/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_psk_common.h | 50 u8 mac_p[EAP_PSK_MAC_LEN]; member in struct:eap_psk_hdr_2
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 301 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 321 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", resp->mac_p, EAP_PSK_MAC_LEN); 322 if (os_memcmp(mac, resp->mac_p, EAP_PSK_MAC_LEN) != 0) { 323 wpa_printf(MSG_INFO, "EAP-PSK: Invalid MAC_P"); 324 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Expected MAC_P",
|
/external/wpa_supplicant/ |
eap_psk_common.h | 67 u8 mac_p[EAP_PSK_MAC_LEN]; member in struct:eap_psk_hdr_2
|
eap_psk.c | 148 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 162 omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p); 166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN);
|
wpa.c | 876 * Min(MAC_I, MAC_P) || Max(MAC_I, MAC_P) || 1085 * MIC=MIC, DataKDs=(RSNIE_I, MAC_P KDE)) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 149 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 163 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) { 171 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 299 * @mac_p: Peer MAC address 305 * SMKID = HMAC-SHA1-128(SMK, "SMK Name" || PNonce || MAC_P || INonce || MAC_I) 307 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, 319 addr[2] = mac_p; 1047 * MIC=MIC, DataKDs=(RSNIE_I, MAC_P KDE)) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
wpa_common.c | 90 * Min(MAC_I, MAC_P) || Max(MAC_I, MAC_P) ||
|