Lines Matching full:ie
318 /* When using drivers that generate RSN IE, wpa_supplicant may in wpa_supplicant_get_pmk()
520 * @wpa_ie: WPA/RSN IE
521 * @wpa_ie_len: Length of the WPA/RSN IE
550 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE before FT processing", in wpa_supplicant_send_2_of_4()
553 * Add PMKR1Name into RSN IE (PMKID-List) and add MDIE and in wpa_supplicant_send_2_of_4()
568 "WPA: WPA IE after PMKID[PMKR1Name] addition into RSNE", in wpa_supplicant_send_2_of_4()
584 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE for msg 2/4", wpa_ie, wpa_ie_len); in wpa_supplicant_send_2_of_4()
858 struct wpa_eapol_ie_parse ie; in wpa_supplicant_process_1_of_4_wpa() local
872 os_memset(&ie, 0, sizeof(ie)); in wpa_supplicant_process_1_of_4_wpa()
874 res = wpa_supplicant_get_pmk(sm, src_addr, ie.pmkid); in wpa_supplicant_process_1_of_4_wpa()
925 struct wpa_eapol_ie_parse ie; in wpa_supplicant_process_1_of_4() local
956 os_memset(&ie, 0, sizeof(ie)); in wpa_supplicant_process_1_of_4()
960 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) { in wpa_supplicant_process_1_of_4()
965 if (ie.pmkid) { in wpa_supplicant_process_1_of_4()
967 ie.pmkid, PMKID_LEN); in wpa_supplicant_process_1_of_4()
970 if (sm->mlo.valid_links && !is_valid_ap_mld_mac_kde(sm, ie.mac_addr)) { in wpa_supplicant_process_1_of_4()
976 res = wpa_supplicant_get_pmk(sm, src_addr, ie.pmkid); in wpa_supplicant_process_1_of_4()
1558 struct wpa_eapol_ie_parse *ie, in wpa_supplicant_pairwise_mlo_gtk() argument
1564 if (!ie->mlo_gtk[i]) { in wpa_supplicant_pairwise_mlo_gtk()
1570 if (wpa_supplicant_mlo_gtk(sm, i, ie->mlo_gtk[i], in wpa_supplicant_pairwise_mlo_gtk()
1571 ie->mlo_gtk_len[i], key_info)) in wpa_supplicant_pairwise_mlo_gtk()
1867 struct wpa_eapol_ie_parse *ie) in _mlo_ieee80211w_set_keys() argument
1871 if (ie->mlo_igtk[link_id]) { in _mlo_ieee80211w_set_keys()
1873 if (ie->mlo_igtk_len[link_id] != in _mlo_ieee80211w_set_keys()
1880 ie->mlo_igtk[link_id], in _mlo_ieee80211w_set_keys()
1885 if (ie->mlo_bigtk[link_id] && sm->beacon_prot) { in _mlo_ieee80211w_set_keys()
1887 if (ie->mlo_bigtk_len[link_id] != in _mlo_ieee80211w_set_keys()
1894 ie->mlo_bigtk[link_id], in _mlo_ieee80211w_set_keys()
1904 struct wpa_eapol_ie_parse *ie) in mlo_ieee80211w_set_keys() argument
1913 if (_mlo_ieee80211w_set_keys(sm, i, ie)) in mlo_ieee80211w_set_keys()
1922 struct wpa_eapol_ie_parse *ie) in ieee80211w_set_keys() argument
1930 if (ie->igtk) { in ieee80211w_set_keys()
1934 if (ie->igtk_len != WPA_IGTK_KDE_PREFIX_LEN + len) in ieee80211w_set_keys()
1937 igtk = (const struct wpa_igtk_kde *) ie->igtk; in ieee80211w_set_keys()
1942 if (ie->bigtk && sm->beacon_prot) { in ieee80211w_set_keys()
1946 if (ie->bigtk_len != WPA_BIGTK_KDE_PREFIX_LEN + len) in ieee80211w_set_keys()
1949 bigtk = (const struct wpa_bigtk_kde *) ie->bigtk; in ieee80211w_set_keys()
1967 wpa_hexdump(MSG_INFO, "WPA: WPA IE in Beacon/ProbeResp", in wpa_report_ie_mismatch()
1973 "WPA: No WPA IE in Beacon/ProbeResp"); in wpa_report_ie_mismatch()
1975 wpa_hexdump(MSG_INFO, "WPA: WPA IE in 3/4 msg", in wpa_report_ie_mismatch()
1980 wpa_hexdump(MSG_INFO, "WPA: RSN IE in Beacon/ProbeResp", in wpa_report_ie_mismatch()
1986 "WPA: No RSN IE in Beacon/ProbeResp"); in wpa_report_ie_mismatch()
1988 wpa_hexdump(MSG_INFO, "WPA: RSN IE in 3/4 msg", in wpa_report_ie_mismatch()
2000 struct wpa_eapol_ie_parse *ie, in ft_validate_mdie() argument
2005 mdie = (struct rsn_mdie *) (ie->mdie + 2); in ft_validate_mdie()
2006 if (ie->mdie == NULL || ie->mdie_len < 2 + sizeof(*mdie) || in ft_validate_mdie()
2015 (assoc_resp_mdie[1] != ie->mdie[1] || in ft_validate_mdie()
2016 os_memcmp(assoc_resp_mdie, ie->mdie, 2 + ie->mdie[1]) != 0)) { in ft_validate_mdie()
2019 ie->mdie, 2 + ie->mdie[1]); in ft_validate_mdie()
2031 struct wpa_eapol_ie_parse *ie, in ft_validate_ftie() argument
2034 if (ie->ftie == NULL) { in ft_validate_ftie()
2043 if (assoc_resp_ftie[1] != ie->ftie[1] || in ft_validate_ftie()
2044 os_memcmp(assoc_resp_ftie, ie->ftie, 2 + ie->ftie[1]) != 0) { in ft_validate_ftie()
2047 ie->ftie, 2 + ie->ftie[1]); in ft_validate_ftie()
2059 struct wpa_eapol_ie_parse *ie) in ft_validate_rsnie() argument
2063 if (!ie->rsn_ie) in ft_validate_rsnie()
2070 if (wpa_parse_wpa_ie_rsn(ie->rsn_ie, ie->rsn_ie_len, &rsn) < 0 || in ft_validate_rsnie()
2095 struct wpa_eapol_ie_parse *ie) in wpa_supplicant_validate_ie_ft() argument
2117 if (ft_validate_mdie(sm, src_addr, ie, mdie) < 0 || in wpa_supplicant_validate_ie_ft()
2118 ft_validate_ftie(sm, src_addr, ie, ftie) < 0 || in wpa_supplicant_validate_ie_ft()
2119 ft_validate_rsnie(sm, src_addr, ie) < 0) in wpa_supplicant_validate_ie_ft()
2130 struct wpa_eapol_ie_parse *ie) in wpa_supplicant_validate_ie() argument
2134 "WPA: No WPA/RSN IE for this AP known. " in wpa_supplicant_validate_ie()
2146 if (ie->wpa_ie == NULL && ie->rsn_ie == NULL && in wpa_supplicant_validate_ie()
2148 wpa_report_ie_mismatch(sm, "IE in 3/4 msg does not match " in wpa_supplicant_validate_ie()
2149 "with IE in Beacon/ProbeResp (no IE?)", in wpa_supplicant_validate_ie()
2150 src_addr, ie->wpa_ie, ie->wpa_ie_len, in wpa_supplicant_validate_ie()
2151 ie->rsn_ie, ie->rsn_ie_len); in wpa_supplicant_validate_ie()
2155 if ((ie->wpa_ie && sm->ap_wpa_ie && in wpa_supplicant_validate_ie()
2156 (ie->wpa_ie_len != sm->ap_wpa_ie_len || in wpa_supplicant_validate_ie()
2157 os_memcmp(ie->wpa_ie, sm->ap_wpa_ie, ie->wpa_ie_len) != 0)) || in wpa_supplicant_validate_ie()
2158 (ie->rsn_ie && sm->ap_rsn_ie && in wpa_supplicant_validate_ie()
2161 ie->rsn_ie, ie->rsn_ie_len))) { in wpa_supplicant_validate_ie()
2162 wpa_report_ie_mismatch(sm, "IE in 3/4 msg does not match " in wpa_supplicant_validate_ie()
2163 "with IE in Beacon/ProbeResp", in wpa_supplicant_validate_ie()
2164 src_addr, ie->wpa_ie, ie->wpa_ie_len, in wpa_supplicant_validate_ie()
2165 ie->rsn_ie, ie->rsn_ie_len); in wpa_supplicant_validate_ie()
2170 ie->rsn_ie && sm->ap_rsn_ie == NULL && sm->rsn_enabled) { in wpa_supplicant_validate_ie()
2172 "detected - RSN was enabled and RSN IE " in wpa_supplicant_validate_ie()
2175 src_addr, ie->wpa_ie, ie->wpa_ie_len, in wpa_supplicant_validate_ie()
2176 ie->rsn_ie, ie->rsn_ie_len); in wpa_supplicant_validate_ie()
2181 ((sm->ap_rsnxe && !ie->rsnxe) || in wpa_supplicant_validate_ie()
2182 (!sm->ap_rsnxe && ie->rsnxe) || in wpa_supplicant_validate_ie()
2183 (sm->ap_rsnxe && ie->rsnxe && in wpa_supplicant_validate_ie()
2184 (sm->ap_rsnxe_len != ie->rsnxe_len || in wpa_supplicant_validate_ie()
2185 os_memcmp(sm->ap_rsnxe, ie->rsnxe, sm->ap_rsnxe_len) != 0)))) { in wpa_supplicant_validate_ie()
2191 ie->rsnxe, ie->rsnxe_len); in wpa_supplicant_validate_ie()
2198 wpa_supplicant_validate_ie_ft(sm, src_addr, ie) < 0) in wpa_supplicant_validate_ie()
2406 "RSN MLO: IE in 3/4 msg does not match with IE in Beacon/ProbeResp for link ID %u", in wpa_supplicant_validate_link_kde()
2440 struct wpa_eapol_ie_parse *ie) in wpa_validate_mlo_ieee80211w_kdes() argument
2442 if (ie->mlo_igtk[link_id] && in wpa_validate_mlo_ieee80211w_kdes()
2443 ie->mlo_igtk_len[link_id] != RSN_MLO_IGTK_KDE_PREFIX_LENGTH + in wpa_validate_mlo_ieee80211w_kdes()
2447 (unsigned long) ie->mlo_igtk_len[link_id], link_id); in wpa_validate_mlo_ieee80211w_kdes()
2454 if (ie->mlo_bigtk[link_id] && in wpa_validate_mlo_ieee80211w_kdes()
2455 ie->mlo_bigtk_len[link_id] != RSN_MLO_BIGTK_KDE_PREFIX_LENGTH + in wpa_validate_mlo_ieee80211w_kdes()
2459 (unsigned long) ie->mlo_bigtk_len[link_id], link_id); in wpa_validate_mlo_ieee80211w_kdes()
2473 struct wpa_eapol_ie_parse ie; in wpa_supplicant_process_3_of_4_wpa() local
2482 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len); in wpa_supplicant_process_3_of_4_wpa()
2483 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) in wpa_supplicant_process_3_of_4_wpa()
2486 if (wpa_supplicant_validate_ie(sm, sm->bssid, &ie) < 0) in wpa_supplicant_process_3_of_4_wpa()
2540 struct wpa_eapol_ie_parse ie; in wpa_supplicant_process_3_of_4() local
2551 wpa_hexdump(MSG_DEBUG, "WPA: IE KeyData", key_data, key_data_len); in wpa_supplicant_process_3_of_4()
2552 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) in wpa_supplicant_process_3_of_4()
2556 if (!ie.ssid) { in wpa_supplicant_process_3_of_4()
2562 if (ie.ssid_len != sm->ssid_len || in wpa_supplicant_process_3_of_4()
2563 os_memcmp(ie.ssid, sm->ssid, sm->ssid_len) != 0) { in wpa_supplicant_process_3_of_4()
2567 ie.ssid, ie.ssid_len); in wpa_supplicant_process_3_of_4()
2576 if (mlo && !ie.valid_mlo_gtks) { in wpa_supplicant_process_3_of_4()
2593 if (mlo && !is_valid_ap_mld_mac_kde(sm, ie.mac_addr)) { in wpa_supplicant_process_3_of_4()
2602 if (wpa_supplicant_validate_link_kde(sm, i, ie.mlo_link[i], in wpa_supplicant_process_3_of_4()
2603 ie.mlo_link_len[i]) < 0) in wpa_supplicant_process_3_of_4()
2609 if (!ie.mlo_gtk[i]) { in wpa_supplicant_process_3_of_4()
2617 wpa_validate_mlo_ieee80211w_kdes(sm, i, &ie) < 0) in wpa_supplicant_process_3_of_4()
2623 wpa_supplicant_validate_ie_ft(sm, sm->bssid, &ie) < 0) in wpa_supplicant_process_3_of_4()
2627 if (!mlo && ie.gtk && !(key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) { in wpa_supplicant_process_3_of_4()
2629 "WPA: GTK IE in unencrypted key data"); in wpa_supplicant_process_3_of_4()
2632 if (!mlo && ie.igtk && !(key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) { in wpa_supplicant_process_3_of_4()
2638 if (!mlo && ie.igtk && in wpa_supplicant_process_3_of_4()
2641 ie.igtk_len != WPA_IGTK_KDE_PREFIX_LEN + in wpa_supplicant_process_3_of_4()
2645 (unsigned long) ie.igtk_len); in wpa_supplicant_process_3_of_4()
2649 if (!mlo && wpa_supplicant_validate_ie(sm, sm->bssid, &ie) < 0) in wpa_supplicant_process_3_of_4()
2652 if (wpa_handle_ext_key_id(sm, &ie)) in wpa_supplicant_process_3_of_4()
2673 if (ie.ip_addr_alloc) { in wpa_supplicant_process_3_of_4()
2674 os_memcpy(sm->p2p_ip_addr, ie.ip_addr_alloc, 3 * 4); in wpa_supplicant_process_3_of_4()
2690 if (ocv_verify_tx_params(ie.oci, ie.oci_len, &ci, in wpa_supplicant_process_3_of_4()
2702 if (DPP_VERSION > 1 && ie.dpp_kde) { in wpa_supplicant_process_3_of_4()
2705 ie.dpp_kde[0], ie.dpp_kde[1]); in wpa_supplicant_process_3_of_4()
2707 (ie.dpp_kde[1] & DPP_KDE_PFS_ALLOWED) && !sm->dpp_z) { in wpa_supplicant_process_3_of_4()
2749 if (wpa_supplicant_pairwise_mlo_gtk(sm, key, &ie, in wpa_supplicant_process_3_of_4()
2757 } else if (!ie.gtk && sm->proto == WPA_PROTO_RSN) { in wpa_supplicant_process_3_of_4()
2761 } else if (ie.gtk && in wpa_supplicant_process_3_of_4()
2763 ie.gtk, ie.gtk_len, key_info) < 0) { in wpa_supplicant_process_3_of_4()
2769 if ((mlo && mlo_ieee80211w_set_keys(sm, &ie) < 0) || in wpa_supplicant_process_3_of_4()
2770 (!mlo && ieee80211w_set_keys(sm, &ie) < 0)) { in wpa_supplicant_process_3_of_4()
2776 if (mlo || sm->group_cipher == WPA_CIPHER_GTK_NOT_USED || ie.gtk) in wpa_supplicant_process_3_of_4()
2780 if (mlo || ie.gtk) in wpa_supplicant_process_3_of_4()
2800 if (ie.transition_disable) in wpa_supplicant_process_3_of_4()
2801 wpa_sm_transition_disable(sm, ie.transition_disable[0]); in wpa_supplicant_process_3_of_4()
2901 struct wpa_eapol_ie_parse ie; in wpa_supplicant_process_mlo_1_of_2() local
2919 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) in wpa_supplicant_process_mlo_1_of_2()
2922 if (!ie.valid_mlo_gtks) { in wpa_supplicant_process_mlo_1_of_2()
2944 if (ocv_verify_tx_params(ie.oci, ie.oci_len, &ci, in wpa_supplicant_process_mlo_1_of_2()
2955 if (mlo_ieee80211w_set_keys(sm, &ie) < 0) in wpa_supplicant_process_mlo_1_of_2()
2964 if (!ie.mlo_gtk[i]) in wpa_supplicant_process_mlo_1_of_2()
2967 if (wpa_supplicant_mlo_gtk(sm, i, ie.mlo_gtk[i], in wpa_supplicant_process_mlo_1_of_2()
2968 ie.mlo_gtk_len[i], key_info)) in wpa_supplicant_process_mlo_1_of_2()
3136 struct wpa_eapol_ie_parse ie; in wpa_supplicant_process_1_of_2() local
3155 if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) in wpa_supplicant_process_1_of_2()
3160 if (ie.gtk && !(key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) { in wpa_supplicant_process_1_of_2()
3165 if (!ie.gtk) { in wpa_supplicant_process_1_of_2()
3170 gtk_len = ie.gtk_len; in wpa_supplicant_process_1_of_2()
3195 if (ocv_verify_tx_params(ie.oci, ie.oci_len, &ci, in wpa_supplicant_process_1_of_2()
3212 ie.gtk, 2 + gtk_len); in wpa_supplicant_process_1_of_2()
3213 gd.keyidx = ie.gtk[0] & 0x3; in wpa_supplicant_process_1_of_2()
3215 !!(ie.gtk[0] & BIT(2))); in wpa_supplicant_process_1_of_2()
3216 os_memcpy(gd.gtk, ie.gtk + 2, gtk_len); in wpa_supplicant_process_1_of_2()
3218 if (ieee80211w_set_keys(sm, &ie) < 0) in wpa_supplicant_process_1_of_2()
4521 const u8 *ie; in wpa_sm_set_mlo_params() local
4540 ie = mlo->links[i].ap_rsne; in wpa_sm_set_mlo_params()
4543 if (!ie || len == 0) { in wpa_sm_set_mlo_params()
4552 ie, len); in wpa_sm_set_mlo_params()
4553 sm->mlo.links[i].ap_rsne = os_memdup(ie, len); in wpa_sm_set_mlo_params()
4561 ie = mlo->links[i].ap_rsnxe; in wpa_sm_set_mlo_params()
4564 if (!ie || len == 0) { in wpa_sm_set_mlo_params()
4572 wpa_hexdump_link(MSG_DEBUG, i, "RSN: Set AP RSNXE", ie, in wpa_sm_set_mlo_params()
4574 sm->mlo.links[i].ap_rsnxe = os_memdup(ie, len); in wpa_sm_set_mlo_params()
4849 * wpa_sm_set_assoc_wpa_ie_default - Generate own WPA/RSN IE from configuration
4851 * @wpa_ie: Pointer to buffer for WPA/RSN IE
4866 "TESTING: Replace association WPA/RSN IE"); in wpa_sm_set_assoc_wpa_ie_default()
4879 wpa_hexdump(MSG_DEBUG, "WPA: Set own WPA IE default", in wpa_sm_set_assoc_wpa_ie_default()
4884 * Make a copy of the WPA/RSN IE so that 4-Way Handshake gets in wpa_sm_set_assoc_wpa_ie_default()
4885 * the correct version of the IE even if PMKSA caching is in wpa_sm_set_assoc_wpa_ie_default()
4886 * aborted (which would remove PMKID from IE generation). in wpa_sm_set_assoc_wpa_ie_default()
4895 "WPA: Leave previously set WPA IE default", in wpa_sm_set_assoc_wpa_ie_default()
4904 * wpa_sm_set_assoc_wpa_ie - Set own WPA/RSN IE from (Re)AssocReq
4906 * @ie: Pointer to IE data (starting from id)
4907 * @len: IE length
4910 * Inform WPA state machine about the WPA/RSN IE used in (Re)Association
4911 * Request frame. The IE will be used to override the default value generated
4914 int wpa_sm_set_assoc_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) in wpa_sm_set_assoc_wpa_ie() argument
4920 if (ie == NULL || len == 0) { in wpa_sm_set_assoc_wpa_ie()
4922 "WPA: clearing own WPA/RSN IE"); in wpa_sm_set_assoc_wpa_ie()
4926 wpa_hexdump(MSG_DEBUG, "WPA: set own WPA/RSN IE", ie, len); in wpa_sm_set_assoc_wpa_ie()
4927 sm->assoc_wpa_ie = os_memdup(ie, len); in wpa_sm_set_assoc_wpa_ie()
4967 * correct version of the IE even if it gets changed. in wpa_sm_set_assoc_rsnxe_default()
4983 * @ie: Pointer to IE data (starting from id)
4984 * @len: IE length
4988 * frame. The IE will be used to override the default value generated
4991 int wpa_sm_set_assoc_rsnxe(struct wpa_sm *sm, const u8 *ie, size_t len) in wpa_sm_set_assoc_rsnxe() argument
4997 if (!ie || len == 0) { in wpa_sm_set_assoc_rsnxe()
5003 wpa_hexdump(MSG_DEBUG, "RSN: set own RSNXE", ie, len); in wpa_sm_set_assoc_rsnxe()
5004 sm->assoc_rsnxe = os_memdup(ie, len); in wpa_sm_set_assoc_rsnxe()
5024 * wpa_sm_set_ap_wpa_ie - Set AP WPA IE from Beacon/ProbeResp
5026 * @ie: Pointer to IE data (starting from id)
5027 * @len: IE length
5030 * Inform WPA state machine about the WPA IE used in Beacon / Probe Response
5033 int wpa_sm_set_ap_wpa_ie(struct wpa_sm *sm, const u8 *ie, size_t len) in wpa_sm_set_ap_wpa_ie() argument
5039 if (ie == NULL || len == 0) { in wpa_sm_set_ap_wpa_ie()
5041 "WPA: clearing AP WPA IE"); in wpa_sm_set_ap_wpa_ie()
5045 wpa_hexdump(MSG_DEBUG, "WPA: set AP WPA IE", ie, len); in wpa_sm_set_ap_wpa_ie()
5046 sm->ap_wpa_ie = os_memdup(ie, len); in wpa_sm_set_ap_wpa_ie()
5058 * wpa_sm_set_ap_rsn_ie - Set AP RSN IE from Beacon/ProbeResp
5060 * @ie: Pointer to IE data (starting from id)
5061 * @len: IE length
5064 * Inform WPA state machine about the RSN IE used in Beacon / Probe Response
5067 int wpa_sm_set_ap_rsn_ie(struct wpa_sm *sm, const u8 *ie, size_t len) in wpa_sm_set_ap_rsn_ie() argument
5073 if (ie == NULL || len == 0) { in wpa_sm_set_ap_rsn_ie()
5075 "WPA: clearing AP RSN IE"); in wpa_sm_set_ap_rsn_ie()
5079 wpa_hexdump(MSG_DEBUG, "WPA: set AP RSN IE", ie, len); in wpa_sm_set_ap_rsn_ie()
5080 sm->ap_rsn_ie = os_memdup(ie, len); in wpa_sm_set_ap_rsn_ie()
5094 * @ie: Pointer to IE data (starting from id)
5095 * @len: IE length
5101 int wpa_sm_set_ap_rsnxe(struct wpa_sm *sm, const u8 *ie, size_t len) in wpa_sm_set_ap_rsnxe() argument
5107 if (!ie || len == 0) { in wpa_sm_set_ap_rsnxe()
5112 wpa_hexdump(MSG_DEBUG, "WPA: set AP RSNXE", ie, len); in wpa_sm_set_ap_rsnxe()
5113 sm->ap_rsnxe = os_memdup(ie, len); in wpa_sm_set_ap_rsnxe()
5125 * wpa_sm_parse_own_wpa_ie - Parse own WPA/RSN IE
5128 * Returns: 0 on success, -1 if IE is not known, or -2 on parsing failure
5130 * Parse the contents of the own WPA or RSN IE from (Re)AssocReq and write the
5140 "WPA: No WPA/RSN IE available from association info"); in wpa_sm_parse_own_wpa_ie()
5443 wpa_printf(MSG_INFO, "FILS: No own RSN IE set for FILS"); in fils_build_auth()
6445 struct wpabuf *ie = NULL, *pub = NULL; in owe_build_assoc_req() local
6467 ie = wpabuf_alloc(5 + wpabuf_len(pub)); in owe_build_assoc_req()
6468 if (!ie) in owe_build_assoc_req()
6470 wpabuf_put_u8(ie, WLAN_EID_EXTENSION); in owe_build_assoc_req()
6471 wpabuf_put_u8(ie, 1 + 2 + wpabuf_len(pub)); in owe_build_assoc_req()
6472 wpabuf_put_u8(ie, WLAN_EID_EXT_OWE_DH_PARAM); in owe_build_assoc_req()
6473 wpabuf_put_le16(ie, group); in owe_build_assoc_req()
6474 wpabuf_put_buf(ie, pub); in owe_build_assoc_req()
6477 ie); in owe_build_assoc_req()
6479 return ie; in owe_build_assoc_req()