Searched refs:EAP_SAKE_ROOT_SECRET_LEN (Results 1 - 4 of 4) sorted by relevance
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_sake.c | 23 u8 root_secret_a[EAP_SAKE_ROOT_SECRET_LEN]; 24 u8 root_secret_b[EAP_SAKE_ROOT_SECRET_LEN]; 80 if (!password || password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 102 os_memcpy(data->root_secret_a, password, EAP_SAKE_ROOT_SECRET_LEN); 104 password + EAP_SAKE_ROOT_SECRET_LEN, 105 EAP_SAKE_ROOT_SECRET_LEN);
|
/freebsd-9.3-release/contrib/wpa/src/eap_common/ |
H A D | eap_sake_common.c | 276 root_secret_a, EAP_SAKE_ROOT_SECRET_LEN); 277 eap_sake_kdf(root_secret_a, EAP_SAKE_ROOT_SECRET_LEN, 291 root_secret_b, EAP_SAKE_ROOT_SECRET_LEN); 292 eap_sake_kdf(root_secret_b, EAP_SAKE_ROOT_SECRET_LEN,
|
H A D | eap_sake_common.h | 43 #define EAP_SAKE_ROOT_SECRET_LEN 16 macro
|
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_sake.c | 357 sm->user->password_len != 2 * EAP_SAKE_ROOT_SECRET_LEN) { 360 2 * EAP_SAKE_ROOT_SECRET_LEN); 365 sm->user->password + EAP_SAKE_ROOT_SECRET_LEN,
|
Completed in 115 milliseconds