/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_gpsk_common.c | 110 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument 137 if (psk_len < mk_len) in eap_gpsk_derive_keys_helper() 140 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper() 145 WPA_PUT_BE16(pos, psk_len); in eap_gpsk_derive_keys_helper() 147 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper() 148 pos += psk_len; in eap_gpsk_derive_keys_helper() 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument 252 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256() [all …]
|
D | eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_gpsk_common.c | 110 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument 137 if (psk_len < mk_len) in eap_gpsk_derive_keys_helper() 140 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper() 145 WPA_PUT_BE16(pos, psk_len); in eap_gpsk_derive_keys_helper() 147 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper() 148 pos += psk_len; in eap_gpsk_derive_keys_helper() 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument 252 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256() [all …]
|
D | eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
/third_party/mbedtls/library/ |
D | ssl_tls13_client.c | 724 size_t *psk_len) in ssl_tls13_ticket_get_psk() argument 735 *psk_len = session->resumption_key_len; in ssl_tls13_ticket_get_psk() 762 size_t *psk_len) in ssl_tls13_psk_get_psk() argument 771 *psk_len = ssl->conf->psk_len; in ssl_tls13_psk_get_psk() 828 size_t psk_len, in ssl_tls13_write_binder() argument 857 psk, psk_len, psk_type, in ssl_tls13_write_binder() 1018 size_t psk_len; in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() local 1028 if (ssl_tls13_ticket_get_psk(ssl, &hash_alg, &psk, &psk_len) == 0) { in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() 1032 hash_alg, psk, psk_len, in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() 1041 if (ssl_tls13_psk_get_psk(ssl, &hash_alg, &psk, &psk_len) == 0) { in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() [all …]
|
D | ssl_tls13_keys.c | 830 unsigned char const *psk, size_t psk_len, in mbedtls_ssl_tls13_create_psk_binder() argument 865 psk, psk_len, /* Input */ in mbedtls_ssl_tls13_create_psk_binder() 1270 size_t psk_len = 0; in mbedtls_ssl_tls13_key_schedule_stage_early() local 1280 ret = mbedtls_ssl_tls13_export_handshake_psk(ssl, &psk, &psk_len); in mbedtls_ssl_tls13_key_schedule_stage_early() 1289 ret = mbedtls_ssl_tls13_evolve_secret(hash_alg, NULL, psk, psk_len, in mbedtls_ssl_tls13_key_schedule_stage_early() 1818 size_t *psk_len) in mbedtls_ssl_tls13_export_handshake_psk() argument 1824 *psk_len = 0; in mbedtls_ssl_tls13_export_handshake_psk() 1836 *psk_len = PSA_BITS_TO_BYTES(psa_get_key_bits(&key_attributes)); in mbedtls_ssl_tls13_export_handshake_psk() 1837 *psk = mbedtls_calloc(1, *psk_len); in mbedtls_ssl_tls13_export_handshake_psk() 1843 (uint8_t *) *psk, *psk_len, psk_len); in mbedtls_ssl_tls13_export_handshake_psk() [all …]
|
D | ssl_tls13_keys.h | 494 unsigned char const *psk, size_t psk_len, 658 size_t *psk_len);
|
D | ssl_misc.h | 800 size_t psk_len; /*!< Length of PSK from callback */ member 1527 const unsigned char **psk, size_t *psk_len) in mbedtls_ssl_get_psk() argument 1529 … if (ssl->MBEDTLS_PRIVATE(handshake)->psk != NULL && ssl->MBEDTLS_PRIVATE(handshake)->psk_len > 0) in mbedtls_ssl_get_psk() 1532 *psk_len = ssl->MBEDTLS_PRIVATE(handshake)->psk_len; in mbedtls_ssl_get_psk() 1534 ssl->MBEDTLS_PRIVATE(conf)->MBEDTLS_PRIVATE(psk_len) > 0) { in mbedtls_ssl_get_psk() 1536 *psk_len = ssl->MBEDTLS_PRIVATE(conf)->MBEDTLS_PRIVATE(psk_len); in mbedtls_ssl_get_psk() 1539 *psk_len = 0; in mbedtls_ssl_get_psk()
|
D | ssl_tls.c | 2113 if (conf->psk != NULL && conf->psk_len != 0) { in mbedtls_ssl_conf_has_static_psk() 2131 mbedtls_platform_zeroize(conf->psk, conf->psk_len); in ssl_conf_remove_psk() 2135 conf->psk_len = 0; in ssl_conf_remove_psk() 2175 const unsigned char *psk, size_t psk_len, in mbedtls_ssl_conf_psk() argument 2189 if (psk_len == 0) { in mbedtls_ssl_conf_psk() 2192 if (psk_len > MBEDTLS_PSK_MAX_LEN) { in mbedtls_ssl_conf_psk() 2196 if ((conf->psk = mbedtls_calloc(1, psk_len)) == NULL) { in mbedtls_ssl_conf_psk() 2199 conf->psk_len = psk_len; in mbedtls_ssl_conf_psk() 2200 memcpy(conf->psk, psk, conf->psk_len); in mbedtls_ssl_conf_psk() 2226 ssl->handshake->psk_len); in ssl_remove_psk() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_gpsk.c | 35 size_t psk_len; member 124 data->psk_len = password_len; in eap_gpsk_init() 136 os_memset(data->psk, 0, data->psk_len); in eap_gpsk_deinit() 364 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2() 378 if (eap_gpsk_derive_session_id(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_gpsk.c | 35 size_t psk_len; member 124 data->psk_len = password_len; in eap_gpsk_init() 136 os_memset(data->psk, 0, data->psk_len); in eap_gpsk_deinit() 364 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2() 378 if (eap_gpsk_derive_session_id(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | wpa_auth_glue.c | 253 const u8 *prev_psk, size_t *psk_len, in hostapd_wpa_auth_get_psk() argument 262 if (psk_len) in hostapd_wpa_auth_get_psk() 263 *psk_len = PMK_LEN; in hostapd_wpa_auth_get_psk() 281 if (psk_len) in hostapd_wpa_auth_get_psk() 282 *psk_len = sta->owe_pmk_len; in hostapd_wpa_auth_get_psk() 290 if (psk_len) in hostapd_wpa_auth_get_psk() 291 *psk_len = sa->pmk_len; in hostapd_wpa_auth_get_psk()
|
D | wps_hostapd.c | 97 size_t psk_len) in hostapd_wps_new_psk_cb() argument 113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); in hostapd_wps_new_psk_cb() 115 if (psk_len != PMK_LEN) { in hostapd_wps_new_psk_cb() 117 (unsigned long) psk_len); in hostapd_wps_new_psk_cb() 131 psk, psk_len); in hostapd_wps_new_psk_cb() 148 wpa_snprintf_hex(hex, sizeof(hex), psk, psk_len); in hostapd_wps_new_psk_cb()
|
/third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
D | callbacks.rs | 91 Ok(psk_len) => psk_len as u32, in raw_client_psk() 129 Ok(psk_len) => psk_len as u32, in raw_server_psk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | wpa_auth_glue.c | 332 const u8 *prev_psk, size_t *psk_len, in hostapd_wpa_auth_get_psk() argument 341 if (psk_len) in hostapd_wpa_auth_get_psk() 342 *psk_len = PMK_LEN; in hostapd_wpa_auth_get_psk() 360 if (psk_len) in hostapd_wpa_auth_get_psk() 361 *psk_len = sta->owe_pmk_len; in hostapd_wpa_auth_get_psk() 369 if (psk_len) in hostapd_wpa_auth_get_psk() 370 *psk_len = sa->pmk_len; in hostapd_wpa_auth_get_psk()
|
D | wps_hostapd.c | 97 size_t psk_len) in hostapd_wps_new_psk_cb() argument 113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); in hostapd_wps_new_psk_cb() 115 if (psk_len != PMK_LEN) { in hostapd_wps_new_psk_cb() 117 (unsigned long) psk_len); in hostapd_wps_new_psk_cb() 132 psk, psk_len); in hostapd_wps_new_psk_cb() 150 wpa_snprintf_hex(hex, sizeof(hex), psk, psk_len); in hostapd_wps_new_psk_cb()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | mesh_rsn.c | 79 size_t *psk_len, int *vlan_id) in auth_get_psk() argument 85 if (psk_len) in auth_get_psk() 86 *psk_len = PMK_LEN; in auth_get_psk()
|
D | ibss_rsn.c | 277 size_t *psk_len, int *vlan_id) in auth_get_psk() argument 281 if (psk_len) in auth_get_psk() 282 *psk_len = PMK_LEN; in auth_get_psk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | mesh_rsn.c | 79 size_t *psk_len, int *vlan_id) in auth_get_psk() argument 85 if (psk_len) in auth_get_psk() 86 *psk_len = PMK_LEN; in auth_get_psk()
|
D | ibss_rsn.c | 263 size_t *psk_len, int *vlan_id) in auth_get_psk() argument 267 if (psk_len) in auth_get_psk() 268 *psk_len = PMK_LEN; in auth_get_psk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
D | wps_i.h | 219 const u8 *p2p_dev_addr, const u8 *psk, size_t psk_len);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
D | wps_i.h | 219 const u8 *p2p_dev_addr, const u8 *psk, size_t psk_len);
|
/third_party/openssl/test/ |
D | ssl_old_test.c | 2970 unsigned int psk_len = 0; in psk_client_callback() local 2981 psk_len = ret; in psk_client_callback() 2983 return psk_len; in psk_client_callback() 2990 unsigned int psk_len = 0; in psk_server_callback() local 2996 psk_len = psk_key2bn(psk_key, psk, max_psk_len); in psk_server_callback() 2997 return psk_len; in psk_server_callback()
|
/third_party/mbedtls/include/mbedtls/ |
D | ssl.h | 1515 size_t MBEDTLS_PRIVATE(psk_len); /*!< The length of the raw pre-shared key. 3443 const unsigned char *psk, size_t psk_len, 3507 const unsigned char *psk, size_t psk_len);
|
/third_party/mbedtls/programs/ssl/ |
D | ssl_server2.c | 1315 size_t psk_len) in psa_setup_psk_key_slot() argument 1325 status = psa_import_key(&key_attributes, psk, psk_len, slot); in psa_setup_psk_key_slot() 1479 size_t psk_len = 0; in main() local 2380 opt.psk, &psk_len) != 0) { in main() 3160 status = psa_setup_psk_key_slot(&psk_slot, alg, psk, psk_len); in main() 3175 if (psk_len > 0) { in main() 3176 ret = mbedtls_ssl_conf_psk(&conf, psk, psk_len, in main()
|