/netbsd-current/external/bsd/wpa/dist/src/ap/ |
H A D | wpa_auth_ie.h | 23 const u8 *igtk; member in struct:wpa_eapol_ie_parse
|
H A D | sta_info.h | 97 u8 igtk[WPA_TK_MAX_LEN]; member in struct:sta_info
|
H A D | wpa_auth.c | 3064 struct wpa_igtk_kde igtk; local 3072 igtk.keyid[0] = gsm->GN_igtk; 3073 igtk.keyid[1] = 0; 3076 os_memset(igtk.pn, 0, sizeof(igtk.pn)); 3078 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn)); 3079 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], len); 3086 if (random_get_bytes(igtk [all...] |
H A D | wpa_auth_ft.c | 2492 u8 *igtk; local 2495 igtk = wpa_ft_igtk_subelem(sm, &igtk_len); 2496 if (igtk == NULL) { 2505 os_free(igtk); 2509 os_memcpy(subelem + subelem_len, igtk, igtk_len); 2511 os_free(igtk);
|
H A D | wpa_auth_ie.c | 1030 ie->igtk = pos + 2 + RSN_SELECTOR_LEN;
|
/netbsd-current/external/bsd/wpa/dist/wpa_supplicant/ |
H A D | mesh_rsn.h | 22 u8 igtk[WPA_TK_MAX_LEN]; member in struct:mesh_rsn
|
H A D | mesh_rsn.c | 192 if (random_get_bytes(rsn->igtk, rsn->igtk_len) < 0) 198 rsn->igtk, rsn->igtk_len); 202 seq, sizeof(seq), rsn->igtk, rsn->igtk_len); 221 os_memset(rsn->igtk, 0, sizeof(rsn->igtk)); 604 os_memcpy(pos, rsn->igtk, rsn->igtk_len); 792 os_memcpy(sta->igtk, pos, key_len); 795 sta->igtk, sta->igtk_len);
|
H A D | mesh_mpm.c | 894 sta->igtk, sta->igtk_len); 900 sta->igtk, sta->igtk_len);
|
/netbsd-current/external/bsd/wpa/dist/src/rsn_supp/ |
H A D | wpa_ie.h | 25 const u8 *igtk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa.c | 1056 const struct wpa_igtk_kde *igtk, 1060 u16 keyidx = WPA_GET_LE16(igtk->keyid); 1063 if ((sm->igtk.igtk_len == len && 1064 os_memcmp(sm->igtk.igtk, igtk->igtk, sm->igtk.igtk_len) == 0) || 1066 os_memcmp(sm->igtk_wnm_sleep.igtk, igtk 1055 wpa_supplicant_install_igtk(struct wpa_sm *sm, const struct wpa_igtk_kde *igtk, int wnm_sleep) argument 1133 const struct wpa_igtk_kde *igtk; local 3457 const struct wpa_igtk_kde *igtk; local [all...] |
H A D | wpa_ft.c | 774 u8 igtk[WPA_IGTK_MAX_LEN]; local 814 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { 824 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk, 828 igtk_elem + 2, 6, igtk, igtk_len) < 0) { 831 forced_memzero(igtk, sizeof(igtk)); 834 forced_memzero(igtk, sizeof(igtk)); 1022 if (wpa_ft_process_igtk_subelem(sm, parse.igtk, parse.igtk_len) < 0)
|
H A D | wpa_i.h | 35 struct wpa_igtk igtk; member in struct:wpa_sm
|
H A D | wpa_ie.c | 441 ie->igtk = pos + 2 + RSN_SELECTOR_LEN;
|
/netbsd-current/external/bsd/wpa/dist/src/common/ |
H A D | wpa_common.h | 234 u8 igtk[WPA_IGTK_MAX_LEN]; member in struct:wpa_igtk 302 u8 igtk[WPA_IGTK_MAX_LEN]; member in struct:wpa_igtk_kde 462 const u8 *igtk; member in struct:wpa_ft_ies
|
H A D | wpa_common.c | 897 parse->igtk = pos;
|