Searched refs:EAP_SAKE_ROOT_SECRET_LEN (Results 1 – 4 of 4) sorted by relevance
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_sake.c | 18 u8 root_secret_a[EAP_SAKE_ROOT_SECRET_LEN]; 19 u8 root_secret_b[EAP_SAKE_ROOT_SECRET_LEN]; 75 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { in eap_sake_init() 97 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN); in eap_sake_init() 99 password + EAP_SAKE_ROOT_SECRET_LEN, in eap_sake_init() 100 EAP_SAKE_ROOT_SECRET_LEN); in eap_sake_init()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sake_common.c | 270 root_secret_a, EAP_SAKE_ROOT_SECRET_LEN); in eap_sake_derive_keys() 271 eap_sake_kdf(root_secret_a, EAP_SAKE_ROOT_SECRET_LEN, in eap_sake_derive_keys() 285 root_secret_b, EAP_SAKE_ROOT_SECRET_LEN); in eap_sake_derive_keys() 286 eap_sake_kdf(root_secret_b, EAP_SAKE_ROOT_SECRET_LEN, in eap_sake_derive_keys()
|
D | eap_sake_common.h | 37 #define EAP_SAKE_ROOT_SECRET_LEN 16 macro
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_sake.c | 352 sm->user->password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { in eap_sake_process_challenge() 355 2 * EAP_SAKE_ROOT_SECRET_LEN); in eap_sake_process_challenge() 360 sm->user->password + EAP_SAKE_ROOT_SECRET_LEN, in eap_sake_process_challenge()
|