Home
last modified time | relevance | path

Searched refs:prf_len (Results 1 – 4 of 4) sorted by relevance

/external/wpa_supplicant_8/src/eap_common/
Deap_eke_common.c133 int prf_len; in eap_eke_nonce_len() local
135 prf_len = eap_eke_prf_len(prf); in eap_eke_nonce_len()
136 if (prf_len < 0) in eap_eke_nonce_len()
139 if (prf_len > 2 * 16) in eap_eke_nonce_len()
140 return (prf_len + 1) / 2; in eap_eke_nonce_len()
337 os_memset(zeros, 0, sess->prf_len); in eap_eke_derive_key()
338 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, in eap_eke_derive_key()
342 temp, sess->prf_len); in eap_eke_derive_key()
352 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, in eap_eke_derive_key()
482 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ke_ki()
[all …]
Deap_eke_common.h73 int prf_len; member
/external/wpa_supplicant_8/src/eap_server/
Deap_server_eke.c313 plen = data->sess.pnonce_ps_len + data->sess.prf_len; in eap_eke_build_confirm()
349 auth = wpabuf_put(msg, data->sess.prf_len); in eap_eke_build_confirm()
355 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len); in eap_eke_build_confirm()
606 if (payloadlen < (size_t) data->sess.pnonce_len + data->sess.prf_len) { in eap_eke_process_confirm()
637 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth_p, data->sess.prf_len); in eap_eke_process_confirm()
639 data->sess.prf_len) != 0) { in eap_eke_process_confirm()
/external/wpa_supplicant_8/src/eap_peer/
Deap_eke.c528 if (pos + data->sess.pnonce_ps_len + data->sess.prf_len > end) { in eap_eke_process_confirm()
571 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth_s, data->sess.prf_len); in eap_eke_process_confirm()
573 data->sess.prf_len) != 0) { in eap_eke_process_confirm()
582 data->sess.pnonce_len + data->sess.prf_len, in eap_eke_process_confirm()
598 auth = wpabuf_put(resp, data->sess.prf_len); in eap_eke_process_confirm()
604 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len); in eap_eke_process_confirm()