme->fils_erp_realm, sme->fils_erp_realm_len); in wl_set_fils_params()
5139 if (sme->fils_erp_rrk_len && sme->fils_erp_rrk != NULL) { in wl_set_fils_params()
5141 sme->fils_erp_rrk, sme->fils_erp_rrk_len); in wl_set_fils_params()
5148 (u8 *)&sme->fils_erp_next_seq_num, sizeof(sme->fils_erp_next_seq_num)); in wl_set_fils_params()
5218 wl_set_key_mgmt(struct net_device *dev, struct cfg80211_connect_params *sme) in wl_set_key_mgmt() argument
5231 if (sme->crypto.n_akm_suites) { in wl_set_key_mgmt()
5239 switch (sme->crypto.akm_suites[0]) { in wl_set_key_mgmt()
5248 sme->crypto.akm_suites[0])); in wl_set_key_mgmt()
5253 switch (sme->crypto.akm_suites[0]) { in wl_set_key_mgmt()
5305 val = wl_rsn_akm_wpa_auth_lookup(sme->crypto.akm_suites[0]); in wl_set_key_mgmt()
5315 sme->crypto.akm_suites[0])); in wl_set_key_mgmt()
5322 switch (sme->crypto.akm_suites[0]) { in wl_set_key_mgmt()
5331 sme->crypto.akm_suites[0])); in wl_set_key_mgmt()
5347 if ((err = wl_cfg80211_set_mfp(cfg, dev, sme)) < 0) { in wl_set_key_mgmt()
5361 sec->wpa_auth = sme->crypto.akm_suites[0]; in wl_set_key_mgmt()
5369 struct cfg80211_connect_params *sme) in wl_set_set_sharedkey() argument
5383 WL_DBG(("key len (%d)\n", sme->key_len)); in wl_set_set_sharedkey()
5384 if (sme->key_len) { in wl_set_set_sharedkey()
5399 key.len = (u32) sme->key_len; in wl_set_set_sharedkey()
5400 key.index = (u32) sme->key_idx; in wl_set_set_sharedkey()
5405 memcpy(key.data, sme->key, key.len); in wl_set_set_sharedkey()
5412 sme->crypto.ciphers_pairwise[0])); in wl_set_set_sharedkey()
5578 struct cfg80211_connect_params *sme, u32 changed) in wl_cfg80211_update_connect_params() argument
5583 err = wl_set_fils_params(dev, sme); in wl_cfg80211_update_connect_params()
5594 err = wl_set_auth_type(dev, sme); in wl_cfg80211_update_connect_params()
5605 VNDR_IE_ASSOCREQ_FLAG, sme->ie, sme->ie_len); in wl_cfg80211_update_connect_params()
5654 struct net_device *dev, struct cfg80211_connect_params *sme) in wl_do_preassoc_ops() argument
5724 WL_DBG(("SME IE : len=%zu\n", sme->ie_len)); in wl_do_preassoc_ops()
5725 if (sme->ie != NULL && sme->ie_len > 0 && (wl_dbg_level & WL_DBG_DBG)) { in wl_do_preassoc_ops()
5726 prhex(NULL, sme->ie, sme->ie_len); in wl_do_preassoc_ops()
5735 struct net_device *dev, struct cfg80211_connect_params *sme) in wl_config_assoc_security() argument
5739 err = wl_set_wpa_version(dev, sme); in wl_config_assoc_security()
5745 err = wl_set_auth_type(dev, sme); in wl_config_assoc_security()
5752 if (sme->ie && sme->ie_len) { in wl_config_assoc_security()
5753 err = wl_fils_add_hlp_container(cfg, dev, sme->ie, sme->ie_len); in wl_config_assoc_security()
5761 err = wl_set_set_cipher(dev, sme); in wl_config_assoc_security()
5767 err = wl_set_key_mgmt(dev, sme); in wl_config_assoc_security()
5773 err = wl_set_set_sharedkey(dev, sme); in wl_config_assoc_security()
5780 err = wl_set_fils_params(dev, sme); in wl_config_assoc_security()
5793 struct cfg80211_connect_params *sme, wlcfg_assoc_info_t *info) in wl_config_assoc_ies() argument
5804 VNDR_IE_ASSOCREQ_FLAG, sme->ie, sme->ie_len); in wl_config_assoc_ies()
5808 (const u8*)sme->ie, sme->ie_len)) < 0) { in wl_config_assoc_ies()
5814 if ((wpa2_ie = bcm_parse_tlvs((const u8 *)sme->ie, sme->ie_len, in wl_config_assoc_ies()
5820 if ((wpa_ie = wl_cfgp2p_find_wpaie(sme->ie, in wl_config_assoc_ies()
5821 sme->ie_len)) != NULL) { in wl_config_assoc_ies()
6006 struct cfg80211_connect_params *sme, wlcfg_assoc_info_t *info) in wl_handle_assoc_hints() argument
6013 if (!sme || !info) { in wl_handle_assoc_hints()
6018 if (unlikely(!sme->ssid) || (sme->ssid_len > DOT11_MAX_SSID_LEN)) { in wl_handle_assoc_hints()
6019 WL_ERR(("Invalid ssid %p. len:%zu\n", sme->ssid, sme->ssid_len)); in wl_handle_assoc_hints()
6024 info->ssid_len = sme->ssid_len; in wl_handle_assoc_hints()
6026 sme->ssid, info->ssid_len) != BCME_OK) { in wl_handle_assoc_hints()
6032 if (sme->bssid && !ETHER_ISBCAST(sme->bssid)) { in wl_handle_assoc_hints()
6035 (void)memcpy_s(info->bssid, ETH_ALEN, sme->bssid, ETH_ALEN); in wl_handle_assoc_hints()
6036 if (sme->channel && ((chspec = in wl_handle_assoc_hints()
6037 wl_freq_to_chanspec(sme->channel->center_freq)) != INVCHANSPEC)) { in wl_handle_assoc_hints()
6064 wl_cfg80211_is_oce_ap(wiphy, sme->bssid_hint); in wl_handle_assoc_hints()
6070 if (!skip_hints && sme->bssid_hint && !ETHER_ISBCAST(sme->bssid_hint)) { in wl_handle_assoc_hints()
6071 WL_INFORM_MEM(("bssid_hint "MACDBG" \n", MAC2STRDBG(sme->bssid_hint))); in wl_handle_assoc_hints()
6077 (void)memcpy_s(info->bssid, ETH_ALEN, sme->bssid_hint, ETH_ALEN); in wl_handle_assoc_hints()
6082 if (sme->channel_hint && ((chspec = wl_freq_to_chanspec( in wl_handle_assoc_hints()
6083 sme->channel_hint->center_freq)) != INVCHANSPEC)) { in wl_handle_assoc_hints()
6363 struct cfg80211_connect_params *sme) in wl_cfg80211_connect() argument
6369 WL_DBG(("Enter len=%zu\n", sme->ie_len)); in wl_cfg80211_connect()
6381 err = wl_do_preassoc_ops(cfg, dev, sme); in wl_cfg80211_connect()
6387 err = wl_handle_assoc_hints(cfg, dev, sme, &assoc_info); in wl_cfg80211_connect()
6407 err = wl_config_assoc_security(cfg, dev, sme); in wl_cfg80211_connect()
6419 err = wl_config_assoc_ies(cfg, dev, sme, &assoc_info); in wl_cfg80211_connect()