| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| mesh_rsn.h | 22 u8 igtk[WPA_TK_MAX_LEN]; member in struct:mesh_rsn
|
| mesh_rsn.c | 208 if (random_get_bytes(rsn->igtk, rsn->igtk_len) < 0) 213 wpa_hexdump_key(MSG_DEBUG, "mesh: Own TX IGTK", 214 rsn->igtk, rsn->igtk_len); 219 seq, sizeof(seq), rsn->igtk, rsn->igtk_len, 239 os_memset(rsn->igtk, 0, sizeof(rsn->igtk)); 612 * Key ID[2], IPN[6], IGTK[variable] 619 os_memcpy(pos, rsn->igtk, rsn->igtk_len); 793 * Key ID[2], IPN[6], IGTK[variable] 805 os_memcpy(sta->igtk, pos, key_len) [all...] |
| mesh_mpm.c | 938 wpa_hexdump_key(MSG_DEBUG, "mesh: RX IGTK Key RSC", 940 wpa_hexdump_key(MSG_DEBUG, "mesh: RX IGTK", 941 sta->igtk, sta->igtk_len); 947 sta->igtk, sta->igtk_len,
|
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| wpa.c | 1632 const struct wpa_igtk_kde *igtk, 1636 u16 keyidx = WPA_GET_LE16(igtk->keyid); 1639 if ((sm->igtk.igtk_len == len && 1640 os_memcmp(sm->igtk.igtk, igtk->igtk, sm->igtk.igtk_len) == 0) || 1642 os_memcmp(sm->igtk_wnm_sleep.igtk, igtk->igtk 1931 const struct wpa_igtk_kde *igtk; local 5314 const struct wpa_igtk_kde *igtk; local [all...] |
| wpa_ft.c | 886 u8 igtk[WPA_IGTK_MAX_LEN]; local 907 wpa_printf(MSG_DEBUG, "FT: No IGTK included in FTIE"); 911 wpa_hexdump_key(MSG_DEBUG, "FT: Received IGTK in Reassoc Resp", 916 wpa_printf(MSG_DEBUG, "FT: Invalid IGTK sub-elem " 921 wpa_printf(MSG_DEBUG, "FT: Invalid IGTK sub-elem Key Length " 926 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { 928 "decrypt IGTK"); 936 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk, 940 igtk_elem + 2, 6, igtk, igtk_len [all...] |
| wpa.h | 167 struct wpa_igtk igtk; member in struct:wpa_sm_link
|
| wpa_i.h | 40 struct wpa_igtk igtk; member in struct:wpa_sm
|
| /src/external/bsd/wpa/dist/src/common/ |
| wpa_common.h | 282 u8 igtk[WPA_IGTK_MAX_LEN]; member in struct:wpa_igtk 355 u8 igtk[WPA_IGTK_MAX_LEN]; member in struct:wpa_igtk_kde 378 u8 igtk[WPA_IGTK_MAX_LEN]; member in struct:rsn_mlo_igtk_kde 589 const u8 *igtk; member in struct:wpa_ft_ies 606 u16 valid_mlo_igtks; /* bitmap of valid link IGTK subelements */ 662 const u8 *igtk; member in struct:wpa_eapol_ie_parse 712 u16 valid_mlo_igtks; /* bitmap of valid link IGTK KDEs */
|
| wpa_common.c | 1078 wpa_printf(MSG_DEBUG, "FT: IGTK"); 1079 parse->igtk = pos; 1113 "FT: Too short MLO IGTK in FTE"); 1117 wpa_printf(MSG_DEBUG, "FT: MLO IGTK (Link ID %u)", 3498 ie->igtk = p; 3500 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK in EAPOL-Key", 3581 "RSN: Link ID %u - MLO IGTK KDE in EAPOL-Key",
|
| /src/external/bsd/wpa/dist/src/ap/ |
| sta_info.h | 132 u8 igtk[WPA_TK_MAX_LEN]; member in struct:sta_info
|
| wpa_auth.c | 336 "TESTING: Override IGTK RSC %016llx --> %016llx", 3424 /* IGTK KDE and BIGTK KDE */ 4032 struct wpa_igtk_kde igtk; local 4048 igtk.keyid[0] = gsm->GN_igtk; 4049 igtk.keyid[1] = 0; 4052 os_memset(igtk.pn, 0, sizeof(igtk.pn)); 4054 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn)); 4055 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], len) [all...] |
| wpa_auth_ft.c | 2311 const u8 *kek, *igtk; local 2341 igtk = gsm->IGTK[gsm->GN_igtk - 4]; 2344 * Provide unique random IGTK to each STA to prevent use of 2345 * IGTK in the BSS. 2351 igtk = stub_igtk; 2353 if (aes_wrap(kek, kek_len, igtk_len / 8, igtk, pos)) { 2355 "FT: IGTK subelem encryption failed: kek_len=%d", 2662 u8 *igtk; local 2665 igtk = wpa_ft_igtk_subelem(sm, &igtk_len) [all...] |
| wpa_auth.h | 325 const u8 *igtk; member in struct:wpa_auth_ml_key_info::wpa_auth_ml_link_key_info
|