/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.h | 87 const u8 *id_s, size_t id_s_len, const u8 *id_p, 94 const u8 *id_s, size_t id_s_len, 97 const u8 *id_s, size_t id_s_len, 101 const u8 *id_s, size_t id_s_len,
|
eap_eke_common.c | 333 const u8 *id_s, size_t id_s_len, const u8 *id_p, 349 /* key = prf+(temp, ID_S | ID_P) */ 353 os_memcpy(id, id_s, id_s_len); 355 wpa_hexdump_ascii(MSG_DEBUG, "EAP-EKE: ID_S | ID_P", 363 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: key = prf+(temp, ID_S | ID_P)", 453 const u8 *id_s, size_t id_s_len, 464 * Ke | Ki = prf+(SharedSecret, "EAP-EKE Keys" | ID_S | ID_P) 488 os_memcpy(data + label_len, id_s, id_s_len); 507 const u8 *id_s, size_t id_s_len, 517 * Ka = prf+(SharedSecret, "EAP-EKE Ka" | ID_S | ID_P | Nonce_P [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 26 u8 *id_s, *id_p; member in struct:eap_psk_data 77 os_free(data->id_s); 117 os_free(data->id_s); 119 data->id_s = os_malloc(data->id_s_len); 120 if (data->id_s == NULL) { 122 "ID_S (len=%lu)", (unsigned long) data->id_s_len); 126 os_memcpy(data->id_s, (u8 *) (hdr1 + 1), data->id_s_len); 127 wpa_hexdump_ascii(MSG_DEBUG, "EAP-PSK: ID_S", 128 data->id_s, data->id_s_len); 146 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) * [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
ctrl_iface.c | 2656 int id_s, id_d, ret; local [all...] |