HomeSort by relevance Sort by last modified time
    Searched full:mac_p (Results 1 - 8 of 8) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_psk_common.h 50 u8 mac_p[EAP_PSK_MAC_LEN]; member in struct:eap_psk_hdr_2
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_psk.c 301 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
321 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", resp->mac_p, EAP_PSK_MAC_LEN);
322 if (os_memcmp(mac, resp->mac_p, EAP_PSK_MAC_LEN) != 0) {
323 wpa_printf(MSG_INFO, "EAP-PSK: Invalid MAC_P");
324 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Expected MAC_P",
  /external/wpa_supplicant/
eap_psk_common.h 67 u8 mac_p[EAP_PSK_MAC_LEN]; member in struct:eap_psk_hdr_2
eap_psk.c 148 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
162 omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p);
166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN);
wpa.c 876 * Min(MAC_I, MAC_P) || Max(MAC_I, MAC_P) ||
1085 * MIC=MIC, DataKDs=(RSNIE_I, MAC_P KDE))
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_psk.c 149 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
163 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) {
171 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN);
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
peerkey.c 299 * @mac_p: Peer MAC address
305 * SMKID = HMAC-SHA1-128(SMK, "SMK Name" || PNonce || MAC_P || INonce || MAC_I)
307 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p,
319 addr[2] = mac_p;
1047 * MIC=MIC, DataKDs=(RSNIE_I, MAC_P KDE))
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/common/
wpa_common.c 90 * Min(MAC_I, MAC_P) || Max(MAC_I, MAC_P) ||

Completed in 2842 milliseconds