/external/wpa_supplicant_8/src/eap_common/ |
D | eap_gpsk_common.c | 110 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() argument 137 if (psk_len < mk_len) in eap_gpsk_derive_keys_helper() 140 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper() 145 WPA_PUT_BE16(pos, psk_len); in eap_gpsk_derive_keys_helper() 147 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper() 148 pos += psk_len; in eap_gpsk_derive_keys_helper() 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument 252 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_sha256() [all …]
|
D | eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_gpsk.c | 35 size_t psk_len; member 124 data->psk_len = password_len; in eap_gpsk_init() 136 os_memset(data->psk, 0, data->psk_len); in eap_gpsk_deinit() 364 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2() 378 if (eap_gpsk_derive_session_id(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
|
/external/wpa_supplicant_8/src/ap/ |
D | wpa_auth_glue.c | 318 const u8 *prev_psk, size_t *psk_len, in hostapd_wpa_auth_get_psk() argument 327 if (psk_len) in hostapd_wpa_auth_get_psk() 328 *psk_len = PMK_LEN; in hostapd_wpa_auth_get_psk() 346 if (psk_len) in hostapd_wpa_auth_get_psk() 347 *psk_len = sta->owe_pmk_len; in hostapd_wpa_auth_get_psk() 355 if (psk_len) in hostapd_wpa_auth_get_psk() 356 *psk_len = sa->pmk_len; in hostapd_wpa_auth_get_psk()
|
D | wps_hostapd.c | 97 size_t psk_len) in hostapd_wps_new_psk_cb() argument 113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); in hostapd_wps_new_psk_cb() 115 if (psk_len != PMK_LEN) { in hostapd_wps_new_psk_cb() 117 (unsigned long) psk_len); in hostapd_wps_new_psk_cb() 132 psk, psk_len); in hostapd_wps_new_psk_cb() 150 wpa_snprintf_hex(hex, sizeof(hex), psk, psk_len); in hostapd_wps_new_psk_cb()
|
D | hostapd.h | 282 size_t psk_len);
|
D | wpa_auth.h | 281 const u8 *prev_psk, size_t *psk_len,
|
D | wpa_auth.c | 119 const u8 *prev_psk, size_t *psk_len, in wpa_auth_get_psk() argument 125 prev_psk, psk_len, vlan_id); in wpa_auth_get_psk() 2115 size_t psk_len; in SM_STATE() local 2119 &psk_len, NULL); in SM_STATE() 2121 os_memcpy(sm->PMK, psk, psk_len); in SM_STATE() 2122 sm->pmk_len = psk_len; in SM_STATE()
|
/external/boringssl/src/ssl/ |
D | handshake_client.cc | 1274 unsigned psk_len = 0; in do_send_client_key_exchange() local 1284 psk_len = hs->config->psk_client_callback( in do_send_client_key_exchange() 1287 if (psk_len == 0) { in do_send_client_key_exchange() 1292 assert(psk_len <= PSK_MAX_PSK_LEN); in do_send_client_key_exchange() 1363 if (!pms.Init(psk_len)) { in do_send_client_key_exchange() 1378 if (!CBB_init(pms_cbb.get(), 2 + psk_len + 2 + pms.size()) || in do_send_client_key_exchange() 1382 !CBB_add_bytes(&child, psk, psk_len) || in do_send_client_key_exchange()
|
D | handshake_server.cc | 1359 unsigned psk_len = hs->config->psk_server_callback( in do_read_client_key_exchange() local 1361 if (psk_len > PSK_MAX_PSK_LEN) { in do_read_client_key_exchange() 1365 } else if (psk_len == 0) { in do_read_client_key_exchange() 1375 if (!premaster_secret.Init(psk_len)) { in do_read_client_key_exchange() 1384 2 + psk_len + 2 + premaster_secret.size()) || in do_read_client_key_exchange() 1389 !CBB_add_bytes(&child, psk, psk_len) || in do_read_client_key_exchange()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | mesh_rsn.c | 79 size_t *psk_len, int *vlan_id) in auth_get_psk() argument 85 if (psk_len) in auth_get_psk() 86 *psk_len = PMK_LEN; in auth_get_psk()
|
D | ibss_rsn.c | 277 size_t *psk_len, int *vlan_id) in auth_get_psk() argument 281 if (psk_len) in auth_get_psk() 282 *psk_len = PMK_LEN; in auth_get_psk()
|
D | p2p_supplicant.h | 154 const u8 *psk, size_t psk_len);
|
D | ap.c | 691 const u8 *psk, size_t psk_len) in ap_new_psk_cb() argument 697 wpas_p2p_new_psk_cb(wpa_s, mac_addr, p2p_dev_addr, psk, psk_len); in ap_new_psk_cb()
|
D | wps_supplicant.c | 1431 size_t psk_len) in wpas_wps_new_psk_cb() argument 1443 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); in wpas_wps_new_psk_cb()
|
D | p2p_supplicant.c | 8362 const u8 *psk, size_t psk_len) in wpas_p2p_new_psk_cb() argument 8368 if (psk_len != sizeof(p->psk)) in wpas_p2p_new_psk_cb() 8398 os_memcpy(p->psk, psk, psk_len); in wpas_p2p_new_psk_cb() 8424 os_memcpy(p->psk, psk, psk_len); in wpas_p2p_new_psk_cb()
|
/external/wpa_supplicant_8/src/wps/ |
D | wps_i.h | 219 const u8 *p2p_dev_addr, const u8 *psk, size_t psk_len);
|
D | wps.h | 269 const u8 *psk, size_t psk_len);
|
D | wps_registrar.c | 149 const u8 *psk, size_t psk_len); 1231 const u8 *p2p_dev_addr, const u8 *psk, size_t psk_len) in wps_cb_new_psk() argument 1237 psk_len); in wps_cb_new_psk()
|
/external/wpa_supplicant_8/wpa_supplicant/dbus/ |
D | dbus_new_handlers_p2p.c | 2470 u8 psk_len = 0; in wpas_dbus_getter_p2p_group_psk() local 2478 psk_len = sizeof(ssid->psk); in wpas_dbus_getter_p2p_group_psk() 2482 p_psk, psk_len, error); in wpas_dbus_getter_p2p_group_psk()
|