/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth_ie.h | 19 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth.c | 1357 const u8 *gnonce, u8 *gtk, size_t gtk_len) 1379 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len); 1381 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len) 2163 size_t gtk_len, kde_len; local 2201 gtk_len = gsm->GTK_len; 2207 if (random_get_bytes(dummy_gtk, gtk_len) < 0) 2218 gtk_len = 0; 2239 kde_len += 2 + RSN_SELECTOR_LEN + 2 + gtk_len; 2274 gtk, gtk_len); 1356 wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr, const u8 *gnonce, u8 *gtk, size_t gtk_len) argument
|
H A D | wpa_auth_ie.c | 786 ie->gtk_len = pos[1] - RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa_ie.h | 21 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa.c | 689 int gtk_len; member in struct:wpa_gtk_data 700 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); 703 gd->keyidx, gd->tx, gd->gtk_len); 715 _gtk, gd->gtk_len) < 0) { 724 _gtk, gd->gtk_len) < 0) { 728 gd->alg, gd->gtk_len, gd->keyidx); 758 const u8 *gtk, size_t gtk_len, 773 gtk, gtk_len); 775 if (gtk_len < 2 || gtk_len 756 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) argument 1323 u16 gtk_len; local [all...] |
H A D | wpa_ft.c | 547 size_t gtk_len, keylen, rsc_len; local 563 gtk_len = gtk_elem_len - 19; 564 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, 580 if (gtk_len < keylen) { 786 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0)
|
H A D | wpa_ie.c | 393 ie->gtk_len = pos[1] - RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth_ie.h | 19 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth.c | 1357 const u8 *gnonce, u8 *gtk, size_t gtk_len) 1379 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len); 1381 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len) 2163 size_t gtk_len, kde_len; local 2201 gtk_len = gsm->GTK_len; 2207 if (random_get_bytes(dummy_gtk, gtk_len) < 0) 2218 gtk_len = 0; 2239 kde_len += 2 + RSN_SELECTOR_LEN + 2 + gtk_len; 2274 gtk, gtk_len); 1356 wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr, const u8 *gnonce, u8 *gtk, size_t gtk_len) argument
|
H A D | wpa_auth_ie.c | 786 ie->gtk_len = pos[1] - RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/src/rsn_supp/ |
H A D | wpa_ie.h | 21 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa.c | 689 int gtk_len; member in struct:wpa_gtk_data 700 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); 703 gd->keyidx, gd->tx, gd->gtk_len); 715 _gtk, gd->gtk_len) < 0) { 724 _gtk, gd->gtk_len) < 0) { 728 gd->alg, gd->gtk_len, gd->keyidx); 758 const u8 *gtk, size_t gtk_len, 773 gtk, gtk_len); 775 if (gtk_len < 2 || gtk_len 756 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) argument 1323 u16 gtk_len; local [all...] |
H A D | wpa_ft.c | 547 size_t gtk_len, keylen, rsc_len; local 563 gtk_len = gtk_elem_len - 19; 564 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, 580 if (gtk_len < keylen) { 786 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0)
|
H A D | wpa_ie.c | 393 ie->gtk_len = pos[1] - RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth_ie.h | 19 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa_auth.c | 1357 const u8 *gnonce, u8 *gtk, size_t gtk_len) 1379 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len); 1381 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len) 2163 size_t gtk_len, kde_len; local 2201 gtk_len = gsm->GTK_len; 2207 if (random_get_bytes(dummy_gtk, gtk_len) < 0) 2218 gtk_len = 0; 2239 kde_len += 2 + RSN_SELECTOR_LEN + 2 + gtk_len; 2274 gtk, gtk_len); 1356 wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr, const u8 *gnonce, u8 *gtk, size_t gtk_len) argument
|
H A D | wpa_auth_ie.c | 786 ie->gtk_len = pos[1] - RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/wpa_supplicant/src/rsn_supp/ |
H A D | wpa_ie.h | 21 size_t gtk_len; member in struct:wpa_eapol_ie_parse
|
H A D | wpa.c | 689 int gtk_len; member in struct:wpa_gtk_data 700 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); 703 gd->keyidx, gd->tx, gd->gtk_len); 715 _gtk, gd->gtk_len) < 0) { 724 _gtk, gd->gtk_len) < 0) { 728 gd->alg, gd->gtk_len, gd->keyidx); 758 const u8 *gtk, size_t gtk_len, 773 gtk, gtk_len); 775 if (gtk_len < 2 || gtk_len 756 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) argument 1323 u16 gtk_len; local [all...] |
H A D | wpa_ft.c | 547 size_t gtk_len, keylen, rsc_len; local 563 gtk_len = gtk_elem_len - 19; 564 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, 580 if (gtk_len < keylen) { 786 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0)
|
H A D | wpa_ie.c | 393 ie->gtk_len = pos[1] - RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wnm_sta.c | 178 u8 gtk_len; local 212 gtk_len = *(ptr + 4); 213 if (ptr[1] < 11 + gtk_len || 214 gtk_len < 5 || gtk_len > 32) { 223 ptr += 13 + gtk_len;
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.h | 419 size_t gtk_len; member in struct:wpa_ft_ies
|
/external/wpa_supplicant_8/src/common/ |
H A D | wpa_common.h | 419 size_t gtk_len; member in struct:wpa_ft_ies
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | wpa_common.h | 419 size_t gtk_len; member in struct:wpa_ft_ies
|