Lines Matching full:ie

443 	struct wpa_ie_data ie;  in wpa_find_assoc_pmkid()  local
455 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 || in wpa_find_assoc_pmkid()
456 ie.pmkid == NULL) in wpa_find_assoc_pmkid()
459 for (i = 0; i < ie.num_pmkid; i++) { in wpa_find_assoc_pmkid()
461 ie.pmkid + i * PMKID_LEN, in wpa_find_assoc_pmkid()
472 wpa_dbg(wpa_s, MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from " in wpa_find_assoc_pmkid()
652 struct wpa_ie_data ie; in wpa_supplicant_ssid_bss_match() local
684 if (wpa_parse_wpa_ie(rsn_ie, 2 + rsn_ie[1], &ie)) { in wpa_supplicant_ssid_bss_match()
687 " skip RSN IE - parse failed"); in wpa_supplicant_ssid_bss_match()
690 if (!ie.has_pairwise) in wpa_supplicant_ssid_bss_match()
691 ie.pairwise_cipher = wpa_default_rsn_cipher(bss->freq); in wpa_supplicant_ssid_bss_match()
692 if (!ie.has_group) in wpa_supplicant_ssid_bss_match()
693 ie.group_cipher = wpa_default_rsn_cipher(bss->freq); in wpa_supplicant_ssid_bss_match()
697 ie.pairwise_cipher &= ~(WPA_CIPHER_WEP40 | in wpa_supplicant_ssid_bss_match()
700 ie.group_cipher &= ~(WPA_CIPHER_WEP40 | in wpa_supplicant_ssid_bss_match()
707 (ie.group_cipher & (WPA_CIPHER_WEP40 | WPA_CIPHER_WEP104))) in wpa_supplicant_ssid_bss_match()
711 " selected based on TSN in RSN IE"); in wpa_supplicant_ssid_bss_match()
716 if (!(ie.proto & ssid->proto) && in wpa_supplicant_ssid_bss_match()
720 " skip RSN IE - proto mismatch"); in wpa_supplicant_ssid_bss_match()
724 if (!(ie.pairwise_cipher & ssid->pairwise_cipher)) { in wpa_supplicant_ssid_bss_match()
727 " skip RSN IE - PTK cipher mismatch"); in wpa_supplicant_ssid_bss_match()
731 if (!(ie.group_cipher & ssid->group_cipher)) { in wpa_supplicant_ssid_bss_match()
734 " skip RSN IE - GTK cipher mismatch"); in wpa_supplicant_ssid_bss_match()
739 !(ie.mgmt_group_cipher & ssid->group_mgmt_cipher)) { in wpa_supplicant_ssid_bss_match()
742 " skip RSN IE - group mgmt cipher mismatch"); in wpa_supplicant_ssid_bss_match()
748 if (!(ie.capabilities & WPA_CAPABILITY_MFPC)) { in wpa_supplicant_ssid_bss_match()
756 ie.key_mgmt &= ~(WPA_KEY_MGMT_PSK | in wpa_supplicant_ssid_bss_match()
761 if (!(ie.key_mgmt & ssid->key_mgmt)) { in wpa_supplicant_ssid_bss_match()
764 " skip RSN IE - key mgmt mismatch"); in wpa_supplicant_ssid_bss_match()
768 if (!(ie.capabilities & WPA_CAPABILITY_MFPC) && in wpa_supplicant_ssid_bss_match()
773 " skip RSN IE - no mgmt frame protection"); in wpa_supplicant_ssid_bss_match()
776 if ((ie.capabilities & WPA_CAPABILITY_MFPR) && in wpa_supplicant_ssid_bss_match()
781 " skip RSN IE - no mgmt frame protection enabled but AP requires it"); in wpa_supplicant_ssid_bss_match()
787 " selected based on RSN IE"); in wpa_supplicant_ssid_bss_match()
828 if (wpa_parse_wpa_ie(wpa_ie, 2 + wpa_ie[1], &ie)) { in wpa_supplicant_ssid_bss_match()
831 " skip WPA IE - parse failed"); in wpa_supplicant_ssid_bss_match()
837 (ie.group_cipher & (WPA_CIPHER_WEP40 | WPA_CIPHER_WEP104))) in wpa_supplicant_ssid_bss_match()
841 " selected based on TSN in WPA IE"); in wpa_supplicant_ssid_bss_match()
846 if (!(ie.proto & ssid->proto)) { in wpa_supplicant_ssid_bss_match()
849 " skip WPA IE - proto mismatch"); in wpa_supplicant_ssid_bss_match()
853 if (!(ie.pairwise_cipher & ssid->pairwise_cipher)) { in wpa_supplicant_ssid_bss_match()
856 " skip WPA IE - PTK cipher mismatch"); in wpa_supplicant_ssid_bss_match()
860 if (!(ie.group_cipher & ssid->group_cipher)) { in wpa_supplicant_ssid_bss_match()
863 " skip WPA IE - GTK cipher mismatch"); in wpa_supplicant_ssid_bss_match()
867 if (!(ie.key_mgmt & ssid->key_mgmt)) { in wpa_supplicant_ssid_bss_match()
870 " skip WPA IE - key mgmt mismatch"); in wpa_supplicant_ssid_bss_match()
876 " selected based on WPA IE"); in wpa_supplicant_ssid_bss_match()
1246 const u8 *ie; in sae_pk_acceptable_bss_with_pk() local
1250 ie = wpa_bss_get_ie(bss, WLAN_EID_RSNX); in sae_pk_acceptable_bss_with_pk()
1251 if (!(ieee802_11_rsnx_capab(ie, WLAN_RSNX_CAPAB_SAE_PK))) in sae_pk_acceptable_bss_with_pk()
1285 const u8 *ie; in wpa_scan_res_ok() local
1287 ie = wpa_bss_get_vendor_ie(bss, WPA_IE_VENDOR_TYPE); in wpa_scan_res_ok()
1288 wpa = ie && ie[1]; in wpa_scan_res_ok()
1289 ie = wpa_bss_get_ie(bss, WLAN_EID_RSN); in wpa_scan_res_ok()
1290 wpa |= ie && ie[1]; in wpa_scan_res_ok()
1291 if (ie && wpa_parse_wpa_ie_rsn(ie, 2 + ie[1], &data) == 0 && in wpa_scan_res_ok()
1294 ie = wpa_bss_get_vendor_ie(bss, OSEN_IE_VENDOR_TYPE); in wpa_scan_res_ok()
1295 osen = ie != NULL; in wpa_scan_res_ok()
1298 ie = wpa_bss_get_ie(bss, WLAN_EID_RSNX); in wpa_scan_res_ok()
1299 if (ie && ie[1] >= 1) in wpa_scan_res_ok()
1300 rsnxe_capa = ie[2]; in wpa_scan_res_ok()
1495 wpa_dbg(wpa_s, MSG_DEBUG, " skip - no P2P IE seen"); in wpa_scan_res_ok()
1503 ie = wpa_bss_get_vendor_ie(bss, P2P_IE_VENDOR_TYPE); in wpa_scan_res_ok()
1504 if (!ie) { in wpa_scan_res_ok()
1530 * TODO: skip the AP if its P2P IE has Group Formation bit set in the in wpa_scan_res_ok()
1643 const u8 *ie; in wpa_scan_res_match() local
1650 ie = wpa_bss_get_vendor_ie(bss, WPA_IE_VENDOR_TYPE); in wpa_scan_res_match()
1651 wpa_ie_len = ie ? ie[1] : 0; in wpa_scan_res_match()
1653 ie = wpa_bss_get_ie(bss, WLAN_EID_RSN); in wpa_scan_res_match()
1654 rsn_ie_len = ie ? ie[1] : 0; in wpa_scan_res_match()
1656 ie = wpa_bss_get_vendor_ie(bss, OSEN_IE_VENDOR_TYPE); in wpa_scan_res_match()
1657 osen = ie != NULL; in wpa_scan_res_match()
3093 const u8 *ie, size_t ie_len) in wpas_fst_update_mbie() argument
3097 if (!ie || !ie_len || !wpa_s->fst) in wpas_fst_update_mbie()
3105 len = 2 + ie[1]; in wpas_fst_update_mbie()
3107 wpa_hexdump(MSG_DEBUG, "FST: Truncated IE found", in wpas_fst_update_mbie()
3108 ie, ie_len); in wpas_fst_update_mbie()
3112 if (ie[0] == WLAN_EID_MULTI_BAND) { in wpas_fst_update_mbie()
3113 wpa_printf(MSG_DEBUG, "MB IE of %u bytes found", in wpas_fst_update_mbie()
3115 mb_ies.ies[mb_ies.nof_ies].ie = ie + 2; in wpas_fst_update_mbie()
3121 ie += len; in wpas_fst_update_mbie()
3142 struct wpa_ie_data ie; in wpa_supplicant_use_own_rsne_params() local
3156 wpa_hexdump(MSG_DEBUG, "Truncated IE in assoc_info", in wpa_supplicant_use_own_rsne_params()
3172 if (!found || wpa_parse_wpa_ie(p, len, &ie) < 0) { in wpa_supplicant_use_own_rsne_params()
3182 wpa_s->wpa_proto = ie.proto; in wpa_supplicant_use_own_rsne_params()
3189 sel = ie.key_mgmt; in wpa_supplicant_use_own_rsne_params()
3195 ie.key_mgmt, ssid->key_mgmt, sel); in wpa_supplicant_use_own_rsne_params()
3196 if (ie.key_mgmt && !sel) { in wpa_supplicant_use_own_rsne_params()
3206 !!(ie.capabilities & WPA_CAPABILITY_OCVC)); in wpa_supplicant_use_own_rsne_params()
3213 if (wpa_s->key_mgmt != ie.key_mgmt && in wpa_supplicant_use_own_rsne_params()
3214 wpa_key_mgmt_wpa_psk_no_sae(ie.key_mgmt)) { in wpa_supplicant_use_own_rsne_params()
3231 wpa_s->key_mgmt = ie.key_mgmt; in wpa_supplicant_use_own_rsne_params()
3238 sel = ie.pairwise_cipher; in wpa_supplicant_use_own_rsne_params()
3244 ie.pairwise_cipher, ssid->pairwise_cipher, sel); in wpa_supplicant_use_own_rsne_params()
3245 if (ie.pairwise_cipher && !sel) { in wpa_supplicant_use_own_rsne_params()
3251 wpa_s->pairwise_cipher = ie.pairwise_cipher; in wpa_supplicant_use_own_rsne_params()
3257 /* Update other parameters based on AP's WPA IE/RSNE, if available */ in wpa_supplicant_use_own_rsne_params()
3260 "WPA: current_bss == NULL - skip AP IE check"); in wpa_supplicant_use_own_rsne_params()
3287 if (!found || wpa_parse_wpa_ie(p, len, &ie) < 0) in wpa_supplicant_use_own_rsne_params()
3291 if (!(ie.capabilities & WPA_CAPABILITY_MFPC) && in wpa_supplicant_use_own_rsne_params()
3298 if ((ie.capabilities & WPA_CAPABILITY_MFPR) && in wpa_supplicant_use_own_rsne_params()
3311 sel = ie.group_cipher; in wpa_supplicant_use_own_rsne_params()
3317 ie.group_cipher, ssid->group_cipher, sel); in wpa_supplicant_use_own_rsne_params()
3318 if (ie.group_cipher && !sel) { in wpa_supplicant_use_own_rsne_params()
3324 wpa_s->group_cipher = ie.group_cipher; in wpa_supplicant_use_own_rsne_params()
3329 /* Update IGTK from AP RSN IE */ in wpa_supplicant_use_own_rsne_params()
3330 sel = ie.mgmt_group_cipher; in wpa_supplicant_use_own_rsne_params()
3336 ie.mgmt_group_cipher, ssid->group_mgmt_cipher, sel); in wpa_supplicant_use_own_rsne_params()
3339 !(ie.capabilities & WPA_CAPABILITY_MFPC)) { in wpa_supplicant_use_own_rsne_params()
3342 ie.capabilities); in wpa_supplicant_use_own_rsne_params()
3343 ie.mgmt_group_cipher = 0; in wpa_supplicant_use_own_rsne_params()
3346 if (ie.mgmt_group_cipher && !sel) { in wpa_supplicant_use_own_rsne_params()
3352 wpa_s->mgmt_group_cipher = ie.mgmt_group_cipher; in wpa_supplicant_use_own_rsne_params()
3450 /* Go through the IEs and make a copy of the WPA/RSN IE, if present. */ in wpa_supplicant_event_associnfo()
3454 wpa_hexdump(MSG_DEBUG, "Truncated IE in assoc_info", in wpa_supplicant_event_associnfo()
3576 "include WPS IE in (Re)Association Response"); in wpa_supplicant_event_associnfo()
3594 wpa_hexdump(MSG_DEBUG, "Truncated IE in assoc_info", in wpa_supplicant_event_associnfo()
3641 /* WPA/RSN IE from Beacon/ProbeResp */ in wpa_supplicant_event_associnfo()
3651 wpa_hexdump(MSG_DEBUG, "Truncated IE in beacon_ies", in wpa_supplicant_event_associnfo()
3771 wpa_printf(MSG_DEBUG, "FST: MB IEs updated from bss IE"); in wpas_fst_update_mb_assoc()
3773 wpa_printf(MSG_DEBUG, "FST: MB IEs updated from bss beacon IE"); in wpas_fst_update_mb_assoc()
5037 const u8 *ie, size_t ie_len, int deauth) in wpas_event_disconnect() argument
5065 if (wpas_p2p_deauth_notif(wpa_s, addr, reason_code, ie, ie_len, in wpas_event_disconnect()
5087 const u8 *ie = NULL; in wpas_event_disassoc() local
5094 ie = info->ie; in wpas_event_disassoc()
5104 wpa_hexdump(MSG_DEBUG, "Disassociation frame IE(s)", in wpas_event_disassoc()
5105 ie, ie_len); in wpas_event_disassoc()
5123 wpa_s, info->addr, reason_code, info->ie, info->ie_len, in wpas_event_disassoc()
5132 ie, ie_len, 0); in wpas_event_disassoc()
5142 const u8 *ie = NULL; in wpas_event_deauth() local
5149 ie = info->ie; in wpas_event_deauth()
5160 wpa_hexdump(MSG_DEBUG, "Deauthentication frame IE(s)", in wpas_event_deauth()
5161 ie, ie_len); in wpas_event_deauth()
5167 locally_generated, ie, ie_len, 1); in wpas_event_deauth()
6024 "FST: MB IEs updated from auth IE"); in wpa_supplicant_event()
6449 const u8 *ie; in wpa_supplicant_event() local
6452 ie = data->rx_mgmt.frame + IEEE80211_HDRLEN; in wpa_supplicant_event()
6457 mgmt->bssid, ie, ie_len, in wpa_supplicant_event()
6511 const u8 *ie; in wpa_supplicant_event() local
6514 ie = data->rx_mgmt.frame + IEEE80211_HDRLEN; in wpa_supplicant_event()
6518 mgmt->bssid, ie, ie_len, in wpa_supplicant_event()
6528 data->rx_probe_req.ie == NULL) in wpa_supplicant_event()
6536 data->rx_probe_req.ie, in wpa_supplicant_event()
6545 data->rx_probe_req.ie, in wpa_supplicant_event()