Home
last modified time | relevance | path

Searched refs:EAP_SAKE_ROOT_SECRET_LEN (Results 1 – 4 of 4) sorted by relevance

/external/wpa_supplicant_8/src/eap_peer/
Deap_sake.c18 u8 root_secret_a[EAP_SAKE_ROOT_SECRET_LEN];
19 u8 root_secret_b[EAP_SAKE_ROOT_SECRET_LEN];
75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { in eap_sake_init()
97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN); in eap_sake_init()
99 password + EAP_SAKE_ROOT_SECRET_LEN, in eap_sake_init()
100 EAP_SAKE_ROOT_SECRET_LEN); in eap_sake_init()
/external/wpa_supplicant_8/src/eap_common/
Deap_sake_common.c270 root_secret_a, EAP_SAKE_ROOT_SECRET_LEN); in eap_sake_derive_keys()
271 eap_sake_kdf(root_secret_a, EAP_SAKE_ROOT_SECRET_LEN, in eap_sake_derive_keys()
285 root_secret_b, EAP_SAKE_ROOT_SECRET_LEN); in eap_sake_derive_keys()
286 eap_sake_kdf(root_secret_b, EAP_SAKE_ROOT_SECRET_LEN, in eap_sake_derive_keys()
Deap_sake_common.h37 #define EAP_SAKE_ROOT_SECRET_LEN 16 macro
/external/wpa_supplicant_8/src/eap_server/
Deap_server_sake.c352 sm->user->password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { in eap_sake_process_challenge()
355 2 * EAP_SAKE_ROOT_SECRET_LEN); in eap_sake_process_challenge()
360 sm->user->password + EAP_SAKE_ROOT_SECRET_LEN, in eap_sake_process_challenge()