Lines Matching full:auth
42 wpa_auth_sta_deinit(peer->auth);
254 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s",
257 wpa_printf(MSG_DEBUG, "AUTH: %s", txt);
265 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
279 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu "
300 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR
304 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d key_idx=%d)",
307 wpa_hexdump_key(MSG_DEBUG, "AUTH: set_key - key", key, key_len);
325 wpa_printf(MSG_DEBUG, "AUTH: Do not use this PTK");
349 wpa_printf(MSG_DEBUG, "AUTH: for_each_sta");
352 if (peer->auth && cb(peer->auth, cb_ctx))
369 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port",
374 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizing port",
401 wpa_printf(MSG_DEBUG, "AUTH: eapol event not handled %d", var);
421 wpa_printf(MSG_DEBUG, "AUTH: Initializing group state machine");
436 wpa_printf(MSG_DEBUG, "AUTH: wpa_init() failed");
449 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL);
450 if (peer->auth == NULL) {
451 wpa_printf(MSG_DEBUG, "AUTH: wpa_auth_sta_init() failed");
456 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth,
463 wpa_printf(MSG_DEBUG, "AUTH: wpa_validate_wpa_ie() failed");
467 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC))
470 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth))
479 struct ieee80211_mgmt auth;
480 const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth.u.auth);
486 os_memset(&auth, 0, sizeof(auth));
488 auth.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
490 os_memcpy(auth.da, da, ETH_ALEN);
491 os_memcpy(auth.sa, wpa_s->own_addr, ETH_ALEN);
492 os_memcpy(auth.bssid, wpa_s->bssid, ETH_ALEN);
494 auth.u.auth.auth_alg = host_to_le16(WLAN_AUTH_OPEN);
495 auth.u.auth.auth_transaction = host_to_le16(seq);
496 auth.u.auth.status_code = host_to_le16(WLAN_STATUS_SUCCESS);
498 wpa_printf(MSG_DEBUG, "RSN: IBSS TX Auth frame (SEQ %d) to " MACSTR,
501 return wpa_s->driver->send_frame(wpa_s->drv_priv, (u8 *) &auth,
783 wpa_receive(ibss_rsn->auth_group, peer->auth, tmp, len);
813 wpa_printf(MSG_DEBUG, "RSN: IBSS Not using IBSS Auth for peer "
837 wpa_printf(MSG_DEBUG, "RSN: IBSS RX Auth frame (SEQ 1) from " MACSTR,
859 wpa_printf(MSG_DEBUG, "RSN: Skip IBSS reinit since only %u usec from own Auth frame TX",
882 wpa_printf(MSG_DEBUG, "RSN: IBSS Auth started by peer " MACSTR,
889 /* no need to start another AUTH challenge in the other way.. */
902 auth_length = IEEE80211_HDRLEN + sizeof(header->u.auth);
907 if (le_to_host16(header->u.auth.auth_alg) != WLAN_AUTH_OPEN ||
908 le_to_host16(header->u.auth.status_code) != WLAN_STATUS_SUCCESS)
913 switch (le_to_host16(header->u.auth.auth_transaction)) {
918 wpa_printf(MSG_DEBUG, "RSN: IBSS RX Auth frame (SEQ 2) from "
921 wpa_printf(MSG_DEBUG, "RSN: Received Auth seq 2 from "
928 wpa_printf(MSG_DEBUG, "RSN: IBSS Auth completed with " MACSTR,