/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_eke.c | 28 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member 464 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) { in eap_eke_process_commit() 470 data->nonce_p, data->sess.nonce_len); in eap_eke_process_commit() 472 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len, in eap_eke_process_commit() 546 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { in eap_eke_process_confirm() 559 data->nonce_p, data->nonce_s) < 0) { in eap_eke_process_confirm() 606 data->nonce_s, data->nonce_p, in eap_eke_process_confirm() 758 os_memcpy(sid + 1, data->nonce_p, data->sess.nonce_len); in eap_eke_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_eke.c | 28 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member 464 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) { in eap_eke_process_commit() 470 data->nonce_p, data->sess.nonce_len); in eap_eke_process_commit() 472 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len, in eap_eke_process_commit() 546 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { in eap_eke_process_confirm() 559 data->nonce_p, data->nonce_s) < 0) { in eap_eke_process_confirm() 606 data->nonce_s, data->nonce_p, in eap_eke_process_confirm() 758 os_memcpy(sid + 1, data->nonce_p, data->sess.nonce_len); in eap_eke_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_eke.c | 30 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); in eap_eke_build_confirm() 343 data->nonce_p, data->nonce_s) < 0) { in eap_eke_build_confirm() 562 decrypt_len = sizeof(data->nonce_p); in eap_eke_process_commit() 564 data->nonce_p, &decrypt_len) < 0) { in eap_eke_process_commit() 575 data->nonce_p, data->sess.nonce_len); in eap_eke_process_commit() 646 data->nonce_s, data->nonce_p, in eap_eke_process_confirm() 780 os_memcpy(sid + 1, data->nonce_p, data->sess.nonce_len); in eap_eke_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_eke.c | 30 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); in eap_eke_build_confirm() 343 data->nonce_p, data->nonce_s) < 0) { in eap_eke_build_confirm() 562 decrypt_len = sizeof(data->nonce_p); in eap_eke_process_commit() 564 data->nonce_p, &decrypt_len) < 0) { in eap_eke_process_commit() 575 data->nonce_p, data->sess.nonce_len); in eap_eke_process_commit() 647 data->nonce_s, data->nonce_p, in eap_eke_process_confirm() 781 os_memcpy(sid + 1, data->nonce_p, data->sess.nonce_len); in eap_eke_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_eke_common.h | 99 const u8 *nonce_p, const u8 *nonce_s); 103 const u8 *nonce_p, const u8 *nonce_s,
|
D | eap_eke_common.c | 479 const u8 *nonce_p, const u8 *nonce_s) in eap_eke_derive_ka() argument 505 os_memcpy(pos, nonce_p, sess->nonce_len); in eap_eke_derive_ka() 524 const u8 *nonce_p, const u8 *nonce_s, in eap_eke_derive_msk() argument 550 os_memcpy(pos, nonce_p, sess->nonce_len); in eap_eke_derive_msk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_eke_common.h | 99 const u8 *nonce_p, const u8 *nonce_s); 103 const u8 *nonce_p, const u8 *nonce_s,
|
D | eap_eke_common.c | 479 const u8 *nonce_p, const u8 *nonce_s) in eap_eke_derive_ka() argument 505 os_memcpy(pos, nonce_p, sess->nonce_len); in eap_eke_derive_ka() 524 const u8 *nonce_p, const u8 *nonce_s, in eap_eke_derive_msk() argument 550 os_memcpy(pos, nonce_p, sess->nonce_len); in eap_eke_derive_msk()
|