Searched refs:prf_len (Results 1 – 4 of 4) sorted by relevance
/freebsd/contrib/wpa/src/eap_common/ |
H A D | eap_eke_common.c | 133 int prf_len; in eap_eke_nonce_len() local 135 prf_len = eap_eke_prf_len(prf); in eap_eke_nonce_len() 136 if (prf_len < 0) in eap_eke_nonce_len() 139 if (prf_len > 2 * 16) in eap_eke_nonce_len() 140 return (prf_len + 1) / 2; in eap_eke_nonce_len() 314 os_memset(zeros, 0, sess->prf_len); in eap_eke_derive_key() 315 if (eap_eke_prf(sess->prf, zeros, sess->prf_len, in eap_eke_derive_key() 319 temp, sess->prf_len); in eap_eke_derive_key() 329 if (eap_eke_prfplus(sess->prf, temp, sess->prf_len, in eap_eke_derive_key() 460 if (eap_eke_prfplus(sess->prf, sess->shared_secret, sess->prf_len, in eap_eke_derive_ke_ki() [all …]
|
H A D | eap_eke_common.h | 73 int prf_len; member
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | eap_eke.c | 526 if (pos + data->sess.pnonce_ps_len + data->sess.prf_len > end) { in eap_eke_process_confirm() 569 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth_s, data->sess.prf_len); in eap_eke_process_confirm() 571 data->sess.prf_len) != 0) { in eap_eke_process_confirm() 580 data->sess.pnonce_len + data->sess.prf_len, in eap_eke_process_confirm() 596 auth = wpabuf_put(resp, data->sess.prf_len); in eap_eke_process_confirm() 602 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth, data->sess.prf_len); in eap_eke_process_confirm()
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_eke.c | 314 plen = data->sess.pnonce_ps_len + data->sess.prf_len; in eap_eke_build_confirm() 350 auth = wpabuf_put(msg, data->sess.prf_len); in eap_eke_build_confirm() 356 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_S", auth, data->sess.prf_len); in eap_eke_build_confirm() 606 if (payloadlen < (size_t) data->sess.pnonce_len + data->sess.prf_len) { in eap_eke_process_confirm() 637 wpa_hexdump(MSG_DEBUG, "EAP-EKE: Auth_P", auth_p, data->sess.prf_len); in eap_eke_process_confirm() 639 data->sess.prf_len) != 0) { in eap_eke_process_confirm()
|