| /src/external/bsd/wpa/dist/src/common/ |
| wpa_common.c | 454 ptk->tk_len = wpa_cipher_key_len(cipher); 456 if (ptk->tk_len == 0) { 462 ptk_len = ptk->kck_len + ptk->kek_len + ptk->tk_len + ptk->kdk_len; 573 os_memcpy(ptk->tk, tmp + ptk->kck_len + ptk->kek_len, ptk->tk_len); 574 wpa_hexdump_key(MSG_DEBUG, "WPA: TK", ptk->tk, ptk->tk_len); 578 ptk->tk_len, ptk->kdk_len); 712 ptk->tk_len = wpa_cipher_key_len(cipher); 719 key_data_len = *ick_len + ptk->kek_len + ptk->tk_len; 775 os_memcpy(ptk->tk, tmp + offset, ptk->tk_len); 776 wpa_hexdump_key(MSG_DEBUG, "FILS: TK", ptk->tk, ptk->tk_len); [all...] |
| ptksa_cache.c | 198 e->ptk.tk_len);
|
| common_module_tests.c | 665 if (ptk.tk_len != sizeof(tk) || 750 if (ptk.tk_len != sizeof(tk) ||
|
| wpa_common.h | 268 size_t tk_len; member in struct:wpa_ptk
|
| /src/external/bsd/wpa/dist/src/ap/ |
| ap_drv_ops.c | 1231 u32 cipher, u8 tk_len, const u8 *tk, 1244 params.tk_len = tk_len;
|
| ieee802_11.c | 2699 entry->ptk.tk_len, entry->ptk.tk,
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| driver_i.h | 1142 u32 cipher, u8 tk_len, 1160 params.tk_len = tk_len;
|
| pasn_supplicant.c | 334 entry->ptk.tk_len,
|
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| wpa.c | 1217 if (keylen <= 0 || (unsigned int) keylen != sm->ptk.tk_len) { 1219 keylen, (long unsigned int) sm->ptk.tk_len); 1261 sm->ptk.tk_len = 0; 6373 if (keylen <= 0 || (unsigned int) keylen != sm->ptk.tk_len) { 6375 keylen, (long unsigned int) sm->ptk.tk_len); 6399 sm->ptk.tk_len = 0;
|
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver.h | 2990 * @tk_len: Length of temporal key. 3000 u8 tk_len; member in struct:secure_ranging_params
|
| driver_nl80211.c | 13395 if (params->tk_len && params->tk) { 13397 params->tk_len, params->tk)) 13400 params->tk, params->tk_len);
|