/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.h | 35 u8 key_signature[16]; /* HMAC-MD5 message integrity check computed with member in struct:ieee802_1x_eapol_key
|
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/ |
eapol_supp_sm.c | 173 u8 key_signature[IEEE8021X_KEY_SIGN_LEN]; member in struct:ieee802_1x_eapol_key 719 os_memcpy(orig_key_sign, key->key_signature, IEEE8021X_KEY_SIGN_LEN); 720 os_memset(key->key_signature, 0, IEEE8021X_KEY_SIGN_LEN); 723 key->key_signature); 724 if (os_memcmp(orig_key_sign, key->key_signature, 728 os_memcpy(key->key_signature, orig_key_sign, [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 167 u8 key_signature[IEEE8021X_KEY_SIGN_LEN]; member in struct:ieee802_1x_eapol_key 739 os_memcpy(orig_key_sign, key->key_signature, IEEE8021X_KEY_SIGN_LEN); 740 os_memset(key->key_signature, 0, IEEE8021X_KEY_SIGN_LEN); 743 key->key_signature); 744 if (os_memcmp(orig_key_sign, key->key_signature, 748 os_memcpy(key->key_signature, orig_key_sign, [all...] |