Searched refs:EAP_PAX_AK_LEN (Results 1 - 7 of 7) sorted by relevance
/external/wpa_supplicant/ |
H A D | eap_pax_common.c | 136 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
|
H A D | eap_pax_common.h | 83 #define EAP_PAX_AK_LEN 16 macro
|
H A D | eap_pax.c | 45 u8 ak[EAP_PAX_AK_LEN]; 67 if (config->eappsk && config->eappsk_len != EAP_PAX_AK_LEN) { 69 "expected %d", EAP_PAX_AK_LEN); 87 os_memcpy(data->ak, config->eappsk, EAP_PAX_AK_LEN); 95 os_memcpy(data->ak, hash, EAP_PAX_AK_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_pax_common.c | 136 if (eap_pax_kdf(mac_id, ak, EAP_PAX_AK_LEN, "Master Key", 144 wpa_hexdump_key(MSG_MSGDUMP, "EAP-PAX: AK", ak, EAP_PAX_AK_LEN);
|
H A D | eap_pax_common.h | 79 #define EAP_PAX_AK_LEN 16 macro
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_pax.c | 44 u8 ak[EAP_PAX_AK_LEN]; 68 if (password_len != EAP_PAX_AK_LEN) { 86 os_memcpy(data->ak, password, EAP_PAX_AK_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_pax.c | 40 u8 ak[EAP_PAX_AK_LEN]; 380 sm->user->password_len != EAP_PAX_AK_LEN) { 387 os_memcpy(data->ak, sm->user->password, EAP_PAX_AK_LEN);
|
Completed in 78 milliseconds