HomeSort by: relevance | last modified time | path
    Searched defs:igtk (Results 1 - 10 of 10) sorted by relevancy

  /src/external/bsd/wpa/dist/wpa_supplicant/
mesh_rsn.h 22 u8 igtk[WPA_TK_MAX_LEN]; member in struct:mesh_rsn
  /src/external/bsd/wpa/dist/src/rsn_supp/
wpa_ft.c 886 u8 igtk[WPA_IGTK_MAX_LEN]; local
907 wpa_printf(MSG_DEBUG, "FT: No IGTK included in FTIE");
911 wpa_hexdump_key(MSG_DEBUG, "FT: Received IGTK in Reassoc Resp",
916 wpa_printf(MSG_DEBUG, "FT: Invalid IGTK sub-elem "
921 wpa_printf(MSG_DEBUG, "FT: Invalid IGTK sub-elem Key Length "
926 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) {
928 "decrypt IGTK");
936 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk,
940 igtk_elem + 2, 6, igtk, igtk_len
    [all...]
wpa.h 167 struct wpa_igtk igtk; member in struct:wpa_sm_link
wpa_i.h 40 struct wpa_igtk igtk; member in struct:wpa_sm
wpa.c 1632 const struct wpa_igtk_kde *igtk,
1636 u16 keyidx = WPA_GET_LE16(igtk->keyid);
1639 if ((sm->igtk.igtk_len == len &&
1640 os_memcmp(sm->igtk.igtk, igtk->igtk, sm->igtk.igtk_len) == 0) ||
1642 os_memcmp(sm->igtk_wnm_sleep.igtk, igtk->igtk
1931 const struct wpa_igtk_kde *igtk; local
5314 const struct wpa_igtk_kde *igtk; local
    [all...]
  /src/external/bsd/wpa/dist/src/ap/
sta_info.h 132 u8 igtk[WPA_TK_MAX_LEN]; member in struct:sta_info
wpa_auth.h 325 const u8 *igtk; member in struct:wpa_auth_ml_key_info::wpa_auth_ml_link_key_info
wpa_auth.c 336 "TESTING: Override IGTK RSC %016llx --> %016llx",
3424 /* IGTK KDE and BIGTK KDE */
4032 struct wpa_igtk_kde igtk; local
4048 igtk.keyid[0] = gsm->GN_igtk;
4049 igtk.keyid[1] = 0;
4052 os_memset(igtk.pn, 0, sizeof(igtk.pn));
4054 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn));
4055 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], len)
    [all...]
wpa_auth_ft.c 2311 const u8 *kek, *igtk; local
2341 igtk = gsm->IGTK[gsm->GN_igtk - 4];
2344 * Provide unique random IGTK to each STA to prevent use of
2345 * IGTK in the BSS.
2351 igtk = stub_igtk;
2353 if (aes_wrap(kek, kek_len, igtk_len / 8, igtk, pos)) {
2355 "FT: IGTK subelem encryption failed: kek_len=%d",
2662 u8 *igtk; local
2665 igtk = wpa_ft_igtk_subelem(sm, &igtk_len)
    [all...]
  /src/external/bsd/wpa/dist/src/common/
wpa_common.h 282 u8 igtk[WPA_IGTK_MAX_LEN]; member in struct:wpa_igtk
355 u8 igtk[WPA_IGTK_MAX_LEN]; member in struct:wpa_igtk_kde
378 u8 igtk[WPA_IGTK_MAX_LEN]; member in struct:rsn_mlo_igtk_kde
589 const u8 *igtk; member in struct:wpa_ft_ies
606 u16 valid_mlo_igtks; /* bitmap of valid link IGTK subelements */
662 const u8 *igtk; member in struct:wpa_eapol_ie_parse
712 u16 valid_mlo_igtks; /* bitmap of valid link IGTK KDEs */

Completed in 36 milliseconds