| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_gpsk.c | 35 size_t psk_len; member in struct:eap_gpsk_data 124 data->psk_len = password_len; 136 os_memset(data->psk, 0, data->psk_len); 364 if (eap_gpsk_derive_keys(data->psk, data->psk_len, 378 if (eap_gpsk_derive_session_id(data->psk, data->psk_len,
|
| /src/external/bsd/wpa/dist/wpa_supplicant/dbus/ |
| dbus_new_handlers_p2p.c | 2526 u8 psk_len = 0; local 2534 psk_len = sizeof(ssid->psk); 2538 p_psk, psk_len, error);
|
| /src/external/bsd/wpa/dist/src/ap/ |
| wpa_auth.c | 266 const u8 *prev_psk, size_t *psk_len, 272 prev_psk, psk_len, vlan_id); 2667 size_t psk_len; local 2671 &psk_len, NULL); 2673 os_memcpy(sm->PMK, psk, psk_len); 2674 sm->pmk_len = psk_len; 2679 (psk_len == SHA512_MAC_LEN || psk_len == SHA384_MAC_LEN || 2680 psk_len == SHA256_MAC_LEN)) 2681 sm->xxkey_len = psk_len; [all...] |
| wpa_auth_ft.c | 2765 size_t psk_len; local 2769 NULL, &psk_len, NULL)) 2770 key_len = psk_len;
|
| /src/sys/net/ |
| if_wg.c | 4663 size_t psk_len; local 4692 if (prop_dictionary_get_data(peer, "preshared_key", &psk, &psk_len)) { 4693 if (psk_len != sizeof(wgp->wgp_psk)) {
|
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver.h | 1843 * psk_len - PSK length in bytes (0 = not set) 1845 size_t psk_len; member in struct:wpa_driver_ap_params
|