Home
last modified time | relevance | path

Searched refs:rand_p (Results 1 – 16 of 16) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_sake_common.c40 attr->rand_p = data; in eap_sake_parse_add_attr()
266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, in eap_sake_derive_keys() argument
279 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys()
284 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys()
296 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys()
301 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys()
329 const u8 *rand_s, const u8 *rand_p, in eap_sake_compute_mic() argument
358 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p, in eap_sake_compute_mic()
372 os_memcpy(_rand, rand_p, EAP_SAKE_RAND_LEN); in eap_sake_compute_mic()
Deap_sake_common.h60 const u8 *rand_p; member
85 const u8 *rand_s, const u8 *rand_p,
88 const u8 *rand_s, const u8 *rand_p,
Deap_psk_common.h43 u8 rand_p[EAP_PSK_RAND_LEN]; member
69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
Deap_psk_common.c34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, in eap_psk_derive_keys() argument
41 if (aes_128_encrypt_block(kdk, rand_p, hash)) in eap_psk_derive_keys()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_sake_common.c40 attr->rand_p = data; in eap_sake_parse_add_attr()
266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, in eap_sake_derive_keys() argument
279 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys()
284 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys()
296 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys()
301 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys()
329 const u8 *rand_s, const u8 *rand_p, in eap_sake_compute_mic() argument
358 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p, in eap_sake_compute_mic()
372 os_memcpy(_rand, rand_p, EAP_SAKE_RAND_LEN); in eap_sake_compute_mic()
Deap_sake_common.h60 const u8 *rand_p; member
85 const u8 *rand_s, const u8 *rand_p,
88 const u8 *rand_s, const u8 *rand_p,
Deap_psk_common.h43 u8 rand_p[EAP_PSK_RAND_LEN]; member
69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
Deap_psk_common.c34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, in eap_psk_derive_keys() argument
41 if (aes_128_encrypt_block(kdk, rand_p, hash)) in eap_psk_derive_keys()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_psk.c23 u8 rand_p[EAP_PSK_RAND_LEN]; member
129 if (random_get_bytes(data->rand_p, EAP_PSK_RAND_LEN)) { in eap_psk_process_1()
143 os_memcpy(hdr2->rand_p, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_1()
158 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_1()
165 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, in eap_psk_process_1()
233 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_3()
248 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, in eap_psk_process_3()
450 os_memcpy(id + 1, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_get_session_id()
Deap_sake.c21 u8 rand_p[EAP_SAKE_RAND_LEN]; member
219 if (random_get_bytes(data->rand_p, EAP_SAKE_RAND_LEN)) { in eap_sake_process_challenge()
224 data->rand_p, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge()
239 data->rand_s, data->rand_p, in eap_sake_process_challenge()
257 data->rand_p, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge()
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge()
314 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
351 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_psk.c23 u8 rand_p[EAP_PSK_RAND_LEN]; member
129 if (random_get_bytes(data->rand_p, EAP_PSK_RAND_LEN)) { in eap_psk_process_1()
143 os_memcpy(hdr2->rand_p, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_1()
158 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_1()
165 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, in eap_psk_process_1()
233 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_3()
248 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, in eap_psk_process_3()
450 os_memcpy(id + 1, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_get_session_id()
Deap_sake.c21 u8 rand_p[EAP_SAKE_RAND_LEN]; member
219 if (random_get_bytes(data->rand_p, EAP_SAKE_RAND_LEN)) { in eap_sake_process_challenge()
224 data->rand_p, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge()
239 data->rand_s, data->rand_p, in eap_sake_process_challenge()
257 data->rand_p, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge()
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge()
314 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
351 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_sake.c20 u8 rand_p[EAP_SAKE_RAND_LEN]; member
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_build_confirm()
317 if (!attr.rand_p || !attr.mic_p) { in eap_sake_process_challenge()
323 os_memcpy(data->rand_p, attr.rand_p, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge()
345 data->rand_s, data->rand_p, in eap_sake_process_challenge()
353 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge()
394 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
Deap_server_psk.c24 u8 rand_p[EAP_PSK_RAND_LEN]; member
119 os_memcpy(buf + sm->server_id_len, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_build_3()
126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, in eap_psk_build_3()
292 resp->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_2()
293 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_2()
308 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_2()
498 os_memcpy(id + 1, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_get_session_id()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_psk.c24 u8 rand_p[EAP_PSK_RAND_LEN]; member
119 os_memcpy(buf + sm->cfg->server_id_len, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_build_3()
126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, in eap_psk_build_3()
292 resp->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_2()
293 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_2()
308 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_2()
498 os_memcpy(id + 1, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_get_session_id()
Deap_server_sake.c20 u8 rand_p[EAP_SAKE_RAND_LEN]; member
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_build_confirm()
317 if (!attr.rand_p || !attr.mic_p) { in eap_sake_process_challenge()
323 os_memcpy(data->rand_p, attr.rand_p, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge()
345 data->rand_s, data->rand_p, in eap_sake_process_challenge()
353 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge()
394 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()