HomeSort by: relevance | last modified time | path
    Searched refs:pkhash (Results 1 - 7 of 7) sorted by relevancy

  /src/external/bsd/wpa/dist/src/eap_peer/
eap_wsc.c 151 u8 pkhash[WPS_OOB_PUBKEY_HASH_LEN]; local
227 pos = os_strstr(phase1, " pkhash=");
237 hexstr2bin(pos, pkhash, WPS_OOB_PUBKEY_HASH_LEN)) {
238 wpa_printf(MSG_INFO, "EAP-WSC: Invalid pkhash");
242 cfg.peer_pubkey_hash = pkhash;
  /src/external/bsd/wpa/dist/src/ap/
dpp_hostapd.c 2061 u8 pkhash[SHA256_MAC_LEN]; local
2098 connector, connector_len, &expire, pkhash);
2145 WPA_KEY_MGMT_DPP, pkhash) < 0) {
2805 u8 pkhash[SHA256_MAC_LEN]; local
2883 connector, connector_len, &expire, pkhash);
2919 WPA_KEY_MGMT_DPP, pkhash) < 0) {
3414 config.pkhash = ctrl->pkhash;
3436 u8 pkhash[SHA256_MAC_LEN]; local
3450 hexstr2bin(pos, pkhash, SHA256_MAC_LEN) < 0
    [all...]
ap_config.h 267 u8 pkhash[SHA256_MAC_LEN]; member in struct:dpp_controller_conf
  /src/external/bsd/wpa/dist/src/common/
dpp_tcp.c 61 u8 pkhash[SHA256_MAC_LEN]; member in struct:dpp_relay_controller
153 os_memcpy(ctrl->pkhash, config->pkhash, SHA256_MAC_LEN);
166 dpp_relay_controller_get(struct dpp_global *dpp, const u8 *pkhash)
175 if (os_memcmp(pkhash, ctrl->pkhash, SHA256_MAC_LEN) == 0)
dpp.h 431 const u8 *pkhash; member in struct:dpp_relay_config
dpp.c 4549 char pkhash[2 * SHA256_MAC_LEN + 1]; local
4557 wpa_snprintf_hex(pkhash, sizeof(pkhash), bi->pubkey_hash,
4605 "pkhash=%s\n"
4613 pkhash,
5058 DPP_EVENT_AUTH_SUCCESS "init=%d pkhash=%s own=%d peer=%d",
  /src/external/bsd/wpa/dist/hostapd/
config_file.c 2389 val = get_param(pos, "pkhash=");
2391 hexstr2bin(val, conf->pkhash, SHA256_MAC_LEN) < 0)

Completed in 43 milliseconds