/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.h | 33 const u8 *igtk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth_ft.c | 688 u8 *igtk; local 691 igtk = wpa_ft_igtk_subelem(sm, &igtk_len); 692 if (igtk == NULL) { 699 os_free(igtk); 703 os_memcpy(subelem + subelem_len, igtk, igtk_len); 705 os_free(igtk);
|
H A D | wpa_auth.c | 2113 struct wpa_igtk_kde igtk; local 2121 igtk.keyid[0] = gsm->GN_igtk; 2122 igtk.keyid[1] = 0; 2125 os_memset(igtk.pn, 0, sizeof(igtk.pn)); 2127 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn)); 2128 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], len); 2134 if (random_get_bytes(igtk [all...] |
H A D | wpa_auth_ie.c | 830 ie->igtk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ie.h | 35 const u8 *igtk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa.c | 801 if (ie->igtk) { 803 const struct wpa_igtk_kde *igtk; local 808 igtk = (const struct wpa_igtk_kde *) ie->igtk; 809 keyidx = WPA_GET_LE16(igtk->keyid); 812 keyidx, MAC2STR(igtk->pn)); 814 igtk->igtk, len); 822 keyidx, 0, igtk->pn, sizeof(igtk [all...] |
H A D | wpa_ft.c | 619 u8 igtk[WPA_IGTK_LEN]; local 645 igtk_elem + 9, igtk)) { 655 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk, 658 igtk_elem + 2, 6, igtk, WPA_IGTK_LEN) < 0) { 790 if (wpa_ft_process_igtk_subelem(sm, parse.igtk, parse.igtk_len) < 0)
|
H A D | wpa_ie.c | 449 ie->igtk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ie.h | 33 const u8 *igtk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth_ft.c | 688 u8 *igtk; local 691 igtk = wpa_ft_igtk_subelem(sm, &igtk_len); 692 if (igtk == NULL) { 699 os_free(igtk); 703 os_memcpy(subelem + subelem_len, igtk, igtk_len); 705 os_free(igtk);
|
H A D | wpa_auth.c | 2113 struct wpa_igtk_kde igtk; local 2121 igtk.keyid[0] = gsm->GN_igtk; 2122 igtk.keyid[1] = 0; 2125 os_memset(igtk.pn, 0, sizeof(igtk.pn)); 2127 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn)); 2128 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], len); 2134 if (random_get_bytes(igtk [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ie.h | 35 const u8 *igtk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa.c | 801 if (ie->igtk) { 803 const struct wpa_igtk_kde *igtk; local 808 igtk = (const struct wpa_igtk_kde *) ie->igtk; 809 keyidx = WPA_GET_LE16(igtk->keyid); 812 keyidx, MAC2STR(igtk->pn)); 814 igtk->igtk, len); 822 keyidx, 0, igtk->pn, sizeof(igtk [all...] |
H A D | wpa_ft.c | 619 u8 igtk[WPA_IGTK_LEN]; local 645 igtk_elem + 9, igtk)) { 655 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk, 658 igtk_elem + 2, 6, igtk, WPA_IGTK_LEN) < 0) { 790 if (wpa_ft_process_igtk_subelem(sm, parse.igtk, parse.igtk_len) < 0)
|
H A D | wpa_ie.c | 449 ie->igtk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ie.h | 33 const u8 *igtk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth_ft.c | 688 u8 *igtk; local 691 igtk = wpa_ft_igtk_subelem(sm, &igtk_len); 692 if (igtk == NULL) { 699 os_free(igtk); 703 os_memcpy(subelem + subelem_len, igtk, igtk_len); 705 os_free(igtk);
|
H A D | wpa_auth.c | 2113 struct wpa_igtk_kde igtk; local 2121 igtk.keyid[0] = gsm->GN_igtk; 2122 igtk.keyid[1] = 0; 2125 os_memset(igtk.pn, 0, sizeof(igtk.pn)); 2127 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn)); 2128 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], len); 2134 if (random_get_bytes(igtk [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ie.h | 35 const u8 *igtk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa.c | 801 if (ie->igtk) { 803 const struct wpa_igtk_kde *igtk; local 808 igtk = (const struct wpa_igtk_kde *) ie->igtk; 809 keyidx = WPA_GET_LE16(igtk->keyid); 812 keyidx, MAC2STR(igtk->pn)); 814 igtk->igtk, len); 822 keyidx, 0, igtk->pn, sizeof(igtk [all...] |
H A D | wpa_ft.c | 619 u8 igtk[WPA_IGTK_LEN]; local 645 igtk_elem + 9, igtk)) { 655 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk, 658 igtk_elem + 2, 6, igtk, WPA_IGTK_LEN) < 0) { 790 if (wpa_ft_process_igtk_subelem(sm, parse.igtk, parse.igtk_len) < 0)
|
H A D | wpa_ie.c | 449 ie->igtk = pos + 2 + RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.h | 298 u8 igtk[WPA_IGTK_MAX_LEN]; member in struct:wpa_igtk_kde 427 const u8 *igtk; member in struct:wpa_ft_ies
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.h | 298 u8 igtk[WPA_IGTK_MAX_LEN]; member in struct:wpa_igtk_kde 427 const u8 *igtk; member in struct:wpa_ft_ies
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.h | 298 u8 igtk[WPA_IGTK_MAX_LEN]; member in struct:wpa_igtk_kde 427 const u8 *igtk; member in struct:wpa_ft_ies
|