Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching refs:wpa

2  * WPA Supplicant - Driver event processing
13 #include "rsn_supp/wpa.h"
226 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites");
254 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped");
323 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 ||
328 pmksa_set = pmksa_cache_set_current(wpa_s->wpa,
356 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid,
445 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard);
518 /* Allow TSN if local configuration accepts WEP use without WPA/WPA2 */
624 " skip WPA IE - parse failed");
633 " selected based on TSN in WPA IE");
640 " skip WPA IE - proto mismatch");
647 " skip WPA IE - PTK cipher mismatch");
654 " skip WPA IE - GTK cipher mismatch");
661 " skip WPA IE - key mgmt mismatch");
667 " selected based on WPA IE");
675 " allow for non-WPA IEEE 802.1X");
683 " skip - no WPA/RSN proto match");
696 wpa_dbg(wpa_s, MSG_DEBUG, " allow in non-WPA/WPA2");
702 " reject due to mismatch with WPA/WPA2");
877 int wpa;
952 wpa = wpa_ie_len > 0 || rsn_ie_len > 0;
955 int check_ssid = wpa ? 1 : (ssid->ssid_len != 0);
981 if (wpa && ssid->ssid_len == 0 &&
985 if (!wpa && (ssid->key_mgmt & WPA_KEY_MGMT_WPS)) {
1041 if (!osen && !wpa &&
1047 " skip - non-WPA network not allowed");
1051 if (wpa && !wpa_key_mgmt_wpa(ssid->key_mgmt) &&
1055 " skip - ignore WPA/WPA2 AP for WEP network block");
1467 if (rsn_preauth_scan_results(wpa_s->wpa) < 0)
1481 rsn_preauth_scan_result(wpa_s->wpa, bss->bssid, ssid, rsn);
2166 wpa_tdls_assoc_resp_ies(wpa_s->wpa, data->assoc_info.resp_ies,
2189 /* Go through the IEs and make a copy of the WPA/RSN IE, if present. */
2202 if (wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, p, len))
2212 wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, NULL, 0);
2218 fils_process_assoc_resp(wpa_s->wpa,
2231 wpa_ft_validate_reassoc_resp(wpa_s->wpa,
2289 wpa_ft_is_completed(wpa_s->wpa)) {
2291 wpa_ft_validate_reassoc_resp(wpa_s->wpa,
2304 wpa_sm_set_ft_params(wpa_s->wpa, data->assoc_info.resp_ies,
2308 /* WPA/RSN IE from Beacon/ProbeResp */
2312 /* Go through the IEs and make a copy of the WPA/RSN IEs, if present.
2326 wpa_sm_set_ap_wpa_ie(wpa_s->wpa, p, len);
2332 wpa_sm_set_ap_rsn_ie(wpa_s->wpa, p, len);
2340 wpa_sm_set_ap_wpa_ie(wpa_s->wpa, NULL, 0);
2342 wpa_sm_set_ap_rsn_ie(wpa_s->wpa, NULL, 0);
2374 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, bss_wpa,
2376 wpa_sm_set_ap_rsn_ie(wpa_s->wpa, bss_rsn,
2445 ft_completed = wpa_ft_is_completed(wpa_s->wpa);
2454 ft_completed = wpa_fils_is_completed(wpa_s->wpa);
2487 "WPA/RSN IEs not updated");
2506 wpa_sm_notify_assoc(wpa_s->wpa, bssid);
2568 * waiting for WPA supplicant.
2660 * IBSS for WPA-None. Ignore them for now.
2720 * IBSS for WPA-None. Ignore them for now.
2723 "IBSS/WPA-None mode");
2741 wpa_msg(wpa_s, MSG_INFO, "WPA: 4-Way Handshake failed - "
2788 wpa_sm_notify_disassoc(wpa_s->wpa);
2844 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Sending pending MIC error report");
2845 wpa_sm_key_request(wpa_s->wpa, 1, wpa_s->pending_mic_error_pairwise);
2870 wpa_sm_key_request(wpa_s->wpa, 1,
2877 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
2922 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Delay MIC error "
2934 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
2937 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
3037 wpa_sm_stkstart(wpa_s->wpa, data->stkstart.peer);
3050 wpa_tdls_remove(wpa_s->wpa, data->tdls.peer);
3051 if (wpa_tdls_is_external_setup(wpa_s->wpa))
3052 wpa_tdls_start(wpa_s->wpa, data->tdls.peer);
3057 if (wpa_tdls_is_external_setup(wpa_s->wpa))
3058 wpa_tdls_teardown_link(wpa_s->wpa, data->tdls.peer,
3065 wpa_tdls_send_discovery_request(wpa_s->wpa,
3100 if (wpa_ft_process_response(wpa_s->wpa, data->ft_ies.ies,
3183 if (wpa_ft_process_response(wpa_s->wpa, data + 1 + 2 * ETH_ALEN + 2,
3357 wpa_reset_ft_completed(wpa_s->wpa);
3609 wpa_sm_set_rx_replay_ctr(wpa_s->wpa, data->assoc_info.key_replay_ctr);
3610 wpa_sm_set_ptk_kck_kek(wpa_s->wpa, data->assoc_info.ptk_kck,
4241 wpa_tdls_disable_unreachable_link(wpa_s->wpa,
4254 if (!wpa_s->wpa)
4256 wpa_sm_update_replay_ctr(wpa_s->wpa,