/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
D | wpa.c | 627 int gtk_len; member 638 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); in wpa_supplicant_install_gtk() 641 gd->gtk_len); in wpa_supplicant_install_gtk() 654 _gtk, gd->gtk_len) < 0) { in wpa_supplicant_install_gtk() 662 _gtk, gd->gtk_len) < 0) { in wpa_supplicant_install_gtk() 665 gd->alg, gd->gtk_len, gd->keyidx); in wpa_supplicant_install_gtk() 692 const u8 *gtk, size_t gtk_len, in wpa_supplicant_pairwise_gtk() argument 708 gtk, gtk_len); in wpa_supplicant_pairwise_gtk() 710 if (gtk_len < 2 || gtk_len - 2 > sizeof(gd.gtk)) in wpa_supplicant_pairwise_gtk() 717 gtk_len -= 2; in wpa_supplicant_pairwise_gtk() [all …]
|
D | wpa_ft.c | 281 size_t gtk_len; member 317 parse->gtk_len = pos[1]; in wpa_ft_parse_ftie() 599 size_t gtk_len, keylen, rsc_len; in wpa_ft_process_gtk_subelem() local 615 gtk_len = gtk_elem_len - 18; in wpa_ft_process_gtk_subelem() 616 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 10, gtk)) { in wpa_ft_process_gtk_subelem() 649 if (gtk_len < keylen) { in wpa_ft_process_gtk_subelem() 829 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0) in wpa_ft_validate_reassoc_resp()
|
D | wpa_ie.h | 25 size_t gtk_len; member
|
D | wpa_ie.c | 430 ie->gtk_len = pos[1] - RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/external/wpa_supplicant_8/src/rsn_supp/ |
D | wpa.c | 627 int gtk_len; member 638 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); in wpa_supplicant_install_gtk() 641 gd->keyidx, gd->tx, gd->gtk_len); in wpa_supplicant_install_gtk() 653 _gtk, gd->gtk_len) < 0) { in wpa_supplicant_install_gtk() 661 _gtk, gd->gtk_len) < 0) { in wpa_supplicant_install_gtk() 665 gd->alg, gd->gtk_len, gd->keyidx); in wpa_supplicant_install_gtk() 693 const u8 *gtk, size_t gtk_len, in wpa_supplicant_pairwise_gtk() argument 709 gtk, gtk_len); in wpa_supplicant_pairwise_gtk() 711 if (gtk_len < 2 || gtk_len - 2 > sizeof(gd.gtk)) in wpa_supplicant_pairwise_gtk() 718 gtk_len -= 2; in wpa_supplicant_pairwise_gtk() [all …]
|
D | wpa_ie.h | 21 size_t gtk_len; member
|
D | wpa_ft.c | 551 size_t gtk_len, keylen, rsc_len; in wpa_ft_process_gtk_subelem() local 567 gtk_len = gtk_elem_len - 19; in wpa_ft_process_gtk_subelem() 568 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem() 601 if (gtk_len < keylen) { in wpa_ft_process_gtk_subelem() 798 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0) in wpa_ft_validate_reassoc_resp()
|
D | wpa_ie.c | 292 ie->gtk_len = pos[1] - RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_ie.h | 19 size_t gtk_len; member
|
D | wpa_auth.c | 1177 const u8 *gnonce, u8 *gtk, size_t gtk_len) in wpa_gmk_to_gtk() argument 1199 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len); in wpa_gmk_to_gtk() 1201 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len) in wpa_gmk_to_gtk() 1913 size_t gtk_len, kde_len; in SM_STATE() local 1949 gtk_len = gsm->GTK_len; in SM_STATE() 1957 gtk_len = 0; in SM_STATE() 1978 kde_len += 2 + RSN_SELECTOR_LEN + 2 + gtk_len; in SM_STATE() 2009 gtk, gtk_len); in SM_STATE()
|
D | wpa_auth_ie.c | 703 ie->gtk_len = pos[1] - RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/external/wpa_supplicant_8/src/common/ |
D | wpa_common.h | 362 size_t gtk_len; member
|
D | wpa_common.c | 210 parse->gtk_len = pos[1]; in wpa_ft_parse_ftie()
|