Lines Matching refs:wh

474 	struct ieee80211_frame *wh;
490 wh = mtod(m, struct ieee80211_frame *);
492 dir = wh->i_fc[1] & IEEE80211_FC1_DIR_MASK;
494 hdrspace = ieee80211_hdrspace(ic, wh); /* XXX optimize? */
516 wh = mtod(m, struct ieee80211_frame *);
518 if ((wh->i_fc[0] & IEEE80211_FC0_VERSION_MASK) !=
522 wh->i_fc[0], wh->i_fc[1]);
527 dir = wh->i_fc[1] & IEEE80211_FC1_DIR_MASK;
528 type = wh->i_fc[0] & IEEE80211_FC0_TYPE_MASK;
529 subtype = wh->i_fc[0] & IEEE80211_FC0_SUBTYPE_MASK;
532 bssid = wh->i_addr1;
534 bssid = wh->i_addr1;
544 bssid = wh->i_addr3;
563 uint8_t tid = ieee80211_gettid(wh);
564 if (IEEE80211_QOS_HAS_SEQ(wh) &&
567 if (! ieee80211_check_rxseq(ni, wh, bssid))
574 hdrspace = ieee80211_hdrspace(ic, wh);
588 IEEE80211_MSG_INPUT, wh, "data",
593 IEEE80211_MSG_WDS, wh,
603 wh, "data", "%s", "unknown src");
604 ieee80211_send_error(ni, wh->i_addr2,
612 wh, "data", "%s", "unassoc src");
624 if (((wh->i_fc[1] & IEEE80211_FC1_PWR_MGT) ^
627 wh->i_fc[1] & IEEE80211_FC1_PWR_MGT);
637 IEEE80211_MSG_WDS, wh,
669 if (wh->i_fc[1] & IEEE80211_FC1_PROTECTED) {
675 wh, "WEP", "%s", "PRIVACY off");
686 wh = mtod(m, struct ieee80211_frame *);
687 wh->i_fc[1] &= ~IEEE80211_FC1_PROTECTED;
697 qos = ieee80211_getqos(wh)[0];
704 if (!IEEE80211_IS_MULTICAST(wh->i_addr1)) {
711 wh = NULL; /* no longer valid, catch any uses */
801 wh, "mgt", "incorrect dir 0x%x", dir);
812 if (IEEE80211_IS_MULTICAST(wh->i_addr2)) {
815 wh, NULL, "source is multicast: %s",
816 ether_sprintf(wh->i_addr2));
825 ether_sprintf(wh->i_addr2), rssi);
828 if (wh->i_fc[1] & IEEE80211_FC1_PROTECTED) {
835 wh, NULL,
845 wh, NULL, "%s", "WEP set but PRIVACY off");
849 hdrspace = ieee80211_hdrspace(ic, wh);
855 wh = mtod(m, struct ieee80211_frame *);
856 wh->i_fc[1] &= ~IEEE80211_FC1_PROTECTED;
876 wh, "bad", "frame type 0x%x", type);
892 hostap_auth_open(struct ieee80211_node *ni, struct ieee80211_frame *wh,
914 ieee80211_send_error(ni, wh->i_addr2,
925 ni = ieee80211_dup_bss(vap, wh->i_addr2);
970 hostap_auth_shared(struct ieee80211_node *ni, struct ieee80211_frame *wh,
1050 ni = ieee80211_dup_bss(vap, wh->i_addr2);
1143 ieee80211_send_error(ni, wh->i_addr2,
1209 struct ieee80211_rsnparms *rsn, const struct ieee80211_frame *wh)
1223 wh, "WPA", "not WPA, flags 0x%x", vap->iv_flags);
1229 wh, "WPA", "too short, len %u", len);
1238 wh, "WPA", "bad version %u", w);
1255 wh, "WPA", "ucast cipher data too short; len %u, n %u",
1275 wh, "WPA", "key mgmt alg data too short; len %u, n %u",
1357 struct ieee80211_rsnparms *rsn, const struct ieee80211_frame *wh)
1371 wh, "WPA", "not RSN, flags 0x%x", vap->iv_flags);
1377 wh, "RSN", "too short, len %u", len);
1385 wh, "RSN", "bad version %u", w);
1402 wh, "RSN", "ucast cipher data too short; len %u, n %u",
1422 wh, "RSN", "key mgmt alg data too short; len %u, n %u",
1449 const struct ieee80211_frame *wh, const uint8_t *wpa,
1477 wh, NULL, "%s", "no WPA/RSN IE in association request");
1497 wh, NULL,
1507 reason = ieee80211_parse_wpa(vap, wpa, rsnparms, wh);
1509 reason = ieee80211_parse_rsn(vap, rsn, rsnparms, wh);
1578 ratesetmismatch(struct ieee80211_node *ni, const struct ieee80211_frame *wh,
1581 IEEE80211_NOTE_MAC(ni->ni_vap, IEEE80211_MSG_ANY, wh->i_addr2,
1589 capinfomismatch(struct ieee80211_node *ni, const struct ieee80211_frame *wh,
1594 IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_ANY, wh->i_addr2,
1603 htcapmismatch(struct ieee80211_node *ni, const struct ieee80211_frame *wh,
1606 IEEE80211_NOTE_MAC(ni->ni_vap, IEEE80211_MSG_ANY, wh->i_addr2,
1614 authalgreject(struct ieee80211_node *ni, const struct ieee80211_frame *wh,
1620 wh, NULL, "unsupported alg %d", algo);
1622 ieee80211_send_error(ni, wh->i_addr2, IEEE80211_FC0_SUBTYPE_AUTH,
1658 struct ieee80211_frame *wh;
1664 wh = mtod(m0, struct ieee80211_frame *);
1665 frm = (uint8_t *)&wh[1];
1711 ieee80211_add_scan(vap, ic->ic_curchan, &scan, wh,
1730 IEEE80211_MSG_ASSOC, wh,
1778 if (vap->iv_acl != NULL && !vap->iv_acl->iac_check(vap, wh)) {
1780 wh, NULL, "%s", "disallowed by ACL");
1814 wh, NULL,
1821 IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_INPUT, wh->i_addr2,
1829 ieee80211_send_proberesp(vap, wh->i_addr2,
1840 if (!IEEE80211_ADDR_EQ(wh->i_addr3, vap->iv_bss->ni_bssid)) {
1842 wh, NULL, "%s", "wrong bssid");
1857 IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_AUTH, wh->i_addr2,
1862 if (vap->iv_acl != NULL && !vap->iv_acl->iac_check(vap, wh)) {
1864 wh, NULL, "%s", "disallowed by ACL");
1866 ieee80211_send_error(ni, wh->i_addr2,
1874 wh, NULL, "%s", "TKIP countermeasures enabled");
1876 ieee80211_send_error(ni, wh->i_addr2,
1882 hostap_auth_shared(ni, wh, frm + 6, efrm, rssi, nf,
1885 hostap_auth_open(ni, wh, rssi, nf, seq, status);
1887 authalgreject(ni, wh, algo,
1900 authalgreject(ni, wh, algo,
1916 if (!IEEE80211_ADDR_EQ(wh->i_addr3, vap->iv_bss->ni_bssid)) {
1918 wh, NULL, "%s", "wrong bssid");
1930 IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_ANY, wh->i_addr2,
1933 ieee80211_send_error(ni, wh->i_addr2,
2009 !wpa_assocreq(ni, &rsnparms, wh, wpa, rsn, capinfo))
2018 capinfomismatch(ni, wh, reassoc, resp,
2028 capinfomismatch(ni, wh, reassoc, resp,
2036 ratesetmismatch(ni, wh, reassoc, resp, "legacy", rate);
2047 ratesetmismatch(ni, wh, reassoc, resp, "11g", rate);
2060 ratesetmismatch(ni, wh, reassoc, resp,
2100 htcapmismatch(ni, wh, reassoc, resp);
2156 !IEEE80211_ADDR_EQ(wh->i_addr1, vap->iv_myaddr)) {
2186 wh, NULL, "%s", "unknown node");
2188 } else if (!IEEE80211_ADDR_EQ(vap->iv_myaddr, wh->i_addr1) &&
2189 !IEEE80211_IS_MULTICAST(wh->i_addr1)) {
2191 wh, NULL, "%s", "not for us");
2195 wh, NULL, "wrong state %s",
2200 (void)ic->ic_recv_action(ni, wh, frm, efrm);
2209 wh, NULL, "%s", "not handled");
2215 wh, "mgt", "subtype 0x%x not handled", subtype);
2242 struct ieee80211_frame_min *wh;
2247 wh = mtod(m0, struct ieee80211_frame_min *);
2251 (struct ieee80211_frame *) wh, NULL,
2259 aid = le16toh(*(uint16_t *)wh->i_dur);
2263 (struct ieee80211_frame *) wh, NULL,
2281 IEEE80211_NOTE_MAC(vap, IEEE80211_MSG_POWER, wh->i_addr2,