/external/wpa_supplicant_8/src/eap_common/ |
eap_gpsk_common.c | 114 u8 *pk, size_t pk_len) 181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); 182 os_memcpy(pk, pos, pk_len); 192 u8 *pk, size_t *pk_len) 214 *pk_len = EAP_GPSK_PK_LEN_AES; 220 pk, *pk_len); 276 * @pk_len: Buffer for returning length of PK 285 u8 *pk, size_t *pk_len) 321 pk, pk_len);
|
eap_gpsk_common.h | 55 u8 *pk, size_t *pk_len);
|
/external/avb/libavb/ |
avb_slot_verify.c | 362 size_t pk_len; local 502 avb_vbmeta_image_verify(vbmeta_buf, vbmeta_num_read, &pk_data, &pk_len); 505 avb_assert(pk_data != NULL && pk_len > 0); 560 if (expected_public_key_length != pk_len || 561 avb_safe_memcmp(expected_public_key, pk_data, pk_len) != 0) { 585 ops, pk_data, pk_len, pk_metadata, pk_metadata_len, &key_is_trusted); [all...] |
/external/wpa_supplicant_8/src/wps/ |
wps_enrollee.c | 555 size_t pk_len) 557 if (pk == NULL || pk_len == 0) { 564 sha256_vector(1, &pk, &pk_len, hash); 569 pk, pk_len); 581 wps->dh_pubkey_r = wpabuf_alloc_copy(pk, pk_len); [all...] |
wps_registrar.c | [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_gpsk.c | 26 size_t pk_len; member in struct:eap_gpsk_data 416 data->pk, &data->pk_len) < 0) {
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_gpsk.c | 25 size_t pk_len; member in struct:eap_gpsk_data 374 data->pk, &data->pk_len) < 0) {
|