Home
last modified time | relevance | path

Searched refs:igtk (Results 1 – 25 of 26) sorted by relevance

12

/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Dmesh_rsn.c192 if (random_get_bytes(rsn->igtk, rsn->igtk_len) < 0) in __mesh_rsn_auth_init()
198 rsn->igtk, rsn->igtk_len); in __mesh_rsn_auth_init()
202 seq, sizeof(seq), rsn->igtk, rsn->igtk_len); in __mesh_rsn_auth_init()
221 os_memset(rsn->igtk, 0, sizeof(rsn->igtk)); in mesh_rsn_deinit()
604 os_memcpy(pos, rsn->igtk, rsn->igtk_len); in mesh_rsn_protect_frame()
792 os_memcpy(sta->igtk, pos, key_len); in mesh_rsn_process_ampe()
795 sta->igtk, sta->igtk_len); in mesh_rsn_process_ampe()
Dmesh_rsn.h22 u8 igtk[WPA_TK_MAX_LEN]; member
Dmesh_mpm.c894 sta->igtk, sta->igtk_len); in mesh_mpm_plink_estab()
900 sta->igtk, sta->igtk_len); in mesh_mpm_plink_estab()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Dmesh_rsn.c190 if (random_get_bytes(rsn->igtk, rsn->igtk_len) < 0) in __mesh_rsn_auth_init()
196 rsn->igtk, rsn->igtk_len); in __mesh_rsn_auth_init()
201 seq, sizeof(seq), rsn->igtk, rsn->igtk_len, in __mesh_rsn_auth_init()
221 os_memset(rsn->igtk, 0, sizeof(rsn->igtk)); in mesh_rsn_deinit()
600 os_memcpy(pos, rsn->igtk, rsn->igtk_len); in mesh_rsn_protect_frame()
786 os_memcpy(sta->igtk, pos, key_len); in mesh_rsn_process_ampe()
789 sta->igtk, sta->igtk_len); in mesh_rsn_process_ampe()
Dmesh_rsn.h22 u8 igtk[WPA_TK_MAX_LEN]; member
Dmesh_mpm.c901 sta->igtk, sta->igtk_len); in mesh_mpm_plink_estab()
907 sta->igtk, sta->igtk_len, in mesh_mpm_plink_estab()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/
Dwpa.c1056 const struct wpa_igtk_kde *igtk, in wpa_supplicant_install_igtk() argument
1060 u16 keyidx = WPA_GET_LE16(igtk->keyid); in wpa_supplicant_install_igtk()
1063 if ((sm->igtk.igtk_len == len && in wpa_supplicant_install_igtk()
1064 os_memcmp(sm->igtk.igtk, igtk->igtk, sm->igtk.igtk_len) == 0) || in wpa_supplicant_install_igtk()
1066 os_memcmp(sm->igtk_wnm_sleep.igtk, igtk->igtk, in wpa_supplicant_install_igtk()
1076 keyidx, MAC2STR(igtk->pn)); in wpa_supplicant_install_igtk()
1077 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK", igtk->igtk, len); in wpa_supplicant_install_igtk()
1085 keyidx, 0, igtk->pn, sizeof(igtk->pn), in wpa_supplicant_install_igtk()
1086 igtk->igtk, len) < 0) { in wpa_supplicant_install_igtk()
1112 os_memcpy(sm->igtk_wnm_sleep.igtk, igtk->igtk, in wpa_supplicant_install_igtk()
[all …]
Dwpa_ft.c774 u8 igtk[WPA_IGTK_MAX_LEN]; in wpa_ft_process_igtk_subelem() local
814 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem()
824 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk, in wpa_ft_process_igtk_subelem()
828 igtk_elem + 2, 6, igtk, igtk_len) < 0) { in wpa_ft_process_igtk_subelem()
831 forced_memzero(igtk, sizeof(igtk)); in wpa_ft_process_igtk_subelem()
834 forced_memzero(igtk, sizeof(igtk)); in wpa_ft_process_igtk_subelem()
1022 if (wpa_ft_process_igtk_subelem(sm, parse.igtk, parse.igtk_len) < 0) in wpa_ft_validate_reassoc_resp()
Dwpa_ie.h25 const u8 *igtk; member
Dwpa_i.h35 struct wpa_igtk igtk; member
Dwpa_ie.c441 ie->igtk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
Dwpa.c1202 const struct wpa_igtk_kde *igtk, in wpa_supplicant_install_igtk() argument
1206 u16 keyidx = WPA_GET_LE16(igtk->keyid); in wpa_supplicant_install_igtk()
1209 if ((sm->igtk.igtk_len == len && in wpa_supplicant_install_igtk()
1210 os_memcmp(sm->igtk.igtk, igtk->igtk, sm->igtk.igtk_len) == 0) || in wpa_supplicant_install_igtk()
1212 os_memcmp(sm->igtk_wnm_sleep.igtk, igtk->igtk, in wpa_supplicant_install_igtk()
1222 keyidx, MAC2STR(igtk->pn)); in wpa_supplicant_install_igtk()
1223 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK", igtk->igtk, len); in wpa_supplicant_install_igtk()
1231 keyidx, 0, igtk->pn, sizeof(igtk->pn), in wpa_supplicant_install_igtk()
1232 igtk->igtk, len, KEY_FLAG_GROUP_RX) < 0) { in wpa_supplicant_install_igtk()
1258 os_memcpy(sm->igtk_wnm_sleep.igtk, igtk->igtk, in wpa_supplicant_install_igtk()
[all …]
Dwpa_ft.c841 u8 igtk[WPA_IGTK_MAX_LEN]; in wpa_ft_process_igtk_subelem() local
881 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem()
891 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk, in wpa_ft_process_igtk_subelem()
895 igtk_elem + 2, 6, igtk, igtk_len, in wpa_ft_process_igtk_subelem()
899 forced_memzero(igtk, sizeof(igtk)); in wpa_ft_process_igtk_subelem()
902 forced_memzero(igtk, sizeof(igtk)); in wpa_ft_process_igtk_subelem()
1215 wpa_ft_process_igtk_subelem(sm, parse.igtk, parse.igtk_len) < 0 || in wpa_ft_validate_reassoc_resp()
Dwpa_i.h39 struct wpa_igtk igtk; member
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Dwpa_auth_ie.h23 const u8 *igtk; member
Dwpa_auth.c3073 struct wpa_igtk_kde igtk; in ieee80211w_kde_add() local
3081 igtk.keyid[0] = gsm->GN_igtk; in ieee80211w_kde_add()
3082 igtk.keyid[1] = 0; in ieee80211w_kde_add()
3085 os_memset(igtk.pn, 0, sizeof(igtk.pn)); in ieee80211w_kde_add()
3087 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn)); in ieee80211w_kde_add()
3088 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], len); in ieee80211w_kde_add()
3095 if (random_get_bytes(igtk.igtk, len) < 0) in ieee80211w_kde_add()
3099 (const u8 *) &igtk, WPA_IGTK_KDE_PREFIX_LEN + len, in ieee80211w_kde_add()
Dsta_info.h97 u8 igtk[WPA_TK_MAX_LEN]; member
Dwpa_auth_ft.c2492 u8 *igtk; in wpa_sm_write_assoc_resp_ies() local
2495 igtk = wpa_ft_igtk_subelem(sm, &igtk_len); in wpa_sm_write_assoc_resp_ies()
2496 if (igtk == NULL) { in wpa_sm_write_assoc_resp_ies()
2505 os_free(igtk); in wpa_sm_write_assoc_resp_ies()
2509 os_memcpy(subelem + subelem_len, igtk, igtk_len); in wpa_sm_write_assoc_resp_ies()
2511 os_free(igtk); in wpa_sm_write_assoc_resp_ies()
Dwpa_auth_ie.c1030 ie->igtk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
Dwpa_common.h231 u8 igtk[WPA_IGTK_MAX_LEN]; member
299 u8 igtk[WPA_IGTK_MAX_LEN]; member
459 const u8 *igtk; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
Dwpa_common.h252 u8 igtk[WPA_IGTK_MAX_LEN]; member
323 u8 igtk[WPA_IGTK_MAX_LEN]; member
506 const u8 *igtk; member
568 const u8 *igtk; member
Dwpa_common.c969 parse->igtk = pos; in wpa_ft_parse_ftie()
3077 ie->igtk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dwpa_auth.c3253 struct wpa_igtk_kde igtk; in ieee80211w_kde_add() local
3263 igtk.keyid[0] = gsm->GN_igtk; in ieee80211w_kde_add()
3264 igtk.keyid[1] = 0; in ieee80211w_kde_add()
3267 os_memset(igtk.pn, 0, sizeof(igtk.pn)); in ieee80211w_kde_add()
3269 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn)); in ieee80211w_kde_add()
3270 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], len); in ieee80211w_kde_add()
3276 if (random_get_bytes(igtk.igtk, len) < 0) in ieee80211w_kde_add()
3280 (const u8 *) &igtk, WPA_IGTK_KDE_PREFIX_LEN + len, in ieee80211w_kde_add()
Dsta_info.h138 u8 igtk[WPA_TK_MAX_LEN]; member
Dwpa_auth_ft.c2259 const u8 *kek, *igtk; in wpa_ft_igtk_subelem() local
2289 igtk = gsm->IGTK[gsm->GN_igtk - 4]; in wpa_ft_igtk_subelem()
2299 igtk = stub_igtk; in wpa_ft_igtk_subelem()
2301 if (aes_wrap(kek, kek_len, igtk_len / 8, igtk, pos)) { in wpa_ft_igtk_subelem()
2610 u8 *igtk; in wpa_sm_write_assoc_resp_ies() local
2613 igtk = wpa_ft_igtk_subelem(sm, &igtk_len); in wpa_sm_write_assoc_resp_ies()
2614 if (igtk == NULL) { in wpa_sm_write_assoc_resp_ies()
2623 os_free(igtk); in wpa_sm_write_assoc_resp_ies()
2627 os_memcpy(subelem + subelem_len, igtk, igtk_len); in wpa_sm_write_assoc_resp_ies()
2629 os_free(igtk); in wpa_sm_write_assoc_resp_ies()

12