Searched refs:sme (Results 1 - 14 of 14) sorted by relevance

/linux-4.4.14/net/wireless/
H A DMakefile13 cfg80211-y += mlme.o ibss.o sme.o chan.o ethtool.o mesh.o ap.o trace.o ocb.o
15 cfg80211-$(CONFIG_CFG80211_WEXT) += wext-compat.o wext-sme.o
H A Dtrace.h1213 struct cfg80211_connect_params *sme),
1214 TP_ARGS(wiphy, netdev, sme),
1228 MAC_ASSIGN(bssid, sme->bssid);
1230 memcpy(__entry->ssid, sme->ssid, sme->ssid_len);
1231 __entry->auth_type = sme->auth_type;
1232 __entry->privacy = sme->privacy;
1233 __entry->wpa_versions = sme->crypto.wpa_versions;
1234 __entry->flags = sme->flags;
H A Drdev-ops.h476 struct cfg80211_connect_params *sme) rdev_connect()
479 trace_rdev_connect(&rdev->wiphy, dev, sme); rdev_connect()
480 ret = rdev->ops->connect(&rdev->wiphy, dev, sme); rdev_connect()
474 rdev_connect(struct cfg80211_registered_device *rdev, struct net_device *dev, struct cfg80211_connect_params *sme) rdev_connect() argument
/linux-4.4.14/drivers/staging/wlan-ng/
H A Dcfg80211.c489 struct cfg80211_connect_params *sme) prism2_connect()
492 struct ieee80211_channel *channel = sme->channel; prism2_connect()
495 int length = sme->ssid_len; prism2_connect()
497 int is_wep = (sme->crypto.cipher_group == WLAN_CIPHER_SUITE_WEP40) || prism2_connect()
498 (sme->crypto.cipher_group == WLAN_CIPHER_SUITE_WEP104); prism2_connect()
513 if ((sme->auth_type == NL80211_AUTHTYPE_OPEN_SYSTEM) || prism2_connect()
514 ((sme->auth_type == NL80211_AUTHTYPE_AUTOMATIC) && !is_wep)) prism2_connect()
516 else if ((sme->auth_type == NL80211_AUTHTYPE_SHARED_KEY) || prism2_connect()
517 ((sme->auth_type == NL80211_AUTHTYPE_AUTOMATIC) && is_wep)) prism2_connect()
522 sme->auth_type); prism2_connect()
526 if (sme->key) { prism2_connect()
529 sme->key_idx); prism2_connect()
534 switch (sme->key_idx) { prism2_connect()
557 did, sme->key_len, prism2_connect()
558 (u8 *)sme->key); prism2_connect()
565 We could possibly use sme->privacy here, but the assumption prism2_connect()
600 memcpy(msg_join.ssid.data.data, sme->ssid, length); prism2_connect()
488 prism2_connect(struct wiphy *wiphy, struct net_device *dev, struct cfg80211_connect_params *sme) prism2_connect() argument
/linux-4.4.14/drivers/net/wireless/libertas/
H A Dcfg.c1054 struct cfg80211_connect_params *sme) lbs_set_authtype()
1059 lbs_deb_enter_args(LBS_DEB_CFG80211, "%d", sme->auth_type); lbs_set_authtype()
1072 if (sme->bssid) lbs_set_authtype()
1073 memcpy(cmd.bssid, sme->bssid, ETH_ALEN); lbs_set_authtype()
1075 ret = lbs_auth_to_authtype(sme->auth_type); lbs_set_authtype()
1102 struct cfg80211_connect_params *sme) lbs_associate()
1165 pos += lbs_add_auth_type_tlv(pos, sme->auth_type); lbs_associate()
1168 if (sme->ie && sme->ie_len) lbs_associate()
1169 pos += lbs_add_wpa_tlv(pos, sme->ie, sme->ie_len); lbs_associate()
1244 sme->ie, sme->ie_len, lbs_associate()
1264 _new_connect_scan_req(struct wiphy *wiphy, struct cfg80211_connect_params *sme) _new_connect_scan_req() argument
1304 memcpy(creq->ssids[0].ssid, sme->ssid, sme->ssid_len); _new_connect_scan_req()
1305 creq->ssids[0].ssid_len = sme->ssid_len; _new_connect_scan_req()
1316 struct cfg80211_connect_params *sme) lbs_cfg_connect()
1328 if (!sme->bssid) { lbs_cfg_connect()
1340 creq = _new_connect_scan_req(wiphy, sme); lbs_cfg_connect()
1357 bss = cfg80211_get_bss(wiphy, sme->channel, sme->bssid, lbs_cfg_connect()
1358 sme->ssid, sme->ssid_len, IEEE80211_BSS_TYPE_ESS, lbs_cfg_connect()
1362 sme->bssid); lbs_cfg_connect()
1368 sme->crypto.cipher_group, lbs_cfg_connect()
1369 sme->key_idx, sme->key_len); lbs_cfg_connect()
1377 switch (sme->crypto.cipher_group) { lbs_cfg_connect()
1381 priv->wep_tx_key = sme->key_idx; lbs_cfg_connect()
1382 priv->wep_key_len[sme->key_idx] = sme->key_len; lbs_cfg_connect()
1383 memcpy(priv->wep_key[sme->key_idx], sme->key, sme->key_len); lbs_cfg_connect()
1416 lbs_enable_rsn(priv, sme->crypto.cipher_group != 0); lbs_cfg_connect()
1420 sme->crypto.cipher_group); lbs_cfg_connect()
1425 ret = lbs_set_authtype(priv, sme); lbs_cfg_connect()
1427 wiphy_err(wiphy, "unsupported authtype 0x%x\n", sme->auth_type); lbs_cfg_connect()
1434 ret = lbs_associate(priv, bss, sme); lbs_cfg_connect()
1053 lbs_set_authtype(struct lbs_private *priv, struct cfg80211_connect_params *sme) lbs_set_authtype() argument
1100 lbs_associate(struct lbs_private *priv, struct cfg80211_bss *bss, struct cfg80211_connect_params *sme) lbs_associate() argument
1315 lbs_cfg_connect(struct wiphy *wiphy, struct net_device *dev, struct cfg80211_connect_params *sme) lbs_cfg_connect() argument
/linux-4.4.14/drivers/staging/wilc1000/
H A Dwilc_wfi_cfgoperations.c783 struct cfg80211_connect_params *sme) connect()
804 PRINT_D(CFG80211_DBG, "Connecting to SSID [%s] on netdev [%p] host if [%p]\n", sme->ssid, dev, priv->hWILCWFIDrv); connect()
805 if (!(strncmp(sme->ssid, "DIRECT-", 7))) { connect()
810 PRINT_INFO(CFG80211_DBG, "Required SSID = %s\n , AuthType = %d\n", sme->ssid, sme->auth_type); connect()
813 if ((sme->ssid_len == astrLastScannedNtwrksShadow[i].u8SsidLen) && connect()
815 sme->ssid, connect()
816 sme->ssid_len) == 0) { connect()
817 PRINT_INFO(CFG80211_DBG, "Network with required SSID is found %s\n", sme->ssid); connect()
818 if (sme->bssid == NULL) { connect()
827 sme->bssid, connect()
859 PRINT_INFO(CFG80211_DBG, "sme->crypto.wpa_versions=%x\n", sme->crypto.wpa_versions); connect()
860 PRINT_INFO(CFG80211_DBG, "sme->crypto.cipher_group=%x\n", sme->crypto.cipher_group); connect()
862 PRINT_INFO(CFG80211_DBG, "sme->crypto.n_ciphers_pairwise=%d\n", sme->crypto.n_ciphers_pairwise); connect()
865 for (i = 0; i < sme->crypto.n_ciphers_pairwise; i++) connect()
866 PRINT_D(CORECONFIG_DBG, "sme->crypto.ciphers_pairwise[%d]=%x\n", i, sme->crypto.ciphers_pairwise[i]); connect()
869 if (sme->crypto.cipher_group != NO_ENCRYPT) { connect()
873 PRINT_D(CORECONFIG_DBG, ">> sme->crypto.wpa_versions: %x\n", sme->crypto.wpa_versions); connect()
874 if (sme->crypto.cipher_group == WLAN_CIPHER_SUITE_WEP40) { connect()
878 PRINT_INFO(CFG80211_DBG, "WEP Default Key Idx = %d\n", sme->key_idx); connect()
881 for (i = 0; i < sme->key_len; i++) connect()
882 PRINT_D(CORECONFIG_DBG, "WEP Key Value[%d] = %d\n", i, sme->key[i]); connect()
884 priv->WILC_WFI_wep_default = sme->key_idx; connect()
885 priv->WILC_WFI_wep_key_len[sme->key_idx] = sme->key_len; connect()
886 memcpy(priv->WILC_WFI_wep_key[sme->key_idx], sme->key, sme->key_len); connect()
888 g_key_wep_params.key_len = sme->key_len; connect()
889 g_key_wep_params.key = kmalloc(sme->key_len, GFP_KERNEL); connect()
890 memcpy(g_key_wep_params.key, sme->key, sme->key_len); connect()
891 g_key_wep_params.key_idx = sme->key_idx; connect()
894 host_int_set_wep_default_key(priv->hWILCWFIDrv, sme->key_idx); connect()
895 host_int_add_wep_key_bss_sta(priv->hWILCWFIDrv, sme->key, sme->key_len, sme->key_idx); connect()
896 } else if (sme->crypto.cipher_group == WLAN_CIPHER_SUITE_WEP104) { connect()
901 priv->WILC_WFI_wep_default = sme->key_idx; connect()
902 priv->WILC_WFI_wep_key_len[sme->key_idx] = sme->key_len; connect()
903 memcpy(priv->WILC_WFI_wep_key[sme->key_idx], sme->key, sme->key_len); connect()
905 g_key_wep_params.key_len = sme->key_len; connect()
906 g_key_wep_params.key = kmalloc(sme->key_len, GFP_KERNEL); connect()
907 memcpy(g_key_wep_params.key, sme->key, sme->key_len); connect()
908 g_key_wep_params.key_idx = sme->key_idx; connect()
911 host_int_set_wep_default_key(priv->hWILCWFIDrv, sme->key_idx); connect()
912 host_int_add_wep_key_bss_sta(priv->hWILCWFIDrv, sme->key, sme->key_len, sme->key_idx); connect()
913 } else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2) { connect()
914 if (sme->crypto.cipher_group == WLAN_CIPHER_SUITE_TKIP) { connect()
925 } else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_1) { connect()
926 if (sme->crypto.cipher_group == WLAN_CIPHER_SUITE_TKIP) { connect()
950 if ((sme->crypto.wpa_versions & NL80211_WPA_VERSION_1) connect()
951 || (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2)) { connect()
952 for (i = 0; i < sme->crypto.n_ciphers_pairwise; i++) { connect()
953 if (sme->crypto.ciphers_pairwise[i] == WLAN_CIPHER_SUITE_TKIP) { connect()
961 PRINT_D(CFG80211_DBG, "Adding key with cipher group = %x\n", sme->crypto.cipher_group); connect()
963 PRINT_D(CFG80211_DBG, "Authentication Type = %d\n", sme->auth_type); connect()
964 switch (sme->auth_type) { connect()
976 PRINT_D(CFG80211_DBG, "Automatic Authentation type = %d\n", sme->auth_type); connect()
981 if (sme->crypto.n_akm_suites) { connect()
982 switch (sme->crypto.akm_suites[0]) { connect()
1006 s32Error = host_int_set_join_req(priv->hWILCWFIDrv, pstrNetworkInfo->au8bssid, sme->ssid, connect()
1007 sme->ssid_len, sme->ie, sme->ie_len, connect()
782 connect(struct wiphy *wiphy, struct net_device *dev, struct cfg80211_connect_params *sme) connect() argument
/linux-4.4.14/drivers/net/wireless/ath/wil6210/
H A Dcfg80211.c380 struct cfg80211_connect_params *sme) wil_print_connect_params()
383 if (sme->channel) { wil_print_connect_params()
385 sme->channel->hw_value, sme->channel->center_freq); wil_print_connect_params()
387 if (sme->bssid) wil_print_connect_params()
388 wil_info(wil, " BSSID: %pM\n", sme->bssid); wil_print_connect_params()
389 if (sme->ssid) wil_print_connect_params()
391 16, 1, sme->ssid, sme->ssid_len, true); wil_print_connect_params()
392 wil_info(wil, " Privacy: %s\n", sme->privacy ? "secure" : "open"); wil_print_connect_params()
393 wil_print_crypto(wil, &sme->crypto); wil_print_connect_params()
398 struct cfg80211_connect_params *sme) wil_cfg80211_connect()
408 wil_print_connect_params(wil, sme); wil_cfg80211_connect()
414 if (sme->ie_len > WMI_MAX_IE_LEN) { wil_cfg80211_connect()
415 wil_err(wil, "IE too large (%td bytes)\n", sme->ie_len); wil_cfg80211_connect()
419 rsn_eid = sme->ie ? wil_cfg80211_connect()
420 cfg80211_find_ie(WLAN_EID_RSN, sme->ie, sme->ie_len) : wil_cfg80211_connect()
422 if (sme->privacy && !rsn_eid) wil_cfg80211_connect()
425 bss = cfg80211_get_bss(wiphy, sme->channel, sme->bssid, wil_cfg80211_connect()
426 sme->ssid, sme->ssid_len, wil_cfg80211_connect()
439 wil->privacy = sme->privacy; wil_cfg80211_connect()
461 rc = wmi_set_ie(wil, WMI_FRAME_ASSOC_REQ, sme->ie_len, sme->ie); wil_cfg80211_connect()
379 wil_print_connect_params(struct wil6210_priv *wil, struct cfg80211_connect_params *sme) wil_print_connect_params() argument
396 wil_cfg80211_connect(struct wiphy *wiphy, struct net_device *ndev, struct cfg80211_connect_params *sme) wil_cfg80211_connect() argument
/linux-4.4.14/drivers/net/wireless/ath/ath6kl/
H A Dcfg80211.c456 struct cfg80211_connect_params *sme) ath6kl_cfg80211_connect()
477 ((sme->channel && sme->channel->center_freq == 0) || ath6kl_cfg80211_connect()
478 (sme->bssid && is_zero_ether_addr(sme->bssid)))) { ath6kl_cfg80211_connect()
508 status = ath6kl_set_assoc_req_ies(vif, sme->ie, sme->ie_len); ath6kl_cfg80211_connect()
514 if (sme->ie == NULL || sme->ie_len == 0) ath6kl_cfg80211_connect()
518 vif->ssid_len == sme->ssid_len && ath6kl_cfg80211_connect()
519 !memcmp(vif->ssid, sme->ssid, vif->ssid_len)) { ath6kl_cfg80211_connect()
531 } else if (vif->ssid_len == sme->ssid_len && ath6kl_cfg80211_connect()
532 !memcmp(vif->ssid, sme->ssid, vif->ssid_len)) { ath6kl_cfg80211_connect()
537 vif->ssid_len = sme->ssid_len; ath6kl_cfg80211_connect()
538 memcpy(vif->ssid, sme->ssid, sme->ssid_len); ath6kl_cfg80211_connect()
540 if (sme->channel) ath6kl_cfg80211_connect()
541 vif->ch_hint = sme->channel->center_freq; ath6kl_cfg80211_connect()
544 if (sme->bssid && !is_broadcast_ether_addr(sme->bssid)) ath6kl_cfg80211_connect()
545 memcpy(vif->req_bssid, sme->bssid, sizeof(vif->req_bssid)); ath6kl_cfg80211_connect()
547 ath6kl_set_wpa_version(vif, sme->crypto.wpa_versions); ath6kl_cfg80211_connect()
549 status = ath6kl_set_auth_type(vif, sme->auth_type); ath6kl_cfg80211_connect()
555 if (sme->crypto.n_ciphers_pairwise) ath6kl_cfg80211_connect()
556 ath6kl_set_cipher(vif, sme->crypto.ciphers_pairwise[0], true); ath6kl_cfg80211_connect()
560 ath6kl_set_cipher(vif, sme->crypto.cipher_group, false); ath6kl_cfg80211_connect()
562 if (sme->crypto.n_akm_suites) ath6kl_cfg80211_connect()
563 ath6kl_set_key_mgmt(vif, sme->crypto.akm_suites[0]); ath6kl_cfg80211_connect()
565 if ((sme->key_len) && ath6kl_cfg80211_connect()
570 if (sme->key_idx > WMI_MAX_KEY_INDEX) { ath6kl_cfg80211_connect()
572 sme->key_idx); ath6kl_cfg80211_connect()
577 key = &vif->keys[sme->key_idx]; ath6kl_cfg80211_connect()
578 key->key_len = sme->key_len; ath6kl_cfg80211_connect()
579 memcpy(key->key, sme->key, key->key_len); ath6kl_cfg80211_connect()
581 vif->def_txkey_index = sme->key_idx; ath6kl_cfg80211_connect()
583 ath6kl_wmi_addkey_cmd(ar->wmi, vif->fw_vif_idx, sme->key_idx, ath6kl_cfg80211_connect()
643 if (sme->bg_scan_period == 0) { ath6kl_cfg80211_connect()
645 sme->bg_scan_period = 0xffff; ath6kl_cfg80211_connect()
646 } else if (sme->bg_scan_period == -1) { ath6kl_cfg80211_connect()
648 sme->bg_scan_period = DEFAULT_BG_SCAN_PERIOD; ath6kl_cfg80211_connect()
652 sme->bg_scan_period, 0, 0, 0, 3, 0, 0, 0); ath6kl_cfg80211_connect()
455 ath6kl_cfg80211_connect(struct wiphy *wiphy, struct net_device *dev, struct cfg80211_connect_params *sme) ath6kl_cfg80211_connect() argument
/linux-4.4.14/drivers/staging/rtl8723au/os_dep/
H A Dioctl_cfg80211.c1950 struct cfg80211_connect_params *sme) cfg80211_rtw_connect()
1965 sme->privacy, sme->key, sme->key_len, sme->key_idx); cfg80211_rtw_connect()
1977 if (!sme->ssid || !sme->ssid_len || cfg80211_rtw_connect()
1978 sme->ssid_len > IEEE80211_MAX_SSID_LEN) { cfg80211_rtw_connect()
1983 DBG_8723A("ssid =%s, len =%zu\n", sme->ssid, sme->ssid_len); cfg80211_rtw_connect()
1985 if (sme->bssid) cfg80211_rtw_connect()
1986 DBG_8723A("bssid=%pM\n", sme->bssid); cfg80211_rtw_connect()
2005 if (sme->bssid) { list_for_each_safe()
2007 sme->bssid)) list_for_each_safe()
2011 if (sme->ssid && sme->ssid_len) { list_for_each_safe()
2012 if (pnetwork->network.Ssid.ssid_len != sme->ssid_len || list_for_each_safe()
2013 memcmp(pnetwork->network.Ssid.ssid, sme->ssid, list_for_each_safe()
2014 sme->ssid_len)) list_for_each_safe()
2018 if (sme->bssid) { list_for_each_safe()
2020 sme->bssid)) { list_for_each_safe()
2026 } else if (sme->ssid && sme->ssid_len) { list_for_each_safe()
2028 sme->ssid, sme->ssid_len) && list_for_each_safe()
2029 pnetwork->network.Ssid.ssid_len == sme->ssid_len) { list_for_each_safe()
2059 sme->crypto.wpa_versions);
2063 ret = rtw_cfg80211_set_auth_type(psecuritypriv, sme->auth_type);
2068 DBG_8723A("%s, ie_len =%zu\n", __func__, sme->ie_len);
2070 ret = rtw_cfg80211_set_wpa_ie(padapter, sme->ie, sme->ie_len);
2074 if (sme->crypto.n_ciphers_pairwise) {
2076 sme->crypto.ciphers_pairwise[0],
2085 sme->key) {
2090 wep_key_idx = sme->key_idx;
2091 wep_key_len = sme->key_len;
2117 memcpy(wep_key.key, (void *)sme->key, wep_key.keylen);
2128 sme->crypto.cipher_group, false);
2132 if (sme->crypto.n_akm_suites) {
2134 sme->crypto.akm_suites[0]);
1949 cfg80211_rtw_connect(struct wiphy *wiphy, struct net_device *ndev, struct cfg80211_connect_params *sme) cfg80211_rtw_connect() argument
/linux-4.4.14/drivers/net/wireless/
H A Drndis_wlan.c499 struct cfg80211_connect_params *sme);
2152 struct cfg80211_connect_params *sme) rndis_connect()
2156 struct ieee80211_channel *channel = sme->channel; rndis_connect()
2166 groupwise = rndis_cipher_to_alg(sme->crypto.cipher_group); rndis_connect()
2167 for (i = 0; i < sme->crypto.n_ciphers_pairwise; i++) rndis_connect()
2169 rndis_cipher_to_alg(sme->crypto.ciphers_pairwise[i]); rndis_connect()
2171 if (sme->crypto.n_ciphers_pairwise > 0 && rndis_connect()
2177 for (i = 0; i < sme->crypto.n_akm_suites; i++) rndis_connect()
2179 rndis_akm_suite_to_key_mgmt(sme->crypto.akm_suites[i]); rndis_connect()
2181 if (sme->crypto.n_akm_suites > 0 && rndis_connect()
2188 sme->ssid, sme->bssid, chan, rndis_connect()
2189 sme->privacy, sme->crypto.wpa_versions, sme->auth_type, rndis_connect()
2202 ret = set_auth_mode(usbdev, sme->crypto.wpa_versions, sme->auth_type, rndis_connect()
2228 if (sme->key && ((groupwise | pairwise) & RNDIS_WLAN_ALG_WEP)) { rndis_connect()
2229 priv->encr_tx_key_index = sme->key_idx; rndis_connect()
2230 ret = add_wep_key(usbdev, sme->key, sme->key_len, sme->key_idx); rndis_connect()
2233 ret, sme->key_len, sme->key_idx); rndis_connect()
2238 if (sme->bssid && !is_zero_ether_addr(sme->bssid) && rndis_connect()
2239 !is_broadcast_ether_addr(sme->bssid)) { rndis_connect()
2240 ret = set_bssid(usbdev, sme->bssid); rndis_connect()
2249 length = sme->ssid_len; rndis_connect()
2255 memcpy(ssid.essid, sme->ssid, length); rndis_connect()
2151 rndis_connect(struct wiphy *wiphy, struct net_device *dev, struct cfg80211_connect_params *sme) rndis_connect() argument
/linux-4.4.14/drivers/net/wireless/brcm80211/brcmfmac/
H A Dcfg80211.c1450 struct cfg80211_connect_params *sme) brcmf_set_wpa_version()
1457 if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_1) brcmf_set_wpa_version()
1459 else if (sme->crypto.wpa_versions & NL80211_WPA_VERSION_2) brcmf_set_wpa_version()
1470 sec->wpa_versions = sme->crypto.wpa_versions; brcmf_set_wpa_version()
1475 struct cfg80211_connect_params *sme) brcmf_set_auth_type()
1482 switch (sme->auth_type) { brcmf_set_auth_type()
1499 brcmf_err("invalid auth type (%d)\n", sme->auth_type); brcmf_set_auth_type()
1509 sec->auth_type = sme->auth_type; brcmf_set_auth_type()
1515 struct cfg80211_connect_params *sme, bool mfp) brcmf_set_wsec_mode()
1524 if (sme->crypto.n_ciphers_pairwise) { brcmf_set_wsec_mode()
1525 switch (sme->crypto.ciphers_pairwise[0]) { brcmf_set_wsec_mode()
1541 sme->crypto.ciphers_pairwise[0]); brcmf_set_wsec_mode()
1545 if (sme->crypto.cipher_group) { brcmf_set_wsec_mode()
1546 switch (sme->crypto.cipher_group) { brcmf_set_wsec_mode()
1562 sme->crypto.cipher_group); brcmf_set_wsec_mode()
1570 if (brcmf_find_wpsie(sme->ie, sme->ie_len) && !pval && !gval && brcmf_set_wsec_mode()
1571 sme->privacy) brcmf_set_wsec_mode()
1585 sec->cipher_pairwise = sme->crypto.ciphers_pairwise[0]; brcmf_set_wsec_mode()
1586 sec->cipher_group = sme->crypto.cipher_group; brcmf_set_wsec_mode()
1592 brcmf_set_key_mgmt(struct net_device *ndev, struct cfg80211_connect_params *sme) brcmf_set_key_mgmt() argument
1599 if (sme->crypto.n_akm_suites) { brcmf_set_key_mgmt()
1607 switch (sme->crypto.akm_suites[0]) { brcmf_set_key_mgmt()
1616 sme->crypto.cipher_group); brcmf_set_key_mgmt()
1620 switch (sme->crypto.akm_suites[0]) { brcmf_set_key_mgmt()
1629 sme->crypto.cipher_group); brcmf_set_key_mgmt()
1643 sec->wpa_auth = sme->crypto.akm_suites[0]; brcmf_set_key_mgmt()
1650 struct cfg80211_connect_params *sme) brcmf_set_sharedkey()
1658 brcmf_dbg(CONN, "key len (%d)\n", sme->key_len); brcmf_set_sharedkey()
1660 if (sme->key_len == 0) brcmf_set_sharedkey()
1675 key.len = (u32) sme->key_len; brcmf_set_sharedkey()
1676 key.index = (u32) sme->key_idx; brcmf_set_sharedkey()
1681 memcpy(key.data, sme->key, key.len); brcmf_set_sharedkey()
1692 sme->crypto.ciphers_pairwise[0]); brcmf_set_sharedkey()
1727 struct cfg80211_connect_params *sme) brcmf_cfg80211_connect()
1732 struct ieee80211_channel *chan = sme->channel; brcmf_cfg80211_connect()
1747 if (!sme->ssid) { brcmf_cfg80211_connect()
1757 wpa_ie = brcmf_find_wpaie((u8 *)sme->ie, sme->ie_len); brcmf_cfg80211_connect()
1763 rsn_ie = brcmf_parse_tlvs((const u8 *)sme->ie, brcmf_cfg80211_connect()
1764 sme->ie_len, brcmf_cfg80211_connect()
1775 sme->ie, sme->ie_len); brcmf_cfg80211_connect()
1794 brcmf_dbg(INFO, "ie (%p), ie_len (%zd)\n", sme->ie, sme->ie_len); brcmf_cfg80211_connect()
1796 err = brcmf_set_wpa_version(ndev, sme); brcmf_cfg80211_connect()
1802 sme->auth_type = brcmf_war_auth_type(ifp, sme->auth_type); brcmf_cfg80211_connect()
1803 err = brcmf_set_auth_type(ndev, sme); brcmf_cfg80211_connect()
1809 err = brcmf_set_wsec_mode(ndev, sme, sme->mfp == NL80211_MFP_REQUIRED); brcmf_cfg80211_connect()
1815 err = brcmf_set_key_mgmt(ndev, sme); brcmf_cfg80211_connect()
1821 err = brcmf_set_sharedkey(ndev, sme); brcmf_cfg80211_connect()
1828 (u32)sme->ssid_len); brcmf_cfg80211_connect()
1829 memcpy(&profile->ssid.SSID, sme->ssid, profile->ssid.SSID_len); brcmf_cfg80211_connect()
1849 memcpy(&ext_join_params->ssid_le.SSID, sme->ssid, brcmf_cfg80211_connect()
1856 if (sme->bssid) brcmf_cfg80211_connect()
1857 memcpy(&ext_join_params->assoc_le.bssid, sme->bssid, ETH_ALEN); brcmf_cfg80211_connect()
1898 memcpy(&join_params.ssid_le.SSID, sme->ssid, profile->ssid.SSID_len); brcmf_cfg80211_connect()
1901 if (sme->bssid) brcmf_cfg80211_connect()
1902 memcpy(join_params.params_le.bssid, sme->bssid, ETH_ALEN); brcmf_cfg80211_connect()
1449 brcmf_set_wpa_version(struct net_device *ndev, struct cfg80211_connect_params *sme) brcmf_set_wpa_version() argument
1474 brcmf_set_auth_type(struct net_device *ndev, struct cfg80211_connect_params *sme) brcmf_set_auth_type() argument
1514 brcmf_set_wsec_mode(struct net_device *ndev, struct cfg80211_connect_params *sme, bool mfp) brcmf_set_wsec_mode() argument
1649 brcmf_set_sharedkey(struct net_device *ndev, struct cfg80211_connect_params *sme) brcmf_set_sharedkey() argument
1726 brcmf_cfg80211_connect(struct wiphy *wiphy, struct net_device *ndev, struct cfg80211_connect_params *sme) brcmf_cfg80211_connect() argument
/linux-4.4.14/drivers/net/wireless/mwifiex/
H A Dcfg80211.c2031 struct cfg80211_connect_params *sme, bool privacy) mwifiex_cfg80211_assoc()
2079 /* Now handle infra mode. "sme" is valid for infra mode only */ mwifiex_cfg80211_assoc()
2080 if (sme->auth_type == NL80211_AUTHTYPE_AUTOMATIC) { mwifiex_cfg80211_assoc()
2084 auth_type = sme->auth_type; mwifiex_cfg80211_assoc()
2087 if (sme->crypto.n_ciphers_pairwise) { mwifiex_cfg80211_assoc()
2089 sme->crypto.ciphers_pairwise[0]; mwifiex_cfg80211_assoc()
2093 if (sme->crypto.cipher_group) { mwifiex_cfg80211_assoc()
2094 priv->sec_info.encryption_mode = sme->crypto.cipher_group; mwifiex_cfg80211_assoc()
2097 if (sme->ie) mwifiex_cfg80211_assoc()
2098 ret = mwifiex_set_gen_ie(priv, sme->ie, sme->ie_len); mwifiex_cfg80211_assoc()
2100 if (sme->key) { mwifiex_cfg80211_assoc()
2104 "with key len %d\n", sme->key_len); mwifiex_cfg80211_assoc()
2105 priv->wep_key_curr_index = sme->key_idx; mwifiex_cfg80211_assoc()
2106 ret = mwifiex_set_encode(priv, NULL, sme->key, mwifiex_cfg80211_assoc()
2107 sme->key_len, sme->key_idx, mwifiex_cfg80211_assoc()
2177 struct cfg80211_connect_params *sme) mwifiex_cfg80211_connect()
2206 (char *)sme->ssid, sme->bssid); mwifiex_cfg80211_connect()
2208 ret = mwifiex_cfg80211_assoc(priv, sme->ssid_len, sme->ssid, sme->bssid, mwifiex_cfg80211_connect()
2209 priv->bss_mode, sme->channel, sme, 0); mwifiex_cfg80211_connect()
2028 mwifiex_cfg80211_assoc(struct mwifiex_private *priv, size_t ssid_len, const u8 *ssid, const u8 *bssid, int mode, struct ieee80211_channel *channel, struct cfg80211_connect_params *sme, bool privacy) mwifiex_cfg80211_assoc() argument
2176 mwifiex_cfg80211_connect(struct wiphy *wiphy, struct net_device *dev, struct cfg80211_connect_params *sme) mwifiex_cfg80211_connect() argument
/linux-4.4.14/drivers/net/ethernet/chelsio/cxgb/
H A Despi.c85 int i, sme = 1; tricn_init() local
94 if (sme) { tricn_init()
/linux-4.4.14/include/net/
H A Dcfg80211.h2607 struct cfg80211_connect_params *sme);

Completed in 517 milliseconds