Lines Matching refs:sae

23 #include "common/sae.h"
384 sae_state_txt(sta->sae->state), sae_state_txt(state),
386 sta->sae->state = state;
398 if (sta->sae->tmp)
399 rx_id = sta->sae->tmp->pw_id;
423 sta->sae) < 0) {
429 if (!sta->sae->tmp) {
434 sta->sae->tmp->vlan_id = pw->vlan_id;
441 sae_write_commit(sta->sae, buf, sta->sae->tmp ?
442 sta->sae->tmp->anti_clogging_token : NULL, rx_id);
457 sae_write_confirm(sta->sae, buf);
471 if (!data && sta->sae->tmp && sta->sae->tmp->pw_id)
478 wpabuf_len(data), "sae-send-commit");
499 wpabuf_len(data), "sae-send-confirm");
516 if (!sta->sae)
518 if (sta->sae->state != SAE_COMMITTED &&
519 sta->sae->state != SAE_CONFIRMED)
641 if (sta->sae->sync > hapd->conf->sae_sync) {
643 sta->sae->sync = 0;
658 sta->sae->sync++;
661 MAC2STR(sta->addr), sta->sae->sync,
662 sae_state_txt(sta->sae->state));
664 switch (sta->sae->state) {
713 if (status == WLAN_STATUS_SUCCESS && sta->sae &&
715 params.pmkid = sta->sae->pmkid;
726 if (sta->sae->tmp && sta->sae->tmp->vlan_id > 0) {
729 MAC2STR(sta->addr), sta->sae->tmp->vlan_id);
733 vlan_desc.untagged = sta->sae->tmp->vlan_id;
737 sta->sae->tmp->vlan_id);
745 MACSTR, sta->sae->tmp->vlan_id,
758 sta->sae->pmk, sta->sae->pmkid);
775 MAC2STR(sta->addr), sae_state_txt(sta->sae->state),
777 switch (sta->sae->state) {
786 if (sae_process_commit(sta->sae) < 0)
818 sta->sae->sync = 0;
830 if (sae_process_commit(sta->sae) < 0)
837 sta->sae->sync = 0;
846 sta->sae->sync++;
879 sta->sae->sync++;
885 if (sae_process_commit(sta->sae) < 0)
894 sta->sae->send_confirm = 0xffff;
914 if (sae_process_commit(sta->sae) < 0)
916 sta->sae->sync = 0;
921 sta->sae->sync++;
924 sae_clear_temp_data(sta->sae);
931 sta->sae->state);
940 struct sae_data *sae = sta->sae;
944 if (sae->state != SAE_COMMITTED)
947 wpa_printf(MSG_DEBUG, "SAE: Previously selected group: %d", sae->group);
952 if (sae->group == groups[i])
970 if (sae_set_group(sae, groups[i]) < 0)
1000 "auth-sae-reflection-attack");
1010 "sae-commit-override");
1014 if (!sta->sae) {
1020 sta->sae = os_zalloc(sizeof(*sta->sae));
1021 if (!sta->sae) {
1026 sta->sae->sync = 0;
1048 sta->sae->tmp) {
1057 resp = sae_group_allowed(sta->sae, groups,
1066 wpabuf_free(sta->sae->tmp->anti_clogging_token);
1067 sta->sae->tmp->anti_clogging_token =
1069 if (sta->sae->tmp->anti_clogging_token == NULL) {
1091 sta->sae->sync = 0;
1099 sta->sae->tmp) {
1110 sta->sae->state == SAE_COMMITTED) {
1121 sae_group_allowed(sta->sae, groups,
1132 sae_clear_data(sta->sae);
1136 resp = sae_parse_commit(sta->sae, mgmt->u.auth.variable,
1173 data = auth_build_token_req(hapd, sta->sae->group,
1191 if (sta->sae->state >= SAE_CONFIRMED ||
1206 if (sta->sae->state == SAE_ACCEPTED &&
1207 (peer_send_confirm <= sta->sae->rc ||
1214 peer_send_confirm, sta->sae->rc);
1218 if (sae_check_confirm(sta->sae, var, var_len) < 0) {
1222 sta->sae->rc = peer_send_confirm;
1252 data ? wpabuf_len(data) : 0, "auth-sae");
1273 * sta->sae structure should be initialized appropriately via a call to
1280 if (!sta->sae || !sta->sae->tmp)
1283 if (sta->sae->state != SAE_NOTHING)
1291 sta->sae->sync = 0;
3128 if (wpa_auth_uses_sae(sta->wpa_sm) && sta->sae &&
3129 sta->sae->state == SAE_ACCEPTED)
3130 wpa_auth_add_sae_pmkid(sta->wpa_sm, sta->sae->pmkid);