Lines Matching defs:gtk
1324 u8 gtk[32];
1333 const u8 *_gtk = gd->gtk;
1337 if ((sm->gtk.gtk_len == (size_t) gd->gtk_len &&
1338 os_memcmp(sm->gtk.gtk, gd->gtk, sm->gtk.gtk_len) == 0) ||
1340 os_memcmp(sm->gtk_wnm_sleep.gtk, gd->gtk,
1348 wpa_hexdump_key(MSG_DEBUG, "WPA: Group Key", gd->gtk, gd->gtk_len);
1355 os_memcpy(gtk_buf, gd->gtk, 16);
1356 os_memcpy(gtk_buf + 16, gd->gtk + 24, 8);
1357 os_memcpy(gtk_buf + 24, gd->gtk + 16, 8);
1385 os_memcpy(sm->gtk_wnm_sleep.gtk, gd->gtk,
1388 sm->gtk.gtk_len = gd->gtk_len;
1389 os_memcpy(sm->gtk.gtk, gd->gtk, sm->gtk.gtk_len);
1400 const u8 *gtk = gd->gtk;
1404 if ((sm->mlo.links[link_id].gtk.gtk_len == (size_t) gd->gtk_len &&
1405 os_memcmp(sm->mlo.links[link_id].gtk.gtk, gd->gtk,
1406 sm->mlo.links[link_id].gtk.gtk_len) == 0) ||
1409 os_memcmp(sm->mlo.links[link_id].gtk_wnm_sleep.gtk, gd->gtk,
1417 wpa_hexdump_link_key(MSG_DEBUG, link_id, "RSN: Group Key", gd->gtk,
1426 os_memcpy(gtk_buf, gd->gtk, 16);
1427 os_memcpy(gtk_buf + 16, gd->gtk + 24, 8);
1428 os_memcpy(gtk_buf + 24, gd->gtk + 16, 8);
1429 gtk = gtk_buf;
1432 gd->keyidx, gd->tx, key_rsc, gd->key_rsc_len, gtk,
1444 os_memcpy(sm->mlo.links[link_id].gtk_wnm_sleep.gtk, gd->gtk,
1447 sm->mlo.links[link_id].gtk.gtk_len = gd->gtk_len;
1448 os_memcpy(sm->mlo.links[link_id].gtk.gtk, gd->gtk,
1449 sm->mlo.links[link_id].gtk.gtk_len);
1504 static int wpa_supplicant_mlo_gtk(struct wpa_sm *sm, u8 link_id, const u8 *gtk,
1520 gtk, gtk_len);
1523 gtk_len - RSN_MLO_GTK_KDE_PREFIX_LENGTH > sizeof(gd.gtk))
1526 gd.keyidx = gtk[0] & 0x3;
1527 gtk += 1;
1530 key_rsc = gtk;
1532 gtk += 6;
1535 os_memcpy(gd.gtk, gtk, gtk_len);
1581 const u8 *gtk, size_t gtk_len,
1597 gtk, gtk_len);
1599 if (gtk_len < 2 || gtk_len - 2 > sizeof(gd.gtk))
1602 gd.keyidx = gtk[0] & 0x3;
1604 !!(gtk[0] & BIT(2)));
1605 gtk += 2;
1608 os_memcpy(gd.gtk, gtk, gtk_len);
2627 if (!mlo && ie.gtk && !(key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) {
2757 } else if (!ie.gtk && sm->proto == WPA_PROTO_RSN) {
2761 } else if (ie.gtk &&
2763 ie.gtk, ie.gtk_len, key_info) < 0) {
2776 if (mlo || sm->group_cipher == WPA_CIPHER_GTK_NOT_USED || ie.gtk)
2780 if (mlo || ie.gtk)
3048 if (key_data_len > sizeof(gd.gtk)) {
3056 os_memcpy(gd.gtk, key_data, key_data_len);
3057 if (rc4_skip(ek, 32, 256, gd.gtk, key_data_len)) {
3072 if (maxkeylen > sizeof(gd.gtk)) {
3081 key_data, gd.gtk)) {
3160 if (ie.gtk && !(key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) {
3165 if (!ie.gtk) {
3178 if (gtk_len > sizeof(gd.gtk)) {
3212 ie.gtk, 2 + gtk_len);
3213 gd.keyidx = ie.gtk[0] & 0x3;
3215 !!(ie.gtk[0] & BIT(2)));
3216 os_memcpy(gd.gtk, ie.gtk + 2, gtk_len);
4214 os_memset(&sm->gtk, 0, sizeof(sm->gtk));
4222 os_memset(&sm->mlo.links[i].gtk, 0,
4223 sizeof(sm->mlo.links[i].gtk));
5302 os_memcpy(gd.gtk, buf + 13, gd.gtk_len);
5305 gd.gtk, gd.gtk_len);
6339 if (!kde.gtk) {
6349 wpa_hexdump_key(MSG_DEBUG, "FILS: Received GTK", kde.gtk, kde.gtk_len);
6350 gd.keyidx = kde.gtk[0] & 0x3;
6352 !!(kde.gtk[0] & BIT(2)));
6353 if (kde.gtk_len - 2 > sizeof(gd.gtk)) {
6358 os_memcpy(gd.gtk, kde.gtk + 2, kde.gtk_len - 2);