/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | mesh_rsn.c | 192 if (random_get_bytes(rsn->igtk, rsn->igtk_len) < 0) in __mesh_rsn_auth_init() 198 rsn->igtk, rsn->igtk_len); in __mesh_rsn_auth_init() 202 seq, sizeof(seq), rsn->igtk, rsn->igtk_len); in __mesh_rsn_auth_init() 221 os_memset(rsn->igtk, 0, sizeof(rsn->igtk)); in mesh_rsn_deinit() 604 os_memcpy(pos, rsn->igtk, rsn->igtk_len); in mesh_rsn_protect_frame() 792 os_memcpy(sta->igtk, pos, key_len); in mesh_rsn_process_ampe() 795 sta->igtk, sta->igtk_len); in mesh_rsn_process_ampe()
|
D | mesh_rsn.h | 22 u8 igtk[WPA_TK_MAX_LEN]; member
|
D | mesh_mpm.c | 894 sta->igtk, sta->igtk_len); in mesh_mpm_plink_estab() 900 sta->igtk, sta->igtk_len); in mesh_mpm_plink_estab()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | mesh_rsn.c | 190 if (random_get_bytes(rsn->igtk, rsn->igtk_len) < 0) in __mesh_rsn_auth_init() 196 rsn->igtk, rsn->igtk_len); in __mesh_rsn_auth_init() 201 seq, sizeof(seq), rsn->igtk, rsn->igtk_len, in __mesh_rsn_auth_init() 221 os_memset(rsn->igtk, 0, sizeof(rsn->igtk)); in mesh_rsn_deinit() 600 os_memcpy(pos, rsn->igtk, rsn->igtk_len); in mesh_rsn_protect_frame() 786 os_memcpy(sta->igtk, pos, key_len); in mesh_rsn_process_ampe() 789 sta->igtk, sta->igtk_len); in mesh_rsn_process_ampe()
|
D | mesh_rsn.h | 22 u8 igtk[WPA_TK_MAX_LEN]; member
|
D | mesh_mpm.c | 901 sta->igtk, sta->igtk_len); in mesh_mpm_plink_estab() 907 sta->igtk, sta->igtk_len, in mesh_mpm_plink_estab()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
D | wpa.c | 1056 const struct wpa_igtk_kde *igtk, in wpa_supplicant_install_igtk() argument 1060 u16 keyidx = WPA_GET_LE16(igtk->keyid); in wpa_supplicant_install_igtk() 1063 if ((sm->igtk.igtk_len == len && in wpa_supplicant_install_igtk() 1064 os_memcmp(sm->igtk.igtk, igtk->igtk, sm->igtk.igtk_len) == 0) || in wpa_supplicant_install_igtk() 1066 os_memcmp(sm->igtk_wnm_sleep.igtk, igtk->igtk, in wpa_supplicant_install_igtk() 1076 keyidx, MAC2STR(igtk->pn)); in wpa_supplicant_install_igtk() 1077 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK", igtk->igtk, len); in wpa_supplicant_install_igtk() 1085 keyidx, 0, igtk->pn, sizeof(igtk->pn), in wpa_supplicant_install_igtk() 1086 igtk->igtk, len) < 0) { in wpa_supplicant_install_igtk() 1112 os_memcpy(sm->igtk_wnm_sleep.igtk, igtk->igtk, in wpa_supplicant_install_igtk() [all …]
|
D | wpa_ft.c | 774 u8 igtk[WPA_IGTK_MAX_LEN]; in wpa_ft_process_igtk_subelem() local 814 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem() 824 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk, in wpa_ft_process_igtk_subelem() 828 igtk_elem + 2, 6, igtk, igtk_len) < 0) { in wpa_ft_process_igtk_subelem() 831 forced_memzero(igtk, sizeof(igtk)); in wpa_ft_process_igtk_subelem() 834 forced_memzero(igtk, sizeof(igtk)); in wpa_ft_process_igtk_subelem() 1022 if (wpa_ft_process_igtk_subelem(sm, parse.igtk, parse.igtk_len) < 0) in wpa_ft_validate_reassoc_resp()
|
D | wpa_ie.h | 25 const u8 *igtk; member
|
D | wpa_i.h | 35 struct wpa_igtk igtk; member
|
D | wpa_ie.c | 441 ie->igtk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
D | wpa.c | 1202 const struct wpa_igtk_kde *igtk, in wpa_supplicant_install_igtk() argument 1206 u16 keyidx = WPA_GET_LE16(igtk->keyid); in wpa_supplicant_install_igtk() 1209 if ((sm->igtk.igtk_len == len && in wpa_supplicant_install_igtk() 1210 os_memcmp(sm->igtk.igtk, igtk->igtk, sm->igtk.igtk_len) == 0) || in wpa_supplicant_install_igtk() 1212 os_memcmp(sm->igtk_wnm_sleep.igtk, igtk->igtk, in wpa_supplicant_install_igtk() 1222 keyidx, MAC2STR(igtk->pn)); in wpa_supplicant_install_igtk() 1223 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK", igtk->igtk, len); in wpa_supplicant_install_igtk() 1231 keyidx, 0, igtk->pn, sizeof(igtk->pn), in wpa_supplicant_install_igtk() 1232 igtk->igtk, len, KEY_FLAG_GROUP_RX) < 0) { in wpa_supplicant_install_igtk() 1258 os_memcpy(sm->igtk_wnm_sleep.igtk, igtk->igtk, in wpa_supplicant_install_igtk() [all …]
|
D | wpa_ft.c | 841 u8 igtk[WPA_IGTK_MAX_LEN]; in wpa_ft_process_igtk_subelem() local 881 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem() 891 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk, in wpa_ft_process_igtk_subelem() 895 igtk_elem + 2, 6, igtk, igtk_len, in wpa_ft_process_igtk_subelem() 899 forced_memzero(igtk, sizeof(igtk)); in wpa_ft_process_igtk_subelem() 902 forced_memzero(igtk, sizeof(igtk)); in wpa_ft_process_igtk_subelem() 1215 wpa_ft_process_igtk_subelem(sm, parse.igtk, parse.igtk_len) < 0 || in wpa_ft_validate_reassoc_resp()
|
D | wpa_i.h | 39 struct wpa_igtk igtk; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | wpa_auth_ie.h | 23 const u8 *igtk; member
|
D | wpa_auth.c | 3073 struct wpa_igtk_kde igtk; in ieee80211w_kde_add() local 3081 igtk.keyid[0] = gsm->GN_igtk; in ieee80211w_kde_add() 3082 igtk.keyid[1] = 0; in ieee80211w_kde_add() 3085 os_memset(igtk.pn, 0, sizeof(igtk.pn)); in ieee80211w_kde_add() 3087 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn)); in ieee80211w_kde_add() 3088 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], len); in ieee80211w_kde_add() 3095 if (random_get_bytes(igtk.igtk, len) < 0) in ieee80211w_kde_add() 3099 (const u8 *) &igtk, WPA_IGTK_KDE_PREFIX_LEN + len, in ieee80211w_kde_add()
|
D | sta_info.h | 97 u8 igtk[WPA_TK_MAX_LEN]; member
|
D | wpa_auth_ft.c | 2492 u8 *igtk; in wpa_sm_write_assoc_resp_ies() local 2495 igtk = wpa_ft_igtk_subelem(sm, &igtk_len); in wpa_sm_write_assoc_resp_ies() 2496 if (igtk == NULL) { in wpa_sm_write_assoc_resp_ies() 2505 os_free(igtk); in wpa_sm_write_assoc_resp_ies() 2509 os_memcpy(subelem + subelem_len, igtk, igtk_len); in wpa_sm_write_assoc_resp_ies() 2511 os_free(igtk); in wpa_sm_write_assoc_resp_ies()
|
D | wpa_auth_ie.c | 1030 ie->igtk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
D | wpa_common.h | 231 u8 igtk[WPA_IGTK_MAX_LEN]; member 299 u8 igtk[WPA_IGTK_MAX_LEN]; member 459 const u8 *igtk; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
D | wpa_common.h | 252 u8 igtk[WPA_IGTK_MAX_LEN]; member 323 u8 igtk[WPA_IGTK_MAX_LEN]; member 506 const u8 *igtk; member 568 const u8 *igtk; member
|
D | wpa_common.c | 969 parse->igtk = pos; in wpa_ft_parse_ftie() 3077 ie->igtk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | wpa_auth.c | 3253 struct wpa_igtk_kde igtk; in ieee80211w_kde_add() local 3263 igtk.keyid[0] = gsm->GN_igtk; in ieee80211w_kde_add() 3264 igtk.keyid[1] = 0; in ieee80211w_kde_add() 3267 os_memset(igtk.pn, 0, sizeof(igtk.pn)); in ieee80211w_kde_add() 3269 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn)); in ieee80211w_kde_add() 3270 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], len); in ieee80211w_kde_add() 3276 if (random_get_bytes(igtk.igtk, len) < 0) in ieee80211w_kde_add() 3280 (const u8 *) &igtk, WPA_IGTK_KDE_PREFIX_LEN + len, in ieee80211w_kde_add()
|
D | sta_info.h | 138 u8 igtk[WPA_TK_MAX_LEN]; member
|
D | wpa_auth_ft.c | 2259 const u8 *kek, *igtk; in wpa_ft_igtk_subelem() local 2289 igtk = gsm->IGTK[gsm->GN_igtk - 4]; in wpa_ft_igtk_subelem() 2299 igtk = stub_igtk; in wpa_ft_igtk_subelem() 2301 if (aes_wrap(kek, kek_len, igtk_len / 8, igtk, pos)) { in wpa_ft_igtk_subelem() 2610 u8 *igtk; in wpa_sm_write_assoc_resp_ies() local 2613 igtk = wpa_ft_igtk_subelem(sm, &igtk_len); in wpa_sm_write_assoc_resp_ies() 2614 if (igtk == NULL) { in wpa_sm_write_assoc_resp_ies() 2623 os_free(igtk); in wpa_sm_write_assoc_resp_ies() 2627 os_memcpy(subelem + subelem_len, igtk, igtk_len); in wpa_sm_write_assoc_resp_ies() 2629 os_free(igtk); in wpa_sm_write_assoc_resp_ies()
|