Home | History | Annotate | Download | only in rsn_supp

Lines Matching refs:tdls

2  * wpa_supplicant - TDLS
54 u8 Anonce[WPA_NONCE_LEN]; /* Responder Nonce in TDLS */
55 u8 Snonce[WPA_NONCE_LEN]; /* Initiator Nonce in TDLS */
74 /* TDLS frame headers as per IEEE Std 802.11z-2010 */
94 int initiator; /* whether this end was initiator for TDLS setup */
118 u8 action_code; /* TDLS frame type */
147 * WEP/WPA/WPA2 hence TDLS frames are processed for TPK handshake.
164 wpa_printf(MSG_WARNING, "TDLS: Failed to delete TPK-TK from "
187 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: "
191 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
198 wpa_printf(MSG_WARNING, "TDLS: Failed to set TPK to the "
221 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u "
228 wpa_printf(MSG_INFO, "TDLS: Failed to send message "
239 for (peer = sm->tdls; peer; peer = peer->next) {
245 wpa_printf(MSG_INFO, "TDLS: No matching entry found for "
272 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered "
303 wpa_printf(MSG_INFO, "TDLS: Retrying sending of message "
308 wpa_printf(MSG_INFO, "TDLS: No retry buffer available "
323 wpa_printf(MSG_INFO, "TDLS: Failed to retry "
334 wpa_printf(MSG_DEBUG, "TDLS: Sending Teardown Request");
346 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout cancelled for "
361 wpa_printf(MSG_INFO, "TDLS: Error in cancelling retry timeout "
387 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN);
388 wpa_hexdump(MSG_DEBUG, "TDLS: max(Nonce)", nonce[1], WPA_NONCE_LEN);
390 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-Key-Input",
394 * TPK-Key-Data = KDF-N_KEY(TPK-Key-Input, "TDLS PMK",
409 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data));
411 sha256_prf(key_input, SHA256_MAC_LEN, "TDLS PMK", data, sizeof(data),
413 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK",
415 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-TK",
422 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC
430 * Calculate MIC for TDLS frame.
444 wpa_printf(MSG_WARNING, "TDLS: No memory for MIC calculation");
450 /* 1) TDLS initiator STA MAC address */
453 /* 2) TDLS responder STA MAC address */
473 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf);
474 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16);
477 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16);
483 * wpa_tdls_key_mic_teardown - Calculate TDLS FTIE MIC for Teardown frame
492 * Calculate MIC for TDLS frame.
511 wpa_printf(MSG_WARNING, "TDLS: No memory for MIC calculation");
532 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf);
533 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16);
536 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16);
553 wpa_printf(MSG_INFO, "TDLS: Invalid MIC in FTIE - "
555 wpa_hexdump(MSG_DEBUG, "TDLS: Received MIC",
557 wpa_hexdump(MSG_DEBUG, "TDLS: Calculated MIC",
562 wpa_printf(MSG_WARNING, "TDLS: Could not verify TDLS MIC, "
580 wpa_printf(MSG_INFO, "TDLS: Invalid MIC in Teardown - "
585 TDLS: Could not verify TDLS Teardown "
607 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
611 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
621 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR,
674 for (peer = sm->tdls; peer; peer = peer->next) {
680 wpa_printf(MSG_INFO, "TDLS: No matching entry found for "
687 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown for " MACSTR,
717 wpa_printf(MSG_DEBUG, "TDLS: Testing - add extra subelem to "
725 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TDLS Teardown handshake",
757 for (peer = sm->tdls; peer; peer = peer->next) {
763 wpa_printf(MSG_DEBUG, "TDLS: Could not find peer " MACSTR
769 wpa_printf(MSG_DEBUG, "TDLS: Peer " MACSTR
790 for (peer = sm->tdls; peer; peer = peer->next) {
812 for (peer = sm->tdls; peer; peer = peer->next) {
818 wpa_printf(MSG_INFO, "TDLS: No matching entry found for "
829 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown Request from " MACSTR
834 wpa_printf(MSG_INFO, "TDLS: Failed to parse IEs in Teardown");
839 wpa_printf(MSG_INFO, "TDLS: No Link Identifier IE in TDLS "
849 wpa_printf(MSG_INFO, "TDLS: No FTIE in TDLS Teardown");
855 /* Process MIC check to see if TDLS Teardown is right */
859 wpa_printf(MSG_DEBUG, "TDLS: MIC failure for TDLS "
875 * wpa_tdls_send_error - To send suitable TDLS status response with
878 * @tdls_action - TDLS frame type for which error code is sent
885 wpa_printf(MSG_DEBUG, "TDLS: Sending error to " MACSTR
900 for (peer = sm->tdls; peer; peer = peer->next) {
908 wpa_printf(MSG_INFO, "TDLS: Creating peer entry for " MACSTR,
916 peer->next = sm->tdls;
917 sm->tdls = peer;
936 wpa_printf(MSG_DEBUG, "TDLS: No security used on the link");
961 * AES-CCMP is the default Encryption preferred for TDLS, so
963 * Note: TKIP is not used to encrypt TDLS link.
983 wpa_printf(MSG_DEBUG, "TDLS: Use alternative RSN IE for "
1000 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE for TPK handshake",
1034 "TDLS: Failed to get random data for initiator Nonce");
1039 wpa_hexdump(MSG_DEBUG, "TDLS: Initiator Nonce for TPK handshake",
1043 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TPK Handshake M1",
1050 wpa_printf(MSG_DEBUG, "TDLS: Testing - add extra subelem to "
1063 wpa_printf(MSG_DEBUG, "TDLS: Testing - use short TPK "
1068 wpa_printf(MSG_DEBUG, "TDLS: Testing - use long TPK "
1075 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds", peer->lifetime);
1081 wpa_printf(MSG_DEBUG, "TDLS: Testing - use incorrect BSSID in "
1090 wpa_printf(MSG_DEBUG, "TDLS: Sending TDLS Setup Request / TPK "
1143 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TPK M2",
1150 wpa_printf(MSG_DEBUG, "TDLS: Testing - add extra subelem to "
1163 wpa_printf(MSG_DEBUG, "TDLS: Testing - use wrong TPK "
1170 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds from initiator",
1232 wpa_printf(MSG_DEBUG, "TDLS: Testing - add extra subelem to "
1245 wpa_printf(MSG_DEBUG, "TDLS: Testing - use wrong TPK "
1252 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds",
1272 wpa_printf(MSG_DEBUG, "TDLS: Sending TDLS Discovery Response "
1291 wpa_printf(MSG_DEBUG, "TDLS: Discovery Request from " MACSTR,
1295 wpa_printf(MSG_DEBUG, "TDLS Discovery Request is too short: "
1308 wpa_printf(MSG_DEBUG, "TDLS: Link ID not found in Discovery "
1316 wpa_printf(MSG_DEBUG, "TDLS: Discovery Request from different "
1334 wpa_printf(MSG_DEBUG, "TDLS: Sending Discovery Request to peer "
1345 wpa_printf(MSG_DEBUG, "TDLS: No supported rates received");
1363 wpa_printf(MSG_DEBUG, "TDLS: No supported ht capabilities "
1377 wpa_hexdump(MSG_DEBUG, "TDLS: Peer HT capabilities",
1391 wpa_printf(MSG_DEBUG, "TDLS: No supported vht capabilities "
1405 wpa_hexdump(MSG_DEBUG, "TDLS: Peer VHT capabilities",
1417 wpa_printf(MSG_DEBUG, "TDLS: No extended capabilities "
1470 wpa_printf(MSG_INFO, "TDLS: Dialog Token in TPK M1 %d", dtoken);
1481 wpa_printf(MSG_DEBUG, "TDLS: TDLS Setup Request while "
1489 * TDLS Setup Request. If so, compare MAC addresses and let the
1495 wpa_printf(MSG_DEBUG, "TDLS: Discard request "
1500 wpa_printf(MSG_DEBUG, "TDLS: Accept request "
1516 wpa_printf(MSG_INFO, "TDLS: Failed to parse IEs in TPK M1");
1521 wpa_printf(MSG_INFO, "TDLS: No valid Link Identifier IE in "
1525 wpa_hexdump(MSG_DEBUG, "TDLS: Link ID Received from TPK M1",
1529 wpa_printf(MSG_INFO, "TDLS: TPK M1 from diff BSS");
1534 wpa_printf(MSG_DEBUG, "TDLS: TPK M1 - TPK initiator " MACSTR,
1558 wpa_printf(MSG_DEBUG, "TDLS: Testing concurrent initiation of "
1559 "TDLS setup - send own request");
1566 wpa_printf(MSG_DEBUG, "TDLS: Testing - ignore AP prohibition "
1567 "on TDLS");
1573 wpa_printf(MSG_INFO, "TDLS: TDLS prohibited in this BSS");
1580 wpa_printf(MSG_INFO, "TDLS: RSN IE in TPK M1 while "
1590 wpa_printf(MSG_INFO, "TDLS: No FTIE or RSN IE in TPK M1");
1596 wpa_printf(MSG_INFO, "TDLS: Too long Initiator RSN IE in "
1603 wpa_printf(MSG_INFO, "TDLS: Failed to parse RSN IE in TPK M1");
1610 wpa_printf(MSG_DEBUG, "TDLS: Using CCMP for direct link");
1613 wpa_printf(MSG_INFO, "TDLS: No acceptable cipher in TPK M1");
1621 wpa_printf(MSG_INFO, "TDLS: Invalid RSN Capabilities in "
1629 wpa_printf(MSG_INFO, "TDLS: No Key Lifetime IE in TPK M1");
1635 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds", lifetime);
1637 wpa_printf(MSG_INFO, "TDLS: Too short TPK lifetime");
1677 * since this is for a new TDLS session.
1680 "TDLS: New TPK M1 INonce - generate new RNonce");
1684 "TDLS: Failed to get random data for responder nonce");
1732 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE for TPK handshake",
1745 wpa_printf(MSG_DEBUG, "TDLS: Sending TDLS Setup Response / TPK M2");
1777 wpa_printf(MSG_DEBUG, "TDLS: Testing - disable TPK "
1784 /* add supported rates, capabilities, and qos_info to the TDLS peer */
1795 wpa_printf(MSG_INFO, "TDLS: Could not configure key to the "
1822 wpa_printf(MSG_DEBUG, "TDLS: Received TDLS Setup Response / TPK M2 "
1824 for (peer = sm->tdls; peer; peer = peer->next) {
1829 wpa_printf(MSG_INFO, "TDLS: No matching peer found for "
1835 * This may happen if both devices try to initiate TDLS at the
1839 wpa_printf(MSG_INFO, "TDLS: We were not the initiator, so "
1856 wpa_printf(MSG_INFO, "TDLS: Status code in TPK M2: %u",
1867 wpa_printf(MSG_DEBUG, "TDLS: Dialog Token in TPK M2 %d", dtoken);
1880 wpa_printf(MSG_INFO, "TDLS: Failed to parse IEs in TPK M2");
1886 wpa_printf(MSG_DEBUG, "TDLS: Testing - decline response");
1893 wpa_printf(MSG_INFO, "TDLS: No valid Link Identifier IE in "
1897 wpa_hexdump(MSG_DEBUG, "TDLS: Link ID Received from TPK M2",
1902 wpa_printf(MSG_INFO, "TDLS: TPK M2 from different BSS");
1931 wpa_printf(MSG_INFO, "TDLS: No FTIE or RSN IE in TPK M2");
1935 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE Received from TPK M2",
1946 wpa_printf(MSG_INFO, "TDLS: RSN IE in TPK M2 does "
1948 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE Sent in TPK M1",
1950 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE Received from TPK M2",
1957 wpa_printf(MSG_INFO, "TDLS: Failed to parse RSN IE in TPK M2");
1964 wpa_printf(MSG_DEBUG, "TDLS: Using CCMP for direct link");
1967 wpa_printf(MSG_INFO, "TDLS: No acceptable cipher in TPK M2");
1972 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE Received from TPK M2",
1977 wpa_printf(MSG_INFO, "TDLS: FTIE SNonce in TPK M2 does "
1991 wpa_printf(MSG_INFO, "TDLS: No Key Lifetime IE in TPK M2");
1997 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds in TPK M2",
2000 wpa_printf(MSG_INFO, "TDLS: Unexpected TPK lifetime %u in "
2022 wpa_printf(MSG_DEBUG, "TDLS: Try to configure TPK again after "
2030 wpa_printf(MSG_DEBUG, "TDLS: Sending TDLS Setup Confirm / "
2039 wpa_printf(MSG_DEBUG, "TDLS: Could not enable link");
2067 wpa_printf(MSG_DEBUG, "TDLS: Received TDLS Setup Confirm / TPK M3 "
2069 for (peer = sm->tdls; peer; peer = peer->next) {
2074 wpa_printf(MSG_INFO, "TDLS: No matching peer found for "
2088 wpa_printf(MSG_INFO, "TDLS: Status code in TPK M3: %u",
2096 wpa_printf(MSG_INFO, "TDLS: Failed to parse KDEs in TPK M3");
2101 wpa_printf(MSG_INFO, "TDLS: No Link Identifier IE in TPK M3");
2104 wpa_hexdump(MSG_DEBUG, "TDLS: Link ID Received from TPK M3",
2109 wpa_printf(MSG_INFO, "TDLS: TPK M3 from diff BSS");
2117 wpa_printf(MSG_INFO, "TDLS: No FTIE in TPK M3");
2120 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE Received from TPK M3",
2125 wpa_printf(MSG_INFO, "TDLS: No RSN IE in TPK M3");
2128 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE Received from TPK M3",
2132 wpa_printf(MSG_INFO, "TDLS: RSN IE in TPK M3 does not match "
2138 wpa_printf(MSG_INFO, "TDLS: FTIE ANonce in TPK M3 does "
2144 wpa_printf(MSG_INFO, "TDLS: FTIE SNonce in TPK M3 does not "
2150 wpa_printf(MSG_INFO, "TDLS: No Key Lifetime IE in TPK M3");
2154 wpa_hexdump(MSG_DEBUG, "TDLS: Timeout IE Received from TPK M3",
2157 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds in TPK M3",
2160 wpa_printf(MSG_INFO, "TDLS: Unexpected TPK lifetime %u in "
2176 wpa_printf(MSG_DEBUG, "TDLS: Try to configure TPK again after "
2184 wpa_printf(MSG_DEBUG, "TDLS: Could not enable link");
2210 * wpa_tdls_start - Initiate TDLS handshake (send TPK Handshake Message 1)
2215 * Send TPK Handshake Message 1 info to driver to start TDLS
2229 wpa_printf(MSG_DEBUG, "TDLS: Testing - ignore AP prohibition "
2230 "on TDLS");
2236 wpa_printf(MSG_DEBUG, "TDLS: TDLS is prohibited in this BSS - "
2246 wpa_printf(MSG_DEBUG, "TDLS: Setup is already in progress with the peer");
2274 for (peer = sm->tdls; peer; peer = peer->next) {
2293 * wpa_supplicant_rx_tdls - Receive TDLS data frame
2295 * This function is called to receive TDLS (ethertype = 0x890d) data frames.
2303 wpa_hexdump(MSG_DEBUG, "TDLS: Received Data frame encapsulation",
2307 wpa_printf(MSG_DEBUG, "TDLS: Discard message - TDLS disabled "
2313 wpa_printf(MSG_DEBUG, "TDLS: Discard copy of own message");
2318 wpa_printf(MSG_INFO, "TDLS: Drop too short frame");
2322 /* Check to make sure its a valid encapsulated TDLS frame */
2326 wpa_printf(MSG_INFO, "TDLS: Invalid frame - payloadtype=%u "
2350 wpa_printf(MSG_DEBUG, "TDLS: Ignore TDLS frame action code %u",
2358 * wpa_tdls_init - Initialize driver interface parameters for TDLS
2362 * This function is called to initialize driver interface parameters for TDLS.
2377 wpa_printf(MSG_ERROR, "TDLS: Failed to open l2_packet "
2383 * Drivers that support TDLS but don't implement the get_capa callback
2392 wpa_printf(MSG_DEBUG, "TDLS: TDLS operation%s supported by "
2394 wpa_printf(MSG_DEBUG, "TDLS: Driver uses %s link setup",
2405 peer = sm->tdls;
2407 wpa_printf(MSG_DEBUG, "TDLS: Tear down peers");
2410 wpa_printf(MSG_DEBUG, "TDLS: Tear down peer " MACSTR,
2427 peer = sm->tdls;
2428 sm->tdls = NULL;
2434 wpa_printf(MSG_DEBUG, "TDLS: Remove peer " MACSTR " (res=%d)",
2444 * wpa_tdls_deinit - Deinitialize driver interface parameters for TDLS
2446 * This function is called to recover driver interface parameters for TDLS
2464 wpa_printf(MSG_DEBUG, "TDLS: Remove peers on association");
2471 wpa_printf(MSG_DEBUG, "TDLS: Remove peers on disassociation");
2489 /* bit 38 - TDLS Prohibited */
2497 wpa_printf(MSG_DEBUG, "TDLS: TDLS is %s in the target BSS",
2505 wpa_printf(MSG_DEBUG, "TDLS: TDLS prohibited based on "
2514 wpa_printf(MSG_DEBUG, "TDLS: %s", enabled ? "enabled" : "disabled");