/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_ikev2_common.c | 23 u8 *nonces; in eap_ikev2_derive_keymat() local 31 nonces = os_malloc(nlen); in eap_ikev2_derive_keymat() 32 if (nonces == NULL) in eap_ikev2_derive_keymat() 34 os_memcpy(nonces, i_nonce, i_nonce_len); in eap_ikev2_derive_keymat() 35 os_memcpy(nonces + i_nonce_len, r_nonce, r_nonce_len); in eap_ikev2_derive_keymat() 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat() 39 os_free(nonces); in eap_ikev2_derive_keymat() 42 os_free(nonces); in eap_ikev2_derive_keymat()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_ikev2_common.c | 23 u8 *nonces; in eap_ikev2_derive_keymat() local 31 nonces = os_malloc(nlen); in eap_ikev2_derive_keymat() 32 if (nonces == NULL) in eap_ikev2_derive_keymat() 34 os_memcpy(nonces, i_nonce, i_nonce_len); in eap_ikev2_derive_keymat() 35 os_memcpy(nonces + i_nonce_len, r_nonce, r_nonce_len); in eap_ikev2_derive_keymat() 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat() 39 os_free(nonces); in eap_ikev2_derive_keymat() 42 os_free(nonces); in eap_ikev2_derive_keymat()
|
/third_party/openssl/doc/man3/ |
D | OCSP_request_add1_nonce.pod | 39 nonces are present and equal 1 is returned. If the nonces are absent 2 is 40 returned. If a nonce is present in the response only 3 is returned. If nonces 56 performance reasons. As a result they do not support nonces. 59 positive return value effectively indicates success: nonces are both present 62 this will happen if the responder doesn't support nonces. A zero return value 63 indicates present and mismatched nonces: this should be treated as an error
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_eke.c | 508 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; in eap_eke_process_confirm() local 532 decrypt_len = sizeof(nonces); in eap_eke_process_confirm() 534 nonces, &decrypt_len) < 0) { in eap_eke_process_confirm() 545 nonces, 2 * data->sess.nonce_len); in eap_eke_process_confirm() 546 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { in eap_eke_process_confirm() 552 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, in eap_eke_process_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_eke.c | 508 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; in eap_eke_process_confirm() local 532 decrypt_len = sizeof(nonces); in eap_eke_process_confirm() 534 nonces, &decrypt_len) < 0) { in eap_eke_process_confirm() 545 nonces, 2 * data->sess.nonce_len); in eap_eke_process_confirm() 546 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { in eap_eke_process_confirm() 552 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, in eap_eke_process_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
D | dpp_crypto.c | 427 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_derive_bk_ke() local 441 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_bk_ke() 442 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_bk_ke() 459 res = dpp_hmac_vector(hash_len, nonces, 2 * nonce_len, in dpp_derive_bk_ke() 1673 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_reconfig_derive_ke_responder() local 1728 os_memcpy(nonces, auth->c_nonce, curve->nonce_len); in dpp_reconfig_derive_ke_responder() 1729 os_memcpy(&nonces[curve->nonce_len], auth->e_nonce, curve->nonce_len); in dpp_reconfig_derive_ke_responder() 1730 if (dpp_hmac(curve->hash_len, nonces, 2 * curve->nonce_len, in dpp_reconfig_derive_ke_responder() 1772 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_reconfig_derive_ke_initiator() local 1819 os_memcpy(nonces, auth->c_nonce, curve->nonce_len); in dpp_reconfig_derive_ke_initiator() [all …]
|
D | wpa_common.c | 521 u8 nonces[2 * FILS_NONCE_LEN]; in fils_rmsk_to_pmk() local 542 os_memcpy(nonces, snonce, FILS_NONCE_LEN); in fils_rmsk_to_pmk() 543 os_memcpy(&nonces[FILS_NONCE_LEN], anonce, FILS_NONCE_LEN); in fils_rmsk_to_pmk() 553 res = hmac_sha384_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, in fils_rmsk_to_pmk() 556 res = hmac_sha256_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, in fils_rmsk_to_pmk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_eke.c | 308 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; in eap_eke_build_confirm() local 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); in eap_eke_build_confirm() 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm() 332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len, in eap_eke_build_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_eke.c | 308 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; in eap_eke_build_confirm() local 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); in eap_eke_build_confirm() 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm() 332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len, in eap_eke_build_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
D | wpa_common.c | 481 u8 nonces[2 * FILS_NONCE_LEN]; in fils_rmsk_to_pmk() local 502 os_memcpy(nonces, snonce, FILS_NONCE_LEN); in fils_rmsk_to_pmk() 503 os_memcpy(&nonces[FILS_NONCE_LEN], anonce, FILS_NONCE_LEN); in fils_rmsk_to_pmk() 513 res = hmac_sha384_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, in fils_rmsk_to_pmk() 516 res = hmac_sha256_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, in fils_rmsk_to_pmk()
|
D | dpp.c | 1580 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_derive_ke() local 1598 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_ke() 1599 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_ke() 1616 res = dpp_hmac_vector(hash_len, nonces, 2 * nonce_len, in dpp_derive_ke()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | sme.c | 1446 u8 nonces[2 * FILS_NONCE_LEN]; in sme_associate() local 1535 os_memcpy(nonces, snonce, FILS_NONCE_LEN); in sme_associate() 1536 os_memcpy(nonces + FILS_NONCE_LEN, anonce, FILS_NONCE_LEN); in sme_associate() 1537 params.fils_nonces = nonces; in sme_associate() 1538 params.fils_nonces_len = sizeof(nonces); in sme_associate()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | sme.c | 1777 u8 nonces[2 * FILS_NONCE_LEN]; in sme_associate() local 1866 os_memcpy(nonces, snonce, FILS_NONCE_LEN); in sme_associate() 1867 os_memcpy(nonces + FILS_NONCE_LEN, anonce, FILS_NONCE_LEN); in sme_associate() 1868 params.fils_nonces = nonces; in sme_associate() 1869 params.fils_nonces_len = sizeof(nonces); in sme_associate()
|
/third_party/node/deps/openssl/openssl/ |
D | NEWS.md | 242 * Prevent over long nonces in ChaCha20-Poly1305 ([CVE-2019-1543]) 321 * Prevent over long nonces in ChaCha20-Poly1305 ([CVE-2019-1543])
|
D | CHANGES.md | 2674 * Prevent over long nonces in ChaCha20-Poly1305. 3365 * Prevent over long nonces in ChaCha20-Poly1305. 12173 copies and compares OCSP nonces as opaque blobs without any attempt at
|
/third_party/openssl/ |
D | NEWS.md | 236 * Prevent over long nonces in ChaCha20-Poly1305 ([CVE-2019-1543]) 315 * Prevent over long nonces in ChaCha20-Poly1305 ([CVE-2019-1543])
|
D | CHANGES.md | 2612 * Prevent over long nonces in ChaCha20-Poly1305. 3303 * Prevent over long nonces in ChaCha20-Poly1305. 12111 copies and compares OCSP nonces as opaque blobs without any attempt at
|
/third_party/mbedtls/ |
D | ChangeLog | 4124 * Use deterministic nonces for AEAD ciphers in TLS by default (possible to
|