struct wpabuf *erp_resp,
const u8 *msk, size_t msk_len)
{
- struct wpas_pasn *pasn = sta->pasn;
+ struct pasn_data *pasn = sta->pasn;
struct pasn_fils *fils = &pasn->fils;
u8 pmk[PMK_LEN_MAX];
size_t pmk_len;
wpa_printf(MSG_DEBUG, "PASN: FILS: RADIUS is not configured. Fail");
return -1;
#else /* CONFIG_NO_RADIUS */
- struct wpas_pasn *pasn = sta->pasn;
+ struct pasn_data *pasn = sta->pasn;
struct pasn_fils *fils = &pasn->fils;
struct ieee802_11_elems elems;
struct wpa_ie_data rsne_data;
static void hapd_initialize_pasn(struct hostapd_data *hapd,
struct sta_info *sta)
{
- struct wpas_pasn *pasn = sta->pasn;
+ struct pasn_data *pasn = sta->pasn;
pasn->cb_ctx = hapd;
pasn->send_mgmt = hapd_pasn_send_mlme;
const struct ieee80211_mgmt *mgmt,
size_t len)
{
- struct wpas_pasn *pasn = sta->pasn;
+ struct pasn_data *pasn = sta->pasn;
struct ieee802_11_elems elems;
struct wpa_ie_data rsn_data;
struct wpa_pasn_params_data pasn_params;
#endif /* CONFIG_AIRTIME_POLICY */
#ifdef CONFIG_PASN
- struct wpas_pasn *pasn;
+ struct pasn_data *pasn;
#endif /* CONFIG_PASN */
};
struct wpabuf *erp_resp;
};
-struct wpas_pasn {
+struct pasn_data {
int akmp;
int cipher;
u16 group;
/* Initiator */
-void wpa_pasn_reset(struct wpas_pasn *pasn);
-int wpas_pasn_start(struct wpas_pasn *pasn, const u8 *own_addr,
+void wpa_pasn_reset(struct pasn_data *pasn);
+int wpas_pasn_start(struct pasn_data *pasn, const u8 *own_addr,
const u8 *bssid, int akmp, int cipher, u16 group,
int freq, const u8 *beacon_rsne, u8 beacon_rsne_len,
const u8 *beacon_rsnxe, u8 beacon_rsnxe_len,
const struct wpabuf *comeback);
-int wpa_pasn_verify(struct wpas_pasn *pasn, const u8 *own_addr,
+int wpa_pasn_verify(struct pasn_data *pasn, const u8 *own_addr,
const u8 *bssid, int akmp, int cipher, u16 group,
int freq, const u8 *beacon_rsne, u8 beacon_rsne_len,
const u8 *beacon_rsnxe, u8 beacon_rsnxe_len,
const struct wpabuf *comeback);
-int wpa_pasn_auth_rx(struct wpas_pasn *pasn, const u8 *data, size_t len,
+int wpa_pasn_auth_rx(struct pasn_data *pasn, const u8 *data, size_t len,
struct wpa_pasn_params_data *pasn_params);
-int wpa_pasn_auth_tx_status(struct wpas_pasn *pasn,
+int wpa_pasn_auth_tx_status(struct pasn_data *pasn,
const u8 *data, size_t data_len, u8 acked);
/* Responder */
-int handle_auth_pasn_1(struct wpas_pasn *pasn,
+int handle_auth_pasn_1(struct pasn_data *pasn,
const u8 *own_addr, const u8 *peer_addr,
const struct ieee80211_mgmt *mgmt, size_t len);
-int handle_auth_pasn_3(struct wpas_pasn *pasn, const u8 *own_addr,
+int handle_auth_pasn_3(struct pasn_data *pasn, const u8 *own_addr,
const u8 *peer_addr,
const struct ieee80211_mgmt *mgmt, size_t len);
-int handle_auth_pasn_resp(struct wpas_pasn *pasn, const u8 *own_addr,
+int handle_auth_pasn_resp(struct pasn_data *pasn, const u8 *own_addr,
const u8 *peer_addr,
struct rsn_pmksa_cache_entry *pmksa, u16 status);
#ifdef CONFIG_SAE
-static struct wpabuf * wpas_pasn_wd_sae_commit(struct wpas_pasn *pasn)
+static struct wpabuf * wpas_pasn_wd_sae_commit(struct pasn_data *pasn)
{
struct wpabuf *buf = NULL;
int ret;
}
-static int wpas_pasn_wd_sae_rx(struct wpas_pasn *pasn, struct wpabuf *wd)
+static int wpas_pasn_wd_sae_rx(struct pasn_data *pasn, struct wpabuf *wd)
{
const u8 *data;
size_t buf_len;
}
-static struct wpabuf * wpas_pasn_wd_sae_confirm(struct wpas_pasn *pasn)
+static struct wpabuf * wpas_pasn_wd_sae_confirm(struct pasn_data *pasn)
{
struct wpabuf *buf = NULL;
#ifdef CONFIG_FILS
-static struct wpabuf * wpas_pasn_fils_build_auth(struct wpas_pasn *pasn)
+static struct wpabuf * wpas_pasn_fils_build_auth(struct pasn_data *pasn)
{
struct wpabuf *buf = NULL;
struct wpabuf *erp_msg;
}
-static struct wpabuf * wpas_pasn_wd_fils_auth(struct wpas_pasn *pasn)
+static struct wpabuf * wpas_pasn_wd_fils_auth(struct pasn_data *pasn)
{
wpa_printf(MSG_DEBUG, "PASN: FILS: wrapped data - completed=%u",
pasn->fils.completed);
}
-static int wpas_pasn_wd_fils_rx(struct wpas_pasn *pasn, struct wpabuf *wd)
+static int wpas_pasn_wd_fils_rx(struct pasn_data *pasn, struct wpabuf *wd)
{
struct ieee802_11_elems elems;
struct wpa_ie_data rsne_data;
#endif /* CONFIG_FILS */
-static struct wpabuf * wpas_pasn_get_wrapped_data(struct wpas_pasn *pasn)
+static struct wpabuf * wpas_pasn_get_wrapped_data(struct pasn_data *pasn)
{
if (pasn->using_pmksa)
return NULL;
}
-static u8 wpas_pasn_get_wrapped_data_format(struct wpas_pasn *pasn)
+static u8 wpas_pasn_get_wrapped_data_format(struct pasn_data *pasn)
{
if (pasn->using_pmksa)
return WPA_PASN_WRAPPED_DATA_NO;
}
-static struct wpabuf * wpas_pasn_build_auth_1(struct wpas_pasn *pasn,
+static struct wpabuf * wpas_pasn_build_auth_1(struct pasn_data *pasn,
const struct wpabuf *comeback,
bool verify)
{
}
-static struct wpabuf * wpas_pasn_build_auth_3(struct wpas_pasn *pasn)
+static struct wpabuf * wpas_pasn_build_auth_3(struct pasn_data *pasn)
{
struct wpabuf *buf, *wrapped_data_buf = NULL;
u8 mic[WPA_PASN_MAX_MIC_LEN];
}
-void wpa_pasn_reset(struct wpas_pasn *pasn)
+void wpa_pasn_reset(struct pasn_data *pasn)
{
wpa_printf(MSG_DEBUG, "PASN: Reset");
}
-static int wpas_pasn_set_pmk(struct wpas_pasn *pasn,
+static int wpas_pasn_set_pmk(struct pasn_data *pasn,
struct wpa_ie_data *rsn_data,
struct wpa_pasn_params_data *pasn_data,
struct wpabuf *wrapped_data)
}
-static int wpas_pasn_send_auth_1(struct wpas_pasn *pasn, const u8 *own_addr,
+static int wpas_pasn_send_auth_1(struct pasn_data *pasn, const u8 *own_addr,
const u8 *bssid, int akmp, int cipher,
u16 group, int freq,
const u8 *beacon_rsne, u8 beacon_rsne_len,
}
-int wpas_pasn_start(struct wpas_pasn *pasn, const u8 *own_addr,
+int wpas_pasn_start(struct pasn_data *pasn, const u8 *own_addr,
const u8 *bssid, int akmp, int cipher, u16 group,
int freq, const u8 *beacon_rsne, u8 beacon_rsne_len,
const u8 *beacon_rsnxe, u8 beacon_rsnxe_len,
* provides support to construct PASN Authentication frames for pairing
* verification.
*/
-int wpa_pasn_verify(struct wpas_pasn *pasn, const u8 *own_addr,
+int wpa_pasn_verify(struct pasn_data *pasn, const u8 *own_addr,
const u8 *bssid, int akmp, int cipher, u16 group,
int freq, const u8 *beacon_rsne, u8 beacon_rsne_len,
const u8 *beacon_rsnxe, u8 beacon_rsnxe_len,
}
-int wpa_pasn_auth_rx(struct wpas_pasn *pasn, const u8 *data, size_t len,
+int wpa_pasn_auth_rx(struct pasn_data *pasn, const u8 *data, size_t len,
struct wpa_pasn_params_data *pasn_params)
{
}
-int wpa_pasn_auth_tx_status(struct wpas_pasn *pasn,
+int wpa_pasn_auth_tx_status(struct pasn_data *pasn,
const u8 *data, size_t data_len, u8 acked)
{
#ifdef CONFIG_PASN
#ifdef CONFIG_SAE
-static int pasn_wd_handle_sae_commit(struct wpas_pasn *pasn,
+static int pasn_wd_handle_sae_commit(struct pasn_data *pasn,
const u8 *own_addr, const u8 *peer_addr,
struct wpabuf *wd)
{
}
-static int pasn_wd_handle_sae_confirm(struct wpas_pasn *pasn,
+static int pasn_wd_handle_sae_confirm(struct pasn_data *pasn,
const u8 *peer_addr, struct wpabuf *wd)
{
const u8 *data;
}
-static struct wpabuf * pasn_get_sae_wd(struct wpas_pasn *pasn)
+static struct wpabuf * pasn_get_sae_wd(struct pasn_data *pasn)
{
struct wpabuf *buf = NULL;
u8 *len_ptr;
#ifdef CONFIG_FILS
-static struct wpabuf * pasn_get_fils_wd(struct wpas_pasn *pasn)
+static struct wpabuf * pasn_get_fils_wd(struct pasn_data *pasn)
{
struct pasn_fils *fils = &pasn->fils;
struct wpabuf *buf = NULL;
#endif /* CONFIG_FILS */
-static struct wpabuf * pasn_get_wrapped_data(struct wpas_pasn *pasn)
+static struct wpabuf * pasn_get_wrapped_data(struct pasn_data *pasn)
{
switch (pasn->akmp) {
case WPA_KEY_MGMT_PASN:
static int
-pasn_derive_keys(struct wpas_pasn *pasn,
+pasn_derive_keys(struct pasn_data *pasn,
const u8 *own_addr, const u8 *peer_addr,
const u8 *cached_pmk, size_t cached_pmk_len,
struct wpa_pasn_params_data *pasn_data,
}
-static void handle_auth_pasn_comeback(struct wpas_pasn *pasn,
+static void handle_auth_pasn_comeback(struct pasn_data *pasn,
const u8 *own_addr, const u8 *peer_addr,
u16 group)
{
}
-int handle_auth_pasn_resp(struct wpas_pasn *pasn, const u8 *own_addr,
+int handle_auth_pasn_resp(struct pasn_data *pasn, const u8 *own_addr,
const u8 *peer_addr,
struct rsn_pmksa_cache_entry *pmksa, u16 status)
{
}
-int handle_auth_pasn_1(struct wpas_pasn *pasn,
+int handle_auth_pasn_1(struct pasn_data *pasn,
const u8 *own_addr, const u8 *peer_addr,
const struct ieee80211_mgmt *mgmt, size_t len)
{
}
-int handle_auth_pasn_3(struct wpas_pasn *pasn, const u8 *own_addr,
+int handle_auth_pasn_3(struct pasn_data *pasn, const u8 *own_addr,
const u8 *peer_addr,
const struct ieee80211_mgmt *mgmt, size_t len)
{
}
-static void wpas_pasn_initiate_eapol(struct wpas_pasn *pasn,
+static void wpas_pasn_initiate_eapol(struct pasn_data *pasn,
struct wpa_ssid *ssid)
{
struct eapol_config eapol_conf;
static void wpas_pasn_reset(struct wpa_supplicant *wpa_s)
{
- struct wpas_pasn *pasn = &wpa_s->pasn;
+ struct pasn_data *pasn = &wpa_s->pasn;
wpas_pasn_cancel_auth_work(wpa_s);
wpa_s->pasn_auth_work = NULL;
{
struct wpa_supplicant *wpa_s = work->wpa_s;
struct wpa_pasn_auth_work *awork = work->ctx;
- struct wpas_pasn *pasn = &wpa_s->pasn;
+ struct pasn_data *pasn = &wpa_s->pasn;
struct wpa_ssid *ssid;
struct wpa_bss *bss;
const u8 *rsne, *rsnxe;
void wpas_pasn_auth_stop(struct wpa_supplicant *wpa_s)
{
- struct wpas_pasn *pasn = &wpa_s->pasn;
+ struct pasn_data *pasn = &wpa_s->pasn;
if (!wpa_s->pasn.ecdh)
return;
static int wpas_pasn_immediate_retry(struct wpa_supplicant *wpa_s,
- struct wpas_pasn *pasn,
+ struct pasn_data *pasn,
struct wpa_pasn_params_data *params)
{
int akmp = pasn->akmp;
int wpas_pasn_auth_rx(struct wpa_supplicant *wpa_s,
const struct ieee80211_mgmt *mgmt, size_t len)
{
- struct wpas_pasn *pasn = &wpa_s->pasn;
+ struct pasn_data *pasn = &wpa_s->pasn;
struct wpa_pasn_params_data pasn_data;
int ret;
const u8 *data, size_t data_len, u8 acked)
{
- struct wpas_pasn *pasn = &wpa_s->pasn;
+ struct pasn_data *pasn = &wpa_s->pasn;
int ret;
if (!wpa_s->pasn_auth_work) {
bool mscs_setup_done;
#ifdef CONFIG_PASN
- struct wpas_pasn pasn;
+ struct pasn_data pasn;
struct wpa_radio_work *pasn_auth_work;
unsigned int pasn_count;
struct pasn_auth *pasn_params;