| /src/sys/contrib/dev/iwlwifi/mld/ |
| H A D | d3.c | 112 struct iwl_mld_mcast_key_data bigtk[WOWLAN_BIGTK_KEYS_NUM]; member 410 const struct iwl_wowlan_igtk_status *bigtk) in iwl_mld_convert_bigtk_resume_data() argument 414 BUILD_BUG_ON(ARRAY_SIZE(wowlan_status->bigtk) < WOWLAN_BIGTK_KEYS_NUM); in iwl_mld_convert_bigtk_resume_data() 418 if (!bigtk[notif_idx].key_status) in iwl_mld_convert_bigtk_resume_data() 421 wowlan_status->bigtk[status_idx].len = bigtk[notif_idx].key_len; in iwl_mld_convert_bigtk_resume_data() 422 wowlan_status->bigtk[status_idx].flags = in iwl_mld_convert_bigtk_resume_data() 423 bigtk[notif_idx].key_flags; in iwl_mld_convert_bigtk_resume_data() 424 wowlan_status->bigtk[status_idx].id = in iwl_mld_convert_bigtk_resume_data() 425 u32_get_bits(bigtk[notif_idx].key_flags, in iwl_mld_convert_bigtk_resume_data() 429 BUILD_BUG_ON(sizeof(wowlan_status->bigtk[status_idx].key) < in iwl_mld_convert_bigtk_resume_data() [all …]
|
| /src/contrib/wpa/src/rsn_supp/ |
| H A D | wpa.c | 1700 const struct wpa_bigtk_kde *bigtk, in wpa_supplicant_install_bigtk() argument 1704 u16 keyidx = WPA_GET_LE16(bigtk->keyid); in wpa_supplicant_install_bigtk() 1707 if ((sm->bigtk.bigtk_len == len && in wpa_supplicant_install_bigtk() 1708 os_memcmp(sm->bigtk.bigtk, bigtk->bigtk, in wpa_supplicant_install_bigtk() 1709 sm->bigtk.bigtk_len) == 0) || in wpa_supplicant_install_bigtk() 1711 os_memcmp(sm->bigtk_wnm_sleep.bigtk, bigtk->bigtk, in wpa_supplicant_install_bigtk() 1721 keyidx, MAC2STR(bigtk->pn)); in wpa_supplicant_install_bigtk() 1722 wpa_hexdump_key(MSG_DEBUG, "WPA: BIGTK", bigtk->bigtk, len); in wpa_supplicant_install_bigtk() 1730 keyidx, 0, bigtk->pn, sizeof(bigtk->pn), in wpa_supplicant_install_bigtk() 1731 bigtk->bigtk, len, KEY_FLAG_GROUP_RX) < 0) { in wpa_supplicant_install_bigtk() [all …]
|
| H A D | wpa_ft.c | 956 u8 bigtk[WPA_BIGTK_MAX_LEN]; in wpa_ft_process_bigtk_subelem() local 994 if (aes_unwrap(kek, kek_len, bigtk_len / 8, bigtk_elem + 9, bigtk)) { in wpa_ft_process_bigtk_subelem() 1004 wpa_hexdump_key(MSG_DEBUG, "FT: BIGTK from Reassoc Resp", bigtk, in wpa_ft_process_bigtk_subelem() 1008 bigtk_elem + 2, 6, bigtk, bigtk_len, in wpa_ft_process_bigtk_subelem() 1012 forced_memzero(bigtk, sizeof(bigtk)); in wpa_ft_process_bigtk_subelem() 1015 forced_memzero(bigtk, sizeof(bigtk)); in wpa_ft_process_bigtk_subelem() 1253 wpa_ft_process_bigtk_subelem(sm, parse.bigtk, parse.bigtk_len) < 0) in wpa_ft_validate_reassoc_resp()
|
| H A D | wpa_i.h | 42 struct wpa_bigtk bigtk; member
|
| H A D | wpa.h | 169 struct wpa_bigtk bigtk; member
|
| /src/contrib/wpa/src/common/ |
| H A D | wpa_common.h | 285 u8 bigtk[WPA_BIGTK_MAX_LEN]; member 360 u8 bigtk[WPA_BIGTK_MAX_LEN]; member 386 u8 bigtk[WPA_BIGTK_MAX_LEN]; member 589 const u8 *bigtk; member 662 const u8 *bigtk; member
|
| H A D | wpa_common.c | 1092 parse->bigtk = pos; in wpa_ft_parse_ftie() 3506 ie->bigtk = p; in wpa_parse_generic()
|
| /src/sys/contrib/dev/iwlwifi/mvm/ |
| H A D | d3.c | 1453 struct iwl_multicast_key_data bigtk[WOWLAN_BIGTK_KEYS_NUM]; member 1869 u8 idx = key->keyidx == status->bigtk[1].id; in iwl_mvm_d3_update_keys() 1872 &status->bigtk[idx]); in iwl_mvm_d3_update_keys() 2012 for (i = 0; i < ARRAY_SIZE(status->bigtk); i++) { in iwl_mvm_setup_connection_keep() 2014 &status->bigtk[i])) in iwl_mvm_setup_connection_keep() 2117 BUILD_BUG_ON(ARRAY_SIZE(status->bigtk) < WOWLAN_BIGTK_KEYS_NUM); in iwl_mvm_convert_bigtk() 2123 status->bigtk[status_idx].len = data[data_idx].key_len; in iwl_mvm_convert_bigtk() 2124 status->bigtk[status_idx].flags = data[data_idx].key_flags; in iwl_mvm_convert_bigtk() 2125 status->bigtk[status_idx].id = in iwl_mvm_convert_bigtk() 2130 BUILD_BUG_ON(sizeof(status->bigtk[status_idx].key) < in iwl_mvm_convert_bigtk() [all …]
|
| /src/sys/contrib/dev/iwlwifi/fw/api/ |
| H A D | d3.h | 881 struct iwl_wowlan_igtk_status_v1 bigtk[WOWLAN_BIGTK_KEYS_NUM]; member 919 struct iwl_wowlan_igtk_status_v1 bigtk[WOWLAN_BIGTK_KEYS_NUM]; member 958 struct iwl_wowlan_igtk_status bigtk[WOWLAN_BIGTK_KEYS_NUM]; member
|
| /src/contrib/wpa/src/ap/ |
| H A D | wpa_auth.c | 4033 struct wpa_bigtk_kde bigtk; local 4079 bigtk.keyid[0] = gsm->GN_bigtk; 4080 bigtk.keyid[1] = 0; 4083 os_memset(bigtk.pn, 0, sizeof(bigtk.pn)); 4085 os_memcpy(bigtk.pn, rsc, sizeof(bigtk.pn)); 4086 os_memcpy(bigtk.bigtk, gsm->BIGTK[gsm->GN_bigtk - 6], len); 4092 if (random_get_bytes(bigtk.bigtk, len) < 0) 4096 (const u8 *) &bigtk, WPA_BIGTK_KDE_PREFIX_LEN + len, 4098 forced_memzero(&bigtk, sizeof(bigtk)); 4219 info->bigtk = gsm->BIGTK[gsm->GN_bigtk - 6]; [all …]
|
| H A D | wpa_auth_ft.c | 2372 const u8 *kek, *bigtk; in wpa_ft_bigtk_subelem() local 2402 bigtk = gsm->BIGTK[gsm->GN_bigtk - 6]; in wpa_ft_bigtk_subelem() 2412 bigtk = stub_bigtk; in wpa_ft_bigtk_subelem() 2414 if (aes_wrap(kek, kek_len, bigtk_len / 8, bigtk, pos)) { in wpa_ft_bigtk_subelem() 2684 u8 *bigtk; in wpa_sm_write_assoc_resp_ies() local 2688 bigtk = wpa_ft_bigtk_subelem(sm, &bigtk_len); in wpa_sm_write_assoc_resp_ies() 2689 if (!bigtk) { in wpa_sm_write_assoc_resp_ies() 2698 os_free(bigtk); in wpa_sm_write_assoc_resp_ies() 2702 os_memcpy(subelem + subelem_len, bigtk, bigtk_len); in wpa_sm_write_assoc_resp_ies() 2704 os_free(bigtk); in wpa_sm_write_assoc_resp_ies()
|
| H A D | wpa_auth.h | 329 const u8 *bigtk; member
|