HomeSort by relevance Sort by last modified time
    Searched refs:mac_s (Results 1 - 5 of 5) sorted by null

  /external/wpa_supplicant_8/src/crypto/
milenage.c 33 * @mac_s: Buffer for MAC-S = 64-bit resync authentication code, or %NULL
37 const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s)
70 if (mac_s)
71 os_memcpy(mac_s, tmp1 + 8, 8); /* f1* */
212 u8 ak[6], mac_s[8]; local
219 if (milenage_f1(opc, k, _rand, sqn, amf, NULL, mac_s) ||
220 memcmp(mac_s, auts + 6, 8) != 0)
milenage.h 23 const u8 *sqn, const u8 *amf, u8 *mac_a, u8 *mac_s);
  /external/wpa_supplicant_8/src/eap_common/
eap_psk_common.h 52 u8 mac_s[EAP_PSK_MAC_LEN]; member in struct:eap_psk_hdr_3
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 217 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_S", hdr3->mac_s, EAP_PSK_MAC_LEN);
228 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
240 if (os_memcmp(mac, hdr3->mac_s, EAP_PSK_MAC_LEN) != 0) {
241 wpa_printf(MSG_WARNING, "EAP-PSK: Invalid MAC_S in third "
247 wpa_printf(MSG_DEBUG, "EAP-PSK: MAC_S verified successfully");
  /external/wpa_supplicant_8/src/eap_server/
eap_server_psk.c 112 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
120 if (omac1_aes_128(data->ak, buf, buflen, psk->mac_s)) {

Completed in 48 milliseconds