Searched refs:gtk (Results 1 – 10 of 10) sorted by relevance
/hal_espressif-latest/components/wpa_supplicant/src/rsn_supp/ |
D | wpa.c | 886 u8 *_gtk = gd->gtk; in wpa_supplicant_install_gtk() 890 wpa_hexdump(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); in wpa_supplicant_install_gtk() 893 if ((sm->gtk.gtk_len == (size_t) gd->gtk_len && in wpa_supplicant_install_gtk() 894 os_memcmp(sm->gtk.gtk, gd->gtk, sm->gtk.gtk_len) == 0) || in wpa_supplicant_install_gtk() 908 memcpy(gtk_buf, gd->gtk, 16); in wpa_supplicant_install_gtk() 909 memcpy(gtk_buf + 16, gd->gtk + 16, 8); in wpa_supplicant_install_gtk() 910 memcpy(gtk_buf + 24, gd->gtk + 24, 8); in wpa_supplicant_install_gtk() 931 sm->gtk.gtk_len = gd->gtk_len; in wpa_supplicant_install_gtk() 932 os_memcpy(sm->gtk.gtk, gd->gtk, sm->gtk.gtk_len); in wpa_supplicant_install_gtk() 939 u8 *_gtk = gd->gtk; in wpa_supplicant_gtk_in_use() [all …]
|
D | wpa_ft.c | 588 u8 gtk[32]; in wpa_ft_process_gtk_subelem() local 602 gtk_elem_len - 19 > sizeof(gtk)) { in wpa_ft_process_gtk_subelem() 608 if (aes_unwrap(sm->ptk.kek, sm->ptk.kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem() 639 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); in wpa_ft_process_gtk_subelem() 643 os_memcpy(tmp, gtk + 16, 8); in wpa_ft_process_gtk_subelem() 644 os_memcpy(gtk + 16, gtk + 24, 8); in wpa_ft_process_gtk_subelem() 645 os_memcpy(gtk + 24, tmp, 8); in wpa_ft_process_gtk_subelem() 648 (u8 *)(gtk_elem + 3), rsc_len, gtk, keylen, KEY_FLAG_GROUP | KEY_FLAG_RX) < 0) { in wpa_ft_process_gtk_subelem() 837 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0)
|
D | wpa_ie.h | 24 const u8 *gtk; member
|
D | wpa_i.h | 39 struct wpa_gtk gtk; member
|
D | wpa_ie.c | 360 ie->gtk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/hal_espressif-latest/components/wpa_supplicant/src/ap/ |
D | wpa_auth_ie.h | 18 const u8 *gtk; member
|
D | wpa_auth.c | 974 const u8 *gnonce, u8 *gtk, size_t gtk_len) in wpa_gmk_to_gtk() argument 996 sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len); in wpa_gmk_to_gtk() 998 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data), gtk, gtk_len) < 0) in wpa_gmk_to_gtk() 1803 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; in SM_STATE() local 1839 gtk = gsm->GTK[gsm->GN - 1]; in SM_STATE() 1848 gtk = dummy_gtk; in SM_STATE() 1856 gtk = NULL; in SM_STATE() 1874 if (gtk) in SM_STATE() 1901 if (gtk) { in SM_STATE() 1906 gtk, gtk_len); in SM_STATE() [all …]
|
D | wpa_auth_ie.c | 689 ie->gtk = pos + 2 + RSN_SELECTOR_LEN; in wpa_parse_generic()
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | wpa_common.h | 211 u8 gtk[WPA_GTK_MAX_LEN]; member 225 u8 gtk[32]; member 414 const u8 *gtk; member
|
D | wpa_common.c | 111 parse->gtk = pos + 2; in wpa_ft_parse_ftie()
|