/external/wpa_supplicant_8/src/eap_common/ |
eap_gpsk_common.h | 51 const u8 *rand_client, const u8 *rand_server, 58 const u8 *rand_peer, const u8 *rand_server,
|
eap_gpsk_common.c | 199 * inputString = RAND_Peer || ID_Peer || RAND_Server || ID_Server 235 * inputString = RAND_Peer || ID_Peer || RAND_Server || ID_Server 265 * @rand_server: 32-byte RAND_Server 280 const u8 *rand_peer, const u8 *rand_server, 297 /* Seed = RAND_Peer || ID_Peer || RAND_Server || ID_Server */ 310 os_memcpy(pos, rand_server, EAP_GPSK_RAND_LEN); 406 * @rand_server: 32-byte RAND_Server 418 const u8 *rand_peer, const u8 *rand_server, [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gpsk.c | 19 u8 rand_server[EAP_GPSK_RAND_LEN]; member in struct:eap_gpsk_data 112 if (random_get_bytes(data->rand_server, EAP_GPSK_RAND_LEN)) { 117 wpa_hexdump(MSG_MSGDUMP, "EAP-GPSK: RAND_Server", 118 data->rand_server, EAP_GPSK_RAND_LEN); 134 wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN); 170 wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN); 320 "RAND_Server"); 324 if (os_memcmp(data->rand_server, pos, EAP_GPSK_RAND_LEN) != 0) { 325 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1 and " 327 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1" [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 18 u8 rand_server[EAP_GPSK_RAND_LEN]; member in struct:eap_gpsk_data 183 wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server overflow"); 186 os_memcpy(data->rand_server, pos, EAP_GPSK_RAND_LEN); 187 wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server", 188 data->rand_server, EAP_GPSK_RAND_LEN); 358 wpabuf_put_data(resp, data->rand_server, EAP_GPSK_RAND_LEN); 369 data->rand_peer, data->rand_server, 383 data->rand_peer, data->rand_server, 433 "RAND_Server"); 436 if (os_memcmp(pos, data->rand_server, EAP_GPSK_RAND_LEN) != 0) [all...] |