| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_gpsk_common.c | 110 const u8 *psk, size_t psk_len, 137 if (psk_len < mk_len) 140 data_len = 2 + psk_len + 6 + seed_len; 145 WPA_PUT_BE16(pos, psk_len); 147 os_memcpy(pos, psk, psk_len); 148 pos += psk_len; 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, 202 * KS = 16, PL = psk_len, CSuite_Sel = 0x00000000 0x0001 218 psk, psk_len, seed, seed_len, 225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, [all...] |
| eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
| /src/external/bsd/wpa/dist/src/ap/ |
| wpa_auth_glue.c | 346 const u8 *prev_psk, size_t *psk_len, 355 if (psk_len) 356 *psk_len = PMK_LEN; 362 if (psk_len) 363 *psk_len = sta->sae->pmk_len; 376 if (psk_len) 377 *psk_len = sta->owe_pmk_len; 385 if (psk_len) 386 *psk_len = sa->pmk_len;
|
| wps_hostapd.c | 97 size_t psk_len) 113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); 115 if (psk_len != PMK_LEN) { 117 (unsigned long) psk_len); 132 psk, psk_len); 150 wpa_snprintf_hex(hex, sizeof(hex), psk, psk_len);
|
| hostapd.h | 304 size_t psk_len);
|
| wpa_auth.h | 344 const u8 *prev_psk, size_t *psk_len,
|
| wpa_auth.c | 266 const u8 *prev_psk, size_t *psk_len, 272 prev_psk, psk_len, vlan_id); 2667 size_t psk_len; local 2671 &psk_len, NULL); 2673 os_memcpy(sm->PMK, psk, psk_len); 2674 sm->pmk_len = psk_len; 2679 (psk_len == SHA512_MAC_LEN || psk_len == SHA384_MAC_LEN || 2680 psk_len == SHA256_MAC_LEN)) 2681 sm->xxkey_len = psk_len; [all...] |
| beacon.c | 2389 params->psk_len = PMK_LEN; 2395 params->psk_len = PMK_LEN;
|
| wpa_auth_ft.c | 2765 size_t psk_len; local 2769 NULL, &psk_len, NULL)) 2770 key_len = psk_len;
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_gpsk.c | 35 size_t psk_len; member in struct:eap_gpsk_data 124 data->psk_len = password_len; 136 os_memset(data->psk, 0, data->psk_len); 364 if (eap_gpsk_derive_keys(data->psk, data->psk_len, 378 if (eap_gpsk_derive_session_id(data->psk, data->psk_len,
|
| /src/external/bsd/wpa/dist/src/wps/ |
| wps_i.h | 220 const u8 *p2p_dev_addr, const u8 *psk, size_t psk_len);
|
| wps.h | 268 * @psk_len: The length of psk in octets 274 const u8 *psk, size_t psk_len);
|
| wps_registrar.c | 149 const u8 *psk, size_t psk_len); 1230 const u8 *p2p_dev_addr, const u8 *psk, size_t psk_len) 1236 psk_len);
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| ibss_rsn.c | 278 size_t *psk_len, int *vlan_id) 282 if (psk_len) 283 *psk_len = PMK_LEN;
|
| mesh_rsn.c | 79 size_t *psk_len, int *vlan_id) 85 if (psk_len) 86 *psk_len = PMK_LEN;
|
| p2p_supplicant.h | 165 const u8 *psk, size_t psk_len);
|
| ap.c | 885 const u8 *psk, size_t psk_len) 891 wpas_p2p_new_psk_cb(wpa_s, mac_addr, p2p_dev_addr, psk, psk_len);
|
| wps_supplicant.c | 1455 size_t psk_len) 1467 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len);
|
| p2p_supplicant.c | 8825 const u8 *psk, size_t psk_len) 8831 if (psk_len != sizeof(p->psk)) 8861 os_memcpy(p->psk, psk, psk_len); 8887 os_memcpy(p->psk, psk, psk_len);
|
| /src/external/bsd/wpa/dist/wpa_supplicant/dbus/ |
| dbus_new_handlers_p2p.c | 2526 u8 psk_len = 0; local 2534 psk_len = sizeof(ssid->psk); 2538 p_psk, psk_len, error);
|
| /src/sys/net/ |
| if_wg.c | 4663 size_t psk_len; local 4692 if (prop_dictionary_get_data(peer, "preshared_key", &psk, &psk_len)) { 4693 if (psk_len != sizeof(wgp->wgp_psk)) {
|
| /src/external/bsd/wpa/dist/src/drivers/ |
| driver.h | 1843 * psk_len - PSK length in bytes (0 = not set) 1845 size_t psk_len; member in struct:wpa_driver_ap_params
|
| driver_nl80211.c | 5194 params->psk_len && 5195 nla_put(msg, NL80211_ATTR_PMK, params->psk_len, params->psk))
|