| /hostap-latest/wlantest/ |
| D | test_vectors.c | 349 u8 igtk[] = { in test_vector_bip() local 366 wpa_hexdump(MSG_INFO, "IGTK", igtk, sizeof(igtk)); in test_vector_bip() 370 prot = bip_protect(igtk, sizeof(igtk), frame, sizeof(frame), in test_vector_bip() 384 const u8 igtk[] = { in test_vector_bip_s1g_beacon() local 406 wpa_hexdump(MSG_INFO, "IGTK", igtk, sizeof(igtk)); in test_vector_bip_s1g_beacon() 410 prot = bip_protect_s1g_beacon(igtk, sizeof(igtk), frame, sizeof(frame), in test_vector_bip_s1g_beacon() 425 const u8 igtk[] = { in test_vector_bip_s1g_beacon_ext() local 445 wpa_hexdump(MSG_INFO, "IGTK", igtk, sizeof(igtk)); in test_vector_bip_s1g_beacon_ext() 449 prot = bip_protect_s1g_beacon(igtk, sizeof(igtk), frame, sizeof(frame), in test_vector_bip_s1g_beacon_ext() 464 const u8 igtk[] = { in test_vector_bip_s1g_beacon_bce() local [all …]
|
| D | bip.c | 17 u8 * bip_protect(const u8 *igtk, size_t igtk_len, u8 *frame, size_t len, in bip_protect() argument 55 if (omac1_aes_128(igtk, buf, plen + 20 - 24, mic) < 0) { in bip_protect() 73 u8 * bip_protect_s1g_beacon(const u8 *igtk, size_t igtk_len, const u8 *frame, in bip_protect_s1g_beacon() argument 173 if (omac1_aes_128(igtk, buf, buf_len, mic) < 0) { in bip_protect_s1g_beacon() 188 u8 * bip_gmac_protect(const u8 *igtk, size_t igtk_len, u8 *frame, size_t len, in bip_gmac_protect() argument 239 if (aes_gmac(igtk, igtk_len, nonce, sizeof(nonce), in bip_gmac_protect() 254 u8 * bip_gmac_protect_s1g_beacon(const u8 *igtk, size_t igtk_len, in bip_gmac_protect_s1g_beacon() argument 363 if (aes_gmac(igtk, igtk_len, nonce, sizeof(nonce), buf, buf_len, pos) < in bip_gmac_protect_s1g_beacon()
|
| D | rx_eapol.c | 679 os_memcpy(bss->igtk[key_id], key, key_len); in learn_kde_keys_mlo() 710 os_memcpy(bss->igtk[key_id], key, key_len); in learn_kde_keys_mlo() 786 if (ie.igtk) { in learn_kde_keys() 788 ie.igtk, ie.igtk_len); in learn_kde_keys() 791 id = WPA_GET_LE16(ie.igtk); in learn_kde_keys() 798 wpa_hexdump(MSG_DEBUG, "IPN", ie.igtk + 2, 6); in learn_kde_keys() 799 wpa_hexdump(MSG_DEBUG, "IGTK", ie.igtk + 8, in learn_kde_keys() 801 os_memcpy(bss->igtk[id], ie.igtk + 8, 16); in learn_kde_keys() 803 ipn = ie.igtk + 2; in learn_kde_keys() 814 id = WPA_GET_LE16(ie.igtk); in learn_kde_keys() [all …]
|
| D | wlantest.h | 178 u8 igtk[8][32]; member 358 u8 * bip_protect(const u8 *igtk, size_t igtk_len, u8 *frame, size_t len, 360 u8 * bip_protect_s1g_beacon(const u8 *igtk, size_t igtk_len, const u8 *frame, 363 u8 * bip_gmac_protect(const u8 *igtk, size_t igtk_len, u8 *frame, size_t len, 365 u8 * bip_gmac_protect_s1g_beacon(const u8 *igtk, size_t igtk_len,
|
| D | rx_mgmt.c | 23 const u8 *igtk, size_t igtk_len, 621 if (check_mmie_mic(bss->mgmt_group_cipher, bss->igtk[keyid], in rx_mgmt_beacon() 1880 u8 igtk[WPA_IGTK_MAX_LEN]; in process_igtk_subelem() local 1916 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + hlen, igtk)) { in process_igtk_subelem() 1926 wpa_hexdump(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk, igtk_len); in process_igtk_subelem() 1935 wpa_hexdump(MSG_DEBUG, "IGTK", igtk, igtk_len); in process_igtk_subelem() 1936 os_memcpy(bss->igtk[keyidx], igtk, igtk_len); in process_igtk_subelem() 2008 os_memcpy(bss->igtk[keyidx], bigtk, bigtk_len); in process_bigtk_subelem() 2030 parse->igtk, parse->igtk_len, false); in process_fte_group_keys() 3062 const u8 *igtk, size_t igtk_len, in check_mmie_mic() argument [all …]
|
| D | inject.c | 96 prot = bip_protect(incorrect_key ? stub : bss->igtk[bss->igtk_idx], in wlantest_inject_bip()
|
| /hostap-latest/src/rsn_supp/ |
| D | wpa.c | 1667 const struct wpa_igtk_kde *igtk, in wpa_supplicant_install_igtk() argument 1671 u16 keyidx = WPA_GET_LE16(igtk->keyid); in wpa_supplicant_install_igtk() 1674 if ((sm->igtk.igtk_len == len && in wpa_supplicant_install_igtk() 1675 os_memcmp(sm->igtk.igtk, igtk->igtk, sm->igtk.igtk_len) == 0) || in wpa_supplicant_install_igtk() 1677 os_memcmp(sm->igtk_wnm_sleep.igtk, igtk->igtk, in wpa_supplicant_install_igtk() 1687 keyidx, MAC2STR(igtk->pn)); in wpa_supplicant_install_igtk() 1688 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK", igtk->igtk, len); in wpa_supplicant_install_igtk() 1696 keyidx, 0, igtk->pn, sizeof(igtk->pn), in wpa_supplicant_install_igtk() 1697 igtk->igtk, len, KEY_FLAG_GROUP_RX) < 0) { in wpa_supplicant_install_igtk() 1723 os_memcpy(sm->igtk_wnm_sleep.igtk, igtk->igtk, in wpa_supplicant_install_igtk() [all …]
|
| D | wpa_ft.c | 889 u8 igtk[WPA_IGTK_MAX_LEN]; in wpa_ft_process_igtk_subelem() local 929 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem() 939 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk, in wpa_ft_process_igtk_subelem() 943 igtk_elem + 2, 6, igtk, igtk_len, in wpa_ft_process_igtk_subelem() 947 forced_memzero(igtk, sizeof(igtk)); in wpa_ft_process_igtk_subelem() 950 forced_memzero(igtk, sizeof(igtk)); in wpa_ft_process_igtk_subelem() 1255 wpa_ft_process_igtk_subelem(sm, parse.igtk, parse.igtk_len) < 0 || in wpa_ft_validate_reassoc_resp()
|
| D | wpa_i.h | 40 struct wpa_igtk igtk; member
|
| D | wpa.h | 177 struct wpa_igtk igtk; member
|
| /hostap-latest/wpa_supplicant/ |
| D | mesh_rsn.c | 208 if (random_get_bytes(rsn->igtk, rsn->igtk_len) < 0) in __mesh_rsn_auth_init() 214 rsn->igtk, rsn->igtk_len); in __mesh_rsn_auth_init() 219 seq, sizeof(seq), rsn->igtk, rsn->igtk_len, in __mesh_rsn_auth_init() 239 os_memset(rsn->igtk, 0, sizeof(rsn->igtk)); in mesh_rsn_deinit() 619 os_memcpy(pos, rsn->igtk, rsn->igtk_len); in mesh_rsn_protect_frame() 805 os_memcpy(sta->igtk, pos, key_len); in mesh_rsn_process_ampe() 808 sta->igtk, sta->igtk_len); in mesh_rsn_process_ampe()
|
| D | mesh_rsn.h | 22 u8 igtk[WPA_TK_MAX_LEN]; member
|
| D | mesh_mpm.c | 941 sta->igtk, sta->igtk_len); in mesh_mpm_plink_estab() 947 sta->igtk, sta->igtk_len, in mesh_mpm_plink_estab()
|
| /hostap-latest/src/common/ |
| D | wpa_common.h | 281 u8 igtk[WPA_IGTK_MAX_LEN]; member 354 u8 igtk[WPA_IGTK_MAX_LEN]; member 377 u8 igtk[WPA_IGTK_MAX_LEN]; member 588 const u8 *igtk; member 669 const u8 *igtk; member
|
| D | wpa_common.c | 1079 parse->igtk = pos; in wpa_ft_parse_ftie() 3506 ie->igtk = p; in wpa_parse_generic()
|
| /hostap-latest/src/ap/ |
| D | wpa_auth.c | 4062 struct wpa_igtk_kde igtk; local 4078 igtk.keyid[0] = gsm->GN_igtk; 4079 igtk.keyid[1] = 0; 4082 os_memset(igtk.pn, 0, sizeof(igtk.pn)); 4084 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn)); 4085 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], len); 4091 if (random_get_bytes(igtk.igtk, len) < 0) 4095 (const u8 *) &igtk, WPA_IGTK_KDE_PREFIX_LEN + len, 4097 forced_memzero(&igtk, sizeof(igtk)); 4232 info->igtk = gsm->IGTK[gsm->GN_igtk - 4]; [all …]
|
| D | sta_info.h | 132 u8 igtk[WPA_TK_MAX_LEN]; member
|
| D | wpa_auth_ft.c | 2311 const u8 *kek, *igtk; in wpa_ft_igtk_subelem() local 2341 igtk = gsm->IGTK[gsm->GN_igtk - 4]; in wpa_ft_igtk_subelem() 2351 igtk = stub_igtk; in wpa_ft_igtk_subelem() 2353 if (aes_wrap(kek, kek_len, igtk_len / 8, igtk, pos)) { in wpa_ft_igtk_subelem() 2662 u8 *igtk; in wpa_sm_write_assoc_resp_ies() local 2665 igtk = wpa_ft_igtk_subelem(sm, &igtk_len); in wpa_sm_write_assoc_resp_ies() 2666 if (igtk == NULL) { in wpa_sm_write_assoc_resp_ies() 2675 os_free(igtk); in wpa_sm_write_assoc_resp_ies() 2679 os_memcpy(subelem + subelem_len, igtk, igtk_len); in wpa_sm_write_assoc_resp_ies() 2681 os_free(igtk); in wpa_sm_write_assoc_resp_ies()
|
| D | wpa_auth.h | 348 const u8 *igtk; member
|