Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching full:wpa

2  * WPA Supplicant - WPA state machine and EAPOL-Key processing
22 #include "wpa.h"
47 /* WPA IE version 1
58 * WPA Capabilities (2 octets, little endian) (default: 0)
208 /* bit4..5 is used in WPA, but is reserved in IEEE 802.11i/RSN */
255 * @proto: WPA/WPA2 version (WPA_PROTO_*)
263 "WPA2/IEEE 802.1X/EAP" : "WPA/IEEE 802.1X/EAP";
266 "WPA2-PSK" : "WPA-PSK";
270 return "IEEE 802.1X (no WPA)";
381 /* No WPA IE - fail silently */
634 * wpa_parse_wpa_ie - Parse WPA/RSN IE
635 * @wpa_ie: Pointer to WPA or RSN IE
636 * @wpa_ie_len: Length of the WPA/RSN IE
640 * Parse the contents of WPA or RSN IE and write the parsed data into data.
716 /* WPA Capabilities; use defaults, so no need to include it */
836 * wpa_gen_wpa_ie - Generate WPA/RSN IE based on current security policy
837 * @sm: Pointer to WPA state machine data from wpa_sm_init()
838 * @wpa_ie: Pointer to memory area for the generated WPA/RSN IE
839 * @wpa_ie_len: Maximum length of the generated WPA/RSN IE
840 * Returns: Length of the generated WPA/RSN IE or -1 on failure
905 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len);
906 wpa_hexdump_key(MSG_DEBUG, "WPA: PTK", ptk, ptk_len);
951 wpa_printf(MSG_DEBUG, "WPA: Failed to read BSSID for "
955 wpa_printf(MSG_DEBUG, "WPA: Use BSSID (" MACSTR
963 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len);
972 * @sm: Pointer to WPA state machine data from wpa_sm_init()
1021 wpa_printf(MSG_INFO, "WPA: Sending EAPOL-Key Request (error=%d "
1032 * @sm: Pointer to WPA state machine data from wpa_sm_init()
1114 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake",
1138 "WPA: Failed to get random data for INonce");
1144 wpa_hexdump(MSG_DEBUG, "WPA: INonce for SMK handshake",
1316 wpa_printf(MSG_DEBUG, "WPA: EAPOL-Key Key Data "
1319 wpa_hexdump_key(MSG_DEBUG, "WPA: Key Data",
1336 wpa_hexdump(MSG_DEBUG, "WPA: Unrecognized EAPOL-Key "
1386 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK from EAPOL state "
1399 "WPA: Failed to get master session key from "
1402 "WPA: Key handshake aborted");
1448 wpa_printf(MSG_WARNING, "WPA: No wpa_ie set - cannot "
1453 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE for msg 2/4", wpa_ie, wpa_ie_len);
1477 wpa_printf(MSG_DEBUG, "WPA: Sending EAPOL-Key 2/4");
1495 wpa_printf(MSG_WARNING, "WPA: No SSID info found (msg 1 of "
1501 wpa_printf(MSG_DEBUG, "WPA: RX message 1 of 4-Way Handshake from "
1526 "WPA: Failed to get random data for SNonce");
1530 wpa_hexdump(MSG_DEBUG, "WPA: Renewed SNonce",
1565 wpa_msg(sm->ctx->ctx, MSG_INFO, "WPA: Key negotiation completed with "
1605 wpa_printf(MSG_DEBUG, "WPA: Installing PTK to the driver.");
1619 wpa_printf(MSG_DEBUG, "WPA: Pairwise Cipher Suite: "
1623 wpa_printf(MSG_WARNING, "WPA: Unsupported pairwise cipher %d",
1632 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key_rsc, rsclen);
1637 wpa_printf(MSG_WARNING, "WPA: Failed to set PTK to the "
1685 wpa_printf(MSG_WARNING, "WPA: Unsupported Group Cipher %d",
1691 wpa_printf(MSG_WARNING, "WPA: Unsupported %s Group Cipher key "
1715 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len);
1716 wpa_printf(MSG_DEBUG, "WPA: Installing GTK to the driver "
1718 wpa_hexdump(MSG_DEBUG, "WPA: RSC", key_rsc, gd->key_rsc_len);
1731 wpa_printf(MSG_WARNING, "WPA: Failed to set "
1739 wpa_printf(MSG_WARNING, "WPA: Failed to set GTK to "
1757 wpa_printf(MSG_INFO, "WPA: Tx bit set for GTK, but pairwise "
1828 wpa_printf(MSG_DEBUG, "WPA: IGTK keyid %d "
1831 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK",
1834 wpa_printf(MSG_WARNING, "WPA: Invalid IGTK KeyID %d",
1842 wpa_printf(MSG_WARNING, "WPA: Failed to configure IGTK"
1853 wpa_hexdump_key(MSG_DEBUG, "WPA: DHV", dhv->dhv, WPA_DHV_LEN);
1857 wpa_printf(MSG_WARNING, "WPA: Failed to configure DHV "
1875 wpa_msg(sm->ctx->ctx, MSG_WARNING, "WPA: %s (src=" MACSTR ")",
1879 wpa_hexdump(MSG_INFO, "WPA: WPA IE in Beacon/ProbeResp",
1884 wpa_printf(MSG_INFO, "WPA: No WPA IE in "
1887 wpa_hexdump(MSG_INFO, "WPA: WPA IE in 3/4 msg",
1892 wpa_hexdump(MSG_INFO, "WPA: RSN IE in Beacon/ProbeResp",
1897 wpa_printf(MSG_INFO, "WPA: No RSN IE in "
1900 wpa_hexdump(MSG_INFO, "WPA: RSN IE in 3/4 msg",
1915 wpa_printf(MSG_DEBUG, "WPA: No WPA/RSN IE for this AP known. "
1918 wpa_printf(MSG_WARNING, "WPA: Could not find AP from "
1921 wpa_printf(MSG_DEBUG, "WPA: Found the current AP from "
1976 wpa_hexdump(MSG_DEBUG, "WPA: KDE for msg 4/4", kde, kde_len);
2000 wpa_printf(MSG_DEBUG, "WPA: Sending EAPOL-Key 4/4");
2017 wpa_printf(MSG_DEBUG, "WPA: RX message 3 of 4-Way Handshake from "
2024 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", pos, len);
2027 wpa_printf(MSG_WARNING, "WPA: GTK IE in unencrypted key data");
2032 wpa_printf(MSG_WARNING, "WPA: DHV/IGTK KDE in unencrypted key "
2038 wpa_printf(MSG_WARNING, "WPA: Invalid DHV KDE length %lu",
2044 wpa_printf(MSG_WARNING, "WPA: Invalid IGTK KDE length %lu",
2054 wpa_printf(MSG_WARNING, "WPA: ANonce from message 1 of 4-Way "
2064 wpa_printf(MSG_WARNING, "WPA: Invalid CCMP key length "
2072 wpa_printf(MSG_WARNING, "WPA: Invalid TKIP key length "
2326 "WPA: Failed to get random data for PNonce");
2350 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE for SMK handshake",
2741 wpa_hexdump(MSG_DEBUG, "WPA: Renewed PNonce",
2973 wpa_printf(MSG_WARNING, "WPA: GTK IE in unencrypted key data");
2977 wpa_printf(MSG_INFO, "WPA: No GTK IE in Group Key msg 1/2");
3018 wpa_printf(MSG_INFO, "WPA: Truncated EAPOL-Key packet:"
3026 wpa_printf(MSG_INFO, "WPA: Too short maxkeylen (%lu)",
3044 wpa_printf(MSG_WARNING, "WPA: RC4 key data "
3053 wpa_printf(MSG_WARNING, "WPA: Unsupported AES-WRAP "
3058 wpa_printf(MSG_WARNING, "WPA: AES-WRAP key data "
3066 wpa_printf(MSG_WARNING, "WPA: AES unwrap "
3104 wpa_printf(MSG_DEBUG, "WPA: Sending EAPOL-Key 2/2");
3124 wpa_printf(MSG_DEBUG, "WPA: RX message 1 of Group Key Handshake from "
3151 wpa_msg(sm->ctx->ctx, MSG_INFO, "WPA: Group rekeying "
3177 wpa_printf(MSG_WARNING, "WPA: Invalid EAPOL-Key MIC "
3192 wpa_printf(MSG_WARNING, "WPA: Invalid EAPOL-Key MIC "
3200 wpa_printf(MSG_WARNING, "WPA: Could not verify EAPOL-Key MIC "
3280 wpa_printf(MSG_WARNING, "WPA: PTK not available, "
3295 wpa_printf(MSG_WARNING, "WPA: Unsupported "
3302 wpa_printf(MSG_WARNING, "WPA: No memory for "
3309 wpa_printf(MSG_WARNING, "WPA: AES unwrap failed - "
3317 wpa_hexdump_key(MSG_DEBUG, "WPA: decrypted EAPOL-Key key data",
3324 * wpa_sm_aborted_cached - Notify WPA that PMKSA caching was aborted
3325 * @sm: Pointer to WPA state machine data from wpa_sm_init()
3371 * wpa_sm_rx_eapol - Process received WPA EAPOL frames
3372 * @sm: Pointer to WPA state machine data from wpa_sm_init()
3376 * Returns: 1 = WPA EAPOL-Key processed, 0 = not a WPA EAPOL-Key, -1 failure
3380 * only processing WPA and WPA2 EAPOL-Key frames.
3398 wpa_printf(MSG_DEBUG, "WPA: EAPOL frame too short to be a WPA "
3421 wpa_printf(MSG_DEBUG, "WPA: EAPOL frame (type %u) discarded, "
3427 wpa_printf(MSG_DEBUG, "WPA: EAPOL frame payload size %lu "
3436 wpa_printf(MSG_DEBUG, "WPA: EAPOL-Key type (%d) unknown, "
3444 wpa_hexdump(MSG_MSGDUMP, "WPA: RX EAPOL-Key", tmp, len);
3446 wpa_printf(MSG_DEBUG, "WPA: ignoring %lu bytes after the IEEE "
3453 wpa_printf(MSG_INFO, "WPA: Unsupported EAPOL-Key descriptor "
3460 wpa_printf(MSG_INFO, "WPA: CCMP is used, but EAPOL-Key "
3468 wpa_printf(MSG_INFO, "WPA: Backwards compatibility: "
3513 wpa_printf(MSG_WARNING, "WPA: EAPOL-Key Replay Counter did not"
3523 wpa_printf(MSG_INFO, "WPA: No Ack bit in key_info");
3528 wpa_printf(MSG_INFO, "WPA: EAPOL-Key with Request bit - "
3547 wpa_msg(sm->ctx->ctx, MSG_INFO, "WPA: Invalid EAPOL-Key "
3564 wpa_printf(MSG_WARNING, "WPA: Ignored EAPOL-Key "
3620 wpa_printf(MSG_WARNING, "WPA: EAPOL-Key (Group) "
3701 * @sm: Pointer to WPA state machine data from wpa_sm_init()
3803 * wpa_sm_init - Initialize WPA state machine
3805 * Returns: Pointer to the allocated WPA state machine data
3807 * This function is used to allocate a new WPA state machine and the returned
3808 * value is passed to all WPA state machine calls.
3837 * wpa_sm_deinit - Deinitialize WPA state machine
3838 * @sm: Pointer to WPA state machine data from wpa_sm_init()
3865 * wpa_sm_notify_assoc - Notify WPA state machine about association
3866 * @sm: Pointer to WPA state machine data from wpa_sm_init()
3869 * This function is called to let WPA state machine know that the connection
3877 wpa_printf(MSG_DEBUG, "WPA: Association event - clear replay counter");
3888 * wpa_sm_notify_disassoc - Notify WPA state machine about disassociation
3889 * @sm: Pointer to WPA state machine data from wpa_sm_init()
3891 * This function is called to let WPA state machine know that the connection
3904 * @sm: Pointer to WPA state machine data from wpa_sm_init()
3908 * Configure the PMK for WPA state machine.
3922 * @sm: Pointer to WPA state machine data from wpa_sm_init()
3944 * @sm: Pointer to WPA state machine data from wpa_sm_init()
3956 * @sm: Pointer to WPA state machine data from wpa_sm_init()
3971 * @sm: Pointer to WPA state machine data from wpa_sm_init()
3974 * Notify WPA state machine that configuration has changed. config will be
3989 * @sm: Pointer to WPA state machine data from wpa_sm_init()
4001 * @sm: Pointer to WPA state machine data from wpa_sm_init()
4017 * @sm: Pointer to WPA state machine data from wpa_sm_init()
4028 * wpa_sm_set_param - Set WPA state machine parameters
4029 * @sm: Pointer to WPA state machine data from wpa_sm_init()
4087 * wpa_sm_get_param - Get WPA state machine parameters
4088 * @sm: Pointer to WPA state machine data from wpa_sm_init()
4123 * wpa_sm_get_status - Get WPA state machine
4124 * @sm: Pointer to WPA state machine data from wpa_sm_init()
4130 * Query WPA state machine for status information. This function fills in
4155 * wpa_sm_set_assoc_wpa_ie_default - Generate own WPA/RSN IE from configuration
4156 * @sm: Pointer to WPA state machine data from wpa_sm_init()
4157 * @wpa_ie: Pointer to buffer for WPA/RSN IE
4174 wpa_hexdump(MSG_DEBUG, "WPA: Set own WPA IE default",
4179 * Make a copy of the WPA/RSN IE so that 4-Way Handshake gets
4196 * wpa_sm_set_assoc_wpa_ie - Set own WPA/RSN IE from (Re)AssocReq
4197 * @sm: Pointer to WPA state machine data from wpa_sm_init()
4202 * Inform WPA state machine about the WPA/RSN IE used in (Re)Association
4213 wpa_printf(MSG_DEBUG, "WPA: clearing own WPA/RSN IE");
4217 wpa_hexdump(MSG_DEBUG, "WPA: set own WPA/RSN IE", ie, len);
4231 * wpa_sm_set_ap_wpa_ie - Set AP WPA IE from Beacon/ProbeResp
4232 * @sm: Pointer to WPA state machine data from wpa_sm_init()
4237 * Inform WPA state machine about the WPA IE used in Beacon / Probe Response
4247 wpa_printf(MSG_DEBUG, "WPA: clearing AP WPA IE");
4251 wpa_hexdump(MSG_DEBUG, "WPA: set AP WPA IE", ie, len);
4266 * @sm: Pointer to WPA state machine data from wpa_sm_init()
4271 * Inform WPA state machine about the RSN IE used in Beacon / Probe Response
4281 wpa_printf(MSG_DEBUG, "WPA: clearing AP RSN IE");
4285 wpa_hexdump(MSG_DEBUG, "WPA: set AP RSN IE", ie, len);
4299 * wpa_sm_parse_own_wpa_ie - Parse own WPA/RSN IE
4300 * @sm: Pointer to WPA state machine data from wpa_sm_init()
4304 * Parse the contents of the own WPA or RSN IE from (Re)AssocReq and write the
4310 wpa_printf(MSG_DEBUG, "WPA: No WPA/RSN IE available from "