Home | History | Annotate | Download | only in rsn_supp

Lines Matching full:tdls

2  * wpa_supplicant - TDLS
55 u8 Anonce[WPA_NONCE_LEN]; /* Responder Nonce in TDLS */
56 u8 Snonce[WPA_NONCE_LEN]; /* Initiator Nonce in TDLS */
75 /* TDLS frame headers as per IEEE Std 802.11z-2010 */
97 int initiator; /* whether this end was initiator for TDLS setup */
121 u8 action_code; /* TDLS frame type */
159 * WEP/WPA/WPA2 hence TDLS frames are processed for TPK handshake.
176 wpa_printf(MSG_WARNING, "TDLS: Failed to delete TPK-TK from "
199 wpa_printf(MSG_DEBUG, "TDLS: Pairwise Cipher Suite: "
203 wpa_printf(MSG_WARNING, "TDLS: Unsupported pairwise cipher %d",
210 wpa_printf(MSG_WARNING, "TDLS: Failed to set TPK to the "
235 wpa_printf(MSG_DEBUG, "TDLS: TPK send dest=" MACSTR " action_code=%u "
244 wpa_printf(MSG_INFO, "TDLS: Failed to send message "
255 for (peer = sm->tdls; peer; peer = peer->next) {
261 wpa_printf(MSG_INFO, "TDLS: No matching entry found for "
289 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout registered "
320 wpa_printf(MSG_INFO, "TDLS: Retrying sending of message "
325 wpa_printf(MSG_INFO, "TDLS: No retry buffer available "
342 wpa_printf(MSG_INFO, "TDLS: Failed to retry "
353 wpa_printf(MSG_DEBUG, "TDLS: Sending Teardown Request");
365 wpa_printf(MSG_DEBUG, "TDLS: Retry timeout cancelled for "
380 wpa_printf(MSG_INFO, "TDLS: Error in cancelling retry timeout "
406 wpa_hexdump(MSG_DEBUG, "TDLS: min(Nonce)", nonce[0], WPA_NONCE_LEN);
407 wpa_hexdump(MSG_DEBUG, "TDLS: max(Nonce)", nonce[1], WPA_NONCE_LEN);
409 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-Key-Input",
413 * TPK-Key-Data = KDF-N_KEY(TPK-Key-Input, "TDLS PMK",
428 wpa_hexdump(MSG_DEBUG, "TDLS: KDF Context", data, sizeof(data));
430 sha256_prf(key_input, SHA256_MAC_LEN, "TDLS PMK", data, sizeof(data),
432 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-KCK",
434 wpa_hexdump_key(MSG_DEBUG, "TDLS: TPK-TK",
441 * wpa_tdls_ftie_mic - Calculate TDLS FTIE MIC
449 * Calculate MIC for TDLS frame.
463 wpa_printf(MSG_WARNING, "TDLS: No memory for MIC calculation");
469 /* 1) TDLS initiator STA MAC address */
472 /* 2) TDLS responder STA MAC address */
492 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf);
493 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16);
496 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16);
502 * wpa_tdls_key_mic_teardown - Calculate TDLS FTIE MIC for Teardown frame
511 * Calculate MIC for TDLS frame.
530 wpa_printf(MSG_WARNING, "TDLS: No memory for MIC calculation");
551 wpa_hexdump(MSG_DEBUG, "TDLS: Data for FTIE MIC", buf, pos - buf);
552 wpa_hexdump_key(MSG_DEBUG, "TDLS: KCK", kck, 16);
555 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE MIC", mic, 16);
572 wpa_printf(MSG_INFO, "TDLS: Invalid MIC in FTIE - "
574 wpa_hexdump(MSG_DEBUG, "TDLS: Received MIC",
576 wpa_hexdump(MSG_DEBUG, "TDLS: Calculated MIC",
581 wpa_printf(MSG_WARNING, "TDLSTDLS MIC, "
599 wpa_printf(MSG_INFO, "TDLS: Invalid MIC in Teardown - "
604 wpa_printf(MSG_INFO, "TDLS: Could not verify TDLS Teardown "
626 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
630 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime expired for " MACSTR
643 cur = sm->tdls;
651 wpa_printf(MSG_ERROR, "TDLS: Could not find peer " MACSTR
660 sm->tdls = peer->next;
666 wpa_printf(MSG_DEBUG, "TDLS: Clear state for peer " MACSTR,
734 for (peer = sm->tdls; peer; peer = peer->next) {
740 wpa_printf(MSG_INFO, "TDLS: No matching entry found for "
747 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown for " MACSTR,
777 wpa_printf(MSG_DEBUG, "TDLS: Testing - add extra subelem to "
785 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TDLS Teardown handshake",
814 for (peer = sm->tdls; peer; peer = peer->next) {
820 wpa_printf(MSG_DEBUG, "TDLS: Could not find peer " MACSTR
826 wpa_printf(MSG_DEBUG, "TDLS: Peer " MACSTR
847 for (peer = sm->tdls; peer; peer = peer->next) {
853 wpa_printf(MSG_DEBUG, "TDLS: Peer " MACSTR
881 for (peer = sm->tdls; peer; peer = peer->next) {
908 for (peer = sm->tdls; peer; peer = peer->next) {
914 wpa_printf(MSG_INFO, "TDLS: No matching entry found for "
925 wpa_printf(MSG_DEBUG, "TDLS: TDLS Teardown Request from " MACSTR
930 wpa_printf(MSG_INFO, "TDLS: Failed to parse IEs in Teardown");
935 wpa_printf(MSG_INFO, "TDLS: No Link Identifier IE in TDLS "
945 wpa_printf(MSG_INFO, "TDLS: No FTIE in TDLS Teardown");
951 /* Process MIC check to see if TDLS Teardown is right */
955 wpa_printf(MSG_DEBUG, "TDLS: MIC failure for TDLS "
971 * wpa_tdls_send_error - To send suitable TDLS status response with
974 * @tdls_action - TDLS frame type for which error code is sent
983 wpa_printf(MSG_DEBUG, "TDLS: Sending error to " MACSTR
998 for (peer = sm->tdls; peer; peer = peer->next) {
1006 wpa_printf(MSG_INFO, "TDLS: Creating peer entry for " MACSTR,
1014 peer->next = sm->tdls;
1015 sm->tdls = peer;
1034 wpa_printf(MSG_DEBUG, "TDLS: No security used on the link");
1059 * AES-CCMP is the default Encryption preferred for TDLS, so
1061 * Note: TKIP is not used to encrypt TDLS link.
1081 wpa_printf(MSG_DEBUG, "TDLS: Use alternative RSN IE for "
1098 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE for TPK handshake",
1132 "TDLS: Failed to get random data for initiator Nonce");
1137 wpa_hexdump(MSG_DEBUG, "TDLS: Initiator Nonce for TPK handshake",
1141 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TPK Handshake M1",
1148 wpa_printf(MSG_DEBUG, "TDLS: Testing - add extra subelem to "
1161 wpa_printf(MSG_DEBUG, "TDLS: Testing - use short TPK "
1166 wpa_printf(MSG_DEBUG, "TDLS: Testing - use long TPK "
1173 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds", peer->lifetime);
1179 wpa_printf(MSG_DEBUG, "TDLS: Testing - use incorrect BSSID in "
1188 wpa_printf(MSG_DEBUG, "TDLS: Sending TDLS Setup Request / TPK "
1241 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE for TPK M2",
1248 wpa_printf(MSG_DEBUG, "TDLS: Testing - add extra subelem to "
1261 wpa_printf(MSG_DEBUG, "TDLS: Testing - use wrong TPK "
1268 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds from initiator",
1276 wpa_printf(MSG_DEBUG, "TDLS: Testing - use wrong MIC");
1338 wpa_printf(MSG_DEBUG, "TDLS: Testing - add extra subelem to "
1351 wpa_printf(MSG_DEBUG, "TDLS: Testing - use wrong TPK "
1358 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds",
1366 wpa_printf(MSG_DEBUG, "TDLS: Testing - use wrong MIC");
1401 wpa_printf(MSG_DEBUG, "TDLS: Sending TDLS Discovery Response "
1418 * AES-CCMP is the default encryption preferred for TDLS, so
1420 * Note: TKIP is not used to encrypt TDLS link.
1441 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE for Discovery Response",
1465 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds", peer->lifetime);
1486 wpa_printf(MSG_DEBUG, "TDLS: Discovery Request from " MACSTR,
1490 wpa_printf(MSG_DEBUG, "TDLS Discovery Request is too short: "
1498 * Some APs will tack on a weird IE to the end of a TDLS
1506 "TDLS: Failed to parse IEs in Discovery Request - ignore as an interop workaround");
1510 wpa_printf(MSG_DEBUG, "TDLS: Link ID not found in Discovery "
1518 wpa_printf(MSG_DEBUG, "TDLS: Discovery Request from different "
1536 wpa_printf(MSG_DEBUG, "TDLS: Sending Discovery Request to peer "
1547 wpa_printf(MSG_DEBUG, "TDLS: No supported rates received");
1565 wpa_printf(MSG_DEBUG, "TDLS: No supported ht capabilities "
1579 wpa_hexdump(MSG_DEBUG, "TDLS: Peer HT capabilities",
1593 wpa_printf(MSG_DEBUG, "TDLS: No supported vht capabilities "
1607 wpa_hexdump(MSG_DEBUG, "TDLS: Peer VHT capabilities",
1619 wpa_printf(MSG_DEBUG, "TDLS: No extended capabilities "
1645 wpa_printf(MSG_DEBUG, "TDLS: No supported WMM capabilities received");
1650 wpa_printf(MSG_DEBUG, "TDLS: Invalid supported WMM capabilities received");
1659 wpa_printf(MSG_DEBUG, "TDLS: Peer WMM QOS Info 0x%x", peer->qos_info);
1668 wpa_printf(MSG_DEBUG, "TDLS: No supported channels received");
1684 wpa_hexdump(MSG_DEBUG, "TDLS: Peer Supported Channels",
1694 wpa_printf(MSG_DEBUG, "TDLS: No supported operating classes received");
1709 wpa_hexdump(MSG_DEBUG, "TDLS: Peer Supported Operating Classes",
1766 wpa_printf(MSG_INFO, "TDLS: Dialog Token in TPK M1 %d", dtoken);
1777 wpa_printf(MSG_DEBUG, "TDLS: TDLS Setup Request while "
1785 * sent a TDLS Setup Request. If so, compare MAC
1791 wpa_printf(MSG_DEBUG, "TDLS
1796 wpa_printf(MSG_DEBUG, "TDLS: Accept request "
1814 wpa_printf(MSG_INFO, "TDLS: Failed to parse IEs in TPK M1");
1819 wpa_printf(MSG_INFO, "TDLS: No valid Link Identifier IE in "
1823 wpa_hexdump(MSG_DEBUG, "TDLS: Link ID Received from TPK M1",
1827 wpa_printf(MSG_INFO, "TDLS: TPK M1 from diff BSS");
1832 wpa_printf(MSG_DEBUG, "TDLS: TPK M1 - TPK initiator " MACSTR,
1866 wpa_printf(MSG_DEBUG, "TDLS: Testing concurrent initiation of "
1867 "TDLS setup - send own request");
1876 wpa_printf(MSG_DEBUG, "TDLS: Testing - ignore AP prohibition "
1877 "on TDLS");
1883 wpa_printf(MSG_INFO, "TDLS: TDLS prohibited in this BSS");
1890 wpa_printf(MSG_INFO, "TDLS: RSN IE in TPK M1 while "
1900 wpa_printf(MSG_INFO, "TDLS: No FTIE or RSN IE in TPK M1");
1906 wpa_printf(MSG_INFO, "TDLS: Too long Initiator RSN IE in "
1913 wpa_printf(MSG_INFO, "TDLS: Failed to parse RSN IE in TPK M1");
1920 wpa_printf(MSG_DEBUG, "TDLS: Using CCMP for direct link");
1923 wpa_printf(MSG_INFO, "TDLS: No acceptable cipher in TPK M1");
1931 wpa_printf(MSG_INFO, "TDLS: Invalid RSN Capabilities in "
1939 wpa_printf(MSG_INFO, "TDLS: No Key Lifetime IE in TPK M1");
1945 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds", lifetime);
1947 wpa_printf(MSG_INFO, "TDLS: Too short TPK lifetime");
1987 * since this is for a new TDLS session.
1990 "TDLS: New TPK M1 INonce - generate new RNonce");
1994 "TDLS: Failed to get random data for responder nonce");
2041 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE for TPK handshake",
2054 /* add supported rates, capabilities, and qos_info to the TDLS peer */
2063 wpa_printf(MSG_DEBUG, "TDLS: Sending TDLS Setup Response / TPK M2");
2097 wpa_printf(MSG_DEBUG, "TDLS: Testing - disable TPK "
2105 wpa_printf(MSG_INFO, "TDLS: Could not configure key to the "
2132 wpa_printf(MSG_DEBUG, "TDLS: Received TDLS Setup Response / TPK M2 "
2134 for (peer = sm->tdls; peer; peer = peer->next) {
2139 wpa_printf(MSG_INFO, "TDLS: No matching peer found for "
2145 * This may happen if both devices try to initiate TDLS at the
2149 wpa_printf(MSG_INFO, "TDLS: We were not the initiator, so "
2166 wpa_printf(MSG_INFO, "TDLS: Status code in TPK M2: %u",
2177 wpa_printf(MSG_DEBUG, "TDLS: Dialog Token in TPK M2 %d", dtoken);
2190 wpa_printf(MSG_INFO, "TDLS: Failed to parse IEs in TPK M2");
2196 wpa_printf(MSG_DEBUG, "TDLS: Testing - decline response");
2203 wpa_printf(MSG_INFO, "TDLS: No valid Link Identifier IE in "
2207 wpa_hexdump(MSG_DEBUG, "TDLS: Link ID Received from TPK M2",
2212 wpa_printf(MSG_INFO, "TDLS: TPK M2 from different BSS");
2251 wpa_printf(MSG_INFO, "TDLS: No FTIE or RSN IE in TPK M2");
2255 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE Received from TPK M2",
2260 "TDLS: Too long Responder RSN IE in TPK M2");
2273 wpa_printf(MSG_INFO, "TDLS: RSN IE in TPK M2 does "
2275 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE Sent in TPK M1",
2277 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE Received from TPK M2",
2284 wpa_printf(MSG_INFO, "TDLS: Failed to parse RSN IE in TPK M2");
2291 wpa_printf(MSG_DEBUG, "TDLS: Using CCMP for direct link");
2294 wpa_printf(MSG_INFO, "TDLS: No acceptable cipher in TPK M2");
2299 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE Received from TPK M2",
2304 wpa_printf(MSG_INFO, "TDLS: FTIE SNonce in TPK M2 does "
2318 wpa_printf(MSG_INFO, "TDLS: No Key Lifetime IE in TPK M2");
2324 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds in TPK M2",
2327 wpa_printf(MSG_INFO, "TDLS: Unexpected TPK lifetime %u in "
2349 wpa_printf(MSG_DEBUG, "TDLS: Try to configure TPK again after "
2357 /* add supported rates, capabilities, and qos_info to the TDLS peer */
2361 wpa_printf(MSG_DEBUG, "TDLS: Sending TDLS Setup Confirm / "
2370 * during TDLS setup handshake.
2374 wpa_printf(MSG_DEBUG, "TDLS: Could not enable link");
2404 wpa_printf(MSG_DEBUG, "TDLS: Received TDLS Setup Confirm / TPK M3 "
2406 for (peer = sm->tdls; peer; peer = peer->next) {
2411 wpa_printf(MSG_INFO, "TDLS: No matching peer found for "
2425 wpa_printf(MSG_INFO, "TDLS: Status code in TPK M3: %u",
2436 * of a TDLS Confirm packet, which will fail the link if we don't ignore
2441 "TDLS: Failed to parse KDEs in TPK M3 - ignore as an interop workaround");
2445 wpa_printf(MSG_INFO, "TDLS: No Link Identifier IE in TPK M3");
2448 wpa_hexdump(MSG_DEBUG, "TDLS: Link ID Received from TPK M3",
2453 wpa_printf(MSG_INFO, "TDLS: TPK M3 from diff BSS");
2461 wpa_printf(MSG_INFO, "TDLS: No FTIE in TPK M3");
2464 wpa_hexdump(MSG_DEBUG, "TDLS: FTIE Received from TPK M3",
2469 wpa_printf(MSG_INFO, "TDLS: No RSN IE in TPK M3");
2472 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE Received from TPK M3",
2476 wpa_printf(MSG_INFO, "TDLS: RSN IE in TPK M3 does not match "
2482 wpa_printf(MSG_INFO, "TDLS: FTIE ANonce in TPK M3 does "
2488 wpa_printf(MSG_INFO, "TDLS: FTIE SNonce in TPK M3 does not "
2494 wpa_printf(MSG_INFO, "TDLS: No Key Lifetime IE in TPK M3");
2498 wpa_hexdump(MSG_DEBUG, "TDLS: Timeout IE Received from TPK M3",
2501 wpa_printf(MSG_DEBUG, "TDLS: TPK lifetime %u seconds in TPK M3",
2504 wpa_printf(MSG_INFO, "TDLS: Unexpected TPK lifetime %u in "
2520 wpa_printf(MSG_DEBUG, "TDLS: Try to configure TPK again after "
2526 /* add supported rates, capabilities, and qos_info to the TDLS peer */
2534 * during TDLS setup handshake.
2538 wpa_printf(MSG_DEBUG, "TDLS: Could not enable link");
2564 * wpa_tdls_start - Initiate TDLS handshake (send TPK Handshake Message 1)
2569 * Send TPK Handshake Message 1 info to driver to start TDLS
2583 wpa_printf(MSG_DEBUG, "TDLS: Testing - ignore AP prohibition "
2584 "on TDLS");
2590 wpa_printf(MSG_DEBUG, "TDLS: TDLS is prohibited in this BSS - "
2600 wpa_printf(MSG_DEBUG, "TDLS: Setup is already in progress with the peer");
2631 for (peer = sm->tdls; peer; peer = peer->next) {
2651 * wpa_supplicant_rx_tdls - Receive TDLS data frame
2653 * This function is called to receive TDLS (ethertype = 0x890d) data frames.
2661 wpa_hexdump(MSG_DEBUG, "TDLS: Received Data frame encapsulation",
2665 wpa_printf(MSG_DEBUG, "TDLS: Discard message - TDLS disabled "
2671 wpa_printf(MSG_DEBUG, "TDLS: Discard copy of own message");
2676 wpa_printf(MSG_INFO, "TDLS: Drop too short frame");
2680 /* Check to make sure its a valid encapsulated TDLS frame */
2684 wpa_printf(MSG_INFO, "TDLS: Invalid frame - payloadtype=%u "
2708 wpa_printf(MSG_DEBUG, "TDLS: Ignore TDLS frame action code %u",
2716 * wpa_tdls_init - Initialize driver interface parameters for TDLS
2720 * This function is called to initialize driver interface parameters for TDLS.
2735 wpa_printf(MSG_ERROR, "TDLS: Failed to open l2_packet "
2741 * Drivers that support TDLS but don't implement the get_capa callback
2750 wpa_printf(MSG_DEBUG, "TDLS: TDLS operation%s supported by "
2752 wpa_printf(MSG_DEBUG, "TDLS: Driver uses %s link setup",
2763 peer = sm->tdls;
2765 wpa_printf(MSG_DEBUG, "TDLS: Tear down peers");
2769 wpa_printf(MSG_DEBUG, "TDLS: Tear down peer " MACSTR,
2786 peer = sm->tdls;
2792 wpa_printf(MSG_DEBUG, "TDLS: Remove peer " MACSTR " (res=%d)",
2801 * wpa_tdls_deinit - Deinitialize driver interface parameters for TDLS
2803 * This function is called to recover driver interface parameters for TDLS
2821 wpa_printf(MSG_DEBUG, "TDLS: Remove peers on association");
2828 wpa_printf(MSG_DEBUG, "TDLS: Remove peers on disassociation");
2846 /* bit 38 - TDLS Prohibited */
2854 wpa_printf(MSG_DEBUG, "TDLS: TDLS is %s in the target BSS",
2862 wpa_printf(MSG_DEBUG, "TDLS: TDLS prohibited based on "
2871 wpa_printf(MSG_DEBUG, "TDLS: %s", enabled ? "enabled" : "disabled");