• Home
  • Raw
  • Download

Lines Matching full:ie

947 		/* IE hdr and mic_control */  in wpa_ft_mic()
1020 static int wpa_ft_parse_ftie(const u8 *ie, size_t ie_len, in wpa_ft_parse_ftie() argument
1027 end = ie + ie_len; in wpa_ft_parse_ftie()
1144 static int wpa_ft_parse_fte(int key_mgmt, const u8 *ie, size_t len, in wpa_ft_parse_fte() argument
1149 const u8 *pos = ie; in wpa_ft_parse_fte()
1200 return wpa_ft_parse_ftie(ie, len, parse, pos); in wpa_ft_parse_fte()
1249 "RSN IE: %d", ret); in wpa_ft_parse_ies()
1342 * Check that the protected IE count matches with IEs included in the in wpa_ft_parse_ies()
1370 "the protected IE count"); in wpa_ft_parse_ies()
1375 wpa_printf(MSG_DEBUG, "FT: RIC IE(s) in the frame, but not " in wpa_ft_parse_ies()
1376 "included in protected IE count"); in wpa_ft_parse_ies()
1380 /* Determine the end of the RIC IE(s) */ in wpa_ft_parse_ies()
1851 * wpa_parse_wpa_ie_rsn - Parse RSN IE
1852 * @rsn_ie: Buffer containing RSN IE
1853 * @rsn_ie_len: RSN IE buffer length (including IE number and length octets)
1875 /* No RSN IE - fail silently */ in wpa_parse_wpa_ie_rsn()
1880 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu", in wpa_parse_wpa_ie_rsn()
1901 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version", in wpa_parse_wpa_ie_rsn()
1930 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much", in wpa_parse_wpa_ie_rsn()
1941 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " in wpa_parse_wpa_ie_rsn()
1958 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)", in wpa_parse_wpa_ie_rsn()
1969 wpa_printf(MSG_DEBUG, "%s: ie count botch (key mgmt), " in wpa_parse_wpa_ie_rsn()
1979 wpa_printf(MSG_DEBUG, "%s: ie too short (for capabilities)", in wpa_parse_wpa_ie_rsn()
2074 wpa_printf(MSG_DEBUG, "%s: ie len too short %lu", in wpa_parse_wpa_ie_wpa()
2085 wpa_printf(MSG_DEBUG, "%s: malformed ie or unknown version", in wpa_parse_wpa_ie_wpa()
2098 wpa_printf(MSG_DEBUG, "%s: ie length mismatch, %u too much", in wpa_parse_wpa_ie_wpa()
2109 wpa_printf(MSG_DEBUG, "%s: ie count botch (pairwise), " in wpa_parse_wpa_ie_wpa()
2119 wpa_printf(MSG_DEBUG, "%s: ie too short (for key mgmt)", in wpa_parse_wpa_ie_wpa()
2130 wpa_printf(MSG_DEBUG, "%s: ie count botch (key mgmt), " in wpa_parse_wpa_ie_wpa()
2140 wpa_printf(MSG_DEBUG, "%s: ie too short (for capabilities)", in wpa_parse_wpa_ie_wpa()
2871 * The PMKID-List in RSN IE is different between Beacon/Probe in wpa_compare_rsn_ie()
2964 * PMKID may have been included in RSN IE in in wpa_insert_pmkid()
3392 * @pos: Pointer to the IE header
3394 * @ie: Pointer to parsed IE data
3397 struct wpa_eapol_ie_parse *ie) in wpa_parse_vendor_specific() argument
3403 "Too short vendor specific IE ignored (len=%u)", in wpa_parse_vendor_specific()
3411 ie->wmm = &pos[2]; in wpa_parse_vendor_specific()
3412 ie->wmm_len = pos[1]; in wpa_parse_vendor_specific()
3413 wpa_hexdump(MSG_DEBUG, "WPA: WMM IE", in wpa_parse_vendor_specific()
3414 ie->wmm, ie->wmm_len); in wpa_parse_vendor_specific()
3416 ie->wmm = &pos[2]; in wpa_parse_vendor_specific()
3417 ie->wmm_len = pos[1]; in wpa_parse_vendor_specific()
3419 ie->wmm, ie->wmm_len); in wpa_parse_vendor_specific()
3427 * @pos: Pointer to the IE header
3428 * @ie: Pointer to parsed IE data
3431 static int wpa_parse_generic(const u8 *pos, struct wpa_eapol_ie_parse *ie) in wpa_parse_generic() argument
3454 ie->wpa_ie = pos; in wpa_parse_generic()
3455 ie->wpa_ie_len = dlen; in wpa_parse_generic()
3456 wpa_hexdump(MSG_DEBUG, "WPA: WPA IE in EAPOL-Key", in wpa_parse_generic()
3457 ie->wpa_ie, ie->wpa_ie_len); in wpa_parse_generic()
3462 ie->pmkid = p; in wpa_parse_generic()
3468 ie->key_id = p; in wpa_parse_generic()
3474 ie->gtk = p; in wpa_parse_generic()
3475 ie->gtk_len = left; in wpa_parse_generic()
3481 ie->mac_addr = p; in wpa_parse_generic()
3483 MAC2STR(ie->mac_addr)); in wpa_parse_generic()
3488 ie->igtk = p; in wpa_parse_generic()
3489 ie->igtk_len = left; in wpa_parse_generic()
3496 ie->bigtk = p; in wpa_parse_generic()
3497 ie->bigtk_len = left; in wpa_parse_generic()
3504 ie->ip_addr_req = p; in wpa_parse_generic()
3506 ie->ip_addr_req, left); in wpa_parse_generic()
3511 ie->ip_addr_alloc = p; in wpa_parse_generic()
3514 ie->ip_addr_alloc, left); in wpa_parse_generic()
3519 ie->oci = p; in wpa_parse_generic()
3520 ie->oci_len = left; in wpa_parse_generic()
3527 ie->transition_disable = p; in wpa_parse_generic()
3528 ie->transition_disable_len = left; in wpa_parse_generic()
3536 ie->dpp_kde = p; in wpa_parse_generic()
3537 ie->dpp_kde_len = left; in wpa_parse_generic()
3549 ie->valid_mlo_gtks |= BIT(link_id); in wpa_parse_generic()
3550 ie->mlo_gtk[link_id] = p; in wpa_parse_generic()
3551 ie->mlo_gtk_len[link_id] = left; in wpa_parse_generic()
3567 ie->valid_mlo_igtks |= BIT(link_id); in wpa_parse_generic()
3568 ie->mlo_igtk[link_id] = p; in wpa_parse_generic()
3569 ie->mlo_igtk_len[link_id] = left; in wpa_parse_generic()
3585 ie->valid_mlo_bigtks |= BIT(link_id); in wpa_parse_generic()
3586 ie->mlo_bigtk[link_id] = p; in wpa_parse_generic()
3587 ie->mlo_bigtk_len[link_id] = left; in wpa_parse_generic()
3603 ie->valid_mlo_links |= BIT(link_id); in wpa_parse_generic()
3604 ie->mlo_link[link_id] = p; in wpa_parse_generic()
3605 ie->mlo_link_len[link_id] = left; in wpa_parse_generic()
3619 ie->rsn_override_link[link_id] = p; in wpa_parse_generic()
3620 ie->rsn_override_link_len[link_id] = left; in wpa_parse_generic()
3630 ie->rsne_override = pos; in wpa_parse_generic()
3631 ie->rsne_override_len = dlen; in wpa_parse_generic()
3634 ie->rsne_override, ie->rsne_override_len); in wpa_parse_generic()
3639 ie->rsne_override_2 = pos; in wpa_parse_generic()
3640 ie->rsne_override_2_len = dlen; in wpa_parse_generic()
3643 ie->rsne_override_2, ie->rsne_override_2_len); in wpa_parse_generic()
3648 ie->rsnxe_override = pos; in wpa_parse_generic()
3649 ie->rsnxe_override_len = dlen; in wpa_parse_generic()
3652 ie->rsnxe_override, ie->rsnxe_override_len); in wpa_parse_generic()
3657 ie->rsn_selection = p; in wpa_parse_generic()
3658 ie->rsn_selection_len = left; in wpa_parse_generic()
3661 ie->rsn_selection, ie->rsn_selection_len); in wpa_parse_generic()
3673 * @ie: Pointer to parsed IE data
3676 int wpa_parse_kde_ies(const u8 *buf, size_t len, struct wpa_eapol_ie_parse *ie) in wpa_parse_kde_ies() argument
3682 os_memset(ie, 0, sizeof(*ie)); in wpa_parse_kde_ies()
3692 "WPA: EAPOL-Key Key Data underflow (ie=%d len=%d pos=%d)", in wpa_parse_kde_ies()
3699 ie->rsn_ie = pos; in wpa_parse_kde_ies()
3700 ie->rsn_ie_len = dlen; in wpa_parse_kde_ies()
3701 wpa_hexdump(MSG_DEBUG, "WPA: RSN IE in EAPOL-Key", in wpa_parse_kde_ies()
3702 ie->rsn_ie, ie->rsn_ie_len); in wpa_parse_kde_ies()
3704 ie->rsnxe = pos; in wpa_parse_kde_ies()
3705 ie->rsnxe_len = dlen; in wpa_parse_kde_ies()
3707 ie->rsnxe, ie->rsnxe_len); in wpa_parse_kde_ies()
3709 ie->mdie = pos; in wpa_parse_kde_ies()
3710 ie->mdie_len = dlen; in wpa_parse_kde_ies()
3712 ie->mdie, ie->mdie_len); in wpa_parse_kde_ies()
3714 ie->ftie = pos; in wpa_parse_kde_ies()
3715 ie->ftie_len = dlen; in wpa_parse_kde_ies()
3717 ie->ftie, ie->ftie_len); in wpa_parse_kde_ies()
3720 ie->reassoc_deadline = pos; in wpa_parse_kde_ies()
3723 ie->reassoc_deadline, dlen); in wpa_parse_kde_ies()
3725 ie->key_lifetime = pos; in wpa_parse_kde_ies()
3728 ie->key_lifetime, dlen); in wpa_parse_kde_ies()
3731 "EAPOL-Key Key Data IE", in wpa_parse_kde_ies()
3736 ie->lnkid = pos; in wpa_parse_kde_ies()
3737 ie->lnkid_len = dlen; in wpa_parse_kde_ies()
3740 ie->ext_capab = pos; in wpa_parse_kde_ies()
3741 ie->ext_capab_len = dlen; in wpa_parse_kde_ies()
3743 ie->supp_rates = pos; in wpa_parse_kde_ies()
3744 ie->supp_rates_len = dlen; in wpa_parse_kde_ies()
3746 ie->ext_supp_rates = pos; in wpa_parse_kde_ies()
3747 ie->ext_supp_rates_len = dlen; in wpa_parse_kde_ies()
3750 ie->ht_capabilities = pos + 2; in wpa_parse_kde_ies()
3753 ie->aid = WPA_GET_LE16(pos + 2) & 0x3fff; in wpa_parse_kde_ies()
3757 ie->vht_capabilities = pos + 2; in wpa_parse_kde_ies()
3761 ie->he_capabilities = pos + 3; in wpa_parse_kde_ies()
3762 ie->he_capab_len = pos[1] - 1; in wpa_parse_kde_ies()
3767 ie->he_6ghz_capabilities = pos + 3; in wpa_parse_kde_ies()
3771 ie->eht_capabilities = pos + 3; in wpa_parse_kde_ies()
3772 ie->eht_capab_len = pos[1] - 1; in wpa_parse_kde_ies()
3774 ie->qosinfo = pos[2]; in wpa_parse_kde_ies()
3776 ie->supp_channels = pos + 2; in wpa_parse_kde_ies()
3777 ie->supp_channels_len = pos[1]; in wpa_parse_kde_ies()
3786 ie->supp_oper_classes = pos + 2; in wpa_parse_kde_ies()
3787 ie->supp_oper_classes_len = pos[1]; in wpa_parse_kde_ies()
3790 ie->ssid = pos + 2; in wpa_parse_kde_ies()
3791 ie->ssid_len = pos[1]; in wpa_parse_kde_ies()
3793 ie->ssid, ie->ssid_len); in wpa_parse_kde_ies()
3795 ret = wpa_parse_generic(pos, ie); in wpa_parse_kde_ies()
3804 wpa_parse_vendor_specific(pos, end, ie); in wpa_parse_kde_ies()
3810 "WPA: Unrecognized EAPOL-Key Key Data IE", in wpa_parse_kde_ies()
3860 * @buf: Buffer in which the IE will be added
3964 * wpa_pasn_add_parameter_ie - Add PASN Parameters IE for PASN authentication
3965 * @buf: Buffer in which the IE will be added
3967 * @wrapped_data_format: Format of the data in the Wrapped Data IE
4039 * wpa_pasn_add_wrapped_data - Add a Wrapped Data IE to PASN Authentication
4040 * frame. If needed, the Wrapped Data IE would be fragmented.
4042 * @buf: Buffer in which the IE will be added
4163 * wpa_pasn_parse_parameter_ie - Validates PASN Parameters IE
4164 * @data: Pointer to the PASN Parameters IE (starting with the EID).
4165 * @len: Length of the data in the PASN Parameters IE
4171 * the IE and are not locally allocated (so they should not be freed etc.).
4187 "PASN: Invalid parameters IE. len=(%u, %u)", in wpa_pasn_parse_parameter_ie()
4213 "PASN: Invalid Parameters IE: Truncated Comeback After"); in wpa_pasn_parse_parameter_ie()
4223 "PASN: Invalid Parameters IE: comeback len"); in wpa_pasn_parse_parameter_ie()
4237 "PASN: Invalid Parameters IE: group and key"); in wpa_pasn_parse_parameter_ie()
4253 "PASN: Invalid Parameters IE. Bytes left=%u", len); in wpa_pasn_parse_parameter_ie()