Home
last modified time | relevance | path

Searched refs:bigtk (Results 1 – 7 of 7) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/
Dwpa.c1270 const struct wpa_bigtk_kde *bigtk, in wpa_supplicant_install_bigtk() argument
1274 u16 keyidx = WPA_GET_LE16(bigtk->keyid); in wpa_supplicant_install_bigtk()
1277 if ((sm->bigtk.bigtk_len == len && in wpa_supplicant_install_bigtk()
1278 os_memcmp(sm->bigtk.bigtk, bigtk->bigtk, in wpa_supplicant_install_bigtk()
1279 sm->bigtk.bigtk_len) == 0) || in wpa_supplicant_install_bigtk()
1281 os_memcmp(sm->bigtk_wnm_sleep.bigtk, bigtk->bigtk, in wpa_supplicant_install_bigtk()
1291 keyidx, MAC2STR(bigtk->pn)); in wpa_supplicant_install_bigtk()
1292 wpa_hexdump_key(MSG_DEBUG, "WPA: BIGTK", bigtk->bigtk, len); in wpa_supplicant_install_bigtk()
1300 keyidx, 0, bigtk->pn, sizeof(bigtk->pn), in wpa_supplicant_install_bigtk()
1301 bigtk->bigtk, len, KEY_FLAG_GROUP_RX) < 0) { in wpa_supplicant_install_bigtk()
[all …]
Dwpa_ft.c911 u8 bigtk[WPA_BIGTK_MAX_LEN]; in wpa_ft_process_bigtk_subelem() local
949 if (aes_unwrap(kek, kek_len, bigtk_len / 8, bigtk_elem + 9, bigtk)) { in wpa_ft_process_bigtk_subelem()
959 wpa_hexdump_key(MSG_DEBUG, "FT: BIGTK from Reassoc Resp", bigtk, in wpa_ft_process_bigtk_subelem()
963 bigtk_elem + 2, 6, bigtk, bigtk_len, in wpa_ft_process_bigtk_subelem()
967 forced_memzero(bigtk, sizeof(bigtk)); in wpa_ft_process_bigtk_subelem()
970 forced_memzero(bigtk, sizeof(bigtk)); in wpa_ft_process_bigtk_subelem()
1216 wpa_ft_process_bigtk_subelem(sm, parse.bigtk, parse.bigtk_len) < 0) in wpa_ft_validate_reassoc_resp()
Dwpa_i.h41 struct wpa_bigtk bigtk; member
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
Dwpa_common.h257 u8 bigtk[WPA_BIGTK_MAX_LEN]; member
330 u8 bigtk[WPA_BIGTK_MAX_LEN]; member
508 const u8 *bigtk; member
570 const u8 *bigtk; member
Dwpa_common.c979 parse->bigtk = pos; in wpa_ft_parse_ftie()
3086 ie->bigtk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
Dwpa_auth.c3254 struct wpa_bigtk_kde bigtk; in ieee80211w_kde_add() local
3286 bigtk.keyid[0] = gsm->GN_bigtk; in ieee80211w_kde_add()
3287 bigtk.keyid[1] = 0; in ieee80211w_kde_add()
3290 os_memset(bigtk.pn, 0, sizeof(bigtk.pn)); in ieee80211w_kde_add()
3292 os_memcpy(bigtk.pn, rsc, sizeof(bigtk.pn)); in ieee80211w_kde_add()
3293 os_memcpy(bigtk.bigtk, gsm->BIGTK[gsm->GN_bigtk - 6], len); in ieee80211w_kde_add()
3299 if (random_get_bytes(bigtk.bigtk, len) < 0) in ieee80211w_kde_add()
3303 (const u8 *) &bigtk, WPA_BIGTK_KDE_PREFIX_LEN + len, in ieee80211w_kde_add()
Dwpa_auth_ft.c2319 const u8 *kek, *bigtk; in wpa_ft_bigtk_subelem() local
2349 bigtk = gsm->IGTK[gsm->GN_bigtk - 6]; in wpa_ft_bigtk_subelem()
2359 bigtk = stub_bigtk; in wpa_ft_bigtk_subelem()
2361 if (aes_wrap(kek, kek_len, bigtk_len / 8, bigtk, pos)) { in wpa_ft_bigtk_subelem()
2632 u8 *bigtk; in wpa_sm_write_assoc_resp_ies() local
2636 bigtk = wpa_ft_bigtk_subelem(sm, &bigtk_len); in wpa_sm_write_assoc_resp_ies()
2637 if (!bigtk) { in wpa_sm_write_assoc_resp_ies()
2646 os_free(bigtk); in wpa_sm_write_assoc_resp_ies()
2650 os_memcpy(subelem + subelem_len, bigtk, bigtk_len); in wpa_sm_write_assoc_resp_ies()
2652 os_free(bigtk); in wpa_sm_write_assoc_resp_ies()