/linux-4.4.14/net/wireless/ |
H A D | Makefile | 13 cfg80211-y += mlme.o ibss.o sme.o chan.o ethtool.o mesh.o ap.o trace.o ocb.o 15 cfg80211-$(CONFIG_CFG80211_WEXT) += wext-compat.o wext-sme.o
|
H A D | trace.h | 1213 struct cfg80211_connect_params *sme), 1214 TP_ARGS(wiphy, netdev, sme), 1228 MAC_ASSIGN(bssid, sme->bssid); 1230 memcpy(__entry->ssid, sme->ssid, sme->ssid_len); 1231 __entry->auth_type = sme->auth_type; 1232 __entry->privacy = sme->privacy; 1233 __entry->wpa_versions = sme->crypto.wpa_versions; 1234 __entry->flags = sme->flags;
|
H A D | rdev-ops.h | 476 struct cfg80211_connect_params *sme) rdev_connect() 479 trace_rdev_connect(&rdev->wiphy, dev, sme); rdev_connect() 480 ret = rdev->ops->connect(&rdev->wiphy, dev, sme); rdev_connect() 474 rdev_connect(struct cfg80211_registered_device *rdev, struct net_device *dev, struct cfg80211_connect_params *sme) rdev_connect() argument
|
/linux-4.4.14/drivers/staging/wlan-ng/ |
H A D | cfg80211.c | 489 struct cfg80211_connect_params *sme) prism2_connect() 492 struct ieee80211_channel *channel = sme->channel; prism2_connect() 495 int length = sme->ssid_len; prism2_connect() 497 int is_wep = (sme->crypto.cipher_group == WLAN_CIPHER_SUITE_WEP40) || prism2_connect() 498 (sme->crypto.cipher_group == WLAN_CIPHER_SUITE_WEP104); prism2_connect() 513 if ((sme->auth_type == NL80211_AUTHTYPE_OPEN_SYSTEM) || prism2_connect() 514 ((sme->auth_type == NL80211_AUTHTYPE_AUTOMATIC) && !is_wep)) prism2_connect() 516 else if ((sme->auth_type == NL80211_AUTHTYPE_SHARED_KEY) || prism2_connect() 517 ((sme->auth_type == NL80211_AUTHTYPE_AUTOMATIC) && is_wep)) prism2_connect() 522 sme->auth_type); prism2_connect() 526 if (sme->key) { prism2_connect() 529 sme->key_idx); prism2_connect() 534 switch (sme->key_idx) { prism2_connect() 557 did, sme->key_len, prism2_connect() 558 (u8 *)sme->key); prism2_connect() 565 We could possibly use sme->privacy here, but the assumption prism2_connect() 600 memcpy(msg_join.ssid.data.data, sme->ssid, length); prism2_connect() 488 prism2_connect(struct wiphy *wiphy, struct net_device *dev, struct cfg80211_connect_params *sme) prism2_connect() argument
|
/linux-4.4.14/drivers/net/wireless/libertas/ |
H A D | cfg.c | 1054 struct cfg80211_connect_params *sme) lbs_set_authtype() 1059 lbs_deb_enter_args(LBS_DEB_CFG80211, "%d", sme->auth_type); lbs_set_authtype() 1072 if (sme->bssid) lbs_set_authtype() 1073 memcpy(cmd.bssid, sme->bssid, ETH_ALEN); lbs_set_authtype() 1075 ret = lbs_auth_to_authtype(sme->auth_type); lbs_set_authtype() 1102 struct cfg80211_connect_params *sme) lbs_associate() 1165 pos += lbs_add_auth_type_tlv(pos, sme->auth_type); lbs_associate() 1168 if (sme->ie && sme->ie_len) lbs_associate() 1169 pos += lbs_add_wpa_tlv(pos, sme->ie, sme->ie_len); lbs_associate() 1244 sme->ie, sme->ie_len, lbs_associate() 1264 _new_connect_scan_req(struct wiphy *wiphy, struct cfg80211_connect_params *sme) _new_connect_scan_req() argument 1304 memcpy(creq->ssids[0].ssid, sme->ssid, sme->ssid_len); _new_connect_scan_req() 1305 creq->ssids[0].ssid_len = sme->ssid_len; _new_connect_scan_req() 1316 struct cfg80211_connect_params *sme) lbs_cfg_connect() 1328 if (!sme->bssid) { lbs_cfg_connect() 1340 creq = _new_connect_scan_req(wiphy, sme); lbs_cfg_connect() 1357 bss = cfg80211_get_bss(wiphy, sme->channel, sme->bssid, lbs_cfg_connect() 1358 sme->ssid, sme->ssid_len, IEEE80211_BSS_TYPE_ESS, lbs_cfg_connect() 1362 sme->bssid); lbs_cfg_connect() 1368 sme->crypto.cipher_group, lbs_cfg_connect() 1369 sme->key_idx, sme->key_len); lbs_cfg_connect() 1377 switch (sme->crypto.cipher_group) { lbs_cfg_connect() 1381 priv->wep_tx_key = sme->key_idx; lbs_cfg_connect() 1382 priv->wep_key_len[sme->key_idx] = sme->key_len; lbs_cfg_connect() 1383 memcpy(priv->wep_key[sme->key_idx], sme->key, sme->key_len); lbs_cfg_connect() 1416 lbs_enable_rsn(priv, sme->crypto.cipher_group != 0); lbs_cfg_connect() 1420 sme->crypto.cipher_group); lbs_cfg_connect() 1425 ret = lbs_set_authtype(priv, sme); lbs_cfg_connect() 1427 wiphy_err(wiphy, "unsupported authtype 0x%x\n", sme->auth_type); lbs_cfg_connect() 1434 ret = lbs_associate(priv, bss, sme); lbs_cfg_connect() 1053 lbs_set_authtype(struct lbs_private *priv, struct cfg80211_connect_params *sme) lbs_set_authtype() argument 1100 lbs_associate(struct lbs_private *priv, struct cfg80211_bss *bss, struct cfg80211_connect_params *sme) lbs_associate() argument 1315 lbs_cfg_connect(struct wiphy *wiphy, struct net_device *dev, struct cfg80211_connect_params *sme) lbs_cfg_connect() argument
|
/linux-4.4.14/drivers/staging/wilc1000/ |
H A D | wilc_wfi_cfgoperations.c | 783 struct cfg80211_connect_params *sme) connect() 804 PRINT_D(CFG80211_DBG, "Connecting to SSID [%s] on netdev [%p] host if [%p]\n", sme->ssid, dev, priv->hWILCWFIDrv); connect() 805 if (!(strncmp(sme->ssid, "DIRECT-", 7))) { connect() 810 PRINT_INFO(CFG80211_DBG, "Required SSID = %s\n , AuthType = %d\n", sme->ssid, sme->auth_type); connect() 813 if ((sme->ssid_len == astrLastScannedNtwrksShadow[i].u8SsidLen) && connect() 815 sme->ssid, connect() 816 sme->ssid_len) == 0) { connect() 817 PRINT_INFO(CFG80211_DBG, "Network with required SSID is found %s\n", sme->ssid); connect() 818 if (sme->bssid == NULL) { connect() 827 sme->bssid, connect() 859 PRINT_INFO(CFG80211_DBG, "sme->crypto.wpa_versions=%x\n", sme->crypto.wpa_versions); connect() 860 PRINT_INFO(CFG80211_DBG, "sme->crypto.cipher_group=%x\n", sme->crypto.cipher_group); connect() 862 PRINT_INFO(CFG80211_DBG, "sme->crypto.n_ciphers_pairwise=%d\n", sme->crypto.n_ciphers_pairwise); connect() 865 for (i = 0; i < sme->crypto.n_ciphers_pairwise; i++) connect() 866 PRINT_D(CORECONFIG_DBG, "sme->crypto.ciphers_pairwise[%d]=%x\n", i, sme->crypto.ciphers_pairwise[i]); connect() 869 if (sme->crypto.cipher_group != NO_ENCRYPT) { connect() 873 PRINT_D(CORECONFIG_DBG, ">> sme->crypto.wpa_versions: %x\n", sme->crypto.wpa_versions); connect() 874 if (sme->crypto.cipher_group == WLAN_CIPHER_SUITE_WEP40) { connect() 878 PRINT_INFO(CFG80211_DBG, "WEP Default Key Idx = %d\n", sme->key_idx); connect() 881 for (i = 0; i < sme->key_len; i++) connect() 882 PRINT_D(CORECONFIG_DBG, "WEP Key Value[%d] = %d\n", i, sme->key[i]); connect() 884 priv->WILC_WFI_wep_default = sme->key_idx; connect() 885 priv->WILC_WFI_wep_key_len[sme->key_idx] = sme->key_len; connect() 886 memcpy(priv->WILC_WFI_wep_key[sme->key_idx], sme->key, sme->key_len); connect() 888 g_key_wep_params.key_len = sme->key_len; connect() 889 g_key_wep_params.key = kmalloc(sme->key_len, GFP_KERNEL); connect() 890 memcpy(g_key_wep_params.key, sme->key, sme->key_len); connect() 891 g_key_wep_params.key_idx = sme->key_idx; connect() 894 host_int_set_wep_default_key(priv->hWILCWFIDrv, sme->key_idx); connect() 895 host_int_add_wep_key_bss_sta(priv->hWILCWFIDrv, sme->key, sme->key_len, sme->key_idx); connect() 896 } else if (sme->crypto.cipher_group == WLAN_CIPHER_SUITE_WEP104) { connect() 901 priv->WILC_WFI_wep_default = sme->key_idx; connect() 902 priv->WILC_WFI_wep_key_len[sme->key_idx] = sme->key_len; connect() 903 memcpy(priv->WILC_WFI_wep_key[sme->key_idx], sme->key, sme->key_len); connect() 905 g_key_wep_params.key_len = sme->key_len; connect() 906 g_key_wep_params.key = kmalloc(sme->key_len, GFP_KERNEL); connect() 907 memcpy(g_key_wep_params.key, sme->key, sme->key_len); connect() 908 g_key_wep_params.key_idx = sme->key_idx; connect() 911 host_int_set_wep_default_key(priv->hWILCWFIDrv, sme->key_idx); connect() 912 host_int_add_wep_key_bss_sta(priv->hWILCWFIDrv, sme->key, sme->key_len, sme->key_idx); connect() 913 } else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2) { connect() 914 if (sme->crypto.cipher_group == WLAN_CIPHER_SUITE_TKIP) { connect() 925 } else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_1) { connect() 926 if (sme->crypto.cipher_group == WLAN_CIPHER_SUITE_TKIP) { connect() 950 if ((sme->crypto.wpa_versions & NL80211_WPA_VERSION_1) connect() 951 || (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2)) { connect() 952 for (i = 0; i < sme->crypto.n_ciphers_pairwise; i++) { connect() 953 if (sme->crypto.ciphers_pairwise[i] == WLAN_CIPHER_SUITE_TKIP) { connect() 961 PRINT_D(CFG80211_DBG, "Adding key with cipher group = %x\n", sme->crypto.cipher_group); connect() 963 PRINT_D(CFG80211_DBG, "Authentication Type = %d\n", sme->auth_type); connect() 964 switch (sme->auth_type) { connect() 976 PRINT_D(CFG80211_DBG, "Automatic Authentation type = %d\n", sme->auth_type); connect() 981 if (sme->crypto.n_akm_suites) { connect() 982 switch (sme->crypto.akm_suites[0]) { connect() 1006 s32Error = host_int_set_join_req(priv->hWILCWFIDrv, pstrNetworkInfo->au8bssid, sme->ssid, connect() 1007 sme->ssid_len, sme->ie, sme->ie_len, connect() 782 connect(struct wiphy *wiphy, struct net_device *dev, struct cfg80211_connect_params *sme) connect() argument
|
/linux-4.4.14/drivers/net/wireless/ath/wil6210/ |
H A D | cfg80211.c | 380 struct cfg80211_connect_params *sme) wil_print_connect_params() 383 if (sme->channel) { wil_print_connect_params() 385 sme->channel->hw_value, sme->channel->center_freq); wil_print_connect_params() 387 if (sme->bssid) wil_print_connect_params() 388 wil_info(wil, " BSSID: %pM\n", sme->bssid); wil_print_connect_params() 389 if (sme->ssid) wil_print_connect_params() 391 16, 1, sme->ssid, sme->ssid_len, true); wil_print_connect_params() 392 wil_info(wil, " Privacy: %s\n", sme->privacy ? "secure" : "open"); wil_print_connect_params() 393 wil_print_crypto(wil, &sme->crypto); wil_print_connect_params() 398 struct cfg80211_connect_params *sme) wil_cfg80211_connect() 408 wil_print_connect_params(wil, sme); wil_cfg80211_connect() 414 if (sme->ie_len > WMI_MAX_IE_LEN) { wil_cfg80211_connect() 415 wil_err(wil, "IE too large (%td bytes)\n", sme->ie_len); wil_cfg80211_connect() 419 rsn_eid = sme->ie ? wil_cfg80211_connect() 420 cfg80211_find_ie(WLAN_EID_RSN, sme->ie, sme->ie_len) : wil_cfg80211_connect() 422 if (sme->privacy && !rsn_eid) wil_cfg80211_connect() 425 bss = cfg80211_get_bss(wiphy, sme->channel, sme->bssid, wil_cfg80211_connect() 426 sme->ssid, sme->ssid_len, wil_cfg80211_connect() 439 wil->privacy = sme->privacy; wil_cfg80211_connect() 461 rc = wmi_set_ie(wil, WMI_FRAME_ASSOC_REQ, sme->ie_len, sme->ie); wil_cfg80211_connect() 379 wil_print_connect_params(struct wil6210_priv *wil, struct cfg80211_connect_params *sme) wil_print_connect_params() argument 396 wil_cfg80211_connect(struct wiphy *wiphy, struct net_device *ndev, struct cfg80211_connect_params *sme) wil_cfg80211_connect() argument
|
/linux-4.4.14/drivers/net/wireless/ath/ath6kl/ |
H A D | cfg80211.c | 456 struct cfg80211_connect_params *sme) ath6kl_cfg80211_connect() 477 ((sme->channel && sme->channel->center_freq == 0) || ath6kl_cfg80211_connect() 478 (sme->bssid && is_zero_ether_addr(sme->bssid)))) { ath6kl_cfg80211_connect() 508 status = ath6kl_set_assoc_req_ies(vif, sme->ie, sme->ie_len); ath6kl_cfg80211_connect() 514 if (sme->ie == NULL || sme->ie_len == 0) ath6kl_cfg80211_connect() 518 vif->ssid_len == sme->ssid_len && ath6kl_cfg80211_connect() 519 !memcmp(vif->ssid, sme->ssid, vif->ssid_len)) { ath6kl_cfg80211_connect() 531 } else if (vif->ssid_len == sme->ssid_len && ath6kl_cfg80211_connect() 532 !memcmp(vif->ssid, sme->ssid, vif->ssid_len)) { ath6kl_cfg80211_connect() 537 vif->ssid_len = sme->ssid_len; ath6kl_cfg80211_connect() 538 memcpy(vif->ssid, sme->ssid, sme->ssid_len); ath6kl_cfg80211_connect() 540 if (sme->channel) ath6kl_cfg80211_connect() 541 vif->ch_hint = sme->channel->center_freq; ath6kl_cfg80211_connect() 544 if (sme->bssid && !is_broadcast_ether_addr(sme->bssid)) ath6kl_cfg80211_connect() 545 memcpy(vif->req_bssid, sme->bssid, sizeof(vif->req_bssid)); ath6kl_cfg80211_connect() 547 ath6kl_set_wpa_version(vif, sme->crypto.wpa_versions); ath6kl_cfg80211_connect() 549 status = ath6kl_set_auth_type(vif, sme->auth_type); ath6kl_cfg80211_connect() 555 if (sme->crypto.n_ciphers_pairwise) ath6kl_cfg80211_connect() 556 ath6kl_set_cipher(vif, sme->crypto.ciphers_pairwise[0], true); ath6kl_cfg80211_connect() 560 ath6kl_set_cipher(vif, sme->crypto.cipher_group, false); ath6kl_cfg80211_connect() 562 if (sme->crypto.n_akm_suites) ath6kl_cfg80211_connect() 563 ath6kl_set_key_mgmt(vif, sme->crypto.akm_suites[0]); ath6kl_cfg80211_connect() 565 if ((sme->key_len) && ath6kl_cfg80211_connect() 570 if (sme->key_idx > WMI_MAX_KEY_INDEX) { ath6kl_cfg80211_connect() 572 sme->key_idx); ath6kl_cfg80211_connect() 577 key = &vif->keys[sme->key_idx]; ath6kl_cfg80211_connect() 578 key->key_len = sme->key_len; ath6kl_cfg80211_connect() 579 memcpy(key->key, sme->key, key->key_len); ath6kl_cfg80211_connect() 581 vif->def_txkey_index = sme->key_idx; ath6kl_cfg80211_connect() 583 ath6kl_wmi_addkey_cmd(ar->wmi, vif->fw_vif_idx, sme->key_idx, ath6kl_cfg80211_connect() 643 if (sme->bg_scan_period == 0) { ath6kl_cfg80211_connect() 645 sme->bg_scan_period = 0xffff; ath6kl_cfg80211_connect() 646 } else if (sme->bg_scan_period == -1) { ath6kl_cfg80211_connect() 648 sme->bg_scan_period = DEFAULT_BG_SCAN_PERIOD; ath6kl_cfg80211_connect() 652 sme->bg_scan_period, 0, 0, 0, 3, 0, 0, 0); ath6kl_cfg80211_connect() 455 ath6kl_cfg80211_connect(struct wiphy *wiphy, struct net_device *dev, struct cfg80211_connect_params *sme) ath6kl_cfg80211_connect() argument
|
/linux-4.4.14/drivers/staging/rtl8723au/os_dep/ |
H A D | ioctl_cfg80211.c | 1950 struct cfg80211_connect_params *sme) cfg80211_rtw_connect() 1965 sme->privacy, sme->key, sme->key_len, sme->key_idx); cfg80211_rtw_connect() 1977 if (!sme->ssid || !sme->ssid_len || cfg80211_rtw_connect() 1978 sme->ssid_len > IEEE80211_MAX_SSID_LEN) { cfg80211_rtw_connect() 1983 DBG_8723A("ssid =%s, len =%zu\n", sme->ssid, sme->ssid_len); cfg80211_rtw_connect() 1985 if (sme->bssid) cfg80211_rtw_connect() 1986 DBG_8723A("bssid=%pM\n", sme->bssid); cfg80211_rtw_connect() 2005 if (sme->bssid) { list_for_each_safe() 2007 sme->bssid)) list_for_each_safe() 2011 if (sme->ssid && sme->ssid_len) { list_for_each_safe() 2012 if (pnetwork->network.Ssid.ssid_len != sme->ssid_len || list_for_each_safe() 2013 memcmp(pnetwork->network.Ssid.ssid, sme->ssid, list_for_each_safe() 2014 sme->ssid_len)) list_for_each_safe() 2018 if (sme->bssid) { list_for_each_safe() 2020 sme->bssid)) { list_for_each_safe() 2026 } else if (sme->ssid && sme->ssid_len) { list_for_each_safe() 2028 sme->ssid, sme->ssid_len) && list_for_each_safe() 2029 pnetwork->network.Ssid.ssid_len == sme->ssid_len) { list_for_each_safe() 2059 sme->crypto.wpa_versions); 2063 ret = rtw_cfg80211_set_auth_type(psecuritypriv, sme->auth_type); 2068 DBG_8723A("%s, ie_len =%zu\n", __func__, sme->ie_len); 2070 ret = rtw_cfg80211_set_wpa_ie(padapter, sme->ie, sme->ie_len); 2074 if (sme->crypto.n_ciphers_pairwise) { 2076 sme->crypto.ciphers_pairwise[0], 2085 sme->key) { 2090 wep_key_idx = sme->key_idx; 2091 wep_key_len = sme->key_len; 2117 memcpy(wep_key.key, (void *)sme->key, wep_key.keylen); 2128 sme->crypto.cipher_group, false); 2132 if (sme->crypto.n_akm_suites) { 2134 sme->crypto.akm_suites[0]); 1949 cfg80211_rtw_connect(struct wiphy *wiphy, struct net_device *ndev, struct cfg80211_connect_params *sme) cfg80211_rtw_connect() argument
|
/linux-4.4.14/drivers/net/wireless/ |
H A D | rndis_wlan.c | 499 struct cfg80211_connect_params *sme); 2152 struct cfg80211_connect_params *sme) rndis_connect() 2156 struct ieee80211_channel *channel = sme->channel; rndis_connect() 2166 groupwise = rndis_cipher_to_alg(sme->crypto.cipher_group); rndis_connect() 2167 for (i = 0; i < sme->crypto.n_ciphers_pairwise; i++) rndis_connect() 2169 rndis_cipher_to_alg(sme->crypto.ciphers_pairwise[i]); rndis_connect() 2171 if (sme->crypto.n_ciphers_pairwise > 0 && rndis_connect() 2177 for (i = 0; i < sme->crypto.n_akm_suites; i++) rndis_connect() 2179 rndis_akm_suite_to_key_mgmt(sme->crypto.akm_suites[i]); rndis_connect() 2181 if (sme->crypto.n_akm_suites > 0 && rndis_connect() 2188 sme->ssid, sme->bssid, chan, rndis_connect() 2189 sme->privacy, sme->crypto.wpa_versions, sme->auth_type, rndis_connect() 2202 ret = set_auth_mode(usbdev, sme->crypto.wpa_versions, sme->auth_type, rndis_connect() 2228 if (sme->key && ((groupwise | pairwise) & RNDIS_WLAN_ALG_WEP)) { rndis_connect() 2229 priv->encr_tx_key_index = sme->key_idx; rndis_connect() 2230 ret = add_wep_key(usbdev, sme->key, sme->key_len, sme->key_idx); rndis_connect() 2233 ret, sme->key_len, sme->key_idx); rndis_connect() 2238 if (sme->bssid && !is_zero_ether_addr(sme->bssid) && rndis_connect() 2239 !is_broadcast_ether_addr(sme->bssid)) { rndis_connect() 2240 ret = set_bssid(usbdev, sme->bssid); rndis_connect() 2249 length = sme->ssid_len; rndis_connect() 2255 memcpy(ssid.essid, sme->ssid, length); rndis_connect() 2151 rndis_connect(struct wiphy *wiphy, struct net_device *dev, struct cfg80211_connect_params *sme) rndis_connect() argument
|
/linux-4.4.14/drivers/net/wireless/brcm80211/brcmfmac/ |
H A D | cfg80211.c | 1450 struct cfg80211_connect_params *sme) brcmf_set_wpa_version() 1457 if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_1) brcmf_set_wpa_version() 1459 else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2) brcmf_set_wpa_version() 1470 sec->wpa_versions = sme->crypto.wpa_versions; brcmf_set_wpa_version() 1475 struct cfg80211_connect_params *sme) brcmf_set_auth_type() 1482 switch (sme->auth_type) { brcmf_set_auth_type() 1499 brcmf_err("invalid auth type (%d)\n", sme->auth_type); brcmf_set_auth_type() 1509 sec->auth_type = sme->auth_type; brcmf_set_auth_type() 1515 struct cfg80211_connect_params *sme, bool mfp) brcmf_set_wsec_mode() 1524 if (sme->crypto.n_ciphers_pairwise) { brcmf_set_wsec_mode() 1525 switch (sme->crypto.ciphers_pairwise[0]) { brcmf_set_wsec_mode() 1541 sme->crypto.ciphers_pairwise[0]); brcmf_set_wsec_mode() 1545 if (sme->crypto.cipher_group) { brcmf_set_wsec_mode() 1546 switch (sme->crypto.cipher_group) { brcmf_set_wsec_mode() 1562 sme->crypto.cipher_group); brcmf_set_wsec_mode() 1570 if (brcmf_find_wpsie(sme->ie, sme->ie_len) && !pval && !gval && brcmf_set_wsec_mode() 1571 sme->privacy) brcmf_set_wsec_mode() 1585 sec->cipher_pairwise = sme->crypto.ciphers_pairwise[0]; brcmf_set_wsec_mode() 1586 sec->cipher_group = sme->crypto.cipher_group; brcmf_set_wsec_mode() 1592 brcmf_set_key_mgmt(struct net_device *ndev, struct cfg80211_connect_params *sme) brcmf_set_key_mgmt() argument 1599 if (sme->crypto.n_akm_suites) { brcmf_set_key_mgmt() 1607 switch (sme->crypto.akm_suites[0]) { brcmf_set_key_mgmt() 1616 sme->crypto.cipher_group); brcmf_set_key_mgmt() 1620 switch (sme->crypto.akm_suites[0]) { brcmf_set_key_mgmt() 1629 sme->crypto.cipher_group); brcmf_set_key_mgmt() 1643 sec->wpa_auth = sme->crypto.akm_suites[0]; brcmf_set_key_mgmt() 1650 struct cfg80211_connect_params *sme) brcmf_set_sharedkey() 1658 brcmf_dbg(CONN, "key len (%d)\n", sme->key_len); brcmf_set_sharedkey() 1660 if (sme->key_len == 0) brcmf_set_sharedkey() 1675 key.len = (u32) sme->key_len; brcmf_set_sharedkey() 1676 key.index = (u32) sme->key_idx; brcmf_set_sharedkey() 1681 memcpy(key.data, sme->key, key.len); brcmf_set_sharedkey() 1692 sme->crypto.ciphers_pairwise[0]); brcmf_set_sharedkey() 1727 struct cfg80211_connect_params *sme) brcmf_cfg80211_connect() 1732 struct ieee80211_channel *chan = sme->channel; brcmf_cfg80211_connect() 1747 if (!sme->ssid) { brcmf_cfg80211_connect() 1757 wpa_ie = brcmf_find_wpaie((u8 *)sme->ie, sme->ie_len); brcmf_cfg80211_connect() 1763 rsn_ie = brcmf_parse_tlvs((const u8 *)sme->ie, brcmf_cfg80211_connect() 1764 sme->ie_len, brcmf_cfg80211_connect() 1775 sme->ie, sme->ie_len); brcmf_cfg80211_connect() 1794 brcmf_dbg(INFO, "ie (%p), ie_len (%zd)\n", sme->ie, sme->ie_len); brcmf_cfg80211_connect() 1796 err = brcmf_set_wpa_version(ndev, sme); brcmf_cfg80211_connect() 1802 sme->auth_type = brcmf_war_auth_type(ifp, sme->auth_type); brcmf_cfg80211_connect() 1803 err = brcmf_set_auth_type(ndev, sme); brcmf_cfg80211_connect() 1809 err = brcmf_set_wsec_mode(ndev, sme, sme->mfp == NL80211_MFP_REQUIRED); brcmf_cfg80211_connect() 1815 err = brcmf_set_key_mgmt(ndev, sme); brcmf_cfg80211_connect() 1821 err = brcmf_set_sharedkey(ndev, sme); brcmf_cfg80211_connect() 1828 (u32)sme->ssid_len); brcmf_cfg80211_connect() 1829 memcpy(&profile->ssid.SSID, sme->ssid, profile->ssid.SSID_len); brcmf_cfg80211_connect() 1849 memcpy(&ext_join_params->ssid_le.SSID, sme->ssid, brcmf_cfg80211_connect() 1856 if (sme->bssid) brcmf_cfg80211_connect() 1857 memcpy(&ext_join_params->assoc_le.bssid, sme->bssid, ETH_ALEN); brcmf_cfg80211_connect() 1898 memcpy(&join_params.ssid_le.SSID, sme->ssid, profile->ssid.SSID_len); brcmf_cfg80211_connect() 1901 if (sme->bssid) brcmf_cfg80211_connect() 1902 memcpy(join_params.params_le.bssid, sme->bssid, ETH_ALEN); brcmf_cfg80211_connect() 1449 brcmf_set_wpa_version(struct net_device *ndev, struct cfg80211_connect_params *sme) brcmf_set_wpa_version() argument 1474 brcmf_set_auth_type(struct net_device *ndev, struct cfg80211_connect_params *sme) brcmf_set_auth_type() argument 1514 brcmf_set_wsec_mode(struct net_device *ndev, struct cfg80211_connect_params *sme, bool mfp) brcmf_set_wsec_mode() argument 1649 brcmf_set_sharedkey(struct net_device *ndev, struct cfg80211_connect_params *sme) brcmf_set_sharedkey() argument 1726 brcmf_cfg80211_connect(struct wiphy *wiphy, struct net_device *ndev, struct cfg80211_connect_params *sme) brcmf_cfg80211_connect() argument
|
/linux-4.4.14/drivers/net/wireless/mwifiex/ |
H A D | cfg80211.c | 2031 struct cfg80211_connect_params *sme, bool privacy) mwifiex_cfg80211_assoc() 2079 /* Now handle infra mode. "sme" is valid for infra mode only */ mwifiex_cfg80211_assoc() 2080 if (sme->auth_type == NL80211_AUTHTYPE_AUTOMATIC) { mwifiex_cfg80211_assoc() 2084 auth_type = sme->auth_type; mwifiex_cfg80211_assoc() 2087 if (sme->crypto.n_ciphers_pairwise) { mwifiex_cfg80211_assoc() 2089 sme->crypto.ciphers_pairwise[0]; mwifiex_cfg80211_assoc() 2093 if (sme->crypto.cipher_group) { mwifiex_cfg80211_assoc() 2094 priv->sec_info.encryption_mode = sme->crypto.cipher_group; mwifiex_cfg80211_assoc() 2097 if (sme->ie) mwifiex_cfg80211_assoc() 2098 ret = mwifiex_set_gen_ie(priv, sme->ie, sme->ie_len); mwifiex_cfg80211_assoc() 2100 if (sme->key) { mwifiex_cfg80211_assoc() 2104 "with key len %d\n", sme->key_len); mwifiex_cfg80211_assoc() 2105 priv->wep_key_curr_index = sme->key_idx; mwifiex_cfg80211_assoc() 2106 ret = mwifiex_set_encode(priv, NULL, sme->key, mwifiex_cfg80211_assoc() 2107 sme->key_len, sme->key_idx, mwifiex_cfg80211_assoc() 2177 struct cfg80211_connect_params *sme) mwifiex_cfg80211_connect() 2206 (char *)sme->ssid, sme->bssid); mwifiex_cfg80211_connect() 2208 ret = mwifiex_cfg80211_assoc(priv, sme->ssid_len, sme->ssid, sme->bssid, mwifiex_cfg80211_connect() 2209 priv->bss_mode, sme->channel, sme, 0); mwifiex_cfg80211_connect() 2028 mwifiex_cfg80211_assoc(struct mwifiex_private *priv, size_t ssid_len, const u8 *ssid, const u8 *bssid, int mode, struct ieee80211_channel *channel, struct cfg80211_connect_params *sme, bool privacy) mwifiex_cfg80211_assoc() argument 2176 mwifiex_cfg80211_connect(struct wiphy *wiphy, struct net_device *dev, struct cfg80211_connect_params *sme) mwifiex_cfg80211_connect() argument
|
/linux-4.4.14/drivers/net/ethernet/chelsio/cxgb/ |
H A D | espi.c | 85 int i, sme = 1; tricn_init() local 94 if (sme) { tricn_init()
|
/linux-4.4.14/include/net/ |
H A D | cfg80211.h | 2607 struct cfg80211_connect_params *sme);
|