Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching refs:pos

123 	u8 mk[32], *pos, *data;
151 pos = data;
152 WPA_PUT_BE16(pos, psk_len);
153 pos += 2;
154 os_memcpy(pos, psk, psk_len);
155 pos += psk_len;
156 WPA_PUT_BE32(pos, EAP_GPSK_VENDOR_IETF); /* CSuite/Vendor = IETF */
157 pos += 4;
158 WPA_PUT_BE16(pos, csuite_specifier); /* CSuite/Specifier */
159 pos += 2;
160 os_memcpy(pos, seed, seed_len); /* inputString */
174 pos = kdf_out;
175 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: MSK", pos, EAP_MSK_LEN);
176 os_memcpy(msk, pos, EAP_MSK_LEN);
177 pos += EAP_MSK_LEN;
179 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: EMSK", pos, EAP_EMSK_LEN);
180 os_memcpy(emsk, pos, EAP_EMSK_LEN);
181 pos += EAP_EMSK_LEN;
183 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: SK", pos, sk_len);
184 os_memcpy(sk, pos, sk_len);
185 pos += sk_len;
188 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len);
189 os_memcpy(pk, pos, pk_len);
294 u8 *seed, *pos;
315 pos = seed;
316 os_memcpy(pos, rand_peer, EAP_GPSK_RAND_LEN);
317 pos += EAP_GPSK_RAND_LEN;
318 os_memcpy(pos, id_peer, id_peer_len);
319 pos += id_peer_len;
320 os_memcpy(pos, rand_server, EAP_GPSK_RAND_LEN);
321 pos += EAP_GPSK_RAND_LEN;
322 os_memcpy(pos, id_server, id_server_len);
323 pos += id_server_len;