Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching full:auth

845 	if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) {
848 MAC2STR(data->auth.peer));
854 MAC2STR(data->auth.peer), data->auth.auth_type,
855 data->auth.auth_transaction, data->auth.status_code);
857 data->auth.ies, data->auth.ies_len);
862 if (data->auth.auth_type == WLAN_AUTH_SAE) {
864 res = sme_sae_auth(wpa_s, data->auth.auth_transaction,
865 data->auth.status_code, data->auth.ies,
866 data->auth.ies_len);
882 if (data->auth.status_code != WLAN_STATUS_SUCCESS) {
885 if (data->auth.ies && data->auth.ies_len) {
886 size_t buflen = 2 * data->auth.ies_len + 1;
889 wpa_snprintf_hex(ie_txt, buflen, data->auth.ies,
890 data->auth.ies_len);
895 MAC2STR(data->auth.peer), data->auth.auth_type,
896 data->auth.auth_transaction, data->auth.status_code,
901 if (data->auth.status_code !=
903 wpa_s->sme.auth_alg == data->auth.auth_type ||
912 switch (data->auth.auth_type) {
916 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying SHARED auth");
924 wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying LEAP auth");
935 if (data->auth.auth_type == WLAN_AUTH_FT) {
943 if (wpa_ft_process_response(wpa_s->wpa, data->auth.ies,
944 data->auth.ies_len, 0,
945 data->auth.peer,
962 if (data->auth.auth_type == WLAN_AUTH_FILS_SK) {
963 if (fils_process_auth(wpa_s->wpa, data->auth.ies,
964 data->auth.ies_len) < 0) {
979 sme_associate(wpa_s, ssid->mode, data->auth.peer,
980 data->auth.auth_type);
1304 * mac80211-workaround to force deauth on failed auth cmd,
1314 * Re-arm authentication timer in case auth fails for whatever reason.