Lines Matching refs:wpa
2 * WPA Supplicant - Driver event processing
13 #include "rsn_supp/wpa.h"
227 wpa_dbg(wpa_s, MSG_DEBUG, "Could not set WPA suites");
255 wpa_msg(wpa_s, MSG_INFO, "WPA: TKIP countermeasures stopped");
331 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 ||
336 pmksa_set = pmksa_cache_set_current(wpa_s->wpa,
364 pmksa_candidate_add(wpa_s->wpa, data->pmkid_candidate.bssid,
453 wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard);
526 /* Allow TSN if local configuration accepts WEP use without WPA/WPA2 */
640 " skip WPA IE - parse failed");
649 " selected based on TSN in WPA IE");
656 " skip WPA IE - proto mismatch");
663 " skip WPA IE - PTK cipher mismatch");
670 " skip WPA IE - GTK cipher mismatch");
677 " skip WPA IE - key mgmt mismatch");
683 " selected based on WPA IE");
691 " allow for non-WPA IEEE 802.1X");
699 " skip - no WPA/RSN proto match");
712 wpa_dbg(wpa_s, MSG_DEBUG, " allow in non-WPA/WPA2");
718 " reject due to mismatch with WPA/WPA2");
967 int wpa;
1048 wpa = wpa_ie_len > 0 || rsn_ie_len > 0;
1051 int check_ssid = wpa ? 1 : (ssid->ssid_len != 0);
1077 if (wpa && ssid->ssid_len == 0 &&
1081 if (!wpa && (ssid->key_mgmt & WPA_KEY_MGMT_WPS)) {
1137 if (!osen && !wpa &&
1143 " skip - non-WPA network not allowed");
1147 if (wpa && !wpa_key_mgmt_wpa(ssid->key_mgmt) &&
1151 " skip - ignore WPA/WPA2 AP for WEP network block");
1310 !wpa_sm_pmksa_exists(wpa_s->wpa, bss->bssid, ssid) &&
1576 if (rsn_preauth_scan_results(wpa_s->wpa) < 0)
1590 rsn_preauth_scan_result(wpa_s->wpa, bss->bssid, ssid, rsn);
2275 wpa_tdls_assoc_resp_ies(wpa_s->wpa, data->assoc_info.resp_ies,
2298 /* Go through the IEs and make a copy of the WPA/RSN IE, if present. */
2311 if (wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, p, len))
2321 wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, NULL, 0);
2328 fils_process_assoc_resp(wpa_s->wpa,
2339 wpa_sm_set_reset_fils_completed(wpa_s->wpa, 1);
2345 owe_process_assoc_resp(wpa_s->wpa, bssid,
2357 wpa_ft_validate_reassoc_resp(wpa_s->wpa,
2415 wpa_ft_is_completed(wpa_s->wpa)) {
2417 wpa_ft_validate_reassoc_resp(wpa_s->wpa,
2430 wpa_sm_set_ft_params(wpa_s->wpa, data->assoc_info.resp_ies,
2434 /* WPA/RSN IE from Beacon/ProbeResp */
2438 /* Go through the IEs and make a copy of the WPA/RSN IEs, if present.
2452 wpa_sm_set_ap_wpa_ie(wpa_s->wpa, p, len);
2458 wpa_sm_set_ap_rsn_ie(wpa_s->wpa, p, len);
2466 wpa_sm_set_ap_wpa_ie(wpa_s->wpa, NULL, 0);
2468 wpa_sm_set_ap_rsn_ie(wpa_s->wpa, NULL, 0);
2500 if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, bss_wpa,
2502 wpa_sm_set_ap_rsn_ie(wpa_s->wpa, bss_rsn,
2571 ft_completed = wpa_ft_is_completed(wpa_s->wpa);
2580 ft_completed = wpa_fils_is_completed(wpa_s->wpa);
2613 "WPA/RSN IEs not updated");
2632 wpa_sm_notify_assoc(wpa_s->wpa, bssid);
2696 * waiting for WPA supplicant.
2774 wpa_sm_set_fils_cache_id(wpa_s->wpa, fils_cache_id);
2798 * IBSS for WPA-None. Ignore them for now.
2858 * IBSS for WPA-None. Ignore them for now.
2861 "IBSS/WPA-None mode");
2879 wpa_msg(wpa_s, MSG_INFO, "WPA: 4-Way Handshake failed - "
2926 wpa_sm_notify_disassoc(wpa_s->wpa);
2982 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Sending pending MIC error report");
2983 wpa_sm_key_request(wpa_s->wpa, 1, wpa_s->pending_mic_error_pairwise);
3008 wpa_sm_key_request(wpa_s->wpa, 1,
3015 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
3060 wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Delay MIC error "
3072 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
3075 wpa_sm_key_request(wpa_s->wpa, 1, pairwise);
3176 wpa_tdls_remove(wpa_s->wpa, data->tdls.peer);
3177 if (wpa_tdls_is_external_setup(wpa_s->wpa))
3178 wpa_tdls_start(wpa_s->wpa, data->tdls.peer);
3183 if (wpa_tdls_is_external_setup(wpa_s->wpa))
3184 wpa_tdls_teardown_link(wpa_s->wpa, data->tdls.peer,
3191 wpa_tdls_send_discovery_request(wpa_s->wpa,
3226 if (wpa_ft_process_response(wpa_s->wpa, data->ft_ies.ies,
3309 if (wpa_ft_process_response(wpa_s->wpa, data + 1 + 2 * ETH_ALEN + 2,
3483 wpa_reset_ft_completed(wpa_s->wpa);
3758 wpa_sm_set_rx_replay_ctr(wpa_s->wpa, data->assoc_info.key_replay_ctr);
3759 wpa_sm_set_ptk_kck_kek(wpa_s->wpa, data->assoc_info.ptk_kck,
3774 wpa_sm_pmksa_cache_add(wpa_s->wpa,
3781 pmksa_cache_set_current(wpa_s->wpa,
3853 wpa_fils_is_completed(wpa_s->wpa))))
4433 wpa_tdls_disable_unreachable_link(wpa_s->wpa,
4446 if (!wpa_s->wpa)
4448 wpa_sm_update_replay_ctr(wpa_s->wpa,