/hostap-latest/src/rsn_supp/ |
D | wpa.c | 1359 u8 gtk[32]; member 1368 const u8 *_gtk = gd->gtk; in wpa_supplicant_install_gtk() 1372 if ((sm->gtk.gtk_len == (size_t) gd->gtk_len && in wpa_supplicant_install_gtk() 1373 os_memcmp(sm->gtk.gtk, gd->gtk, sm->gtk.gtk_len) == 0) || in wpa_supplicant_install_gtk() 1375 os_memcmp(sm->gtk_wnm_sleep.gtk, gd->gtk, in wpa_supplicant_install_gtk() 1383 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len); in wpa_supplicant_install_gtk() 1390 os_memcpy(gtk_buf, gd->gtk, 16); in wpa_supplicant_install_gtk() 1391 os_memcpy(gtk_buf + 16, gd->gtk + 24, 8); in wpa_supplicant_install_gtk() 1392 os_memcpy(gtk_buf + 24, gd->gtk + 16, 8); in wpa_supplicant_install_gtk() 1420 os_memcpy(sm->gtk_wnm_sleep.gtk, gd->gtk, in wpa_supplicant_install_gtk() [all …]
|
D | wpa_ft.c | 805 u8 gtk[32]; in wpa_ft_process_gtk_subelem() local 829 gtk_elem_len - 19 > sizeof(gtk)) { in wpa_ft_process_gtk_subelem() 835 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem() 866 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); in wpa_ft_process_gtk_subelem() 870 os_memcpy(tmp, gtk + 16, 8); in wpa_ft_process_gtk_subelem() 871 os_memcpy(gtk + 16, gtk + 24, 8); in wpa_ft_process_gtk_subelem() 872 os_memcpy(gtk + 24, tmp, 8); in wpa_ft_process_gtk_subelem() 875 gtk_elem + 3, rsc_len, gtk, keylen, in wpa_ft_process_gtk_subelem() 1254 if (wpa_ft_process_gtk_subelem(sm, parse.gtk, parse.gtk_len) < 0 || in wpa_ft_validate_reassoc_resp()
|
D | wpa_i.h | 38 struct wpa_gtk gtk; member
|
D | wpa.h | 175 struct wpa_gtk gtk; member
|
/hostap-latest/hs20/client/ |
D | Makefile | 14 GTKCFLAGS := $(shell pkg-config --cflags gtk+-3.0 webkit2gtk-4.0) 15 GTKLIBS := $(shell pkg-config --libs gtk+-3.0 webkit2gtk-4.0) 18 GTKCFLAGS := $(shell pkg-config --cflags gtk+-3.0 webkitgtk-3.0) 19 GTKLIBS := $(shell pkg-config --libs gtk+-3.0 webkitgtk-3.0)
|
D | Android.mk | 9 INCLUDES += external/webkit/Source/WebKit/gtk
|
/hostap-latest/tests/hwsim/ |
D | test_erp.py | 385 gtk = None 408 gtk = binascii.unhexlify(val) 409 if not msk or not emsk or not rIK or not rRK or not pmk or not ptk or not gtk: 411 if len(gtk) != 16: 454 if gtk in buf: 455 get_key_locations(buf, gtk, "GTK") 456 verify_not_present(buf, gtk, fname, "GTK") 472 gtk = None 483 gtk = binascii.unhexlify(val) 484 if not pmk or not ptk or not gtk: [all …]
|
D | test_wpas_ap.py | 1113 gtk = None 1121 gtk = binascii.unhexlify(val) 1122 if not pmk or not ptk or not gtk: 1124 if len(gtk) != 16: 1152 get_key_locations(buf2, gtk, "GTK") 1161 get_key_locations(buf3, gtk, "GTK") 1162 verify_not_present(buf3, gtk, fname, "GTK")
|
D | test_sae.py | 596 gtk = None 616 gtk = binascii.unhexlify(val) 617 if not sae_k or not sae_keyseed or not sae_kck or not pmk or not ptk or not gtk: 619 if len(gtk) != 16: 657 if gtk in buf: 658 get_key_locations(buf, gtk, "GTK") 659 verify_not_present(buf, gtk, fname, "GTK") 683 verify_not_present(buf, gtk, fname, "GTK")
|
D | test_ap_ft.py | 2136 gtk = None 2156 gtk = binascii.unhexlify(val) 2157 if not pmkr0 or not pmkr1 or not kck or not kek or not tk or not gtk: 2159 if len(gtk) != 16: 2194 if gtk in buf: 2195 get_key_locations(buf, gtk, "GTK") 2196 verify_not_present(buf, gtk, fname, "GTK") 2212 verify_not_present(buf, gtk, fname, "GTK")
|
D | test_ap_psk.py | 2752 gtk = None 2760 gtk = binascii.unhexlify(val) 2761 if not pmk or not ptk or not gtk: 2763 if len(gtk) != 16: 2792 if gtk in buf: 2793 get_key_locations(buf, gtk, "GTK") 2794 verify_not_present(buf, gtk, fname, "GTK") 2806 verify_not_present(buf, gtk, fname, "GTK")
|
D | test_ap_eap.py | 5825 gtk = None 5844 gtk = binascii.unhexlify(val) 5845 if not msk or not emsk or not pmk or not ptk or not gtk: 5847 if len(gtk) != 16: 5886 if gtk in buf: 5887 get_key_locations(buf, gtk, "GTK") 5888 verify_not_present(buf, gtk, fname, "GTK") 5914 verify_not_present(buf, gtk, fname, "GTK")
|
/hostap-latest/wlantest/ |
D | rx_eapol.c | 644 os_memcpy(bss->gtk[key_id], key, key_len); in learn_kde_keys_mlo() 646 os_memcpy(sta->gtk, key, key_len); in learn_kde_keys_mlo() 752 if (ie.gtk) { in learn_kde_keys() 754 ie.gtk, ie.gtk_len); in learn_kde_keys() 757 id = ie.gtk[0] & 0x03; in learn_kde_keys() 759 id, !!(ie.gtk[0] & 0x04)); in learn_kde_keys() 760 if ((ie.gtk[0] & 0xf8) || ie.gtk[1]) { in learn_kde_keys() 763 "%02x %02x", ie.gtk[0], ie.gtk[1]); in learn_kde_keys() 765 wpa_hexdump(MSG_DEBUG, "GTK", ie.gtk + 2, in learn_kde_keys() 769 os_memcpy(bss->gtk[id], ie.gtk + 2, ie.gtk_len - 2); in learn_kde_keys() [all …]
|
D | rx_data.c | 333 decrypted = tkip_decrypt(bss->gtk[keyid], hdr, data, len, in rx_data_bss_prot_group() 342 decrypted = ccmp_decrypt(bss->gtk[keyid], hdr, NULL, NULL, NULL, in rx_data_bss_prot_group() 345 decrypted = ccmp_256_decrypt(bss->gtk[keyid], hdr, in rx_data_bss_prot_group() 350 decrypted = gcmp_decrypt(bss->gtk[keyid], bss->gtk_len[keyid], in rx_data_bss_prot_group() 356 char gtk[65]; in rx_data_bss_prot_group() local 358 wpa_snprintf_hex(gtk, sizeof(gtk), bss->gtk[keyid], in rx_data_bss_prot_group() 360 add_note(wt, MSG_EXCESSIVE, "GTK[%d] %s", keyid, gtk); in rx_data_bss_prot_group()
|
D | inject.c | 140 bss->gtk[bss->gtk_idx], in wlantest_inject_prot_bc() 145 bss->gtk[bss->gtk_idx], in wlantest_inject_prot_bc()
|
D | rx_mgmt.c | 1787 u8 gtk[32]; in process_gtk_subelem() local 1806 gtk_elem_len - (hlen + 8) > sizeof(gtk)) { in process_gtk_subelem() 1812 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + hlen, gtk)) { in process_gtk_subelem() 1844 wpa_hexdump(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen); in process_gtk_subelem() 1849 os_memcpy(tmp, gtk + 16, 8); in process_gtk_subelem() 1850 os_memcpy(gtk + 16, gtk + 24, 8); in process_gtk_subelem() 1851 os_memcpy(gtk + 24, tmp, 8); in process_gtk_subelem() 1857 os_memcpy(bss->gtk[keyidx], gtk, gtk_len); in process_gtk_subelem() 1859 os_memcpy(sta->gtk, gtk, gtk_len); in process_gtk_subelem() 2028 parse->gtk, parse->gtk_len, false); in process_fte_group_keys()
|
D | wlantest.h | 115 u8 gtk[32]; member 174 u8 gtk[4][32]; member
|
D | ctrl.c | 1015 wpa_snprintf_hex(buf + pos, len - pos, sta->gtk, sta->gtk_len); in info_print_gtk()
|
/hostap-latest/src/ap/ |
D | wpa_auth.c | 1900 const u8 *gnonce, u8 *gtk, size_t gtk_len) argument 1927 gtk, gtk_len) < 0) 1932 gtk, gtk_len) < 0) 1936 gtk, gtk_len) < 0) 3370 u8 *gtk, stub_gtk[32]; local 3406 gtk = gsm->GTK[gsm->GN - 1]; 3417 gtk = stub_gtk; 3423 gtk, gtk_len); 4220 info->gtk = gsm->GTK[gsm->GN - 1]; 4350 ml_key_info.links[i].gtk, [all …]
|
D | wpa_auth.h | 344 const u8 *gtk; member
|
/hostap-latest/src/common/ |
D | wpa_common.h | 276 u8 gtk[WPA_GTK_MAX_LEN]; member 572 const u8 *gtk; member 666 const u8 *gtk; member
|
D | wpa_common.c | 1062 parse->gtk = pos; in wpa_ft_parse_ftie() 3492 ie->gtk = p; in wpa_parse_generic()
|