HomeSort by relevance Sort by last modified time
    Searched refs:igtk (Results 1 - 10 of 10) sorted by null

  /external/wpa_supplicant_8/src/ap/
wpa_auth_ie.h 33 const u8 *igtk; member in struct:wpa_eapol_ie_parse
wpa_auth.c 1936 struct wpa_igtk_kde igtk; local
    [all...]
wpa_auth_ft.c 496 gsm->IGTK[gsm->GN_igtk - 4], pos)) {
690 u8 *igtk; local
693 igtk = wpa_ft_igtk_subelem(sm, &igtk_len);
694 if (igtk == NULL) {
701 os_free(igtk);
705 os_memcpy(subelem + subelem_len, igtk, igtk_len);
707 os_free(igtk);
    [all...]
wpa_auth_ie.c 812 ie->igtk = pos + 2 + RSN_SELECTOR_LEN;
  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ie.h 35 const u8 *igtk; member in struct:wpa_eapol_ie_parse
wpa.c 754 if (ie->igtk) {
756 const struct wpa_igtk_kde *igtk; local
761 igtk = (const struct wpa_igtk_kde *) ie->igtk;
762 keyidx = WPA_GET_LE16(igtk->keyid);
763 wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: IGTK keyid %d "
765 keyidx, MAC2STR(igtk->pn));
766 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK",
767 igtk->igtk, len)
    [all...]
wpa_ft.c 623 u8 igtk[WPA_IGTK_LEN]; local
630 wpa_printf(MSG_DEBUG, "FT: No IGTK included in FTIE");
634 wpa_hexdump_key(MSG_DEBUG, "FT: Received IGTK in Reassoc Resp",
638 wpa_printf(MSG_DEBUG, "FT: Invalid IGTK sub-elem "
643 wpa_printf(MSG_DEBUG, "FT: Invalid IGTK sub-elem Key Length "
648 if (aes_unwrap(sm->ptk.kek, 16, WPA_IGTK_LEN / 8, igtk_elem + 9, igtk))
651 "decrypt IGTK");
659 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk,
662 igtk_elem + 2, 6, igtk, WPA_IGTK_LEN) < 0)
    [all...]
wpa_ie.c 442 ie->igtk = pos + 2 + RSN_SELECTOR_LEN;
444 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK in EAPOL-Key",
  /external/wpa_supplicant_8/src/common/
wpa_common.h 291 u8 igtk[WPA_IGTK_MAX_LEN]; member in struct:wpa_igtk_kde
401 const u8 *igtk; member in struct:wpa_ft_ies
wpa_common.c 231 parse->igtk = pos + 2;
    [all...]

Completed in 208 milliseconds