Home
last modified time | relevance | path

Searched refs:gtk_len (Results 1 – 13 of 13) sorted by relevance

/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
Dwpa.c627 int gtk_len; member
638 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); in wpa_supplicant_install_gtk()
641 gd->gtk_len); in wpa_supplicant_install_gtk()
654 _gtk, gd->gtk_len) < 0) { in wpa_supplicant_install_gtk()
662 _gtk, gd->gtk_len) < 0) { in wpa_supplicant_install_gtk()
665 gd->alg, gd->gtk_len, gd->keyidx); in wpa_supplicant_install_gtk()
692 const u8 *gtk, size_t gtk_len, in wpa_supplicant_pairwise_gtk() argument
708 gtk, gtk_len); in wpa_supplicant_pairwise_gtk()
710 if (gtk_len < 2 || gtk_len - 2 > sizeof(gd.gtk)) in wpa_supplicant_pairwise_gtk()
717 gtk_len -= 2; in wpa_supplicant_pairwise_gtk()
[all …]
Dwpa_ft.c281 size_t gtk_len; member
317 parse->gtk_len = pos[1]; in wpa_ft_parse_ftie()
599 size_t gtk_len, keylen, rsc_len; in wpa_ft_process_gtk_subelem() local
615 gtk_len = gtk_elem_len - 18; in wpa_ft_process_gtk_subelem()
616 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 10, gtk)) { in wpa_ft_process_gtk_subelem()
649 if (gtk_len < keylen) { in wpa_ft_process_gtk_subelem()
829 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0) in wpa_ft_validate_reassoc_resp()
Dwpa_ie.h25 size_t gtk_len; member
Dwpa_ie.c430 ie->gtk_len = pos[1] - RSN_SELECTOR_LEN; in wpa_parse_generic()
/external/wpa_supplicant_8/src/rsn_supp/
Dwpa.c627 int gtk_len; member
638 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); in wpa_supplicant_install_gtk()
641 gd->keyidx, gd->tx, gd->gtk_len); in wpa_supplicant_install_gtk()
653 _gtk, gd->gtk_len) < 0) { in wpa_supplicant_install_gtk()
661 _gtk, gd->gtk_len) < 0) { in wpa_supplicant_install_gtk()
665 gd->alg, gd->gtk_len, gd->keyidx); in wpa_supplicant_install_gtk()
693 const u8 *gtk, size_t gtk_len, in wpa_supplicant_pairwise_gtk() argument
709 gtk, gtk_len); in wpa_supplicant_pairwise_gtk()
711 if (gtk_len < 2 || gtk_len - 2 > sizeof(gd.gtk)) in wpa_supplicant_pairwise_gtk()
718 gtk_len -= 2; in wpa_supplicant_pairwise_gtk()
[all …]
Dwpa_ie.h21 size_t gtk_len; member
Dwpa_ft.c551 size_t gtk_len, keylen, rsc_len; in wpa_ft_process_gtk_subelem() local
567 gtk_len = gtk_elem_len - 19; in wpa_ft_process_gtk_subelem()
568 if (aes_unwrap(sm->ptk.kek, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem()
601 if (gtk_len < keylen) { in wpa_ft_process_gtk_subelem()
798 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0) in wpa_ft_validate_reassoc_resp()
Dwpa_ie.c292 ie->gtk_len = pos[1] - RSN_SELECTOR_LEN; in wpa_parse_generic()
/external/wpa_supplicant_8/src/ap/
Dwpa_auth_ie.h19 size_t gtk_len; member
Dwpa_auth.c1177 const u8 *gnonce, u8 *gtk, size_t gtk_len) in wpa_gmk_to_gtk() argument
1199 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len); in wpa_gmk_to_gtk()
1201 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len) in wpa_gmk_to_gtk()
1913 size_t gtk_len, kde_len; in SM_STATE() local
1949 gtk_len = gsm->GTK_len; in SM_STATE()
1957 gtk_len = 0; in SM_STATE()
1978 kde_len += 2 + RSN_SELECTOR_LEN + 2 + gtk_len; in SM_STATE()
2009 gtk, gtk_len); in SM_STATE()
Dwpa_auth_ie.c703 ie->gtk_len = pos[1] - RSN_SELECTOR_LEN; in wpa_parse_generic()
/external/wpa_supplicant_8/src/common/
Dwpa_common.h362 size_t gtk_len; member
Dwpa_common.c210 parse->gtk_len = pos[1]; in wpa_ft_parse_ftie()