Searched refs:igtk (Results 1 - 25 of 33) sorted by relevance

12

/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
H A Dwpa_ie.h39 const u8 *igtk; member in struct:wpa_eapol_ie_parse
H A Dwpa_ft.c289 const u8 *igtk; member in struct:wpa_ft_ies
330 parse->igtk = pos + 2;
682 u8 igtk[WPA_IGTK_LEN]; local
707 if (aes_unwrap(sm->ptk.kek, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk)) {
717 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk,
720 keyidx, 0, igtk_elem + 2, 6, igtk, WPA_IGTK_LEN) <
833 if (wpa_ft_process_igtk_subelem(sm, parse.igtk, parse.igtk_len) < 0)
H A Dwpa.c746 if (ie->igtk) {
747 const struct wpa_igtk_kde *igtk; local
749 if (ie->igtk_len != sizeof(*igtk))
751 igtk = (const struct wpa_igtk_kde *) ie->igtk;
752 keyidx = WPA_GET_LE16(igtk->keyid);
755 keyidx, MAC2STR(igtk->pn));
757 igtk->igtk, WPA_IGTK_LEN);
765 keyidx, 0, igtk
[all...]
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth_ie.h39 const u8 *igtk; member in struct:wpa_eapol_ie_parse
H A Dwpa_auth.c1763 struct wpa_igtk_kde igtk; local
1769 igtk.keyid[0] = gsm->GN_igtk;
1770 igtk.keyid[1] = 0;
1772 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN_igtk, igtk.pn) < 0)
1773 os_memset(igtk.pn, 0, sizeof(igtk.pn));
1774 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], WPA_IGTK_LEN);
1776 (const u8 *) &igtk, sizeof(igtk), NUL
[all...]
H A Dwpa_auth_ft.c664 u8 *igtk; local
667 igtk = wpa_ft_igtk_subelem(sm, &igtk_len);
668 if (igtk == NULL) {
675 os_free(igtk);
679 os_memcpy(subelem + subelem_len, igtk, igtk_len);
681 os_free(igtk);
/external/wpa_supplicant_8/hostapd/src/rsn_supp/
H A Dwpa_ie.h41 const u8 *igtk; member in struct:wpa_eapol_ie_parse
H A Dwpa_ft.c43 const u8 *igtk; member in struct:wpa_ft_ies
386 parse->igtk = pos + 2;
814 u8 igtk[WPA_IGTK_LEN]; local
839 if (aes_unwrap(sm->ptk.kek, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk)) {
849 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk,
852 igtk_elem + 2, 6, igtk, WPA_IGTK_LEN) < 0) {
983 if (wpa_ft_process_igtk_subelem(sm, parse.igtk, parse.igtk_len) < 0)
H A Dwpa.c751 if (ie->igtk) {
752 const struct wpa_igtk_kde *igtk; local
754 if (ie->igtk_len != sizeof(*igtk))
756 igtk = (const struct wpa_igtk_kde *) ie->igtk;
757 keyidx = WPA_GET_LE16(igtk->keyid);
760 keyidx, MAC2STR(igtk->pn));
762 igtk->igtk, WPA_IGTK_LEN);
769 keyidx, 0, igtk
[all...]
H A Dwpa_ie.c354 ie->igtk = pos + 2 + RSN_SELECTOR_LEN;
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth_ie.h39 const u8 *igtk; member in struct:wpa_eapol_ie_parse
H A Dwpa_auth.c1763 struct wpa_igtk_kde igtk; local
1769 igtk.keyid[0] = gsm->GN_igtk;
1770 igtk.keyid[1] = 0;
1772 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN_igtk, igtk.pn) < 0)
1773 os_memset(igtk.pn, 0, sizeof(igtk.pn));
1774 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], WPA_IGTK_LEN);
1776 (const u8 *) &igtk, sizeof(igtk), NUL
[all...]
H A Dwpa_auth_ft.c664 u8 *igtk; local
667 igtk = wpa_ft_igtk_subelem(sm, &igtk_len);
668 if (igtk == NULL) {
675 os_free(igtk);
679 os_memcpy(subelem + subelem_len, igtk, igtk_len);
681 os_free(igtk);
/external/wpa_supplicant_8/src/rsn_supp/
H A Dwpa_ie.h41 const u8 *igtk; member in struct:wpa_eapol_ie_parse
H A Dwpa_ft.c43 const u8 *igtk; member in struct:wpa_ft_ies
386 parse->igtk = pos + 2;
814 u8 igtk[WPA_IGTK_LEN]; local
839 if (aes_unwrap(sm->ptk.kek, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk)) {
849 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk,
852 igtk_elem + 2, 6, igtk, WPA_IGTK_LEN) < 0) {
983 if (wpa_ft_process_igtk_subelem(sm, parse.igtk, parse.igtk_len) < 0)
H A Dwpa.c751 if (ie->igtk) {
752 const struct wpa_igtk_kde *igtk; local
754 if (ie->igtk_len != sizeof(*igtk))
756 igtk = (const struct wpa_igtk_kde *) ie->igtk;
757 keyidx = WPA_GET_LE16(igtk->keyid);
760 keyidx, MAC2STR(igtk->pn));
762 igtk->igtk, WPA_IGTK_LEN);
769 keyidx, 0, igtk
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth_ie.h39 const u8 *igtk; member in struct:wpa_eapol_ie_parse
H A Dwpa_auth.c1763 struct wpa_igtk_kde igtk; local
1769 igtk.keyid[0] = gsm->GN_igtk;
1770 igtk.keyid[1] = 0;
1772 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN_igtk, igtk.pn) < 0)
1773 os_memset(igtk.pn, 0, sizeof(igtk.pn));
1774 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], WPA_IGTK_LEN);
1776 (const u8 *) &igtk, sizeof(igtk), NUL
[all...]
H A Dwpa_auth_ft.c664 u8 *igtk; local
667 igtk = wpa_ft_igtk_subelem(sm, &igtk_len);
668 if (igtk == NULL) {
675 os_free(igtk);
679 os_memcpy(subelem + subelem_len, igtk, igtk_len);
681 os_free(igtk);
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/
H A Dwpa_ie.h41 const u8 *igtk; member in struct:wpa_eapol_ie_parse
H A Dwpa_ft.c43 const u8 *igtk; member in struct:wpa_ft_ies
386 parse->igtk = pos + 2;
814 u8 igtk[WPA_IGTK_LEN]; local
839 if (aes_unwrap(sm->ptk.kek, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk)) {
849 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk,
852 igtk_elem + 2, 6, igtk, WPA_IGTK_LEN) < 0) {
983 if (wpa_ft_process_igtk_subelem(sm, parse.igtk, parse.igtk_len) < 0)
H A Dwpa.c751 if (ie->igtk) {
752 const struct wpa_igtk_kde *igtk; local
754 if (ie->igtk_len != sizeof(*igtk))
756 igtk = (const struct wpa_igtk_kde *) ie->igtk;
757 keyidx = WPA_GET_LE16(igtk->keyid);
760 keyidx, MAC2STR(igtk->pn));
762 igtk->igtk, WPA_IGTK_LEN);
769 keyidx, 0, igtk
[all...]
/external/wpa_supplicant/
H A Dwpa.c196 u8 igtk[WPA_IGTK_LEN]; member in struct:wpa_igtk_kde
1196 const u8 *igtk; member in struct:wpa_eapol_ie_parse
1285 ie->igtk = pos + 2 + RSN_SELECTOR_LEN;
1821 if (ie->igtk) {
1822 const struct wpa_igtk_kde *igtk; local
1824 if (ie->igtk_len != sizeof(*igtk))
1826 igtk = (const struct wpa_igtk_kde *) ie->igtk;
1827 keyidx = WPA_GET_LE16(igtk->keyid);
1830 keyidx, MAC2STR(igtk
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/common/
H A Dwpa_common.h259 u8 igtk[WPA_IGTK_LEN]; member in struct:wpa_igtk_kde
/external/wpa_supplicant_8/hostapd/src/common/
H A Dwpa_common.h267 u8 igtk[WPA_IGTK_LEN]; member in struct:wpa_igtk_kde

Completed in 205 milliseconds

12