- default:
- return;
- }
-
- /* Pick version number (little endian) */
- ver = iebuf[offset] | (iebuf[offset + 1] << 8);
- offset += 2;
-
- if(iebuf[0] == 0xdd)
- wpa1 = 1;
-
- if(iebuf[0] == 0x30)
- wpa2 = 1;
-
- if( wpa1 && (ce->wpa_version == 2) )
- ce->wpa_version = 3;
- else if( wpa2 && (ce->wpa_version == 1) )
- ce->wpa_version = 3;
- else if( wpa1 && !ce->wpa_version )
- ce->wpa_version = 1;
- else if( wpa2 && !ce->wpa_version )
- ce->wpa_version = 2;
-
- if(ielen < (offset + 4))
- {
- ce->group_ciphers |= (1<<2); /* TKIP */
- ce->pair_ciphers |= (1<<2); /* TKIP */
- ce->auth_suites |= (1<<2); /* PSK */
- return;
- }
-
- if(memcmp(&iebuf[offset], wpa_oui, 3) != 0)
- ce->group_ciphers |= (1<<7); /* Proprietary */
- else
- ce->group_ciphers |= (1<<iebuf[offset+3]);
-
- offset += 4;
-
- if(ielen < (offset + 2))
- {
- ce->pair_ciphers |= (1<<2); /* TKIP */
- ce->auth_suites |= (1<<2); /* PSK */
- return;
- }
-
- /* Otherwise, we have some number of pairwise ciphers. */
- cnt = iebuf[offset] | (iebuf[offset + 1] << 8);
- offset += 2;
-
- if(ielen < (offset + 4*cnt))
- return;
-
- *buf = '\0';
- for(i = 0; i < cnt; i++)
- {
- if(memcmp(&iebuf[offset], wpa_oui, 3) != 0)
- ce->pair_ciphers |= (1<<7); /* Proprietary */
- else if(iebuf[offset+3] <= IW_IE_CYPHER_NUM)
- ce->pair_ciphers |= (1<<iebuf[offset+3]);
- //else
- // ce->pair_ciphers[ce->pair_cipher_num++] = 255; /* Unknown */
-
- offset += 4;
- }
-
- /* Check if we are done */
- if(ielen < (offset + 2))
- return;
-
- /* Now, we have authentication suites. */
- cnt = iebuf[offset] | (iebuf[offset + 1] << 8);
- offset += 2;
- *buf = '\0';
-
- if(ielen < (offset + 4*cnt))
- return;
-
- for(i = 0; i < cnt; i++)
- {
- if(memcmp(&iebuf[offset], wpa_oui, 3) != 0)
- ce->auth_suites |= (1<<7); /* Proprietary */
- else if(iebuf[offset+3] <= IW_IE_KEY_MGMT_NUM)
- ce->auth_suites |= (1<<iebuf[offset+3]);
- //else
- // ce->auth_suites[ce->auth_suite_num++] = 255; /* Unknown */
-
- offset += 4;