Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching refs:ie

102 	struct wpa_ie_data ie;
105 if (wpa_sm_parse_own_wpa_ie(wpa_s->wpa, &ie) < 0 ||
106 ie.pmkid == NULL)
109 for (i = 0; i < ie.num_pmkid; i++) {
111 ie.pmkid + i * PMKID_LEN,
119 wpa_printf(MSG_DEBUG, "RSN: PMKID from assoc IE %sfound from PMKSA "
264 struct wpa_ie_data ie;
270 if (wpa_parse_wpa_ie(bss->rsn_ie, bss->rsn_ie_len, &ie)) {
271 wpa_printf(MSG_DEBUG, " skip RSN IE - parse failed");
274 if (!(ie.proto & ssid->proto)) {
275 wpa_printf(MSG_DEBUG, " skip RSN IE - proto "
280 if (!(ie.pairwise_cipher & ssid->pairwise_cipher)) {
281 wpa_printf(MSG_DEBUG, " skip RSN IE - PTK cipher "
286 if (!(ie.group_cipher & ssid->group_cipher)) {
287 wpa_printf(MSG_DEBUG, " skip RSN IE - GTK cipher "
292 if (!(ie.key_mgmt & ssid->key_mgmt)) {
293 wpa_printf(MSG_DEBUG, " skip RSN IE - key mgmt "
299 if (!(ie.capabilities & WPA_CAPABILITY_MGMT_FRAME_PROTECTION)
301 wpa_printf(MSG_DEBUG, " skip RSN IE - no mgmt frame "
307 wpa_printf(MSG_DEBUG, " selected based on RSN IE");
314 if (wpa_parse_wpa_ie(bss->wpa_ie, bss->wpa_ie_len, &ie)) {
315 wpa_printf(MSG_DEBUG, " skip WPA IE - parse failed");
318 if (!(ie.proto & ssid->proto)) {
319 wpa_printf(MSG_DEBUG, " skip WPA IE - proto "
324 if (!(ie.pairwise_cipher & ssid->pairwise_cipher)) {
325 wpa_printf(MSG_DEBUG, " skip WPA IE - PTK cipher "
330 if (!(ie.group_cipher & ssid->group_cipher)) {
331 wpa_printf(MSG_DEBUG, " skip WPA IE - GTK cipher "
336 if (!(ie.key_mgmt & ssid->key_mgmt)) {
337 wpa_printf(MSG_DEBUG, " skip WPA IE - key mgmt "
342 wpa_printf(MSG_DEBUG, " selected based on WPA IE");
385 wpa_printf(MSG_DEBUG, " skip - no WPA/RSN IE");
610 /* Go through the IEs and make a copy of the WPA/RSN IE, if present. */
614 wpa_hexdump(MSG_DEBUG, "Truncated IE in assoc_info",
633 /* WPA/RSN IE from Beacon/ProbeResp */
643 wpa_hexdump(MSG_DEBUG, "Truncated IE in beacon_ies",