/external/wpa_supplicant/ |
eap_gpsk_common.h | 57 const u8 *rand_client, const u8 *rand_server,
|
eap_gpsk.c | 24 u8 rand_server[EAP_GPSK_RAND_LEN]; member in struct:eap_gpsk_data 173 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow"); 176 os_memcpy(data->rand_server, pos, EAP_GPSK_RAND_LEN); 177 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server", 178 data->rand_server, EAP_GPSK_RAND_LEN); 350 os_memcpy(rpos, data->rand_server, EAP_GPSK_RAND_LEN); 365 data->rand_peer, data->rand_server, 414 "RAND_Server"); 417 if (os_memcmp(pos, data->rand_server, EAP_GPSK_RAND_LEN) != 0) { 418 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1 and [all...] |
eap_gpsk_common.c | 207 * inputString = RAND_Peer || ID_Peer || RAND_Server || ID_Server 243 * inputString = RAND_Peer || ID_Peer || RAND_Server || ID_Server 273 * @rand_server: 32-byte RAND_Server 288 const u8 *rand_peer, const u8 *rand_server, 306 /* Seed = RAND_Peer || ID_Peer || RAND_Server || ID_Server */ 320 os_memcpy(pos, rand_server, EAP_GPSK_RAND_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_gpsk_common.h | 57 const u8 *rand_client, const u8 *rand_server,
|
eap_gpsk_common.c | 208 * inputString = RAND_Peer || ID_Peer || RAND_Server || ID_Server 244 * inputString = RAND_Peer || ID_Peer || RAND_Server || ID_Server 274 * @rand_server: 32-byte RAND_Server 289 const u8 *rand_peer, const u8 *rand_server, 307 /* Seed = RAND_Peer || ID_Peer || RAND_Server || ID_Server */ 321 os_memcpy(pos, rand_server, EAP_GPSK_RAND_LEN);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_gpsk_common.h | 57 const u8 *rand_client, const u8 *rand_server,
|
eap_gpsk_common.c | 205 * inputString = RAND_Peer || ID_Peer || RAND_Server || ID_Server 241 * inputString = RAND_Peer || ID_Peer || RAND_Server || ID_Server 271 * @rand_server: 32-byte RAND_Server 286 const u8 *rand_peer, const u8 *rand_server, 304 /* Seed = RAND_Peer || ID_Peer || RAND_Server || ID_Server */ 318 os_memcpy(pos, rand_server, EAP_GPSK_RAND_LEN);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_gpsk.c | 24 u8 rand_server[EAP_GPSK_RAND_LEN]; member in struct:eap_gpsk_data 123 if (os_get_random(data->rand_server, EAP_GPSK_RAND_LEN)) { 128 wpa_hexdump(MSG_MSGDUMP, "EAP-GPSK: RAND_Server", 129 data->rand_server, EAP_GPSK_RAND_LEN); 145 wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN); 181 wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN); 331 "RAND_Server"); 335 if (os_memcmp(data->rand_server, pos, EAP_GPSK_RAND_LEN) != 0) { 336 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1 and " 338 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1" [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gpsk.c | 25 u8 rand_server[EAP_GPSK_RAND_LEN]; member in struct:eap_gpsk_data 124 if (random_get_bytes(data->rand_server, EAP_GPSK_RAND_LEN)) { 129 wpa_hexdump(MSG_MSGDUMP, "EAP-GPSK: RAND_Server", 130 data->rand_server, EAP_GPSK_RAND_LEN); 146 wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN); 182 wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN); 332 "RAND_Server"); 336 if (os_memcmp(data->rand_server, pos, EAP_GPSK_RAND_LEN) != 0) { 337 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1 and " 339 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1" [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_gpsk.c | 23 u8 rand_server[EAP_GPSK_RAND_LEN]; member in struct:eap_gpsk_data 171 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow"); 174 os_memcpy(data->rand_server, pos, EAP_GPSK_RAND_LEN); 175 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server", 176 data->rand_server, EAP_GPSK_RAND_LEN); 339 wpabuf_put_data(resp, data->rand_server, EAP_GPSK_RAND_LEN); 350 data->rand_peer, data->rand_server, 399 "RAND_Server"); 402 if (os_memcmp(pos, data->rand_server, EAP_GPSK_RAND_LEN) != 0) { 403 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1 and [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 24 u8 rand_server[EAP_GPSK_RAND_LEN]; member in struct:eap_gpsk_data 172 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow"); 175 os_memcpy(data->rand_server, pos, EAP_GPSK_RAND_LEN); 176 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server", 177 data->rand_server, EAP_GPSK_RAND_LEN); 340 wpabuf_put_data(resp, data->rand_server, EAP_GPSK_RAND_LEN); 351 data->rand_peer, data->rand_server, 400 "RAND_Server"); 403 if (os_memcmp(pos, data->rand_server, EAP_GPSK_RAND_LEN) != 0) { 404 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1 and [all...] |