/external/wpa_supplicant_8/src/eap_common/ |
eap_gpsk_common.h | 51 const u8 *rand_client, const u8 *rand_server, 58 const u8 *rand_peer, const u8 *rand_server,
|
eap_gpsk_common.c | 199 * inputString = RAND_Peer || ID_Peer || RAND_Server || ID_Server 235 * inputString = RAND_Peer || ID_Peer || RAND_Server || ID_Server 265 * @rand_server: 32-byte RAND_Server 280 const u8 *rand_peer, const u8 *rand_server, 298 /* Seed = RAND_Peer || ID_Peer || RAND_Server || ID_Server */ 312 os_memcpy(pos, rand_server, EAP_GPSK_RAND_LEN); 407 * @rand_server: 32-byte RAND_Server 419 const u8 *rand_peer, const u8 *rand_server, [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gpsk.c | 19 u8 rand_server[EAP_GPSK_RAND_LEN]; member in struct:eap_gpsk_data 110 if (random_get_bytes(data->rand_server, EAP_GPSK_RAND_LEN)) { 115 wpa_hexdump(MSG_MSGDUMP, "EAP-GPSK: RAND_Server", 116 data->rand_server, EAP_GPSK_RAND_LEN); 132 wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN); 168 wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN); 318 "RAND_Server"); 322 if (os_memcmp(data->rand_server, pos, EAP_GPSK_RAND_LEN) != 0) { 323 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1 and " 325 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1" [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 18 u8 rand_server[EAP_GPSK_RAND_LEN]; member in struct:eap_gpsk_data 166 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow"); 169 os_memcpy(data->rand_server, pos, EAP_GPSK_RAND_LEN); 170 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server", 171 data->rand_server, EAP_GPSK_RAND_LEN); 334 wpabuf_put_data(resp, data->rand_server, EAP_GPSK_RAND_LEN); 345 data->rand_peer, data->rand_server, 359 data->rand_peer, data->rand_server, 409 "RAND_Server"); 412 if (os_memcmp(pos, data->rand_server, EAP_GPSK_RAND_LEN) != 0) [all...] |