Home | History | Annotate | Download | only in rsn_supp

Lines Matching refs:eapol

2  * WPA Supplicant - WPA state machine and EAPOL-Key processing
35 * wpa_eapol_key_send - Send WPA/RSN EAPOL-Key message
41 * @msg: EAPOL-Key message
43 * @key_mic: Pointer to the buffer to which the EAPOL-Key MIC is written
61 "EAPOL-Key destination address");
66 ") as the destination for EAPOL-Key",
79 "WPA: Failed to generate EAPOL-Key version %d key_mgmt 0x%x MIC",
115 /* Update EAPOL header to include AES-SIV overhead */
131 /* AES-SIV AAD from EAPOL protocol version field (inclusive) to
153 wpa_hexdump(MSG_MSGDUMP, "WPA: TX EAPOL-Key", msg, msg_len);
155 eapol_sm_notify_tx_eapol_key(sm->eapol);
163 * wpa_sm_key_request - Send EAPOL-Key Request
168 * Send an EAPOL-Key Request to the current authenticator. This function is
192 "Failed to read BSSID for EAPOL-Key request");
229 "WPA: Sending EAPOL-Key Request (error=%d "
284 eapol_sm_notify_cached(sm->eapol);
288 } else if (wpa_key_mgmt_wpa_ieee8021x(sm->key_mgmt) && sm->eapol) {
295 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len);
302 res = eapol_sm_get_key(sm->eapol, sm->pmk, 16);
308 if (eapol_sm_get_key(sm->eapol, buf, 2 * PMK_LEN) == 0)
318 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK from EAPOL state "
357 "EAPOL state machines - key handshake "
375 /* Send EAPOL-Start to trigger full EAP authentication. */
402 * @key: Pointer to the EAPOL-Key frame header
403 * @ver: Version bits from EAPOL-Key Key Info
404 * @nonce: Nonce value for the EAPOL-Key frame
495 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Sending EAPOL-Key 2/4");
595 "into EAPOL-Key 2/4");
645 eapol_sm_notify_portValid(sm->eapol, TRUE);
647 eapol_sm_notify_eap_success(sm->eapol, TRUE);
652 * likelihood of the first preauth EAPOL-Start frame getting to
877 * the RSC bytes in EAPOL-Key message in the wrong order, both if
904 * IEEE Std 802.11i-2004 - 8.5.2 EAPOL-Key frames - Figure 43x
1088 wpa_hexdump(MSG_DEBUG, "FT: MDIE in EAPOL-Key msg 3/4",
1106 "FT: No FTIE in EAPOL-Key msg 3/4");
1116 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 3/4",
1137 * Verify that PMKR1Name from EAPOL-Key message 3/4
1265 * @key: Pointer to the EAPOL-Key frame header
1266 * @ver: Version bits from EAPOL-Key Key Info
1307 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Sending EAPOL-Key 4/4");
1400 eapol_sm_notify_portValid(sm->eapol, TRUE);
1614 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Sending EAPOL-Key 2/2");
1707 "WPA: Invalid EAPOL-Key MIC "
1724 EAPOL-Key MIC - "
1733 "WPA: Could not verify EAPOL-Key MIC - "
1745 /* Decrypt RSN EAPOL-Key key data (RC4 or AES-WRAP) */
1755 "WPA: PTK not available, cannot decrypt EAPOL-Key Key "
1802 "could not decrypt EAPOL-Key key data");
1813 wpa_hexdump_key(MSG_DEBUG, "WPA: decrypted EAPOL-Key key data",
1841 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, " EAPOL-Key type=%d", key->type);
1902 /* AES-SIV AAD from EAPOL protocol version field (inclusive) to
1941 * wpa_sm_rx_eapol - Process received WPA EAPOL frames
1943 * @src_addr: Source MAC address of the EAPOL packet
1944 * @buf: Pointer to the beginning of the EAPOL data (EAPOL header)
1945 * @len: Length of the EAPOL frame
1946 * Returns: 1 = WPA EAPOL-Key processed, 0 = not a WPA EAPOL-Key, -1 failure
1948 * This function is called for each received EAPOL frame. Other than EAPOL-Key
1950 * only processing WPA and WPA2 EAPOL-Key frames.
1952 * The received EAPOL-Key packets are validated and valid packets are replied
1978 "WPA: EAPOL frame too short to be a WPA "
1979 "EAPOL-Key (len %lu, expecting at least %lu)",
1997 "WPA: EAPOL frame (type %u) discarded, "
2002 wpa_hexdump(MSG_MSGDUMP, "WPA: RX EAPOL-Key", buf, len);
2005 "WPA: EAPOL frame payload size %lu "
2032 "WPA: EAPOL-Key type (%d) unknown, discarded",
2042 wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "WPA: Invalid EAPOL-Key "
2049 eapol_sm_notify_lower_layer_success(sm->eapol, 0);
2061 "WPA: Unsupported EAPOL-Key descriptor version %d",
2069 "OSEN: Unsupported EAPOL-Key descriptor version %d",
2078 "RSN: Unsupported EAPOL-Key descriptor version %d (expected AKM defined = 0)",
2111 "WPA: CCMP is used, but EAPOL-Key "
2116 * require version 2 descriptor for all EAPOL-Key
2131 "WPA: GCMP is used, but EAPOL-Key "
2147 "RSN: EAPOL-Key Replay Counter did not "
2158 "RSN: EAPOL-Key Replay "
2177 "WPA: EAPOL-Key Replay Counter did not increase - "
2194 "WPA: EAPOL-Key with Request bit - dropped");
2227 "WPA: Ignored EAPOL-Key (Pairwise) with "
2259 "WPA: EAPOL-Key (Group) without Mic/Encr bit - "
2529 * Clear portValid to kick EAPOL state machine to re-enter
2530 * AUTHENTICATED state to get the EAPOL port Authorized.
2532 eapol_sm_notify_portValid(sm->eapol, FALSE);
2544 * Clear portValid to kick EAPOL state machine to re-enter
2545 * AUTHENTICATED state to get the EAPOL port Authorized.
2768 * wpa_sm_set_eapol - Set EAPOL state machine pointer
2770 * @eapol: Pointer to EAPOL state machine allocated with eapol_sm_init()
2772 void wpa_sm_set_eapol(struct wpa_sm *sm, struct eapol_sm *eapol)
2775 sm->eapol = eapol;
3296 erp_msg = eapol_sm_build_erp_reauth_start(sm->eapol);
3478 eapol, elems.fils_wrapped_data,
3480 if (eapol_sm_failed(sm->eapol))
3484 res = eapol_sm_get_key(sm->eapol, rmsk, rmsk_len);
3487 res = eapol_sm_get_key(sm->eapol, rmsk, rmsk_len);