/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ie.h | 18 const u8 *gtk; member in struct:wpa_eapol_ie_parse
|
wpa_auth.c | 279 wpa_auth_logger(wpa_auth, NULL, LOGGER_DEBUG, "rekeying GTK"); 560 * Reinitialize GTK to make sure it is suitable for the new 609 /* Go to PTKINITDONE state to allow GTK rekeying */ 620 /* Go to PTKINITDONE state to allow GTK rekeying */ 695 "strict rekeying - force GTK rekey since STA " 2302 u8 *gtk, dummy_gtk[32]; local 2699 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos, dummy_gtk[32]; local 3071 u8 *gtk, dummy_gtk[32]; local [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 543 u8 gtk[32]; local 549 wpa_printf(MSG_DEBUG, "FT: No GTK included in FTIE"); 553 wpa_hexdump_key(MSG_DEBUG, "FT: Received GTK in Reassoc Resp", 557 gtk_elem_len - 19 > sizeof(gtk)) { 558 wpa_printf(MSG_DEBUG, "FT: Invalid GTK sub-elem " 564 gtk)) { 566 "decrypt GTK"); 580 wpa_printf(MSG_DEBUG, "FT: Too short GTK in FTIE"); 589 wpa_printf(MSG_DEBUG, "FT: GTK length mismatch: received %d " 595 wpa_hexdump_key(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen) [all...] |
wpa_ie.h | 20 const u8 *gtk; member in struct:wpa_eapol_ie_parse
|
wpa_i.h | 33 struct wpa_gtk gtk; member in struct:wpa_sm
|
wpa.c | 635 MACSTR " [PTK=%s GTK=%s]", MAC2STR(addr), 776 u8 gtk[32]; member in struct:wpa_gtk_data 785 const u8 *_gtk = gd->gtk; 789 if ((sm->gtk.gtk_len == (size_t) gd->gtk_len && 790 os_memcmp(sm->gtk.gtk, gd->gtk, sm->gtk.gtk_len) == 0) || 792 os_memcmp(sm->gtk_wnm_sleep.gtk, gd->gtk, [all...] |
/external/syslinux/gpxe/src/include/gpxe/ |
wpa.h | 85 /** Key type field value for a GTK (group) key handshake */ 140 /** Receive sequence counter for GTK 284 * gtk according to the state of the @a valid bitmask. 324 * If the PTK is not valid, the GTK should be used for both 325 * unicast and multicast decryption; if the GTK is not valid, 340 struct wpa_gtk gtk; member in struct:wpa_common_ctx 416 /** Payload structure of the GTK-encapsulating KDE 430 struct wpa_gtk gtk; member in struct:wpa_kde_gtk_encap 476 /** For GTK-type KDEs, encapsulated GTK */ [all...] |
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
eapol.h | 163 /* GTK encapsulation */ 167 uint8 gtk[EAPOL_WPA_MAX_KEY_SIZE]; member in struct:__anon41883
|
/prebuilts/tools/linux-x86/swt/ |
swt.jar | |
/prebuilts/tools/linux-x86_64/swt/ |
swt.jar | |
/external/wpa_supplicant_8/src/common/ |
wpa_common.h | 218 u8 gtk[WPA_GTK_MAX_LEN]; member in struct:wpa_gtk 253 * 3/4: one or two RSN IEs + GTK IE (encrypted) 255 * 1/2: GTK IE (encrypted) 442 const u8 *gtk; member in struct:wpa_ft_ies
|