/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_gpsk_common.c | 110 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() 137 if (psk_len < mk_len) in eap_gpsk_derive_keys_helper() 140 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper() 145 WPA_PUT_BE16(pos, psk_len); in eap_gpsk_derive_keys_helper() 147 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper() 148 pos += psk_len; in eap_gpsk_derive_keys_helper() 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument 202 * KS = 16, PL = psk_len, CSuite_Sel = 0x00000000 0x0001 in eap_gpsk_derive_keys_aes() 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) eap_gpsk_derive_keys_helper() argument 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys() argument 417 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) eap_gpsk_derive_session_id() argument [all...] |
H A D | eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_gpsk_common.c | 110 const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_helper() 137 if (psk_len < mk_len) in eap_gpsk_derive_keys_helper() 140 data_len = 2 + psk_len + 6 + seed_len; in eap_gpsk_derive_keys_helper() 145 WPA_PUT_BE16(pos, psk_len); in eap_gpsk_derive_keys_helper() 147 os_memcpy(pos, psk, psk_len); in eap_gpsk_derive_keys_helper() 148 pos += psk_len; in eap_gpsk_derive_keys_helper() 189 static int eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_aes() argument 202 * KS = 16, PL = psk_len, CSuite_Sel = 0x00000000 0x0001 in eap_gpsk_derive_keys_aes() 218 psk, psk_len, seed, seed_len, in eap_gpsk_derive_keys_aes() 225 static int eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, in eap_gpsk_derive_keys_sha256() argument 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) eap_gpsk_derive_keys_helper() argument 279 eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) eap_gpsk_derive_keys() argument 417 eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor, int specifier, const u8 *rand_peer, const u8 *rand_server, const u8 *id_peer, size_t id_peer_len, const u8 *id_server, size_t id_server_len, u8 method_type, u8 *sid, size_t *sid_len) eap_gpsk_derive_session_id() argument [all...] |
H A D | eap_gpsk_common.h | 49 int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor, 56 int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
|
/third_party/mbedtls/library/ |
H A D | ssl_tls13_keys.c | 836 unsigned char const *psk, size_t psk_len, in mbedtls_ssl_tls13_create_psk_binder() 871 psk, psk_len, /* Input */ in mbedtls_ssl_tls13_create_psk_binder() 1282 size_t psk_len = 0; in mbedtls_ssl_tls13_key_schedule_stage_early() local 1292 ret = mbedtls_ssl_tls13_export_handshake_psk(ssl, &psk, &psk_len); in mbedtls_ssl_tls13_key_schedule_stage_early() 1301 ret = mbedtls_ssl_tls13_evolve_secret(hash_alg, NULL, psk, psk_len, in mbedtls_ssl_tls13_key_schedule_stage_early() 1842 size_t *psk_len) in mbedtls_ssl_tls13_export_handshake_psk() 1848 *psk_len = 0; in mbedtls_ssl_tls13_export_handshake_psk() 1860 *psk_len = PSA_BITS_TO_BYTES(psa_get_key_bits(&key_attributes)); in mbedtls_ssl_tls13_export_handshake_psk() 1861 *psk = mbedtls_calloc(1, *psk_len); in mbedtls_ssl_tls13_export_handshake_psk() 1867 (uint8_t *) *psk, *psk_len, psk_le in mbedtls_ssl_tls13_export_handshake_psk() 834 mbedtls_ssl_tls13_create_psk_binder(mbedtls_ssl_context *ssl, const psa_algorithm_t hash_alg, unsigned char const *psk, size_t psk_len, int psk_type, unsigned char const *transcript, unsigned char *result) mbedtls_ssl_tls13_create_psk_binder() argument 1840 mbedtls_ssl_tls13_export_handshake_psk(mbedtls_ssl_context *ssl, unsigned char **psk, size_t *psk_len) mbedtls_ssl_tls13_export_handshake_psk() argument [all...] |
H A D | ssl_tls13_client.c | 725 size_t *psk_len) in ssl_tls13_ticket_get_psk() 736 *psk_len = session->resumption_key_len; in ssl_tls13_ticket_get_psk() 763 size_t *psk_len) in ssl_tls13_psk_get_psk() 772 *psk_len = ssl->conf->psk_len; in ssl_tls13_psk_get_psk() 829 size_t psk_len, in ssl_tls13_write_binder() 858 psk, psk_len, psk_type, in ssl_tls13_write_binder() 1005 size_t psk_len; in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() local 1015 if (ssl_tls13_ticket_get_psk(ssl, &hash_alg, &psk, &psk_len) == 0) { in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() 1019 hash_alg, psk, psk_len, in mbedtls_ssl_tls13_write_binders_of_pre_shared_key_ext() 722 ssl_tls13_ticket_get_psk(mbedtls_ssl_context *ssl, psa_algorithm_t *hash_alg, const unsigned char **psk, size_t *psk_len) ssl_tls13_ticket_get_psk() argument 760 ssl_tls13_psk_get_psk(mbedtls_ssl_context *ssl, psa_algorithm_t *hash_alg, const unsigned char **psk, size_t *psk_len) ssl_tls13_psk_get_psk() argument 823 ssl_tls13_write_binder(mbedtls_ssl_context *ssl, unsigned char *buf, unsigned char *end, int psk_type, psa_algorithm_t hash_alg, const unsigned char *psk, size_t psk_len, size_t *out_len) ssl_tls13_write_binder() argument 1081 size_t psk_len; ssl_tls13_parse_server_pre_shared_key_ext() local 1239 size_t psk_len; mbedtls_ssl_tls13_finalize_client_hello() local [all...] |
H A D | ssl_tls13_keys.h | 475 * \param psk_len The size of \p psk in bytes. 494 unsigned char const *psk, size_t psk_len, 649 * \param[out] psk_len Length of PSK. 658 size_t *psk_len);
|
H A D | ssl_misc.h | 817 size_t psk_len; /*!< Length of PSK from callback */ member 1544 const unsigned char **psk, size_t *psk_len) in mbedtls_ssl_get_psk() 1546 if (ssl->MBEDTLS_PRIVATE(handshake)->psk != NULL && ssl->MBEDTLS_PRIVATE(handshake)->psk_len > 0) in mbedtls_ssl_get_psk() 1549 *psk_len = ssl->MBEDTLS_PRIVATE(handshake)->psk_len; in mbedtls_ssl_get_psk() 1551 ssl->MBEDTLS_PRIVATE(conf)->MBEDTLS_PRIVATE(psk_len) > 0) { in mbedtls_ssl_get_psk() 1553 *psk_len = ssl->MBEDTLS_PRIVATE(conf)->MBEDTLS_PRIVATE(psk_len); in mbedtls_ssl_get_psk() 1556 *psk_len = 0; in mbedtls_ssl_get_psk() 1543 mbedtls_ssl_get_psk(const mbedtls_ssl_context *ssl, const unsigned char **psk, size_t *psk_len) mbedtls_ssl_get_psk() argument
|
H A D | ssl_tls.c | 2124 if (conf->psk != NULL && conf->psk_len != 0) { in mbedtls_ssl_conf_has_static_psk() 2142 mbedtls_zeroize_and_free(conf->psk, conf->psk_len); in ssl_conf_remove_psk() 2144 conf->psk_len = 0; in ssl_conf_remove_psk() 2184 const unsigned char *psk, size_t psk_len, in mbedtls_ssl_conf_psk() 2198 if (psk_len == 0) { in mbedtls_ssl_conf_psk() 2201 if (psk_len > MBEDTLS_PSK_MAX_LEN) { in mbedtls_ssl_conf_psk() 2205 if ((conf->psk = mbedtls_calloc(1, psk_len)) == NULL) { in mbedtls_ssl_conf_psk() 2208 conf->psk_len = psk_len; in mbedtls_ssl_conf_psk() 2209 memcpy(conf->psk, psk, conf->psk_len); in mbedtls_ssl_conf_psk() 2183 mbedtls_ssl_conf_psk(mbedtls_ssl_config *conf, const unsigned char *psk, size_t psk_len, const unsigned char *psk_identity, size_t psk_identity_len) mbedtls_ssl_conf_psk() argument 2241 mbedtls_ssl_set_hs_psk(mbedtls_ssl_context *ssl, const unsigned char *psk, size_t psk_len) mbedtls_ssl_set_hs_psk() argument 7394 size_t psk_len = 0; mbedtls_ssl_psk_derive_premaster() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/wapi/ |
H A D | wapi_asue_i.h | 54 size_t psk_len;
member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | wpa_auth_glue.c | 253 const u8 *prev_psk, size_t *psk_len, in hostapd_wpa_auth_get_psk() 262 if (psk_len) in hostapd_wpa_auth_get_psk() 263 *psk_len = PMK_LEN; in hostapd_wpa_auth_get_psk() 281 if (psk_len) in hostapd_wpa_auth_get_psk() 282 *psk_len = sta->owe_pmk_len; in hostapd_wpa_auth_get_psk() 290 if (psk_len) in hostapd_wpa_auth_get_psk() 291 *psk_len = sa->pmk_len; in hostapd_wpa_auth_get_psk() 251 hostapd_wpa_auth_get_psk(void *ctx, const u8 *addr, const u8 *p2p_dev_addr, const u8 *prev_psk, size_t *psk_len, int *vlan_id) hostapd_wpa_auth_get_psk() argument
|
H A D | wps_hostapd.c | 97 size_t psk_len) in hostapd_wps_new_psk_cb() 113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); in hostapd_wps_new_psk_cb() 115 if (psk_len != PMK_LEN) { in hostapd_wps_new_psk_cb() 117 (unsigned long) psk_len); in hostapd_wps_new_psk_cb() 131 psk, psk_len); in hostapd_wps_new_psk_cb() 148 wpa_snprintf_hex(hex, sizeof(hex), psk, psk_len); in hostapd_wps_new_psk_cb() 95 hostapd_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *p2p_dev_addr, const u8 *psk, size_t psk_len) hostapd_wps_new_psk_cb() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_gpsk.c | 35 size_t psk_len; member 124 data->psk_len = password_len; in eap_gpsk_init() 136 os_memset(data->psk, 0, data->psk_len); in eap_gpsk_deinit() 364 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2() 378 if (eap_gpsk_derive_session_id(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_gpsk.c | 35 size_t psk_len; member 124 data->psk_len = password_len; in eap_gpsk_init() 136 os_memset(data->psk, 0, data->psk_len); in eap_gpsk_deinit() 364 if (eap_gpsk_derive_keys(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2() 378 if (eap_gpsk_derive_session_id(data->psk, data->psk_len, in eap_gpsk_send_gpsk_2()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | wpa_auth_glue.c | 347 const u8 *prev_psk, size_t *psk_len, in hostapd_wpa_auth_get_psk() 356 if (psk_len) in hostapd_wpa_auth_get_psk() 357 *psk_len = PMK_LEN; in hostapd_wpa_auth_get_psk() 363 if (psk_len) in hostapd_wpa_auth_get_psk() 364 *psk_len = sta->sae->pmk_len; in hostapd_wpa_auth_get_psk() 377 if (psk_len) in hostapd_wpa_auth_get_psk() 378 *psk_len = sta->owe_pmk_len; in hostapd_wpa_auth_get_psk() 386 if (psk_len) in hostapd_wpa_auth_get_psk() 387 *psk_len = sa->pmk_len; in hostapd_wpa_auth_get_psk() 345 hostapd_wpa_auth_get_psk(void *ctx, const u8 *addr, const u8 *p2p_dev_addr, const u8 *prev_psk, size_t *psk_len, int *vlan_id) hostapd_wpa_auth_get_psk() argument
|
H A D | wps_hostapd.c | 97 size_t psk_len) in hostapd_wps_new_psk_cb() 113 wpa_hexdump_key(MSG_DEBUG, "Per-device PSK", psk, psk_len); in hostapd_wps_new_psk_cb() 115 if (psk_len != PMK_LEN) { in hostapd_wps_new_psk_cb() 117 (unsigned long) psk_len); in hostapd_wps_new_psk_cb() 132 psk, psk_len); in hostapd_wps_new_psk_cb() 150 wpa_snprintf_hex(hex, sizeof(hex), psk, psk_len); in hostapd_wps_new_psk_cb() 95 hostapd_wps_new_psk_cb(void *ctx, const u8 *mac_addr, const u8 *p2p_dev_addr, const u8 *psk, size_t psk_len) hostapd_wps_new_psk_cb() argument
|
/third_party/rust/crates/rust-openssl/openssl/src/ssl/ |
H A D | callbacks.rs | 91 Ok(psk_len) => psk_len as u32, in raw_client_psk() 129 Ok(psk_len) => psk_len as u32, in raw_server_psk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | ibss_rsn.c | 263 size_t *psk_len, int *vlan_id) in auth_get_psk() 267 if (psk_len) in auth_get_psk() 268 *psk_len = PMK_LEN; in auth_get_psk() 261 auth_get_psk(void *ctx, const u8 *addr, const u8 *p2p_dev_addr, const u8 *prev_psk, size_t *psk_len, int *vlan_id) auth_get_psk() argument
|
H A D | mesh_rsn.c | 79 size_t *psk_len, int *vlan_id) in auth_get_psk() 85 if (psk_len) in auth_get_psk() 86 *psk_len = PMK_LEN; in auth_get_psk() 77 auth_get_psk(void *ctx, const u8 *addr, const u8 *p2p_dev_addr, const u8 *prev_psk, size_t *psk_len, int *vlan_id) auth_get_psk() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | ibss_rsn.c | 285 size_t *psk_len, int *vlan_id) in auth_get_psk() 289 if (psk_len) in auth_get_psk() 290 *psk_len = PMK_LEN; in auth_get_psk() 283 auth_get_psk(void *ctx, const u8 *addr, const u8 *p2p_dev_addr, const u8 *prev_psk, size_t *psk_len, int *vlan_id) auth_get_psk() argument
|
H A D | mesh_rsn.c | 79 size_t *psk_len, int *vlan_id) in auth_get_psk() 85 if (psk_len) in auth_get_psk() 86 *psk_len = PMK_LEN; in auth_get_psk() 77 auth_get_psk(void *ctx, const u8 *addr, const u8 *p2p_dev_addr, const u8 *prev_psk, size_t *psk_len, int *vlan_id) auth_get_psk() argument
|
/third_party/openssl/test/ |
H A D | ssl_old_test.c | 2970 unsigned int psk_len = 0; in psk_client_callback() local 2981 psk_len = ret; in psk_client_callback() 2983 return psk_len; in psk_client_callback() 2990 unsigned int psk_len = 0; in psk_server_callback() local 2996 psk_len = psk_key2bn(psk_key, psk, max_psk_len); in psk_server_callback() 2997 return psk_len; in psk_server_callback()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/wps/ |
H A D | wps_i.h | 219 const u8 *p2p_dev_addr, const u8 *psk, size_t psk_len);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/wps/ |
H A D | wps_i.h | 219 const u8 *p2p_dev_addr, const u8 *psk, size_t psk_len);
|
/third_party/mbedtls/programs/ssl/ |
H A D | ssl_server2.c | 1313 size_t psk_len) in psa_setup_psk_key_slot() 1323 status = psa_import_key(&key_attributes, psk, psk_len, slot); in psa_setup_psk_key_slot() 1520 size_t psk_len = 0; in main() local 2445 opt.psk, &psk_len) != 0) { in main() 3183 status = psa_setup_psk_key_slot(&psk_slot, alg, psk, psk_len); in main() 3198 if (psk_len > 0) { in main() 3199 ret = mbedtls_ssl_conf_psk(&conf, psk, psk_len, in main() 1310 psa_setup_psk_key_slot(mbedtls_svc_key_id_t *slot, psa_algorithm_t alg, unsigned char *psk, size_t psk_len) psa_setup_psk_key_slot() argument
|