Searched refs:bigtk (Results 1 – 7 of 7) sorted by relevance
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
D | wpa.c | 1270 const struct wpa_bigtk_kde *bigtk, in wpa_supplicant_install_bigtk() argument 1274 u16 keyidx = WPA_GET_LE16(bigtk->keyid); in wpa_supplicant_install_bigtk() 1277 if ((sm->bigtk.bigtk_len == len && in wpa_supplicant_install_bigtk() 1278 os_memcmp(sm->bigtk.bigtk, bigtk->bigtk, in wpa_supplicant_install_bigtk() 1279 sm->bigtk.bigtk_len) == 0) || in wpa_supplicant_install_bigtk() 1281 os_memcmp(sm->bigtk_wnm_sleep.bigtk, bigtk->bigtk, in wpa_supplicant_install_bigtk() 1291 keyidx, MAC2STR(bigtk->pn)); in wpa_supplicant_install_bigtk() 1292 wpa_hexdump_key(MSG_DEBUG, "WPA: BIGTK", bigtk->bigtk, len); in wpa_supplicant_install_bigtk() 1300 keyidx, 0, bigtk->pn, sizeof(bigtk->pn), in wpa_supplicant_install_bigtk() 1301 bigtk->bigtk, len, KEY_FLAG_GROUP_RX) < 0) { in wpa_supplicant_install_bigtk() [all …]
|
D | wpa_ft.c | 911 u8 bigtk[WPA_BIGTK_MAX_LEN]; in wpa_ft_process_bigtk_subelem() local 949 if (aes_unwrap(kek, kek_len, bigtk_len / 8, bigtk_elem + 9, bigtk)) { in wpa_ft_process_bigtk_subelem() 959 wpa_hexdump_key(MSG_DEBUG, "FT: BIGTK from Reassoc Resp", bigtk, in wpa_ft_process_bigtk_subelem() 963 bigtk_elem + 2, 6, bigtk, bigtk_len, in wpa_ft_process_bigtk_subelem() 967 forced_memzero(bigtk, sizeof(bigtk)); in wpa_ft_process_bigtk_subelem() 970 forced_memzero(bigtk, sizeof(bigtk)); in wpa_ft_process_bigtk_subelem() 1216 wpa_ft_process_bigtk_subelem(sm, parse.bigtk, parse.bigtk_len) < 0) in wpa_ft_validate_reassoc_resp()
|
D | wpa_i.h | 41 struct wpa_bigtk bigtk; member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
D | wpa_common.h | 257 u8 bigtk[WPA_BIGTK_MAX_LEN]; member 330 u8 bigtk[WPA_BIGTK_MAX_LEN]; member 508 const u8 *bigtk; member 570 const u8 *bigtk; member
|
D | wpa_common.c | 979 parse->bigtk = pos; in wpa_ft_parse_ftie() 3086 ie->bigtk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | wpa_auth.c | 3254 struct wpa_bigtk_kde bigtk; in ieee80211w_kde_add() local 3286 bigtk.keyid[0] = gsm->GN_bigtk; in ieee80211w_kde_add() 3287 bigtk.keyid[1] = 0; in ieee80211w_kde_add() 3290 os_memset(bigtk.pn, 0, sizeof(bigtk.pn)); in ieee80211w_kde_add() 3292 os_memcpy(bigtk.pn, rsc, sizeof(bigtk.pn)); in ieee80211w_kde_add() 3293 os_memcpy(bigtk.bigtk, gsm->BIGTK[gsm->GN_bigtk - 6], len); in ieee80211w_kde_add() 3299 if (random_get_bytes(bigtk.bigtk, len) < 0) in ieee80211w_kde_add() 3303 (const u8 *) &bigtk, WPA_BIGTK_KDE_PREFIX_LEN + len, in ieee80211w_kde_add()
|
D | wpa_auth_ft.c | 2319 const u8 *kek, *bigtk; in wpa_ft_bigtk_subelem() local 2349 bigtk = gsm->IGTK[gsm->GN_bigtk - 6]; in wpa_ft_bigtk_subelem() 2359 bigtk = stub_bigtk; in wpa_ft_bigtk_subelem() 2361 if (aes_wrap(kek, kek_len, bigtk_len / 8, bigtk, pos)) { in wpa_ft_bigtk_subelem() 2632 u8 *bigtk; in wpa_sm_write_assoc_resp_ies() local 2636 bigtk = wpa_ft_bigtk_subelem(sm, &bigtk_len); in wpa_sm_write_assoc_resp_ies() 2637 if (!bigtk) { in wpa_sm_write_assoc_resp_ies() 2646 os_free(bigtk); in wpa_sm_write_assoc_resp_ies() 2650 os_memcpy(subelem + subelem_len, bigtk, bigtk_len); in wpa_sm_write_assoc_resp_ies() 2652 os_free(bigtk); in wpa_sm_write_assoc_resp_ies()
|