Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching defs:ssid

54 			      struct wpa_ssid *ssid)
58 if (ssid == NULL || ssid->disabled_until.sec == 0)
62 if (ssid->disabled_until.sec > now.sec)
63 return ssid->disabled_until.sec - now.sec;
65 wpas_clear_temp_disabled(wpa_s, ssid, 0);
73 struct wpa_ssid *ssid, *old_ssid;
81 ssid = wpa_supplicant_get_ssid(wpa_s);
82 if (ssid == NULL) {
88 if (wpas_network_disabled(wpa_s, ssid)) {
94 disallowed_ssid(wpa_s, ssid->ssid, ssid->ssid_len)) {
99 res = wpas_temp_disabled(wpa_s, ssid);
108 if (wpa_key_mgmt_wpa_any(ssid->key_mgmt)) {
111 if (wpa_supplicant_set_suites(wpa_s, NULL, ssid,
115 wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
118 if (wpa_s->current_ssid && wpa_s->current_ssid != ssid)
121 wpa_s->current_ssid = ssid;
268 * @ssid: Configuration data for the network
275 struct wpa_ssid *ssid)
281 if (ssid->eap.pcsc == NULL || wpa_s->scard != NULL)
284 if (ssid->eap.eap_methods == NULL) {
288 struct eap_method_type *eap = ssid->eap.eap_methods;
337 static int has_wep_key(struct wpa_ssid *ssid)
342 if (ssid->wep_key_len[i])
351 struct wpa_ssid *ssid)
355 if (ssid->mixed_cell)
359 if (ssid->key_mgmt & WPA_KEY_MGMT_WPS)
363 if (has_wep_key(ssid))
367 if ((ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X_NO_WPA) &&
368 ssid->eapol_flags & (EAPOL_FLAG_REQUIRE_KEY_UNICAST |
373 if (wpa_key_mgmt_wpa(ssid->key_mgmt))
383 struct wpa_ssid *ssid,
392 ret = wpas_wps_ssid_bss_match(wpa_s, ssid, bss);
397 wep_ok = !wpa_key_mgmt_wpa(ssid->key_mgmt) &&
398 (((ssid->key_mgmt & WPA_KEY_MGMT_NONE) &&
399 ssid->wep_key_len[ssid->wep_tx_keyidx] > 0) ||
400 (ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X_NO_WPA));
403 while ((ssid->proto & WPA_PROTO_RSN) && rsn_ie) {
420 if (!(ie.proto & ssid->proto)) {
426 if (!(ie.pairwise_cipher & ssid->pairwise_cipher)) {
432 if (!(ie.group_cipher & ssid->group_cipher)) {
438 if (!(ie.key_mgmt & ssid->key_mgmt)) {
446 (ssid->ieee80211w == MGMT_FRAME_PROTECTION_DEFAULT ?
447 wpa_s->conf->pmf : ssid->ieee80211w) ==
460 while ((ssid->proto & WPA_PROTO_WPA) && wpa_ie) {
477 if (!(ie.proto & ssid->proto)) {
483 if (!(ie.pairwise_cipher & ssid->pairwise_cipher)) {
489 if (!(ie.group_cipher & ssid->group_cipher)) {
495 if (!(ie.key_mgmt & ssid->key_mgmt)) {
505 if ((ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X_NO_WPA) && !wpa_ie &&
511 if ((ssid->proto & (WPA_PROTO_WPA | WPA_PROTO_RSN)) &&
512 wpa_key_mgmt_wpa(ssid->key_mgmt) && proto_match == 0) {
517 if (!wpa_key_mgmt_wpa(ssid->key_mgmt)) {
712 struct wpa_ssid *ssid;
720 wpa_dbg(wpa_s, MSG_DEBUG, "%d: " MACSTR " ssid='%s' "
722 i, MAC2STR(bss->bssid), wpa_ssid_txt(bss->ssid, bss->ssid_len),
748 wpa_dbg(wpa_s, MSG_DEBUG, " skip - SSID not known");
757 if (disallowed_ssid(wpa_s, bss->ssid, bss->ssid_len)) {
758 wpa_dbg(wpa_s, MSG_DEBUG, " skip - SSID disallowed");
764 for (ssid = group; ssid; ssid = ssid->pnext) {
765 int check_ssid = wpa ? 1 : (ssid->ssid_len != 0);
768 if (wpas_network_disabled(wpa_s, ssid)) {
773 res = wpas_temp_disabled(wpa_s, ssid);
781 if ((ssid->key_mgmt & WPA_KEY_MGMT_WPS) && e && e->count > 0) {
787 if (wpa && ssid->ssid_len == 0 &&
788 wpas_wps_ssid_wildcard_ok(wpa_s, ssid, bss))
791 if (!wpa && (ssid->key_mgmt & WPA_KEY_MGMT_WPS)) {
792 /* Only allow wildcard SSID match if an AP
796 if (ssid->ssid_len == 0 &&
797 wpas_wps_ssid_wildcard_ok(wpa_s, ssid, bss))
802 if (ssid->bssid_set && ssid->ssid_len == 0 &&
803 os_memcmp(bss->bssid, ssid->bssid, ETH_ALEN) == 0)
807 (bss->ssid_len != ssid->ssid_len ||
808 os_memcmp(bss->ssid, ssid->ssid, bss->ssid_len) != 0)) {
809 wpa_dbg(wpa_s, MSG_DEBUG, " skip - SSID mismatch");
813 if (ssid->bssid_set &&
814 os_memcmp(bss->bssid, ssid->bssid, ETH_ALEN) != 0) {
819 if (!wpa_supplicant_ssid_bss_match(wpa_s, ssid, bss))
823 !(ssid->key_mgmt & WPA_KEY_MGMT_NONE) &&
824 !(ssid->key_mgmt & WPA_KEY_MGMT_WPS) &&
825 !(ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X_NO_WPA)) {
831 if (wpa && !wpa_key_mgmt_wpa(ssid->key_mgmt) &&
832 has_wep_key(ssid)) {
837 if (!wpa_supplicant_match_privacy(bss, ssid)) {
848 if (!freq_allowed(ssid->freq_list, bss->freq)) {
869 return ssid;
893 " ssid='%s'",
895 wpa_ssid_txt(bss->ssid, bss->ssid_len));
961 struct wpa_ssid *ssid)
963 if (wpas_wps_scan_pbc_overlap(wpa_s, selected, ssid)) {
980 " wpa_state: %s ssid=%p current_ssid=%p",
984 ssid, wpa_s->current_ssid);
999 ssid != wpa_s->current_ssid)))) {
1000 if (wpa_supplicant_scard_init(wpa_s, ssid)) {
1006 wpa_supplicant_associate(wpa_s, selected, ssid);
1020 struct wpa_ssid *ssid;
1023 for (ssid = wpa_s->conf->pssid[prio]; ssid; ssid = ssid->pnext)
1025 if (wpas_network_disabled(wpa_s, ssid))
1027 if (ssid->mode == IEEE80211_MODE_IBSS ||
1028 ssid->mode == IEEE80211_MODE_AP)
1029 return ssid;
1047 const u8 *ssid, *rsn;
1049 ssid = wpa_bss_get_ie(bss, WLAN_EID_SSID);
1050 if (ssid == NULL)
1057 rsn_preauth_scan_result(wpa_s->wpa, bss->bssid, ssid, rsn);
1065 struct wpa_ssid *ssid)
1075 return 1; /* unknown current SSID */
1076 if (wpa_s->current_ssid != ssid)
1082 if (wpa_s->current_ssid->ssid)
1084 wpa_s->current_ssid->ssid,
1279 struct wpa_ssid *ssid = NULL;
1281 selected = wpa_supplicant_pick_network(wpa_s, &ssid);
1285 skip = !wpa_supplicant_need_to_roam(wpa_s, selected, ssid);
1292 if (wpa_supplicant_connect(wpa_s, selected, ssid) < 0) {
1305 ssid = wpa_supplicant_pick_new_network(wpa_s);
1306 if (ssid) {
1308 wpa_supplicant_associate(wpa_s, NULL, ssid);
1695 struct wpa_ssid *ssid = wpa_s->current_ssid;
1697 if (ssid->ssid_len > 0)
1698 bss = wpa_bss_get(wpa_s, bssid, ssid->ssid, ssid->ssid_len);
2350 struct wpa_ssid *ssid;
2355 ssid = wpa_s->current_ssid;
2356 if (ssid == NULL)
2358 if (ssid->mode != WPAS_MODE_IBSS || !wpa_key_mgmt_wpa(ssid->key_mgmt))
2368 struct wpa_ssid *ssid = wpa_s->current_ssid;
2370 if (ssid == NULL)
2373 /* check if the ssid is correctly configured as IBSS/RSN */
2374 if (ssid->mode != WPAS_MODE_IBSS || !wpa_key_mgmt_wpa(ssid->key_mgmt))