/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
wpa_ie.h | 39 const u8 *igtk; member in struct:wpa_eapol_ie_parse
|
wpa_ft.c | 289 const u8 *igtk; member in struct:wpa_ft_ies 330 parse->igtk = pos + 2; 682 u8 igtk[WPA_IGTK_LEN]; local 689 wpa_printf(MSG_DEBUG, "FT: No IGTK included in FTIE"); 693 wpa_hexdump_key(MSG_DEBUG, "FT: Received IGTK in Reassoc Resp", 697 wpa_printf(MSG_DEBUG, "FT: Invalid IGTK sub-elem " 702 wpa_printf(MSG_DEBUG, "FT: Invalid IGTK sub-elem Key Length " 707 if (aes_unwrap(sm->ptk.kek, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk)) { 709 "decrypt IGTK"); 717 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk [all...] |
wpa.c | 746 if (ie->igtk) { 747 const struct wpa_igtk_kde *igtk; local 749 if (ie->igtk_len != sizeof(*igtk)) 751 igtk = (const struct wpa_igtk_kde *) ie->igtk; 752 keyidx = WPA_GET_LE16(igtk->keyid); 753 wpa_printf(MSG_DEBUG, "WPA: IGTK keyid %d " 755 keyidx, MAC2STR(igtk->pn)); 756 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK", 757 igtk->igtk, WPA_IGTK_LEN) [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ie.h | 39 const u8 *igtk; member in struct:wpa_eapol_ie_parse
|
wpa_auth.c | 1763 struct wpa_igtk_kde igtk; local [all...] |
wpa_auth_ft.c | 492 gsm->IGTK[gsm->GN_igtk - 4], pos)) { 664 u8 *igtk; local 667 igtk = wpa_ft_igtk_subelem(sm, &igtk_len); 668 if (igtk == NULL) { 675 os_free(igtk); 679 os_memcpy(subelem + subelem_len, igtk, igtk_len); 681 os_free(igtk); [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ie.h | 41 const u8 *igtk; member in struct:wpa_eapol_ie_parse
|
wpa_ft.c | 43 const u8 *igtk; member in struct:wpa_ft_ies 386 parse->igtk = pos + 2; 814 u8 igtk[WPA_IGTK_LEN]; local 821 wpa_printf(MSG_DEBUG, "FT: No IGTK included in FTIE"); 825 wpa_hexdump_key(MSG_DEBUG, "FT: Received IGTK in Reassoc Resp", 829 wpa_printf(MSG_DEBUG, "FT: Invalid IGTK sub-elem " 834 wpa_printf(MSG_DEBUG, "FT: Invalid IGTK sub-elem Key Length " 839 if (aes_unwrap(sm->ptk.kek, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk)) { 841 "decrypt IGTK"); 849 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk [all...] |
wpa.c | 751 if (ie->igtk) { 752 const struct wpa_igtk_kde *igtk; local 754 if (ie->igtk_len != sizeof(*igtk)) 756 igtk = (const struct wpa_igtk_kde *) ie->igtk; 757 keyidx = WPA_GET_LE16(igtk->keyid); 758 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: IGTK keyid %d " 760 keyidx, MAC2STR(igtk->pn)); 761 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK", 762 igtk->igtk, WPA_IGTK_LEN) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
wpa_common.h | 259 u8 igtk[WPA_IGTK_LEN]; member in struct:wpa_igtk_kde
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 267 u8 igtk[WPA_IGTK_LEN]; member in struct:wpa_igtk_kde
|
/external/wpa_supplicant/ |
wpa.c | 196 u8 igtk[WPA_IGTK_LEN]; member in struct:wpa_igtk_kde 1196 const u8 *igtk; member in struct:wpa_eapol_ie_parse 1822 const struct wpa_igtk_kde *igtk; local [all...] |