/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_gpsk_common.c | 114 u8 *pk, size_t pk_len) in eap_gpsk_derive_keys_helper() 181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); in eap_gpsk_derive_keys_helper() 182 os_memcpy(pk, pos, pk_len); in eap_gpsk_derive_keys_helper() 192 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys_aes() 214 *pk_len = EAP_GPSK_PK_LEN_AES; in eap_gpsk_derive_keys_aes() 220 pk, *pk_len); in eap_gpsk_derive_keys_aes() 276 * @pk_len: Buffer for returning length of PK 285 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys() 321 pk, pk_len); in eap_gpsk_derive_keys() 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) eap_gpsk_derive_keys_helper() argument 189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys_aes() argument 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys() argument
|
H A D | eap_gpsk_common.h | 55 u8 *pk, size_t *pk_len);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_gpsk_common.c | 114 u8 *pk, size_t pk_len) in eap_gpsk_derive_keys_helper() 181 wpa_hexdump_key(MSG_DEBUG, "EAP-GPSK: PK", pos, pk_len); in eap_gpsk_derive_keys_helper() 182 os_memcpy(pk, pos, pk_len); in eap_gpsk_derive_keys_helper() 192 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys_aes() 214 *pk_len = EAP_GPSK_PK_LEN_AES; in eap_gpsk_derive_keys_aes() 220 pk, *pk_len); in eap_gpsk_derive_keys_aes() 276 * @pk_len: Buffer for returning length of PK 285 u8 *pk, size_t *pk_len) in eap_gpsk_derive_keys() 321 pk, pk_len); in eap_gpsk_derive_keys() 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) eap_gpsk_derive_keys_helper() argument 189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys_aes() argument 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys() argument
|
H A D | eap_gpsk_common.h | 55 u8 *pk, size_t *pk_len);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
H A D | wps_enrollee.c | 559 size_t pk_len) in wps_process_pubkey() 561 if (pk == NULL || pk_len == 0) { in wps_process_pubkey() 568 sha256_vector(1, &pk, &pk_len, hash); in wps_process_pubkey() 573 pk, pk_len); in wps_process_pubkey() 585 wps->dh_pubkey_r = wpabuf_alloc_copy(pk, pk_len); in wps_process_pubkey() 558 wps_process_pubkey(struct wps_data *wps, const u8 *pk, size_t pk_len) wps_process_pubkey() argument
|
H A D | wps_registrar.c | 2402 size_t pk_len) in wps_process_pubkey() 2404 if (pk == NULL || pk_len == 0) { in wps_process_pubkey() 2410 wps->dh_pubkey_e = wpabuf_alloc_copy(pk, pk_len); in wps_process_pubkey() 2401 wps_process_pubkey(struct wps_data *wps, const u8 *pk, size_t pk_len) wps_process_pubkey() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
H A D | wps_enrollee.c | 559 size_t pk_len) in wps_process_pubkey() 561 if (pk == NULL || pk_len == 0) { in wps_process_pubkey() 568 sha256_vector(1, &pk, &pk_len, hash); in wps_process_pubkey() 573 pk, pk_len); in wps_process_pubkey() 585 wps->dh_pubkey_r = wpabuf_alloc_copy(pk, pk_len); in wps_process_pubkey() 558 wps_process_pubkey(struct wps_data *wps, const u8 *pk, size_t pk_len) wps_process_pubkey() argument
|
H A D | wps_registrar.c | 2393 size_t pk_len) in wps_process_pubkey() 2395 if (pk == NULL || pk_len == 0) { in wps_process_pubkey() 2401 wps->dh_pubkey_e = wpabuf_alloc_copy(pk, pk_len); in wps_process_pubkey() 2392 wps_process_pubkey(struct wps_data *wps, const u8 *pk, size_t pk_len) wps_process_pubkey() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_gpsk.c | 26 size_t pk_len; member 415 data->pk, &data->pk_len) < 0) { in eap_gpsk_process_gpsk_2()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_gpsk.c | 26 size_t pk_len; member 415 data->pk, &data->pk_len) < 0) { in eap_gpsk_process_gpsk_2()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_gpsk.c | 25 size_t pk_len; member 371 data->pk, &data->pk_len) < 0) { in eap_gpsk_send_gpsk_2()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_gpsk.c | 25 size_t pk_len; member 371 data->pk, &data->pk_len) < 0) { in eap_gpsk_send_gpsk_2()
|
/third_party/mbedtls/library/ |
H A D | ssl_tls.c | 8264 size_t crt_len, pk_len; in mbedtls_ssl_parse_certificate() local 8275 pk_len = chain->pk_raw.len; in mbedtls_ssl_parse_certificate() 8288 ret = ssl_remember_peer_pubkey(ssl, pk_start, pk_len); in mbedtls_ssl_parse_certificate()
|