Lines Matching full:ie
63 u8 ie_type; /* Timeout IE */
70 u8 ie_type; /* Link Identifier IE */
84 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs);
103 u8 rsnie_i[TDLS_MAX_IE_LEN]; /* Initiator RSN IE */
105 u8 rsnie_p[TDLS_MAX_IE_LEN]; /* Peer RSN IE */
188 static u8 * wpa_add_ie(u8 *pos, const u8 *ie, size_t ie_len) in wpa_add_ie() argument
190 os_memcpy(pos, ie, ie_len); in wpa_add_ie()
483 * @lnkid: Pointer to the beginning of Link Identifier IE
486 * @timeoutie: Pointer to the beginning of Timeout IE used for handshake
520 /* 4) Link Identifier IE */ in wpa_tdls_ftie_mic()
523 /* 5) RSN IE */ in wpa_tdls_ftie_mic()
526 /* 6) Timeout Interval IE */ in wpa_tdls_ftie_mic()
550 * @lnkid: Pointer to the beginning of Link Identifier IE
579 /* 1) Link Identifier IE */ in wpa_tdls_key_mic_teardown()
1000 ielen = len - (pos - buf); /* start of IE in buf */ in wpa_tdls_recv_teardown()
1012 wpa_printf(MSG_INFO, "TDLS: No Link Identifier IE in TDLS " in wpa_tdls_recv_teardown()
1121 * Timeout Interval IE)) in wpa_tdls_send_tpk_m1()
1124 /* Filling RSN IE */ in wpa_tdls_send_tpk_m1()
1139 * RSN IE is filled only with CCMP CIPHER in wpa_tdls_send_tpk_m1()
1160 wpa_printf(MSG_DEBUG, "TDLS: Use alternative RSN IE for " in wpa_tdls_send_tpk_m1()
1177 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE for TPK handshake", in wpa_tdls_send_tpk_m1()
1202 /* Initiator RSN IE */ in wpa_tdls_send_tpk_m1()
1296 /* Peer RSN IE, FTIE(Initiator Nonce, Responder Nonce), in wpa_tdls_send_tpk_m2()
1314 /* Peer RSN IE */ in wpa_tdls_send_tpk_m2()
1389 /* Peer RSN IE, FTIE(Initiator Nonce, Responder Nonce), in wpa_tdls_send_tpk_m3()
1407 /* Peer RSN IE */ in wpa_tdls_send_tpk_m3()
1492 /* Filling RSN IE */ in wpa_tdls_send_discovery_response()
1505 * RSN IE is filled only with CCMP cipher suite. in wpa_tdls_send_discovery_response()
1527 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE for Discovery Response", in wpa_tdls_send_discovery_response()
1532 /* Peer RSN IE, Lifetime */ in wpa_tdls_send_discovery_response()
1545 /* Initiator RSN IE */ in wpa_tdls_send_discovery_response()
1617 * Some APs will tack on a weird IE to the end of a TDLS in wpa_tdls_process_discovery_request()
1619 * since the required IE are verified separately. in wpa_tdls_process_discovery_request()
1947 struct wpa_ie_data ie; in wpa_tdls_process_tpk_m1() local
2022 ielen = len - (cpos - buf); /* start of IE in buf */ in wpa_tdls_process_tpk_m1()
2034 wpa_printf(MSG_INFO, "TDLS: No valid Link Identifier IE in " in wpa_tdls_process_tpk_m1()
2078 /* Overwrite with the qos_info obtained in WMM IE */ in wpa_tdls_process_tpk_m1()
2117 wpa_printf(MSG_INFO, "TDLS: RSN IE in TPK M1 while " in wpa_tdls_process_tpk_m1()
2127 wpa_printf(MSG_INFO, "TDLS: No FTIE or RSN IE in TPK M1"); in wpa_tdls_process_tpk_m1()
2133 wpa_printf(MSG_INFO, "TDLS: Too long Initiator RSN IE in " in wpa_tdls_process_tpk_m1()
2139 if (wpa_parse_wpa_ie_rsn(kde.rsn_ie, kde.rsn_ie_len, &ie) < 0) { in wpa_tdls_process_tpk_m1()
2140 wpa_printf(MSG_INFO, "TDLS: Failed to parse RSN IE in TPK M1"); in wpa_tdls_process_tpk_m1()
2145 cipher = ie.pairwise_cipher; in wpa_tdls_process_tpk_m1()
2155 if ((ie.capabilities & in wpa_tdls_process_tpk_m1()
2166 wpa_printf(MSG_INFO, "TDLS: No Key Lifetime IE in TPK M1"); in wpa_tdls_process_tpk_m1()
2270 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE for TPK handshake", in wpa_tdls_process_tpk_m1()
2360 struct wpa_ie_data ie; in wpa_tdls_process_tpk_m2() local
2436 ielen = len - (pos - buf); /* start of IE in buf */ in wpa_tdls_process_tpk_m2()
2456 wpa_printf(MSG_INFO, "TDLS: No valid Link Identifier IE in " in wpa_tdls_process_tpk_m2()
2496 /* Overwrite with the qos_info obtained in WMM IE */ in wpa_tdls_process_tpk_m2()
2510 wpa_printf(MSG_INFO, "TDLS: No FTIE or RSN IE in TPK M2"); in wpa_tdls_process_tpk_m2()
2514 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE Received from TPK M2", in wpa_tdls_process_tpk_m2()
2519 "TDLS: Too long Responder RSN IE in TPK M2"); in wpa_tdls_process_tpk_m2()
2525 * FIX: bitwise comparison of RSN IE is not the correct way of in wpa_tdls_process_tpk_m2()
2532 wpa_printf(MSG_INFO, "TDLS: RSN IE in TPK M2 does " in wpa_tdls_process_tpk_m2()
2533 "not match with RSN IE used in TPK M1"); in wpa_tdls_process_tpk_m2()
2534 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE Sent in TPK M1", in wpa_tdls_process_tpk_m2()
2536 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE Received from TPK M2", in wpa_tdls_process_tpk_m2()
2542 if (wpa_parse_wpa_ie_rsn(kde.rsn_ie, kde.rsn_ie_len, &ie) < 0) { in wpa_tdls_process_tpk_m2()
2543 wpa_printf(MSG_INFO, "TDLS: Failed to parse RSN IE in TPK M2"); in wpa_tdls_process_tpk_m2()
2548 cipher = ie.pairwise_cipher; in wpa_tdls_process_tpk_m2()
2569 /* Responder Nonce and RSN IE */ in wpa_tdls_process_tpk_m2()
2577 wpa_printf(MSG_INFO, "TDLS: No Key Lifetime IE in TPK M2"); in wpa_tdls_process_tpk_m2()
2696 ielen = len - (pos - buf); /* start of IE in buf */ in wpa_tdls_process_tpk_m3()
2710 wpa_printf(MSG_INFO, "TDLS: No Link Identifier IE in TPK M3"); in wpa_tdls_process_tpk_m3()
2735 wpa_printf(MSG_INFO, "TDLS: No RSN IE in TPK M3"); in wpa_tdls_process_tpk_m3()
2738 wpa_hexdump(MSG_DEBUG, "TDLS: RSN IE Received from TPK M3", in wpa_tdls_process_tpk_m3()
2742 wpa_printf(MSG_INFO, "TDLS: RSN IE in TPK M3 does not match " in wpa_tdls_process_tpk_m3()
2760 wpa_printf(MSG_INFO, "TDLS: No Key Lifetime IE in TPK M3"); in wpa_tdls_process_tpk_m3()
2764 wpa_hexdump(MSG_DEBUG, "TDLS: Timeout IE Received from TPK M3", in wpa_tdls_process_tpk_m3()
2816 static u8 * wpa_add_tdls_timeoutie(u8 *pos, u8 *ie, size_t ie_len, u32 tsecs) in wpa_add_tdls_timeoutie() argument
2818 struct wpa_tdls_timeoutie *lifetime = (struct wpa_tdls_timeoutie *) ie; in wpa_add_tdls_timeoutie()
2825 os_memcpy(pos, ie, ie_len); in wpa_add_tdls_timeoutie()