Lines Matching full:auth

42 	wpa_auth_sta_deinit(peer->auth);  in ibss_rsn_free()
269 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s", in auth_logger()
272 wpa_printf(MSG_DEBUG, "AUTH: %s", txt); in auth_logger()
286 wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)", in auth_get_psk()
300 wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu " in auth_send_eapol()
326 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR in auth_set_key()
330 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d key_idx=%d)", in auth_set_key()
333 wpa_hexdump_key(MSG_DEBUG, "AUTH: set_key - key", key, key_len); in auth_set_key()
351 wpa_printf(MSG_DEBUG, "AUTH: Do not use this PTK"); in auth_set_key()
375 wpa_printf(MSG_DEBUG, "AUTH: for_each_sta"); in auth_for_each_sta()
378 if (peer->auth && cb(peer->auth, cb_ctx)) in auth_for_each_sta()
395 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port", in ibss_set_sta_authorized()
400 wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizing port", in ibss_set_sta_authorized()
427 wpa_printf(MSG_DEBUG, "AUTH: eapol event not handled %d", var); in auth_set_eapol()
447 wpa_printf(MSG_DEBUG, "AUTH: Initializing group state machine"); in ibss_rsn_auth_init_group()
462 wpa_printf(MSG_DEBUG, "AUTH: wpa_init() failed"); in ibss_rsn_auth_init_group()
475 peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL); in ibss_rsn_auth_init()
476 if (peer->auth == NULL) { in ibss_rsn_auth_init()
477 wpa_printf(MSG_DEBUG, "AUTH: wpa_auth_sta_init() failed"); in ibss_rsn_auth_init()
482 if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, 0, in ibss_rsn_auth_init()
489 wpa_printf(MSG_DEBUG, "AUTH: wpa_validate_wpa_ie() failed"); in ibss_rsn_auth_init()
493 if (wpa_auth_sm_event(peer->auth, WPA_ASSOC)) in ibss_rsn_auth_init()
496 if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth)) in ibss_rsn_auth_init()
505 struct ieee80211_mgmt auth; in ibss_rsn_send_auth() local
506 const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth.u.auth); in ibss_rsn_send_auth()
509 os_memset(&auth, 0, sizeof(auth)); in ibss_rsn_send_auth()
511 auth.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT, in ibss_rsn_send_auth()
513 os_memcpy(auth.da, da, ETH_ALEN); in ibss_rsn_send_auth()
514 os_memcpy(auth.sa, wpa_s->own_addr, ETH_ALEN); in ibss_rsn_send_auth()
515 os_memcpy(auth.bssid, wpa_s->bssid, ETH_ALEN); in ibss_rsn_send_auth()
517 auth.u.auth.auth_alg = host_to_le16(WLAN_AUTH_OPEN); in ibss_rsn_send_auth()
518 auth.u.auth.auth_transaction = host_to_le16(seq); in ibss_rsn_send_auth()
519 auth.u.auth.status_code = host_to_le16(WLAN_STATUS_SUCCESS); in ibss_rsn_send_auth()
521 wpa_printf(MSG_DEBUG, "RSN: IBSS TX Auth frame (SEQ %d) to " MACSTR, in ibss_rsn_send_auth()
524 return wpa_drv_send_mlme(wpa_s, (u8 *) &auth, auth_length, 0, 0, 0); in ibss_rsn_send_auth()
805 wpa_receive(ibss_rsn->auth_group, peer->auth, tmp, len); in ibss_rsn_process_rx_eapol()
837 wpa_printf(MSG_DEBUG, "RSN: IBSS Not using IBSS Auth for peer " in ibss_rsn_rx_eapol()
861 wpa_printf(MSG_DEBUG, "RSN: IBSS RX Auth frame (SEQ 1) from " MACSTR, in ibss_rsn_handle_auth_1_of_2()
883 wpa_printf(MSG_DEBUG, "RSN: Skip IBSS reinit since only %u usec from own Auth frame TX", in ibss_rsn_handle_auth_1_of_2()
906 wpa_printf(MSG_DEBUG, "RSN: IBSS Auth started by peer " MACSTR, in ibss_rsn_handle_auth_1_of_2()
913 /* no need to start another AUTH challenge in the other way.. */ in ibss_rsn_handle_auth_1_of_2()
926 auth_length = IEEE80211_HDRLEN + sizeof(header->u.auth); in ibss_rsn_handle_auth()
931 if (le_to_host16(header->u.auth.auth_alg) != WLAN_AUTH_OPEN || in ibss_rsn_handle_auth()
932 le_to_host16(header->u.auth.status_code) != WLAN_STATUS_SUCCESS) in ibss_rsn_handle_auth()
937 switch (le_to_host16(header->u.auth.auth_transaction)) { in ibss_rsn_handle_auth()
942 wpa_printf(MSG_DEBUG, "RSN: IBSS RX Auth frame (SEQ 2) from " in ibss_rsn_handle_auth()
945 wpa_printf(MSG_DEBUG, "RSN: Received Auth seq 2 from " in ibss_rsn_handle_auth()
952 wpa_printf(MSG_DEBUG, "RSN: IBSS Auth completed with " MACSTR, in ibss_rsn_handle_auth()