Lines Matching refs:data

180  * @wpa_s: Pointer to wpa_supplicant data
980 union wpa_event_data *data)
983 size_t ssid_str_len = data->external_auth.ssid_len;
984 const u8 *ssid_str = data->external_auth.ssid;
995 sme_external_auth_send_sae_commit(wpa_s, data->external_auth.bssid,
1031 union wpa_event_data *data)
1033 if (RSN_SELECTOR_GET(&data->external_auth.key_mgmt_suite) !=
1037 if (data->external_auth.action == EXT_AUTH_START) {
1038 if (!data->external_auth.bssid || !data->external_auth.ssid)
1040 os_memcpy(wpa_s->sme.ext_auth_bssid, data->external_auth.bssid,
1042 os_memcpy(wpa_s->sme.ext_auth_ssid, data->external_auth.ssid,
1043 data->external_auth.ssid_len);
1044 wpa_s->sme.ext_auth_ssid_len = data->external_auth.ssid_len;
1049 if (sme_handle_external_auth_start(wpa_s, data) < 0)
1052 } else if (data->external_auth.action == EXT_AUTH_ABORT) {
1061 u16 status_code, const u8 *data, size_t len,
1085 group = WPA_GET_LE16(data);
1097 wpa_s->sme.sae_token = wpabuf_alloc_copy(data + sizeof(le16),
1154 res = sae_parse_commit(&wpa_s->sme.sae, data, len, NULL, NULL,
1182 if (sae_check_confirm(&wpa_s->sme.sae, data, len) < 0)
1243 void sme_event_auth(struct wpa_supplicant *wpa_s, union wpa_event_data *data)
1259 if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) {
1262 MAC2STR(data->auth.peer));
1268 MAC2STR(data->auth.peer), data->auth.auth_type,
1269 data->auth.auth_transaction, data->auth.status_code);
1271 data->auth.ies, data->auth.ies_len);
1276 if (data->auth.auth_type == WLAN_AUTH_SAE) {
1278 res = sme_sae_auth(wpa_s, data->auth.auth_transaction,
1279 data->auth.status_code, data->auth.ies,
1280 data->auth.ies_len, 0, NULL);
1296 if (data->auth.status_code != WLAN_STATUS_SUCCESS) {
1299 if (data->auth.ies && data->auth.ies_len) {
1300 size_t buflen = 2 * data->auth.ies_len + 1;
1303 wpa_snprintf_hex(ie_txt, buflen, data->auth.ies,
1304 data->auth.ies_len);
1309 MAC2STR(data->auth.peer), data->auth.auth_type,
1310 data->auth.auth_transaction, data->auth.status_code,
1321 if (data->auth.status_code !=
1323 wpa_s->sme.auth_alg == data->auth.auth_type ||
1332 switch (data->auth.auth_type) {
1355 if (data->auth.auth_type == WLAN_AUTH_FT) {
1363 if (wpa_ft_process_response(wpa_s->wpa, data->auth.ies,
1364 data->auth.ies_len, 0,
1365 data->auth.peer,
1382 if (data->auth.auth_type == WLAN_AUTH_FILS_SK ||
1383 data->auth.auth_type == WLAN_AUTH_FILS_SK_PFS) {
1389 if (data->auth.auth_type != expect_auth_type) {
1392 data->auth.auth_type, expect_auth_type);
1404 data->auth.ies, data->auth.ies_len) < 0) {
1419 sme_associate(wpa_s, ssid->mode, data->auth.peer,
1420 data->auth.auth_type);
1857 union wpa_event_data *data)
1861 data->assoc_reject.status_code);
1898 union wpa_event_data *data)
1907 union wpa_event_data *data)
2471 const u8 *sa, const u8 *data,
2482 os_memcpy(resp + 2, data + 1, WLAN_SA_QUERY_TR_ID_LEN);
2510 const u8 *sa, const u8 *data,
2519 MACSTR " (trans_id %02x%02x)", MAC2STR(sa), data[1], data[2]);
2527 data + 1, WLAN_SA_QUERY_TR_ID_LEN) == 0)
2544 const u8 *data, size_t len)
2550 MACSTR " (trans_id %02x%02x)", MAC2STR(sa), data[1], data[2]);
2557 if (ieee802_11_parse_elems(data + 1 + WLAN_SA_QUERY_TR_ID_LEN,
2580 if (data[0] == WLAN_SA_QUERY_REQUEST)
2581 sme_process_sa_query_request(wpa_s, sa, data, len);
2582 else if (data[0] == WLAN_SA_QUERY_RESPONSE)
2583 sme_process_sa_query_response(wpa_s, sa, data, len);