/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 1030 const struct wpa_igtk_kde *igtk, in wpa_supplicant_install_igtk() argument 1034 u16 keyidx = WPA_GET_LE16(igtk->keyid); in wpa_supplicant_install_igtk() 1037 if ((sm->igtk.igtk_len == len && in wpa_supplicant_install_igtk() 1038 os_memcmp(sm->igtk.igtk, igtk->igtk, sm->igtk.igtk_len) == 0) || in wpa_supplicant_install_igtk() 1040 os_memcmp(sm->igtk_wnm_sleep.igtk, igtk->igtk, in wpa_supplicant_install_igtk() 1050 keyidx, MAC2STR(igtk->pn)); in wpa_supplicant_install_igtk() 1051 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK", igtk->igtk, len); in wpa_supplicant_install_igtk() 1059 keyidx, 0, igtk->pn, sizeof(igtk->pn), in wpa_supplicant_install_igtk() 1060 igtk->igtk, len) < 0) { in wpa_supplicant_install_igtk() 1086 os_memcpy(sm->igtk_wnm_sleep.igtk, igtk->igtk, in wpa_supplicant_install_igtk() [all …]
|
D | wpa_ft.c | 765 u8 igtk[WPA_IGTK_MAX_LEN]; in wpa_ft_process_igtk_subelem() local 805 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem() 815 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk, in wpa_ft_process_igtk_subelem() 819 igtk_elem + 2, 6, igtk, igtk_len) < 0) { in wpa_ft_process_igtk_subelem() 822 os_memset(igtk, 0, sizeof(igtk)); in wpa_ft_process_igtk_subelem() 825 os_memset(igtk, 0, sizeof(igtk)); in wpa_ft_process_igtk_subelem() 1013 if (wpa_ft_process_igtk_subelem(sm, parse.igtk, parse.igtk_len) < 0) in wpa_ft_validate_reassoc_resp()
|
D | wpa_ie.h | 25 const u8 *igtk; member
|
D | wpa_i.h | 35 struct wpa_igtk igtk; member
|
D | wpa_ie.c | 441 ie->igtk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | mesh_rsn.c | 192 if (random_get_bytes(rsn->igtk, rsn->igtk_len) < 0) in __mesh_rsn_auth_init() 198 rsn->igtk, rsn->igtk_len); in __mesh_rsn_auth_init() 202 seq, sizeof(seq), rsn->igtk, rsn->igtk_len); in __mesh_rsn_auth_init() 221 os_memset(rsn->igtk, 0, sizeof(rsn->igtk)); in mesh_rsn_deinit() 604 os_memcpy(pos, rsn->igtk, rsn->igtk_len); in mesh_rsn_protect_frame() 792 os_memcpy(sta->igtk, pos, key_len); in mesh_rsn_process_ampe() 795 sta->igtk, sta->igtk_len); in mesh_rsn_process_ampe()
|
D | mesh_rsn.h | 22 u8 igtk[WPA_TK_MAX_LEN]; member
|
D | mesh_mpm.c | 862 sta->igtk, sta->igtk_len); in mesh_mpm_plink_estab() 868 sta->igtk, sta->igtk_len); in mesh_mpm_plink_estab()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ie.h | 23 const u8 *igtk; member
|
D | wpa_auth.c | 3003 struct wpa_igtk_kde igtk; in ieee80211w_kde_add() local 3011 igtk.keyid[0] = gsm->GN_igtk; in ieee80211w_kde_add() 3012 igtk.keyid[1] = 0; in ieee80211w_kde_add() 3015 os_memset(igtk.pn, 0, sizeof(igtk.pn)); in ieee80211w_kde_add() 3017 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn)); in ieee80211w_kde_add() 3018 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], len); in ieee80211w_kde_add() 3025 if (random_get_bytes(igtk.igtk, len) < 0) in ieee80211w_kde_add() 3029 (const u8 *) &igtk, WPA_IGTK_KDE_PREFIX_LEN + len, in ieee80211w_kde_add()
|
D | sta_info.h | 96 u8 igtk[WPA_TK_MAX_LEN]; member
|
D | wpa_auth_ft.c | 2483 u8 *igtk; in wpa_sm_write_assoc_resp_ies() local 2486 igtk = wpa_ft_igtk_subelem(sm, &igtk_len); in wpa_sm_write_assoc_resp_ies() 2487 if (igtk == NULL) { in wpa_sm_write_assoc_resp_ies() 2496 os_free(igtk); in wpa_sm_write_assoc_resp_ies() 2500 os_memcpy(subelem + subelem_len, igtk, igtk_len); in wpa_sm_write_assoc_resp_ies() 2502 os_free(igtk); in wpa_sm_write_assoc_resp_ies()
|
D | wpa_auth_ie.c | 1030 ie->igtk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.h | 231 u8 igtk[WPA_IGTK_MAX_LEN]; member 299 u8 igtk[WPA_IGTK_MAX_LEN]; member 459 const u8 *igtk; member
|
D | wpa_common.c | 897 parse->igtk = pos; in wpa_ft_parse_ftie()
|