Home | History | Annotate | Download | only in ap

Lines Matching refs:eapol

780 		wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 2/4",
797 "received EAPOL-Key Error Request "
910 wpa_printf(MSG_DEBUG, "WPA: Received EAPOL-Key from " MACSTR
914 wpa_printf(MSG_INFO, "WPA: Invalid EAPOL-Key frame - "
928 wpa_printf(MSG_DEBUG, "Workaround: Allow EAPOL-Key "
931 wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
938 wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
950 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
1010 "did not use EAPOL-Key descriptor version 0 as required for AKM-defined cases");
1020 "received EAPOL-Key request with "
1038 * WZC) update SNonce for each EAPOL-Key 2/4. This
1041 * even if we have already sent out EAPOL-Key 3/4.
1045 "based on retransmitted EAPOL-Key "
1062 * there was two EAPOL-Key 2/4 messages and they had
1066 "Try to process received EAPOL-Key 4/4 based on old Replay Counter and SNonce from an earlier EAPOL-Key 1/4");
1075 "ignore retransmitted EAPOL-Key %s - "
1079 "received EAPOL-Key %s with "
1102 "received EAPOL-Key msg 2/4 in "
1127 "received EAPOL-Key msg 2/4 with "
1171 "EAPOL-Key exchange");
1191 "received EAPOL-Key msg 4/4 in "
1201 "received EAPOL-Key msg 2/2 in "
1218 "received EAPOL-Key msg SMK in "
1234 "received EAPOL-Key frame (%s)", msgtxt);
1238 "received invalid EAPOL-Key: Key Ack set");
1244 "received invalid EAPOL-Key: Key MIC not set");
1255 "received EAPOL-Key with invalid MIC");
1270 "received EAPOL-Key request with "
1292 "received EAPOL-Key Request for new "
1306 "received EAPOL-Key Request for GTK "
1318 * Maintain a copy of the pending EAPOL-Key frames in
1319 * case the EAPOL-Key frame was retransmitted. This is
1320 * needed to allow EAPOL-Key msg 2/4 reply to another
1401 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "EAPOL-Key timeout");
1443 wpa_printf(MSG_DEBUG, "WPA: Send EAPOL(version=%d secure=%d mic=%d "
1530 wpa_hexdump_key(MSG_DEBUG, "Plaintext EAPOL-Key Key Data",
1578 "PTK not valid when sending EAPOL-Key "
1594 "Corrupting group EAPOL-Key Key MIC");
1632 wpa_printf(MSG_DEBUG, "WPA: Use EAPOL-Key timeout of %u ms (retry "
1921 wpa_printf(MSG_DEBUG, "WPA: PMK from EAPOL state machine "
1949 * will break reauthentication since EAPOL state machines may not be
1989 /* No point in sending the EAPOL-Key - we will disconnect
2096 * Verify that PMKR1Name from EAPOL-Key message 2/4 matches
2215 /* No point in sending the EAPOL-Key - we will disconnect
2220 /* Send EAPOL(1, 1, 1, Pair, P, RSC, ANonce, MIC(PTK), RSNIE, [MDIE],
2308 "PMKR1Name into RSN IE in EAPOL-Key data");
2345 "into EAPOL-Key Key Data");
2577 /* No point in sending the EAPOL-Key - we will disconnect
2585 /* Send EAPOL(1, 1, 1, !Pair, G, RSC, GNonce, MIC(PTK), GTK[GN]) */
3288 int session_timeout, struct eapol_state_machine *eapol)
3304 eapol, sm->wpa_key_mgmt))
3314 struct eapol_state_machine *eapol)
3322 sta_addr, session_timeout, eapol,
3614 wpa_printf(MSG_DEBUG, "WPA: EAPOL-Key TX status for STA " MACSTR
3619 * for each EAPOL-Key 2/4 message even within the same 4-way
3623 * reached and EAPOL-Key 1/4 is retransmitted. Try to work
3628 wpa_printf(MSG_DEBUG, "WPA: Increase initial EAPOL-Key 1/4 "