| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_wsc.c | 151 u8 pkhash[WPS_OOB_PUBKEY_HASH_LEN]; local 227 pos = os_strstr(phase1, " pkhash="); 237 hexstr2bin(pos, pkhash, WPS_OOB_PUBKEY_HASH_LEN)) { 238 wpa_printf(MSG_INFO, "EAP-WSC: Invalid pkhash"); 242 cfg.peer_pubkey_hash = pkhash;
|
| /src/external/bsd/wpa/dist/src/ap/ |
| dpp_hostapd.c | 2061 u8 pkhash[SHA256_MAC_LEN]; local 2098 connector, connector_len, &expire, pkhash); 2145 WPA_KEY_MGMT_DPP, pkhash) < 0) { 2805 u8 pkhash[SHA256_MAC_LEN]; local 2883 connector, connector_len, &expire, pkhash); 2919 WPA_KEY_MGMT_DPP, pkhash) < 0) { 3414 config.pkhash = ctrl->pkhash; 3436 u8 pkhash[SHA256_MAC_LEN]; local 3450 hexstr2bin(pos, pkhash, SHA256_MAC_LEN) < 0 [all...] |
| ap_config.h | 267 u8 pkhash[SHA256_MAC_LEN]; member in struct:dpp_controller_conf
|
| /src/external/bsd/wpa/dist/src/common/ |
| dpp_tcp.c | 61 u8 pkhash[SHA256_MAC_LEN]; member in struct:dpp_relay_controller 153 os_memcpy(ctrl->pkhash, config->pkhash, SHA256_MAC_LEN); 166 dpp_relay_controller_get(struct dpp_global *dpp, const u8 *pkhash) 175 if (os_memcmp(pkhash, ctrl->pkhash, SHA256_MAC_LEN) == 0)
|
| dpp.h | 431 const u8 *pkhash; member in struct:dpp_relay_config
|
| dpp.c | 4549 char pkhash[2 * SHA256_MAC_LEN + 1]; local 4557 wpa_snprintf_hex(pkhash, sizeof(pkhash), bi->pubkey_hash, 4605 "pkhash=%s\n" 4613 pkhash, 5058 DPP_EVENT_AUTH_SUCCESS "init=%d pkhash=%s own=%d peer=%d",
|
| /src/external/bsd/wpa/dist/hostapd/ |
| config_file.c | 2389 val = get_param(pos, "pkhash="); 2391 hexstr2bin(val, conf->pkhash, SHA256_MAC_LEN) < 0)
|