/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ie.h | 33 const u8 *igtk; member in struct:wpa_eapol_ie_parse
|
wpa_auth_ft.c | 477 gsm->IGTK[gsm->GN_igtk - 4], pos)) { 672 u8 *igtk; local 675 igtk = wpa_ft_igtk_subelem(sm, &igtk_len); 676 if (igtk == NULL) { 683 os_free(igtk); 687 os_memcpy(subelem + subelem_len, igtk, igtk_len); 689 os_free(igtk); [all...] |
wpa_auth.c | 1864 struct wpa_igtk_kde igtk; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 621 u8 igtk[WPA_IGTK_LEN]; local 628 wpa_printf(MSG_DEBUG, "FT: No IGTK included in FTIE"); 632 wpa_hexdump_key(MSG_DEBUG, "FT: Received IGTK in Reassoc Resp", 636 wpa_printf(MSG_DEBUG, "FT: Invalid IGTK sub-elem " 641 wpa_printf(MSG_DEBUG, "FT: Invalid IGTK sub-elem Key Length " 646 if (aes_unwrap(sm->ptk.kek, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk)) { 648 "decrypt IGTK"); 656 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk, 659 igtk_elem + 2, 6, igtk, WPA_IGTK_LEN) < 0) [all...] |
wpa_ie.h | 35 const u8 *igtk; member in struct:wpa_eapol_ie_parse
|
wpa.c | 713 if (ie->igtk) { 714 const struct wpa_igtk_kde *igtk; local 716 if (ie->igtk_len != sizeof(*igtk)) 718 igtk = (const struct wpa_igtk_kde *) ie->igtk; 719 keyidx = WPA_GET_LE16(igtk->keyid); 720 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: IGTK keyid %d " 722 keyidx, MAC2STR(igtk->pn)); 723 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK", 724 igtk->igtk, WPA_IGTK_LEN) [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 275 u8 igtk[WPA_IGTK_LEN]; member in struct:wpa_igtk_kde 384 const u8 *igtk; member in struct:wpa_ft_ies
|