/freebsd/contrib/wpa/src/rsn_supp/ |
H A D | wpa.c | 1700 const struct wpa_bigtk_kde *bigtk, in wpa_supplicant_install_bigtk() argument 1704 u16 keyidx = WPA_GET_LE16(bigtk->keyid); in wpa_supplicant_install_bigtk() 1707 if ((sm->bigtk.bigtk_len == len && in wpa_supplicant_install_bigtk() 1708 os_memcmp(sm->bigtk.bigtk, bigtk->bigtk, in wpa_supplicant_install_bigtk() 1709 sm->bigtk.bigtk_len) == 0) || in wpa_supplicant_install_bigtk() 1711 os_memcmp(sm->bigtk_wnm_sleep.bigtk, bigtk->bigtk, in wpa_supplicant_install_bigtk() 1721 keyidx, MAC2STR(bigtk->pn)); in wpa_supplicant_install_bigtk() 1722 wpa_hexdump_key(MSG_DEBUG, "WPA: BIGTK", bigtk->bigtk, len); in wpa_supplicant_install_bigtk() 1730 keyidx, 0, bigtk->pn, sizeof(bigtk->pn), in wpa_supplicant_install_bigtk() 1731 bigtk->bigtk, len, KEY_FLAG_GROUP_RX) < 0) { in wpa_supplicant_install_bigtk() [all …]
|
H A D | wpa_ft.c | 956 u8 bigtk[WPA_BIGTK_MAX_LEN]; in wpa_ft_process_bigtk_subelem() local 994 if (aes_unwrap(kek, kek_len, bigtk_len / 8, bigtk_elem + 9, bigtk)) { in wpa_ft_process_bigtk_subelem() 1004 wpa_hexdump_key(MSG_DEBUG, "FT: BIGTK from Reassoc Resp", bigtk, in wpa_ft_process_bigtk_subelem() 1008 bigtk_elem + 2, 6, bigtk, bigtk_len, in wpa_ft_process_bigtk_subelem() 1012 forced_memzero(bigtk, sizeof(bigtk)); in wpa_ft_process_bigtk_subelem() 1015 forced_memzero(bigtk, sizeof(bigtk)); in wpa_ft_process_bigtk_subelem() 1253 wpa_ft_process_bigtk_subelem(sm, parse.bigtk, parse.bigtk_len) < 0) in wpa_ft_validate_reassoc_resp()
|
H A D | wpa_i.h | 42 struct wpa_bigtk bigtk; member
|
H A D | wpa.h | 169 struct wpa_bigtk bigtk; member
|
/freebsd/contrib/wpa/src/common/ |
H A D | wpa_common.h | 285 u8 bigtk[WPA_BIGTK_MAX_LEN]; member 360 u8 bigtk[WPA_BIGTK_MAX_LEN]; member 386 u8 bigtk[WPA_BIGTK_MAX_LEN]; member 589 const u8 *bigtk; member 662 const u8 *bigtk; member
|
H A D | wpa_common.c | 1092 parse->bigtk = pos; in wpa_ft_parse_ftie() 3506 ie->bigtk = p; in wpa_parse_generic()
|
/freebsd/contrib/wpa/src/ap/ |
H A D | wpa_auth.c | 4033 struct wpa_bigtk_kde bigtk; local 4079 bigtk.keyid[0] = gsm->GN_bigtk; 4080 bigtk.keyid[1] = 0; 4083 os_memset(bigtk.pn, 0, sizeof(bigtk.pn)); 4085 os_memcpy(bigtk.pn, rsc, sizeof(bigtk.pn)); 4086 os_memcpy(bigtk.bigtk, gsm->BIGTK[gsm->GN_bigtk - 6], len); 4092 if (random_get_bytes(bigtk.bigtk, len) < 0) 4096 (const u8 *) &bigtk, WPA_BIGTK_KDE_PREFIX_LEN + len, 4098 forced_memzero(&bigtk, sizeof(bigtk)); 4219 info->bigtk = gsm->BIGTK[gsm->GN_bigtk - 6]; [all …]
|
H A D | wpa_auth_ft.c | 2372 const u8 *kek, *bigtk; in wpa_ft_bigtk_subelem() local 2402 bigtk = gsm->BIGTK[gsm->GN_bigtk - 6]; in wpa_ft_bigtk_subelem() 2412 bigtk = stub_bigtk; in wpa_ft_bigtk_subelem() 2414 if (aes_wrap(kek, kek_len, bigtk_len / 8, bigtk, pos)) { in wpa_ft_bigtk_subelem() 2684 u8 *bigtk; in wpa_sm_write_assoc_resp_ies() local 2688 bigtk = wpa_ft_bigtk_subelem(sm, &bigtk_len); in wpa_sm_write_assoc_resp_ies() 2689 if (!bigtk) { in wpa_sm_write_assoc_resp_ies() 2698 os_free(bigtk); in wpa_sm_write_assoc_resp_ies() 2702 os_memcpy(subelem + subelem_len, bigtk, bigtk_len); in wpa_sm_write_assoc_resp_ies() 2704 os_free(bigtk); in wpa_sm_write_assoc_resp_ies()
|
H A D | wpa_auth.h | 329 const u8 *bigtk; member
|