/external/wpa_supplicant/ |
H A D | eap_gpsk_common.c | 117 const u8 *psk, size_t psk_len, 144 if (psk_len < mk_len) 147 data_len = 2 + psk_len + 6 + seed_len; 152 WPA_PUT_BE16(pos, psk_len); 154 os_memcpy(pos, psk, psk_len); 155 pos += psk_len; 196 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument 209 * KS = 16, PL = psk_len, CSuite_Sel = 0x00000000 0x0001 225 psk, psk_len, seed, seed_len, 232 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, argument 115 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 286 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_gpsk_common.h | 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
|
H A D | eap_gpsk.c | 41 size_t psk_len; member in struct:eap_gpsk_data 119 data->psk_len = config->eappsk_len; 363 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_gpsk_common.c | 118 const u8 *psk, size_t psk_len, 145 if (psk_len < mk_len) 148 data_len = 2 + psk_len + 6 + seed_len; 153 WPA_PUT_BE16(pos, psk_len); 155 os_memcpy(pos, psk, psk_len); 156 pos += psk_len; 197 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument 210 * KS = 16, PL = psk_len, CSuite_Sel = 0x00000000 0x0001 226 psk, psk_len, seed, seed_len, 233 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, argument 116 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 287 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_gpsk_common.h | 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_gpsk_common.c | 115 const u8 *psk, size_t psk_len, 142 if (psk_len < mk_len) 145 data_len = 2 + psk_len + 6 + seed_len; 150 WPA_PUT_BE16(pos, psk_len); 152 os_memcpy(pos, psk, psk_len); 153 pos += psk_len; 194 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument 207 * KS = 16, PL = psk_len, CSuite_Sel = 0x00000000 0x0001 223 psk, psk_len, seed, seed_len, 230 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, argument 113 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 284 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_gpsk_common.h | 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_gpsk_common.c | 115 const u8 *psk, size_t psk_len, 142 if (psk_len < mk_len) 145 data_len = 2 + psk_len + 6 + seed_len; 150 WPA_PUT_BE16(pos, psk_len); 152 os_memcpy(pos, psk, psk_len); 153 pos += psk_len; 194 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument 207 * KS = 16, PL = psk_len, CSuite_Sel = 0x00000000 0x0001 223 psk, psk_len, seed, seed_len, 230 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, argument 113 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 284 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_gpsk_common.h | 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_gpsk_common.c | 115 const u8 *psk, size_t psk_len, 142 if (psk_len < mk_len) 145 data_len = 2 + psk_len + 6 + seed_len; 150 WPA_PUT_BE16(pos, psk_len); 152 os_memcpy(pos, psk, psk_len); 153 pos += psk_len; 194 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, argument 207 * KS = 16, PL = psk_len, CSuite_Sel = 0x00000000 0x0001 223 psk, psk_len, seed, seed_len, 230 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, argument 113 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 284 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument [all...] |
H A D | eap_gpsk_common.h | 55 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
|
/external/openssl/ssl/ |
H A D | d1_clnt.c | 1250 unsigned int pre_ms_len = 0, psk_len = 0; local 1261 psk_len = s->psk_client_callback(s, s->ctx->psk_identity_hint, 1264 if (psk_len > PSK_MAX_PSK_LEN) 1270 else if (psk_len == 0) 1278 pre_ms_len = 2+psk_len+2+psk_len; 1280 memmove(psk_or_pre_ms+psk_len+4, psk_or_pre_ms, psk_len); 1281 s2n(psk_len, t); 1282 memset(t, 0, psk_len); [all...] |
H A D | s3_clnt.c | 2639 unsigned int pre_ms_len = 0, psk_len = 0; local 2650 psk_len = s->psk_client_callback(s, s->ctx->psk_identity_hint, 2653 if (psk_len > PSK_MAX_PSK_LEN) 2659 else if (psk_len == 0) 2667 pre_ms_len = 2+psk_len+2+psk_len; 2669 memmove(psk_or_pre_ms+psk_len+4, psk_or_pre_ms, psk_len); 2670 s2n(psk_len, t); 2671 memset(t, 0, psk_len); [all...] |
H A D | s3_srvr.c | 2547 unsigned int pre_ms_len = 0, psk_len = 0; local 2577 psk_len = s->psk_server_callback(s, tmp_id, 2581 if (psk_len > PSK_MAX_PSK_LEN) 2587 else if (psk_len == 0) 2597 pre_ms_len=2+psk_len+2+psk_len; 2599 memmove(psk_or_pre_ms+psk_len+4, psk_or_pre_ms, psk_len); 2600 s2n(psk_len, t); 2601 memset(t, 0, psk_len); [all...] |
H A D | ssltest.c | 2418 unsigned int psk_len = 0; local 2428 psk_len = ret; 2430 return psk_len; 2436 unsigned int psk_len=0; local 2443 psk_len=psk_key2bn(psk_key, psk, max_psk_len); 2444 return psk_len;
|
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
H A D | wps.h | 180 * @psk_len: The length of psk in octets 186 size_t psk_len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_gpsk.c | 40 size_t psk_len; member in struct:eap_gpsk_data 117 data->psk_len = password_len; 348 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_gpsk.c | 41 size_t psk_len; member in struct:eap_gpsk_data 118 data->psk_len = password_len; 349 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_gpsk.c | 41 size_t psk_len; member in struct:eap_gpsk_data 118 data->psk_len = password_len; 349 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_gpsk.c | 41 size_t psk_len; member in struct:eap_gpsk_data 118 data->psk_len = password_len; 349 if (eap_gpsk_derive_keys(data->psk, data->psk_len,
|
/external/openssl/apps/ |
H A D | s_client.c | 224 unsigned int psk_len = 0; local 262 psk_len=BN_bn2bin(bn, psk); 264 if (psk_len == 0) 268 BIO_printf(bio_c_out, "created PSK len=%d\n", psk_len); 270 return psk_len;
|
H A D | s_server.c | 312 unsigned int psk_len = 0; local 360 psk_len = (unsigned int)ret; 363 BIO_printf(bio_s_out, "fetched PSK len=%d\n", psk_len); 364 return psk_len;
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wps_hostapd.c | 89 size_t psk_len) 97 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); 99 if (psk_len != PMK_LEN) { 101 (unsigned long) psk_len); 126 wpa_snprintf_hex(hex, sizeof(hex), psk, psk_len); 88 hostapd_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *psk, size_t psk_len) argument
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wps_hostapd.c | 89 size_t psk_len) 97 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); 99 if (psk_len != PMK_LEN) { 101 (unsigned long) psk_len); 126 wpa_snprintf_hex(hex, sizeof(hex), psk, psk_len); 88 hostapd_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *psk, size_t psk_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wps_hostapd.c | 89 size_t psk_len) 97 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); 99 if (psk_len != PMK_LEN) { 101 (unsigned long) psk_len); 126 wpa_snprintf_hex(hex, sizeof(hex), psk, psk_len); 88 hostapd_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *psk, size_t psk_len) argument
|