/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.h | 19 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth.c | 1170 const u8 *gnonce, u8 *gtk, size_t gtk_len) 1192 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len); 1194 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len) 1909 size_t gtk_len, kde_len; local 1945 gtk_len = gsm->GTK_len; 1951 if (random_get_bytes(dummy_gtk, gtk_len) < 0) 1962 gtk_len = 0; 1983 kde_len += 2 + RSN_SELECTOR_LEN + 2 + gtk_len; 2014 gtk, gtk_len); 1169 wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr, const u8 *gnonce, u8 *gtk, size_t gtk_len) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ie.h | 19 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth.c | 1170 const u8 *gnonce, u8 *gtk, size_t gtk_len) 1192 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len); 1194 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len) 1909 size_t gtk_len, kde_len; local 1945 gtk_len = gsm->GTK_len; 1951 if (random_get_bytes(dummy_gtk, gtk_len) < 0) 1962 gtk_len = 0; 1983 kde_len += 2 + RSN_SELECTOR_LEN + 2 + gtk_len; 2014 gtk, gtk_len); 1169 wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr, const u8 *gnonce, u8 *gtk, size_t gtk_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ie.h | 19 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth.c | 1170 const u8 *gnonce, u8 *gtk, size_t gtk_len) 1192 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len); 1194 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len) 1909 size_t gtk_len, kde_len; local 1945 gtk_len = gsm->GTK_len; 1951 if (random_get_bytes(dummy_gtk, gtk_len) < 0) 1962 gtk_len = 0; 1983 kde_len += 2 + RSN_SELECTOR_LEN + 2 + gtk_len; 2014 gtk, gtk_len); 1169 wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr, const u8 *gnonce, u8 *gtk, size_t gtk_len) argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ft.c | 550 size_t gtk_len, keylen, rsc_len; local 566 gtk_len = gtk_elem_len - 19; 567 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 11, gtk)) { 582 if (gtk_len < keylen) { 786 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0)
|
H A D | wpa_ie.h | 21 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa.c | 596 int gtk_len; member in struct:wpa_gtk_data 607 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); 610 gd->keyidx, gd->tx, gd->gtk_len); 622 _gtk, gd->gtk_len) < 0) { 630 _gtk, gd->gtk_len) < 0) { 634 gd->alg, gd->gtk_len, gd->keyidx); 662 const u8 *gtk, size_t gtk_len, 677 gtk, gtk_len); 679 if (gtk_len < 2 || gtk_len 660 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) argument [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ft.c | 550 size_t gtk_len, keylen, rsc_len; local 566 gtk_len = gtk_elem_len - 19; 567 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 11, gtk)) { 582 if (gtk_len < keylen) { 786 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0)
|
H A D | wpa_ie.h | 21 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa.c | 596 int gtk_len; member in struct:wpa_gtk_data 607 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); 610 gd->keyidx, gd->tx, gd->gtk_len); 622 _gtk, gd->gtk_len) < 0) { 630 _gtk, gd->gtk_len) < 0) { 634 gd->alg, gd->gtk_len, gd->keyidx); 662 const u8 *gtk, size_t gtk_len, 677 gtk, gtk_len); 679 if (gtk_len < 2 || gtk_len 660 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ft.c | 550 size_t gtk_len, keylen, rsc_len; local 566 gtk_len = gtk_elem_len - 19; 567 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 11, gtk)) { 582 if (gtk_len < keylen) { 786 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0)
|
H A D | wpa_ie.h | 21 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa.c | 596 int gtk_len; member in struct:wpa_gtk_data 607 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); 610 gd->keyidx, gd->tx, gd->gtk_len); 622 _gtk, gd->gtk_len) < 0) { 630 _gtk, gd->gtk_len) < 0) { 634 gd->alg, gd->gtk_len, gd->keyidx); 662 const u8 *gtk, size_t gtk_len, 677 gtk, gtk_len); 679 if (gtk_len < 2 || gtk_len 660 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wnm_sta.c | 176 u8 gtk_len; local 204 gtk_len = *(ptr + 4); 205 if (ptr[1] < 11 + gtk_len || 206 gtk_len < 5 || gtk_len > 32) { 215 ptr += 13 + gtk_len;
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.h | 376 size_t gtk_len; member in struct:wpa_ft_ies
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.h | 376 size_t gtk_len; member in struct:wpa_ft_ies
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.h | 376 size_t gtk_len; member in struct:wpa_ft_ies
|