/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.h | 19 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth.c | 1234 const u8 *gnonce, u8 *gtk, size_t gtk_len) 1256 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len); 1258 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len) 1986 size_t gtk_len, kde_len; local 2022 gtk_len = gsm->GTK_len; 2028 if (random_get_bytes(dummy_gtk, gtk_len) < 0) 2039 gtk_len = 0; 2060 kde_len += 2 + RSN_SELECTOR_LEN + 2 + gtk_len; 2095 gtk, gtk_len); 1233 wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr, const u8 *gnonce, u8 *gtk, size_t gtk_len) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ie.h | 19 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth.c | 1234 const u8 *gnonce, u8 *gtk, size_t gtk_len) 1256 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len); 1258 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len) 1986 size_t gtk_len, kde_len; local 2022 gtk_len = gsm->GTK_len; 2028 if (random_get_bytes(dummy_gtk, gtk_len) < 0) 2039 gtk_len = 0; 2060 kde_len += 2 + RSN_SELECTOR_LEN + 2 + gtk_len; 2095 gtk, gtk_len); 1233 wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr, const u8 *gnonce, u8 *gtk, size_t gtk_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ie.h | 19 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth.c | 1234 const u8 *gnonce, u8 *gtk, size_t gtk_len) 1256 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len); 1258 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len) 1986 size_t gtk_len, kde_len; local 2022 gtk_len = gsm->GTK_len; 2028 if (random_get_bytes(dummy_gtk, gtk_len) < 0) 2039 gtk_len = 0; 2060 kde_len += 2 + RSN_SELECTOR_LEN + 2 + gtk_len; 2095 gtk, gtk_len); 1233 wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr, const u8 *gnonce, u8 *gtk, size_t gtk_len) argument
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ft.c | 552 size_t gtk_len, keylen, rsc_len; local 568 gtk_len = gtk_elem_len - 19; 569 if (aes_unwrap(sm->ptk.kek, 16, gtk_len / 8, gtk_elem + 11, gtk)) { 584 if (gtk_len < keylen) { 790 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0)
|
H A D | wpa_ie.h | 21 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa.c | 631 int gtk_len; member in struct:wpa_gtk_data 642 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); 645 gd->keyidx, gd->tx, gd->gtk_len); 657 _gtk, gd->gtk_len) < 0) { 666 _gtk, gd->gtk_len) < 0) { 670 gd->alg, gd->gtk_len, gd->keyidx); 700 const u8 *gtk, size_t gtk_len, 715 gtk, gtk_len); 717 if (gtk_len < 2 || gtk_len 698 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) argument [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ft.c | 552 size_t gtk_len, keylen, rsc_len; local 568 gtk_len = gtk_elem_len - 19; 569 if (aes_unwrap(sm->ptk.kek, 16, gtk_len / 8, gtk_elem + 11, gtk)) { 584 if (gtk_len < keylen) { 790 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0)
|
H A D | wpa_ie.h | 21 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa.c | 631 int gtk_len; member in struct:wpa_gtk_data 642 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); 645 gd->keyidx, gd->tx, gd->gtk_len); 657 _gtk, gd->gtk_len) < 0) { 666 _gtk, gd->gtk_len) < 0) { 670 gd->alg, gd->gtk_len, gd->keyidx); 700 const u8 *gtk, size_t gtk_len, 715 gtk, gtk_len); 717 if (gtk_len < 2 || gtk_len 698 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ft.c | 552 size_t gtk_len, keylen, rsc_len; local 568 gtk_len = gtk_elem_len - 19; 569 if (aes_unwrap(sm->ptk.kek, 16, gtk_len / 8, gtk_elem + 11, gtk)) { 584 if (gtk_len < keylen) { 790 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0)
|
H A D | wpa_ie.h | 21 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa.c | 631 int gtk_len; member in struct:wpa_gtk_data 642 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); 645 gd->keyidx, gd->tx, gd->gtk_len); 657 _gtk, gd->gtk_len) < 0) { 666 _gtk, gd->gtk_len) < 0) { 670 gd->alg, gd->gtk_len, gd->keyidx); 700 const u8 *gtk, size_t gtk_len, 715 gtk, gtk_len); 717 if (gtk_len < 2 || gtk_len 698 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wnm_sta.c | 177 u8 gtk_len; local 205 gtk_len = *(ptr + 4); 206 if (ptr[1] < 11 + gtk_len || 207 gtk_len < 5 || gtk_len > 32) { 216 ptr += 13 + gtk_len;
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.h | 393 size_t gtk_len; member in struct:wpa_ft_ies
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.h | 393 size_t gtk_len; member in struct:wpa_ft_ies
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.h | 393 size_t gtk_len; member in struct:wpa_ft_ies
|