/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_gpsk_common.c | 113 u8 *pk, size_t pk_len) 180 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); 181 os_memcpy(pk, pos, pk_len); 191 u8 *pk, size_t *pk_len) 213 *pk_len = EAP_GPSK_PK_LEN_AES; 219 pk, *pk_len); 275 * @pk_len: Buffer for returning length of PK 284 u8 *pk, size_t *pk_len) 320 pk, pk_len); 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
|
H A D | eap_gpsk_common.h | 55 u8 *pk, size_t *pk_len);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_gpsk_common.c | 113 u8 *pk, size_t pk_len) 180 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); 181 os_memcpy(pk, pos, pk_len); 191 u8 *pk, size_t *pk_len) 213 *pk_len = EAP_GPSK_PK_LEN_AES; 219 pk, *pk_len); 275 * @pk_len: Buffer for returning length of PK 284 u8 *pk, size_t *pk_len) 320 pk, pk_len); 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
|
H A D | eap_gpsk_common.h | 55 u8 *pk, size_t *pk_len);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_gpsk_common.c | 113 u8 *pk, size_t pk_len) 180 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); 181 os_memcpy(pk, pos, pk_len); 191 u8 *pk, size_t *pk_len) 213 *pk_len = EAP_GPSK_PK_LEN_AES; 219 pk, *pk_len); 275 * @pk_len: Buffer for returning length of PK 284 u8 *pk, size_t *pk_len) 320 pk, pk_len); 107 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 188 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 278 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
|
H A D | eap_gpsk_common.h | 55 u8 *pk, size_t *pk_len);
|
/external/wpa_supplicant_8/hostapd/src/wps/ |
H A D | wps_enrollee.c | 554 size_t pk_len) 556 if (pk == NULL || pk_len == 0) { 563 sha256_vector(1, &pk, &pk_len, hash); 568 pk, pk_len); 580 wps->dh_pubkey_r = wpabuf_alloc_copy(pk, pk_len); 553 wps_process_pubkey(struct wps_data *wps, const u8 *pk, size_t pk_len) argument
|
H A D | wps_registrar.c | 2316 size_t pk_len) 2318 if (pk == NULL || pk_len == 0) { 2324 wps->dh_pubkey_e = wpabuf_alloc_copy(pk, pk_len); 2315 wps_process_pubkey(struct wps_data *wps, const u8 *pk, size_t pk_len) argument
|
/external/wpa_supplicant_8/src/wps/ |
H A D | wps_enrollee.c | 554 size_t pk_len) 556 if (pk == NULL || pk_len == 0) { 563 sha256_vector(1, &pk, &pk_len, hash); 568 pk, pk_len); 580 wps->dh_pubkey_r = wpabuf_alloc_copy(pk, pk_len); 553 wps_process_pubkey(struct wps_data *wps, const u8 *pk, size_t pk_len) argument
|
H A D | wps_registrar.c | 2316 size_t pk_len) 2318 if (pk == NULL || pk_len == 0) { 2324 wps->dh_pubkey_e = wpabuf_alloc_copy(pk, pk_len); 2315 wps_process_pubkey(struct wps_data *wps, const u8 *pk, size_t pk_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/wps/ |
H A D | wps_enrollee.c | 554 size_t pk_len) 556 if (pk == NULL || pk_len == 0) { 563 sha256_vector(1, &pk, &pk_len, hash); 568 pk, pk_len); 580 wps->dh_pubkey_r = wpabuf_alloc_copy(pk, pk_len); 553 wps_process_pubkey(struct wps_data *wps, const u8 *pk, size_t pk_len) argument
|
H A D | wps_registrar.c | 2316 size_t pk_len) 2318 if (pk == NULL || pk_len == 0) { 2324 wps->dh_pubkey_e = wpabuf_alloc_copy(pk, pk_len); 2315 wps_process_pubkey(struct wps_data *wps, const u8 *pk, size_t pk_len) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_gpsk.c | 26 size_t pk_len; member in struct:eap_gpsk_data 416 data->pk, &data->pk_len) < 0) {
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_gpsk.c | 26 size_t pk_len; member in struct:eap_gpsk_data 416 data->pk, &data->pk_len) < 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_gpsk.c | 26 size_t pk_len; member in struct:eap_gpsk_data 416 data->pk, &data->pk_len) < 0) {
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_gpsk.c | 25 size_t pk_len; member in struct:eap_gpsk_data 374 data->pk, &data->pk_len) < 0) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_gpsk.c | 25 size_t pk_len; member in struct:eap_gpsk_data 374 data->pk, &data->pk_len) < 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_gpsk.c | 25 size_t pk_len; member in struct:eap_gpsk_data 374 data->pk, &data->pk_len) < 0) {
|