Home | History | Annotate | Download | only in rsn_supp

Lines Matching defs:rsn

27  * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
144 /* When using drivers that generate RSN IE, wpa_supplicant may
152 "RSN: found matching PMKID from PMKSA cache");
155 "RSN: no matching PMKID found");
162 wpa_hexdump(MSG_DEBUG, "RSN: matched PMKID", pmkid, PMKID_LEN);
164 wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from PMKSA cache",
209 "RSN: the new PMK matches with the "
223 "RSN: Cancelled PMKSA caching "
240 "RSN: no PMKSA entry found - trigger "
259 * wpa_supplicant_send_2_of_4 - Send message 2 of WPA/RSN 4-Way Handshake
265 * @wpa_ie: WPA/RSN IE
266 * @wpa_ie_len: Length of the WPA/RSN IE
292 * Add PMKR1Name into RSN IE (PMKID-List) and add MDIE and
397 /* RSN: msg 1/4 should contain PMKID for the selected PMK */
400 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/4 key data", _buf, len);
404 wpa_hexdump(MSG_DEBUG, "RSN: PMKID from "
412 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: Do not reply to "
490 "RSN: Authenticator accepted "
679 wpa_hexdump_key(MSG_DEBUG, "RSN: received GTK in pairwise handshake",
699 "RSN: Failed to install GTK");
774 wpa_hexdump(MSG_INFO, "WPA: RSN IE in Beacon/ProbeResp",
780 "WPA: No RSN IE in Beacon/ProbeResp");
782 wpa_hexdump(MSG_INFO, "WPA: RSN IE in 3/4 msg",
855 struct wpa_ie_data rsn;
864 if (wpa_parse_wpa_ie_rsn(ie->rsn_ie, ie->rsn_ie_len, &rsn) < 0 ||
865 rsn.num_pmkid != 1 || rsn.pmkid == NULL) {
871 if (os_memcmp(rsn.pmkid, sm->pmk_r1_name, WPA_PMK_NAME_LEN) != 0) {
876 rsn.pmkid, WPA_PMK_NAME_LEN);
927 "WPA: No WPA/RSN IE for this AP known. "
966 "detected - RSN was enabled and RSN IE "
985 * wpa_supplicant_send_4_of_4 - Send message 4 of WPA/RSN 4-Way Handshake
1125 "RSN: Failed to configure GTK");
1131 "RSN: Failed to configure IGTK");
1153 wpa_hexdump(MSG_DEBUG, "RSN: msg 1/2 key data", keydata, keydatalen);
1173 wpa_hexdump(MSG_DEBUG, "RSN: received GTK in group key handshake",
1180 "RSN: Too long GTK in GTK IE (len=%lu)",
1188 "RSN: Failed to configure IGTK");
1422 /* Decrypt RSN EAPOL-Key key data (RC4 or AES-WRAP) */
1428 wpa_hexdump(MSG_DEBUG, "RSN: encrypted key data",
1494 "RSN: Cancelling PMKSA caching attempt");
1694 "RSN: EAPOL-Key Replay Counter did not "
1705 "RSN: EAPOL-Key Replay "
1715 "RSN: Ack bit in key_info from STK peer");
1943 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA cache entry free_cb: "
1948 "RSN: %s current PMKSA entry",
1966 "RSN: deauthenticating due to expired PMK");
2004 "RSN: PMKSA cache initialization failed");
2397 struct wpa_ie_data rsn;
2398 if (wpa_parse_wpa_ie_rsn(sm->ap_rsn_ie, sm->ap_rsn_ie_len, &rsn)
2400 rsn.capabilities & (WPA_CAPABILITY_MFPR |
2403 (rsn.capabilities &
2416 * wpa_sm_set_assoc_wpa_ie_default - Generate own WPA/RSN IE from configuration
2418 * @wpa_ie: Pointer to buffer for WPA/RSN IE
2440 * Make a copy of the WPA/RSN IE so that 4-Way Handshake gets
2457 * wpa_sm_set_assoc_wpa_ie - Set own WPA/RSN IE from (Re)AssocReq
2463 * Inform WPA state machine about the WPA/RSN IE used in (Re)Association
2475 "WPA: clearing own WPA/RSN IE");
2479 wpa_hexdump(MSG_DEBUG, "WPA: set own WPA/RSN IE", ie, len);
2528 * wpa_sm_set_ap_rsn_ie - Set AP RSN IE from Beacon/ProbeResp
2534 * Inform WPA state machine about the RSN IE used in Beacon / Probe Response
2545 "WPA: clearing AP RSN IE");
2549 wpa_hexdump(MSG_DEBUG, "WPA: set AP RSN IE", ie, len);
2563 * wpa_sm_parse_own_wpa_ie - Parse own WPA/RSN IE
2568 * Parse the contents of the own WPA or RSN IE from (Re)AssocReq and write the
2578 "WPA: No WPA/RSN IE available from association info");