/external/wpa_supplicant_8/src/eap_common/ |
eap_psk_common.h | 44 u8 mac_p[EAP_PSK_MAC_LEN]; member in struct:eap_psk_hdr_2
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 296 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 316 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", resp->mac_p, EAP_PSK_MAC_LEN); 317 if (os_memcmp(mac, resp->mac_p, EAP_PSK_MAC_LEN) != 0) { 318 wpa_printf(MSG_INFO, "EAP-PSK: Invalid MAC_P"); 319 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: Expected MAC_P",
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 146 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 160 if (omac1_aes_128(data->ak, buf, buflen, hdr2->mac_p)) { 168 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", hdr2->mac_p, EAP_PSK_MAC_LEN);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 288 * @mac_p: Peer MAC address 294 * SMKID = HMAC-SHA1-128(SMK, "SMK Name" || PNonce || MAC_P || INonce || MAC_I) 296 static void rsn_smkid(const u8 *smk, const u8 *pnonce, const u8 *mac_p, 308 addr[2] = mac_p; 1036 * MIC=MIC, DataKDs=(RSNIE_I, MAC_P KDE)) [all...] |
/external/wpa_supplicant_8/src/ap/ |
peerkey_auth.c | 210 * MIC=MIC, DataKDs=(RSNIE_P, MAC_P KDE, PNonce, SMK KDE,
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 86 * Min(MAC_I, MAC_P) || Max(MAC_I, MAC_P) || [all...] |