Home | History | Annotate | Download | only in ap

Lines Matching refs:igtk

1864 	struct wpa_igtk_kde igtk;
1870 igtk.keyid[0] = gsm->GN_igtk;
1871 igtk.keyid[1] = 0;
1873 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN_igtk, igtk.pn) < 0)
1874 os_memset(igtk.pn, 0, sizeof(igtk.pn));
1875 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], WPA_IGTK_LEN);
1878 * Provide unique random IGTK to each STA to prevent use of
1879 * IGTK in the BSS.
1881 if (random_get_bytes(igtk.igtk, WPA_IGTK_LEN) < 0)
1885 (const u8 *) &igtk, sizeof(igtk), NULL, 0);
1925 GTK[GN], IGTK, [FTIE], [TIE * 2])
2379 if (wpa_gmk_to_gtk(group->GMK, "IGTK key expansion",
2381 group->IGTK[group->GN_igtk - 4],
2384 wpa_hexdump_key(MSG_DEBUG, "IGTK",
2385 group->IGTK[group->GN_igtk - 4], WPA_IGTK_LEN);
2436 /* Do not rekey GTK/IGTK when STA is in WNM-Sleep Mode */
2503 * IGTK subelement:
2514 os_memcpy(pos, gsm->IGTK[gsm->GN_igtk - 4], WPA_IGTK_LEN);
2517 wpa_printf(MSG_DEBUG, "WNM: IGTK Key ID %u in WNM-Sleep Mode exit",
2519 wpa_hexdump_key(MSG_DEBUG, "WNM: IGTK in WNM-Sleep Mode exit",
2520 gsm->IGTK[gsm->GN_igtk - 4], WPA_IGTK_LEN);
2578 group->IGTK[group->GN_igtk - 4],