Home | History | Annotate | Download | only in rsn_supp

Lines Matching refs:tdls

2  * wpa_supplicant - TDLS
52 u8 Anonce[WPA_NONCE_LEN]; /* Responder Nonce in TDLS */
53 u8 Snonce[WPA_NONCE_LEN]; /* Initiator Nonce in TDLS */
72 /* TDLS frame headers as per IEEE Std 802.11z-2010 */
89 int initiator; /* whether this end was initiator for TDLS setup */
112 u8 action_code; /* TDLS frame type */
139 * WEP/WPA/WPA2 hence TDLS frames are processed for TPK handshake.
156 wpa_printf(MSG_WARNING, "TDLS: Failed to delete TPK-TK from "
179 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: "
183 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
190 wpa_printf(MSG_WARNING, "TDLS: Failed to set TPK to the "
213 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u "
220 wpa_printf(MSG_INFO, "TDLS: Failed to send message "
231 for (peer = sm->tdls; peer; peer = peer->next) {
237 wpa_printf(MSG_INFO, "TDLS: No matching entry found for "
259 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered "
298 wpa_printf(MSG_INFO, "TDLS: Retrying sending of message "
303 wpa_printf(MSG_INFO, "TDLS: No retry buffer available "
318 wpa_printf(MSG_INFO, "TDLS: Failed to retry "
328 wpa_printf(MSG_DEBUG, "TDLS: Sending Teardown Request");
340 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout cancelled for "
355 wpa_printf(MSG_INFO, "TDLS: Error in cancelling retry timeout "
381 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN);
382 wpa_hexdump(MSG_DEBUG, "TDLS: max(Nonce)", nonce[1], WPA_NONCE_LEN);
384 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-Key-Input",
388 * TPK-Key-Data = KDF-N_KEY(TPK-Key-Input, "TDLS PMK",
403 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data));
405 sha256_prf(key_input, SHA256_MAC_LEN, "TDLS PMK", data, sizeof(data),
407 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK",
409 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-TK",
416 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC
424 * Calculate MIC for TDLS frame.
438 wpa_printf(MSG_WARNING, "TDLS: No memory for MIC calculation");
444 /* 1) TDLS initiator STA MAC address */
447 /* 2) TDLS responder STA MAC address */
467 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf);
468 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16);
471 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16);
477 * wpa_tdls_key_mic_teardown - Calculate TDLS FTIE MIC for Teardown frame
486 * Calculate MIC for TDLS frame.
505 wpa_printf(MSG_WARNING, "TDLS: No memory for MIC calculation");
526 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf);
527 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16);
530 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16);
547 wpa_printf(MSG_INFO, "TDLS: Invalid MIC in FTIE - "
549 wpa_hexdump(MSG_DEBUG, "TDLS: Received MIC",
551 wpa_hexdump(MSG_DEBUG, "TDLS: Calculated MIC",
556 wpa_printf(MSG_WARNING, "TDLS: Could not verify TDLS MIC, "
574 wpa_printf(MSG_INFO, "TDLS: Invalid MIC in Teardown - "
579 wpa_printf(MSG_INFO, "TDLS: Could not verify TDLS Teardown "
601 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
605 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
615 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR,
666 for (peer = sm->tdls; peer; peer = peer->next) {
672 wpa_printf(MSG_INFO, "TDLS: No matching entry found for "
679 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown for " MACSTR,
714 wpa_printf(MSG_DEBUG, "TDLS: Testing - add extra subelem to "
722 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TDLS Teardown handshake",
754 for (peer = sm->tdls; peer; peer = peer->next) {
760 wpa_printf(MSG_DEBUG, "TDLS: Could not find peer " MACSTR
766 wpa_printf(MSG_DEBUG, "TDLS: Peer " MACSTR
779 for (peer = sm->tdls; peer; peer = peer->next) {
803 for (peer = sm->tdls; peer; peer = peer->next) {
809 wpa_printf(MSG_INFO, "TDLS: No matching entry found for "
820 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown Request from " MACSTR
825 wpa_printf(MSG_INFO, "TDLS: Failed to parse IEs in Teardown");
830 wpa_printf(MSG_INFO, "TDLS: No Link Identifier IE in TDLS "
840 wpa_printf(MSG_INFO, "TDLS: No FTIE in TDLS Teardown");
846 /* Process MIC check to see if TDLS Teardown is right */
850 wpa_printf(MSG_DEBUG, "TDLS: MIC failure for TDLS "
870 * wpa_tdls_send_error - To send suitable TDLS status response with
873 * @tdls_action - TDLS frame type for which error code is sent
880 wpa_printf(MSG_DEBUG, "TDLS: Sending error to " MACSTR
895 for (peer = sm->tdls; peer; peer = peer->next) {
903 wpa_printf(MSG_INFO, "TDLS: Creating peer entry for " MACSTR,
911 peer->next = sm->tdls;
912 sm->tdls = peer;
930 wpa_printf(MSG_DEBUG, "TDLS: No security used on the link");
955 * AES-CCMP is the default Encryption preferred for TDLS, so
957 * Note: TKIP is not used to encrypt TDLS link.
977 wpa_printf(MSG_DEBUG, "TDLS: Use alternative RSN IE for "
994 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE for TPK handshake",
1028 "TDLS: Failed to get random data for initiator Nonce");
1033 wpa_hexdump(MSG_DEBUG, "TDLS: Initiator Nonce for TPK handshake",
1037 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TPK Handshake M1",
1044 wpa_printf(MSG_DEBUG, "TDLS: Testing - add extra subelem to "
1057 wpa_printf(MSG_DEBUG, "TDLS: Testing - use short TPK "
1062 wpa_printf(MSG_DEBUG, "TDLS: Testing - use long TPK "
1069 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds", peer->lifetime);
1075 wpa_printf(MSG_DEBUG, "TDLS: Testing - use incorrect BSSID in "
1084 wpa_printf(MSG_DEBUG, "TDLS: Sending TDLS Setup Request / TPK "
1136 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TPK M2",
1143 wpa_printf(MSG_DEBUG, "TDLS: Testing - add extra subelem to "
1156 wpa_printf(MSG_DEBUG, "TDLS: Testing - use wrong TPK "
1163 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds from initiator",
1224 wpa_printf(MSG_DEBUG, "TDLS: Testing - add extra subelem to "
1237 wpa_printf(MSG_DEBUG, "TDLS: Testing - use wrong TPK "
1244 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds",
1264 wpa_printf(MSG_DEBUG, "TDLS: Sending TDLS Discovery Response "
1283 wpa_printf(MSG_DEBUG, "TDLS: Discovery Request from " MACSTR,
1287 wpa_printf(MSG_DEBUG, "TDLS Discovery Request is too short: "
1300 wpa_printf(MSG_DEBUG, "TDLS: Link ID not found in Discovery "
1308 wpa_printf(MSG_DEBUG, "TDLS: Discovery Request from different "
1326 wpa_printf(MSG_DEBUG, "TDLS: Sending Discovery Request to peer "
1337 wpa_printf(MSG_DEBUG, "TDLS: No supported rates received");
1354 wpa_printf(MSG_DEBUG, "TDLS: No supported ht capabilities "
1368 wpa_hexdump(MSG_DEBUG, "TDLS: Peer HT capabilities",
1382 wpa_printf(MSG_DEBUG, "TDLS: No supported vht capabilities "
1396 wpa_hexdump(MSG_DEBUG, "TDLS: Peer VHT capabilities",
1408 wpa_printf(MSG_DEBUG, "TDLS: No extended capabilities "
1461 wpa_printf(MSG_INFO, "TDLS: Dialog Token in TPK M1 %d", dtoken);
1472 wpa_printf(MSG_DEBUG, "TDLS: TDLS Setup Request while "
1492 * TDLS Setup Request. If so, compare MAC addresses and let the
1498 wpa_printf(MSG_DEBUG, "TDLS: Discard request "
1503 wpa_printf(MSG_DEBUG, "TDLS: Accept request "
1524 wpa_printf(MSG_INFO, "TDLS: Failed to parse IEs in TPK M1");
1529 wpa_printf(MSG_INFO, "TDLS: No valid Link Identifier IE in "
1533 wpa_hexdump(MSG_DEBUG, "TDLS: Link ID Received from TPK M1",
1537 wpa_printf(MSG_INFO, "TDLS: TPK M1 from diff BSS");
1542 wpa_printf(MSG_DEBUG, "TDLS: TPK M1 - TPK initiator " MACSTR,
1564 wpa_printf(MSG_DEBUG, "TDLS: Testing concurrent initiation of "
1565 "TDLS setup - send own request");
1572 wpa_printf(MSG_DEBUG, "TDLS: Testing - ignore AP prohibition "
1573 "on TDLS");
1579 wpa_printf(MSG_INFO, "TDLS: TDLS prohibited in this BSS");
1586 wpa_printf(MSG_INFO, "TDLS: RSN IE in TPK M1 while "
1596 wpa_printf(MSG_INFO, "TDLS: No FTIE or RSN IE in TPK M1");
1602 wpa_printf(MSG_INFO, "TDLS: Too long Initiator RSN IE in "
1609 wpa_printf(MSG_INFO, "TDLS: Failed to parse RSN IE in TPK M1");
1616 wpa_printf(MSG_DEBUG, "TDLS: Using CCMP for direct link");
1619 wpa_printf(MSG_INFO, "TDLS: No acceptable cipher in TPK M1");
1627 wpa_printf(MSG_INFO, "TDLS: Invalid RSN Capabilities in "
1635 wpa_printf(MSG_INFO, "TDLS: No Key Lifetime IE in TPK M1");
1641 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds", lifetime);
1643 wpa_printf(MSG_INFO, "TDLS: Too short TPK lifetime");
1680 "TDLS: Failed to get random data for responder nonce");
1727 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE for TPK handshake",
1739 wpa_printf(MSG_DEBUG, "TDLS: Sending TDLS Setup Response / TPK M2");
1770 wpa_printf(MSG_DEBUG, "TDLS: Testing - disable TPK "
1777 /* add supported rates, capabilities, and qos_info to the TDLS peer */
1804 wpa_printf(MSG_DEBUG, "TDLS: Received TDLS Setup Response / TPK M2 "
1806 for (peer = sm->tdls; peer; peer = peer->next) {
1811 wpa_printf(MSG_INFO, "TDLS: No matching peer found for "
1817 * This may happen if both devices try to initiate TDLS at the
1821 wpa_printf(MSG_INFO, "TDLS: We were not the initiator, so "
1835 wpa_printf(MSG_INFO, "TDLS: Status code in TPK M2: %u",
1847 wpa_printf(MSG_DEBUG, "TDLS: Dialog Token in TPK M2 %d", dtoken);
1858 wpa_printf(MSG_INFO, "TDLS: Failed to parse IEs in TPK M2");
1864 wpa_printf(MSG_DEBUG, "TDLS: Testing - decline response");
1871 wpa_printf(MSG_INFO, "TDLS: No valid Link Identifier IE in "
1875 wpa_hexdump(MSG_DEBUG, "TDLS: Link ID Received from TPK M2",
1880 wpa_printf(MSG_INFO, "TDLS: TPK M2 from different BSS");
1907 wpa_printf(MSG_INFO, "TDLS: No FTIE or RSN IE in TPK M2");
1911 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE Received from TPK M2",
1922 wpa_printf(MSG_INFO, "TDLS: RSN IE in TPK M2 does "
1924 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE Sent in TPK M1",
1926 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE Received from TPK M2",
1933 wpa_printf(MSG_INFO, "TDLS: Failed to parse RSN IE in TPK M2");
1940 wpa_printf(MSG_DEBUG, "TDLS: Using CCMP for direct link");
1943 wpa_printf(MSG_INFO, "TDLS: No acceptable cipher in TPK M2");
1948 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE Received from TPK M2",
1953 wpa_printf(MSG_INFO, "TDLS: FTIE SNonce in TPK M2 does "
1967 wpa_printf(MSG_INFO, "TDLS: No Key Lifetime IE in TPK M2");
1973 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds in TPK M2",
1976 wpa_printf(MSG_INFO, "TDLS: Unexpected TPK lifetime %u in "
2000 wpa_printf(MSG_DEBUG, "TDLS: Sending TDLS Setup Confirm / "
2030 wpa_printf(MSG_DEBUG, "TDLS: Received TDLS Setup Confirm / TPK M3 "
2032 for (peer = sm->tdls; peer; peer = peer->next) {
2037 wpa_printf(MSG_INFO, "TDLS: No matching peer found for "
2051 wpa_printf(MSG_INFO, "TDLS: Status code in TPK M3: %u",
2061 wpa_printf(MSG_INFO, "TDLS: Failed to parse KDEs in TPK M3");
2066 wpa_printf(MSG_INFO, "TDLS: No Link Identifier IE in TPK M3");
2069 wpa_hexdump(MSG_DEBUG, "TDLS: Link ID Received from TPK M3",
2074 wpa_printf(MSG_INFO, "TDLS: TPK M3 from diff BSS");
2082 wpa_printf(MSG_INFO, "TDLS: No FTIE in TPK M3");
2085 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE Received from TPK M3",
2090 wpa_printf(MSG_INFO, "TDLS: No RSN IE in TPK M3");
2093 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE Received from TPK M3",
2097 wpa_printf(MSG_INFO, "TDLS: RSN IE in TPK M3 does not match "
2103 wpa_printf(MSG_INFO, "TDLS: FTIE ANonce in TPK M3 does "
2109 wpa_printf(MSG_INFO, "TDLS: FTIE SNonce in TPK M3 does not "
2115 wpa_printf(MSG_INFO, "TDLS: No Key Lifetime IE in TPK M3");
2119 wpa_hexdump(MSG_DEBUG, "TDLS: Timeout IE Received from TPK M3",
2122 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds in TPK M3",
2125 wpa_printf(MSG_INFO, "TDLS: Unexpected TPK lifetime %u in "
2164 * wpa_tdls_start - Initiate TDLS handshake (send TPK Handshake Message 1)
2169 * Send TPK Handshake Message 1 info to driver to start TDLS
2183 wpa_printf(MSG_DEBUG, "TDLS: Testing - ignore AP prohibition "
2184 "on TDLS");
2190 wpa_printf(MSG_DEBUG, "TDLS: TDLS is prohibited in this BSS - "
2221 for (peer = sm->tdls; peer; peer = peer->next) {
2240 * wpa_supplicant_rx_tdls - Receive TDLS data frame
2242 * This function is called to receive TDLS (ethertype = 0x890d) data frames.
2250 wpa_hexdump(MSG_DEBUG, "TDLS: Received Data frame encapsulation",
2254 wpa_printf(MSG_DEBUG, "TDLS: Discard message - TDLS disabled "
2260 wpa_printf(MSG_DEBUG, "TDLS: Discard copy of own message");
2265 wpa_printf(MSG_INFO, "TDLS: Drop too short frame");
2269 /* Check to make sure its a valid encapsulated TDLS frame */
2273 wpa_printf(MSG_INFO, "TDLS: Invalid frame - payloadtype=%u "
2297 wpa_printf(MSG_DEBUG, "TDLS: Ignore TDLS frame action code %u",
2305 * wpa_tdls_init - Initialize driver interface parameters for TDLS
2309 * This function is called to initialize driver interface parameters for TDLS.
2324 wpa_printf(MSG_ERROR, "TDLS: Failed to open l2_packet "
2330 * Drivers that support TDLS but don't implement the get_capa callback
2339 wpa_printf(MSG_DEBUG, "TDLS: TDLS operation%s supported by "
2341 wpa_printf(MSG_DEBUG, "TDLS: Driver uses %s link setup",
2352 peer = sm->tdls;
2354 wpa_printf(MSG_DEBUG, "TDLS: Tear down peers");
2357 wpa_printf(MSG_DEBUG, "TDLS: Tear down peer " MACSTR,
2374 peer = sm->tdls;
2375 sm->tdls = NULL;
2381 wpa_printf(MSG_DEBUG, "TDLS: Remove peer " MACSTR " (res=%d)",
2391 * wpa_tdls_deinit - Deinitialize driver interface parameters for TDLS
2393 * This function is called to recover driver interface parameters for TDLS
2411 wpa_printf(MSG_DEBUG, "TDLS: Remove peers on association");
2418 wpa_printf(MSG_DEBUG, "TDLS: Remove peers on disassociation");
2436 /* bit 38 - TDLS Prohibited */
2444 wpa_printf(MSG_DEBUG, "TDLS: TDLS is %s in the target BSS",
2452 wpa_printf(MSG_DEBUG, "TDLS: TDLS prohibited based on "
2461 wpa_printf(MSG_DEBUG, "TDLS: %s", enabled ? "enabled" : "disabled");