/external/webkit/Tools/Scripts/webkitpy/layout_tests/port/ |
H A D | factory.py | 50 'gtk', 105 elif port_to_use.startswith('gtk'): 106 import gtk namespace 107 maker = gtk.GtkPort
|
H A D | factory_unittest.py | 41 import gtk namespace 124 self.assert_port("gtk", gtk.GtkPort)
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ie.h | 24 const u8 *gtk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_ft.c | 280 const u8 *gtk; member in struct:wpa_ft_ies 316 parse->gtk = pos + 2; 596 u8 gtk[32]; local 610 gtk_elem_len - 18 > sizeof(gtk)) { 616 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 10, gtk)) { 665 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); 667 keyidx, 0, gtk_elem + 2, rsc_len, gtk, keylen) < 829 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0)
|
H A D | wpa.c | 626 u8 gtk[32]; member in struct:wpa_gtk_data 635 const u8 *_gtk = gd->gtk; 638 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); 645 os_memcpy(gtk_buf, gd->gtk, 16); 646 os_memcpy(gtk_buf + 16, gd->gtk + 24, 8); 647 os_memcpy(gtk_buf + 24, gd->gtk + 16, 8); 692 const u8 *gtk, size_t gtk_len, 708 gtk, gtk_len); 710 if (gtk_len < 2 || gtk_len - 2 > sizeof(gd.gtk)) 713 gd.keyidx = gtk[ 690 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.h | 18 const u8 *gtk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth.c | 1158 const u8 *gnonce, u8 *gtk, size_t gtk_len) 1180 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len); 1182 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len) 1885 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 1921 gtk = gsm->GTK[gsm->GN - 1]; 1930 gtk = dummy_gtk; 1938 gtk = NULL; 1959 if (gtk) 1986 if (gtk) { 1991 gtk, gtk_le 1157 wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr, const u8 *gnonce, u8 *gtk, size_t gtk_len) argument 2221 u8 *gtk, dummy_gtk[32]; local [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ie.h | 18 const u8 *gtk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth.c | 1158 const u8 *gnonce, u8 *gtk, size_t gtk_len) 1180 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len); 1182 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len) 1885 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 1921 gtk = gsm->GTK[gsm->GN - 1]; 1930 gtk = dummy_gtk; 1938 gtk = NULL; 1959 if (gtk) 1986 if (gtk) { 1991 gtk, gtk_le 1157 wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr, const u8 *gnonce, u8 *gtk, size_t gtk_len) argument 2221 u8 *gtk, dummy_gtk[32]; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ie.h | 18 const u8 *gtk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth.c | 1158 const u8 *gnonce, u8 *gtk, size_t gtk_len) 1180 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len); 1182 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len) 1885 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 1921 gtk = gsm->GTK[gsm->GN - 1]; 1930 gtk = dummy_gtk; 1938 gtk = NULL; 1959 if (gtk) 1986 if (gtk) { 1991 gtk, gtk_le 1157 wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr, const u8 *gnonce, u8 *gtk, size_t gtk_len) argument 2221 u8 *gtk, dummy_gtk[32]; local [all...] |
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ie.h | 20 const u8 *gtk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_ft.c | 540 u8 gtk[32]; local 554 gtk_elem_len - 19 > sizeof(gtk)) { 560 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 11, gtk)) { 591 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); 593 gtk_elem + 3, rsc_len, gtk, keylen) < 0) { 772 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0)
|
H A D | wpa.c | 597 u8 gtk[32]; member in struct:wpa_gtk_data 606 const u8 *_gtk = gd->gtk; 609 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); 616 os_memcpy(gtk_buf, gd->gtk, 16); 617 os_memcpy(gtk_buf + 16, gd->gtk + 24, 8); 618 os_memcpy(gtk_buf + 24, gd->gtk + 16, 8); 664 const u8 *gtk, size_t gtk_len, 680 gtk, gtk_len); 682 if (gtk_len < 2 || gtk_len - 2 > sizeof(gd.gtk)) 685 gd.keyidx = gtk[ 662 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) argument [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ie.h | 20 const u8 *gtk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_ft.c | 540 u8 gtk[32]; local 554 gtk_elem_len - 19 > sizeof(gtk)) { 560 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 11, gtk)) { 591 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); 593 gtk_elem + 3, rsc_len, gtk, keylen) < 0) { 772 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0)
|
H A D | wpa.c | 597 u8 gtk[32]; member in struct:wpa_gtk_data 606 const u8 *_gtk = gd->gtk; 609 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); 616 os_memcpy(gtk_buf, gd->gtk, 16); 617 os_memcpy(gtk_buf + 16, gd->gtk + 24, 8); 618 os_memcpy(gtk_buf + 24, gd->gtk + 16, 8); 664 const u8 *gtk, size_t gtk_len, 680 gtk, gtk_len); 682 if (gtk_len < 2 || gtk_len - 2 > sizeof(gd.gtk)) 685 gd.keyidx = gtk[ 662 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ie.h | 20 const u8 *gtk; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_ft.c | 540 u8 gtk[32]; local 554 gtk_elem_len - 19 > sizeof(gtk)) { 560 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 11, gtk)) { 591 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); 593 gtk_elem + 3, rsc_len, gtk, keylen) < 0) { 772 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0)
|
H A D | wpa.c | 597 u8 gtk[32]; member in struct:wpa_gtk_data 606 const u8 *_gtk = gd->gtk; 609 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); 616 os_memcpy(gtk_buf, gd->gtk, 16); 617 os_memcpy(gtk_buf + 16, gd->gtk + 24, 8); 618 os_memcpy(gtk_buf + 24, gd->gtk + 16, 8); 664 const u8 *gtk, size_t gtk_len, 680 gtk, gtk_len); 682 if (gtk_len < 2 || gtk_len - 2 > sizeof(gd.gtk)) 685 gd.keyidx = gtk[ 662 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.h | 365 const u8 *gtk; member in struct:wpa_ft_ies
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.h | 365 const u8 *gtk; member in struct:wpa_ft_ies
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.h | 365 const u8 *gtk; member in struct:wpa_ft_ies
|
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
H A D | org.eclipse.swt.gtk.linux.x86_3.6.1.v3657a.jar | ... -gtk-3657.so libswt-glx-gtk-3657.so libswt-gnome-gtk- ... |