Home
last modified time | relevance | path

Searched refs:bigtk (Results 1 – 9 of 9) sorted by relevance

/freebsd/contrib/wpa/src/rsn_supp/
H A Dwpa.c1700 const struct wpa_bigtk_kde *bigtk, in wpa_supplicant_install_bigtk() argument
1704 u16 keyidx = WPA_GET_LE16(bigtk->keyid); in wpa_supplicant_install_bigtk()
1707 if ((sm->bigtk.bigtk_len == len && in wpa_supplicant_install_bigtk()
1708 os_memcmp(sm->bigtk.bigtk, bigtk->bigtk, in wpa_supplicant_install_bigtk()
1709 sm->bigtk.bigtk_len) == 0) || in wpa_supplicant_install_bigtk()
1711 os_memcmp(sm->bigtk_wnm_sleep.bigtk, bigtk->bigtk, in wpa_supplicant_install_bigtk()
1721 keyidx, MAC2STR(bigtk->pn)); in wpa_supplicant_install_bigtk()
1722 wpa_hexdump_key(MSG_DEBUG, "WPA: BIGTK", bigtk->bigtk, len); in wpa_supplicant_install_bigtk()
1730 keyidx, 0, bigtk->pn, sizeof(bigtk->pn), in wpa_supplicant_install_bigtk()
1731 bigtk->bigtk, len, KEY_FLAG_GROUP_RX) < 0) { in wpa_supplicant_install_bigtk()
[all …]
H A Dwpa_ft.c956 u8 bigtk[WPA_BIGTK_MAX_LEN]; in wpa_ft_process_bigtk_subelem() local
994 if (aes_unwrap(kek, kek_len, bigtk_len / 8, bigtk_elem + 9, bigtk)) { in wpa_ft_process_bigtk_subelem()
1004 wpa_hexdump_key(MSG_DEBUG, "FT: BIGTK from Reassoc Resp", bigtk, in wpa_ft_process_bigtk_subelem()
1008 bigtk_elem + 2, 6, bigtk, bigtk_len, in wpa_ft_process_bigtk_subelem()
1012 forced_memzero(bigtk, sizeof(bigtk)); in wpa_ft_process_bigtk_subelem()
1015 forced_memzero(bigtk, sizeof(bigtk)); in wpa_ft_process_bigtk_subelem()
1253 wpa_ft_process_bigtk_subelem(sm, parse.bigtk, parse.bigtk_len) < 0) in wpa_ft_validate_reassoc_resp()
H A Dwpa_i.h42 struct wpa_bigtk bigtk; member
H A Dwpa.h169 struct wpa_bigtk bigtk; member
/freebsd/contrib/wpa/src/common/
H A Dwpa_common.h285 u8 bigtk[WPA_BIGTK_MAX_LEN]; member
360 u8 bigtk[WPA_BIGTK_MAX_LEN]; member
386 u8 bigtk[WPA_BIGTK_MAX_LEN]; member
589 const u8 *bigtk; member
662 const u8 *bigtk; member
H A Dwpa_common.c1092 parse->bigtk = pos; in wpa_ft_parse_ftie()
3506 ie->bigtk = p; in wpa_parse_generic()
/freebsd/contrib/wpa/src/ap/
H A Dwpa_auth.c4033 struct wpa_bigtk_kde bigtk; local
4079 bigtk.keyid[0] = gsm->GN_bigtk;
4080 bigtk.keyid[1] = 0;
4083 os_memset(bigtk.pn, 0, sizeof(bigtk.pn));
4085 os_memcpy(bigtk.pn, rsc, sizeof(bigtk.pn));
4086 os_memcpy(bigtk.bigtk, gsm->BIGTK[gsm->GN_bigtk - 6], len);
4092 if (random_get_bytes(bigtk.bigtk, len) < 0)
4096 (const u8 *) &bigtk, WPA_BIGTK_KDE_PREFIX_LEN + len,
4098 forced_memzero(&bigtk, sizeof(bigtk));
4219 info->bigtk = gsm->BIGTK[gsm->GN_bigtk - 6];
[all …]
H A Dwpa_auth_ft.c2372 const u8 *kek, *bigtk; in wpa_ft_bigtk_subelem() local
2402 bigtk = gsm->BIGTK[gsm->GN_bigtk - 6]; in wpa_ft_bigtk_subelem()
2412 bigtk = stub_bigtk; in wpa_ft_bigtk_subelem()
2414 if (aes_wrap(kek, kek_len, bigtk_len / 8, bigtk, pos)) { in wpa_ft_bigtk_subelem()
2684 u8 *bigtk; in wpa_sm_write_assoc_resp_ies() local
2688 bigtk = wpa_ft_bigtk_subelem(sm, &bigtk_len); in wpa_sm_write_assoc_resp_ies()
2689 if (!bigtk) { in wpa_sm_write_assoc_resp_ies()
2698 os_free(bigtk); in wpa_sm_write_assoc_resp_ies()
2702 os_memcpy(subelem + subelem_len, bigtk, bigtk_len); in wpa_sm_write_assoc_resp_ies()
2704 os_free(bigtk); in wpa_sm_write_assoc_resp_ies()
H A Dwpa_auth.h329 const u8 *bigtk; member