Searched refs:auth_p (Results 1 - 3 of 3) sorted by relevance
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_eke.c | 595 u8 auth_p[EAP_EKE_MAX_HASH_LEN]; local 632 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth_p) < 0) { 637 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth_p, data->sess.prf_len); 638 if (os_memcmp(auth_p, payload + data->sess.pnonce_len,
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_eke.c | 595 u8 auth_p[EAP_EKE_MAX_HASH_LEN]; local 632 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth_p) < 0) { 637 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth_p, data->sess.prf_len); 638 if (os_memcmp(auth_p, payload + data->sess.pnonce_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_eke.c | 595 u8 auth_p[EAP_EKE_MAX_HASH_LEN]; local 632 if (eap_eke_auth(&data->sess, "EAP-EKE peer", data->msgs, auth_p) < 0) { 637 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth_p, data->sess.prf_len); 638 if (os_memcmp(auth_p, payload + data->sess.pnonce_len,
|
Completed in 84 milliseconds