/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/rsn_supp/ |
H A D | wpa.c | 1208 int gtk_len; member 1220 if ((sm->gtk.gtk_len == (size_t) gd->gtk_len && 1221 os_memcmp(sm->gtk.gtk, gd->gtk, sm->gtk.gtk_len) == 0) || 1222 (sm->gtk_wnm_sleep.gtk_len == (size_t) gd->gtk_len && 1224 sm->gtk_wnm_sleep.gtk_len) == 0)) { 1227 gd->keyidx, gd->tx, gd->gtk_len); 1231 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); 1234 gd->keyidx, gd->tx, gd->gtk_len); 1384 wpa_supplicant_mlo_gtk(struct wpa_sm *sm, u8 link_id, const u8 *gtk, size_t gtk_len, int key_info) global() argument 1461 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) global() argument [all...] |
H A D | wpa_ft.c | 768 size_t gtk_len, keylen, rsc_len; 794 gtk_len = gtk_elem_len - 19; 795 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { 810 if (gtk_len < keylen) { 1234 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0 ||
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | wpa.c | 884 int gtk_len; member 896 if ((sm->gtk.gtk_len == (size_t) gd->gtk_len && in wpa_supplicant_install_gtk() 897 os_memcmp(sm->gtk.gtk, gd->gtk, sm->gtk.gtk_len) == 0) || in wpa_supplicant_install_gtk() 898 (sm->gtk_wnm_sleep.gtk_len == (size_t) gd->gtk_len && in wpa_supplicant_install_gtk() 900 sm->gtk_wnm_sleep.gtk_len) == 0)) { in wpa_supplicant_install_gtk() 903 gd->keyidx, gd->tx, gd->gtk_len); in wpa_supplicant_install_gtk() 907 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); in wpa_supplicant_install_gtk() 910 gd->keyidx, gd->tx, gd->gtk_len); in wpa_supplicant_install_gtk() 1002 wpa_supplicant_pairwise_gtk(struct wpa_sm *sm, const struct wpa_eapol_key *key, const u8 *gtk, size_t gtk_len, int key_info) wpa_supplicant_pairwise_gtk() argument 1677 u16 gtk_len; wpa_supplicant_process_1_of_2_wpa() local [all...] |
H A D | wpa_ft.c | 693 size_t gtk_len, keylen, rsc_len; in wpa_ft_process_gtk_subelem() local 719 gtk_len = gtk_elem_len - 19; in wpa_ft_process_gtk_subelem() 720 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem() 735 if (gtk_len < keylen) { in wpa_ft_process_gtk_subelem() 1018 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0) in wpa_ft_validate_reassoc_resp()
|
H A D | wpa_ie.h | 21 size_t gtk_len; member
|
H A D | wpa_ie.c | 423 ie->gtk_len = pos[1] - RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth_ie.h | 19 size_t gtk_len; member
|
H A D | wpa_auth.c | 1376 const u8 *gnonce, u8 *gtk, size_t gtk_len) in wpa_gmk_to_gtk() 1398 if (random_get_bytes(pos, gtk_len) < 0) in wpa_gmk_to_gtk() 1403 gtk, gtk_len) < 0) in wpa_gmk_to_gtk() 1408 gtk, gtk_len) < 0) in wpa_gmk_to_gtk() 1412 gtk, gtk_len) < 0) in wpa_gmk_to_gtk() 2658 size_t gtk_len; in fils_prepare_plainbuf() local 2689 gtk_len = gsm->GTK_len; in fils_prepare_plainbuf() 2696 if (random_get_bytes(dummy_gtk, gtk_len) < 0) { in fils_prepare_plainbuf() 2706 gtk, gtk_len); in fils_prepare_plainbuf() 3154 size_t gtk_len, kde_le in SM_STATE() local 1375 wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr, const u8 *gnonce, u8 *gtk, size_t gtk_len) wpa_gmk_to_gtk() argument 4994 size_t gtk_len, kde_len; wpa_auth_resend_m3() local [all...] |
H A D | wpa_auth_ie.c | 1016 ie->gtk_len = pos[1] - RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth.c | 1455 const u8 *gnonce, u8 *gtk, size_t gtk_len) in wpa_gmk_to_gtk() 1477 if (random_get_bytes(pos, gtk_len) < 0) in wpa_gmk_to_gtk() 1482 gtk, gtk_len) < 0) in wpa_gmk_to_gtk() 1487 gtk, gtk_len) < 0) in wpa_gmk_to_gtk() 1491 gtk, gtk_len) < 0) in wpa_gmk_to_gtk() 2777 size_t gtk_len; in fils_prepare_plainbuf() local 2813 gtk_len = gsm->GTK_len; in fils_prepare_plainbuf() 2819 if (random_get_bytes(stub_gtk, gtk_len) < 0) { in fils_prepare_plainbuf() 2829 gtk, gtk_len); in fils_prepare_plainbuf() 3407 size_t gtk_len, kde_le in SM_STATE() local 1454 wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr, const u8 *gnonce, u8 *gtk, size_t gtk_len) wpa_gmk_to_gtk() argument 5430 size_t gtk_len, kde_len; wpa_auth_resend_m3() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | wpa_common.h | 226 size_t gtk_len; member 451 size_t gtk_len; member
|
H A D | wpa_common.c | 883 parse->gtk_len = len; in wpa_ft_parse_ftie()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | wpa_common.h | 265 size_t gtk_len; member 548 size_t gtk_len; member 618 size_t gtk_len; member
|
H A D | wpa_common.c | 1022 parse->gtk_len = len; in wpa_ft_parse_ftie() 3177 ie->gtk_len = left; in wpa_parse_generic() 3366 ie->gtk_len = pos[1] - RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | wnm_sta.c | 228 u8 gtk_len; in wnm_sleep_mode_exit_success() local 262 gtk_len = *(ptr + 4); in wnm_sleep_mode_exit_success() 263 if (ptr[1] < 11 + gtk_len || in wnm_sleep_mode_exit_success() 264 gtk_len < 5 || gtk_len > 32) { in wnm_sleep_mode_exit_success() 273 ptr += 13 + gtk_len; in wnm_sleep_mode_exit_success()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | wnm_sta.c | 237 u8 gtk_len; in wnm_sleep_mode_exit_success() local 271 gtk_len = *(ptr + 4); in wnm_sleep_mode_exit_success() 272 if (ptr[1] < 11 + gtk_len || in wnm_sleep_mode_exit_success() 273 gtk_len < 5 || gtk_len > 32) { in wnm_sleep_mode_exit_success() 282 ptr += 13 + gtk_len; in wnm_sleep_mode_exit_success()
|