Home
last modified time | relevance | path

Searched refs:igtk (Results 1 – 19 of 19) sorted by relevance

/hostap-latest/wlantest/
Dtest_vectors.c349 u8 igtk[] = { in test_vector_bip() local
366 wpa_hexdump(MSG_INFO, "IGTK", igtk, sizeof(igtk)); in test_vector_bip()
370 prot = bip_protect(igtk, sizeof(igtk), frame, sizeof(frame), in test_vector_bip()
384 const u8 igtk[] = { in test_vector_bip_s1g_beacon() local
406 wpa_hexdump(MSG_INFO, "IGTK", igtk, sizeof(igtk)); in test_vector_bip_s1g_beacon()
410 prot = bip_protect_s1g_beacon(igtk, sizeof(igtk), frame, sizeof(frame), in test_vector_bip_s1g_beacon()
425 const u8 igtk[] = { in test_vector_bip_s1g_beacon_ext() local
445 wpa_hexdump(MSG_INFO, "IGTK", igtk, sizeof(igtk)); in test_vector_bip_s1g_beacon_ext()
449 prot = bip_protect_s1g_beacon(igtk, sizeof(igtk), frame, sizeof(frame), in test_vector_bip_s1g_beacon_ext()
464 const u8 igtk[] = { in test_vector_bip_s1g_beacon_bce() local
[all …]
Dbip.c17 u8 * bip_protect(const u8 *igtk, size_t igtk_len, u8 *frame, size_t len, in bip_protect() argument
55 if (omac1_aes_128(igtk, buf, plen + 20 - 24, mic) < 0) { in bip_protect()
73 u8 * bip_protect_s1g_beacon(const u8 *igtk, size_t igtk_len, const u8 *frame, in bip_protect_s1g_beacon() argument
173 if (omac1_aes_128(igtk, buf, buf_len, mic) < 0) { in bip_protect_s1g_beacon()
188 u8 * bip_gmac_protect(const u8 *igtk, size_t igtk_len, u8 *frame, size_t len, in bip_gmac_protect() argument
239 if (aes_gmac(igtk, igtk_len, nonce, sizeof(nonce), in bip_gmac_protect()
254 u8 * bip_gmac_protect_s1g_beacon(const u8 *igtk, size_t igtk_len, in bip_gmac_protect_s1g_beacon() argument
363 if (aes_gmac(igtk, igtk_len, nonce, sizeof(nonce), buf, buf_len, pos) < in bip_gmac_protect_s1g_beacon()
Drx_eapol.c679 os_memcpy(bss->igtk[key_id], key, key_len); in learn_kde_keys_mlo()
710 os_memcpy(bss->igtk[key_id], key, key_len); in learn_kde_keys_mlo()
786 if (ie.igtk) { in learn_kde_keys()
788 ie.igtk, ie.igtk_len); in learn_kde_keys()
791 id = WPA_GET_LE16(ie.igtk); in learn_kde_keys()
798 wpa_hexdump(MSG_DEBUG, "IPN", ie.igtk + 2, 6); in learn_kde_keys()
799 wpa_hexdump(MSG_DEBUG, "IGTK", ie.igtk + 8, in learn_kde_keys()
801 os_memcpy(bss->igtk[id], ie.igtk + 8, 16); in learn_kde_keys()
803 ipn = ie.igtk + 2; in learn_kde_keys()
814 id = WPA_GET_LE16(ie.igtk); in learn_kde_keys()
[all …]
Dwlantest.h178 u8 igtk[8][32]; member
358 u8 * bip_protect(const u8 *igtk, size_t igtk_len, u8 *frame, size_t len,
360 u8 * bip_protect_s1g_beacon(const u8 *igtk, size_t igtk_len, const u8 *frame,
363 u8 * bip_gmac_protect(const u8 *igtk, size_t igtk_len, u8 *frame, size_t len,
365 u8 * bip_gmac_protect_s1g_beacon(const u8 *igtk, size_t igtk_len,
Drx_mgmt.c23 const u8 *igtk, size_t igtk_len,
621 if (check_mmie_mic(bss->mgmt_group_cipher, bss->igtk[keyid], in rx_mgmt_beacon()
1880 u8 igtk[WPA_IGTK_MAX_LEN]; in process_igtk_subelem() local
1916 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + hlen, igtk)) { in process_igtk_subelem()
1926 wpa_hexdump(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk, igtk_len); in process_igtk_subelem()
1935 wpa_hexdump(MSG_DEBUG, "IGTK", igtk, igtk_len); in process_igtk_subelem()
1936 os_memcpy(bss->igtk[keyidx], igtk, igtk_len); in process_igtk_subelem()
2008 os_memcpy(bss->igtk[keyidx], bigtk, bigtk_len); in process_bigtk_subelem()
2030 parse->igtk, parse->igtk_len, false); in process_fte_group_keys()
3062 const u8 *igtk, size_t igtk_len, in check_mmie_mic() argument
[all …]
Dinject.c96 prot = bip_protect(incorrect_key ? stub : bss->igtk[bss->igtk_idx], in wlantest_inject_bip()
/hostap-latest/src/rsn_supp/
Dwpa.c1667 const struct wpa_igtk_kde *igtk, in wpa_supplicant_install_igtk() argument
1671 u16 keyidx = WPA_GET_LE16(igtk->keyid); in wpa_supplicant_install_igtk()
1674 if ((sm->igtk.igtk_len == len && in wpa_supplicant_install_igtk()
1675 os_memcmp(sm->igtk.igtk, igtk->igtk, sm->igtk.igtk_len) == 0) || in wpa_supplicant_install_igtk()
1677 os_memcmp(sm->igtk_wnm_sleep.igtk, igtk->igtk, in wpa_supplicant_install_igtk()
1687 keyidx, MAC2STR(igtk->pn)); in wpa_supplicant_install_igtk()
1688 wpa_hexdump_key(MSG_DEBUG, "WPA: IGTK", igtk->igtk, len); in wpa_supplicant_install_igtk()
1696 keyidx, 0, igtk->pn, sizeof(igtk->pn), in wpa_supplicant_install_igtk()
1697 igtk->igtk, len, KEY_FLAG_GROUP_RX) < 0) { in wpa_supplicant_install_igtk()
1723 os_memcpy(sm->igtk_wnm_sleep.igtk, igtk->igtk, in wpa_supplicant_install_igtk()
[all …]
Dwpa_ft.c889 u8 igtk[WPA_IGTK_MAX_LEN]; in wpa_ft_process_igtk_subelem() local
929 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem()
939 wpa_hexdump_key(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk, in wpa_ft_process_igtk_subelem()
943 igtk_elem + 2, 6, igtk, igtk_len, in wpa_ft_process_igtk_subelem()
947 forced_memzero(igtk, sizeof(igtk)); in wpa_ft_process_igtk_subelem()
950 forced_memzero(igtk, sizeof(igtk)); in wpa_ft_process_igtk_subelem()
1255 wpa_ft_process_igtk_subelem(sm, parse.igtk, parse.igtk_len) < 0 || in wpa_ft_validate_reassoc_resp()
Dwpa_i.h40 struct wpa_igtk igtk; member
Dwpa.h177 struct wpa_igtk igtk; member
/hostap-latest/wpa_supplicant/
Dmesh_rsn.c208 if (random_get_bytes(rsn->igtk, rsn->igtk_len) < 0) in __mesh_rsn_auth_init()
214 rsn->igtk, rsn->igtk_len); in __mesh_rsn_auth_init()
219 seq, sizeof(seq), rsn->igtk, rsn->igtk_len, in __mesh_rsn_auth_init()
239 os_memset(rsn->igtk, 0, sizeof(rsn->igtk)); in mesh_rsn_deinit()
619 os_memcpy(pos, rsn->igtk, rsn->igtk_len); in mesh_rsn_protect_frame()
805 os_memcpy(sta->igtk, pos, key_len); in mesh_rsn_process_ampe()
808 sta->igtk, sta->igtk_len); in mesh_rsn_process_ampe()
Dmesh_rsn.h22 u8 igtk[WPA_TK_MAX_LEN]; member
Dmesh_mpm.c941 sta->igtk, sta->igtk_len); in mesh_mpm_plink_estab()
947 sta->igtk, sta->igtk_len, in mesh_mpm_plink_estab()
/hostap-latest/src/common/
Dwpa_common.h281 u8 igtk[WPA_IGTK_MAX_LEN]; member
354 u8 igtk[WPA_IGTK_MAX_LEN]; member
377 u8 igtk[WPA_IGTK_MAX_LEN]; member
588 const u8 *igtk; member
669 const u8 *igtk; member
Dwpa_common.c1079 parse->igtk = pos; in wpa_ft_parse_ftie()
3506 ie->igtk = p; in wpa_parse_generic()
/hostap-latest/src/ap/
Dwpa_auth.c4062 struct wpa_igtk_kde igtk; local
4078 igtk.keyid[0] = gsm->GN_igtk;
4079 igtk.keyid[1] = 0;
4082 os_memset(igtk.pn, 0, sizeof(igtk.pn));
4084 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn));
4085 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], len);
4091 if (random_get_bytes(igtk.igtk, len) < 0)
4095 (const u8 *) &igtk, WPA_IGTK_KDE_PREFIX_LEN + len,
4097 forced_memzero(&igtk, sizeof(igtk));
4232 info->igtk = gsm->IGTK[gsm->GN_igtk - 4];
[all …]
Dsta_info.h132 u8 igtk[WPA_TK_MAX_LEN]; member
Dwpa_auth_ft.c2311 const u8 *kek, *igtk; in wpa_ft_igtk_subelem() local
2341 igtk = gsm->IGTK[gsm->GN_igtk - 4]; in wpa_ft_igtk_subelem()
2351 igtk = stub_igtk; in wpa_ft_igtk_subelem()
2353 if (aes_wrap(kek, kek_len, igtk_len / 8, igtk, pos)) { in wpa_ft_igtk_subelem()
2662 u8 *igtk; in wpa_sm_write_assoc_resp_ies() local
2665 igtk = wpa_ft_igtk_subelem(sm, &igtk_len); in wpa_sm_write_assoc_resp_ies()
2666 if (igtk == NULL) { in wpa_sm_write_assoc_resp_ies()
2675 os_free(igtk); in wpa_sm_write_assoc_resp_ies()
2679 os_memcpy(subelem + subelem_len, igtk, igtk_len); in wpa_sm_write_assoc_resp_ies()
2681 os_free(igtk); in wpa_sm_write_assoc_resp_ies()
Dwpa_auth.h348 const u8 *igtk; member