Home
last modified time | relevance | path

Searched refs:nonces (Results 1 – 18 of 18) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_ikev2_common.c23 u8 *nonces; in eap_ikev2_derive_keymat() local
31 nonces = os_malloc(nlen); in eap_ikev2_derive_keymat()
32 if (nonces == NULL) in eap_ikev2_derive_keymat()
34 os_memcpy(nonces, i_nonce, i_nonce_len); in eap_ikev2_derive_keymat()
35 os_memcpy(nonces + i_nonce_len, r_nonce, r_nonce_len); in eap_ikev2_derive_keymat()
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
39 os_free(nonces); in eap_ikev2_derive_keymat()
42 os_free(nonces); in eap_ikev2_derive_keymat()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_ikev2_common.c23 u8 *nonces; in eap_ikev2_derive_keymat() local
31 nonces = os_malloc(nlen); in eap_ikev2_derive_keymat()
32 if (nonces == NULL) in eap_ikev2_derive_keymat()
34 os_memcpy(nonces, i_nonce, i_nonce_len); in eap_ikev2_derive_keymat()
35 os_memcpy(nonces + i_nonce_len, r_nonce, r_nonce_len); in eap_ikev2_derive_keymat()
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
39 os_free(nonces); in eap_ikev2_derive_keymat()
42 os_free(nonces); in eap_ikev2_derive_keymat()
/third_party/openssl/doc/man3/
DOCSP_request_add1_nonce.pod39 nonces are present and equal 1 is returned. If the nonces are absent 2 is
40 returned. If a nonce is present in the response only 3 is returned. If nonces
56 performance reasons. As a result they do not support nonces.
59 positive return value effectively indicates success: nonces are both present
62 this will happen if the responder doesn't support nonces. A zero return value
63 indicates present and mismatched nonces: this should be treated as an error
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_eke.c508 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; in eap_eke_process_confirm() local
532 decrypt_len = sizeof(nonces); in eap_eke_process_confirm()
534 nonces, &decrypt_len) < 0) { in eap_eke_process_confirm()
545 nonces, 2 * data->sess.nonce_len); in eap_eke_process_confirm()
546 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { in eap_eke_process_confirm()
552 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, in eap_eke_process_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_eke.c508 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; in eap_eke_process_confirm() local
532 decrypt_len = sizeof(nonces); in eap_eke_process_confirm()
534 nonces, &decrypt_len) < 0) { in eap_eke_process_confirm()
545 nonces, 2 * data->sess.nonce_len); in eap_eke_process_confirm()
546 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { in eap_eke_process_confirm()
552 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, in eap_eke_process_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
Ddpp_crypto.c427 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_derive_bk_ke() local
441 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_bk_ke()
442 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_bk_ke()
459 res = dpp_hmac_vector(hash_len, nonces, 2 * nonce_len, in dpp_derive_bk_ke()
1673 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_reconfig_derive_ke_responder() local
1728 os_memcpy(nonces, auth->c_nonce, curve->nonce_len); in dpp_reconfig_derive_ke_responder()
1729 os_memcpy(&nonces[curve->nonce_len], auth->e_nonce, curve->nonce_len); in dpp_reconfig_derive_ke_responder()
1730 if (dpp_hmac(curve->hash_len, nonces, 2 * curve->nonce_len, in dpp_reconfig_derive_ke_responder()
1772 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_reconfig_derive_ke_initiator() local
1819 os_memcpy(nonces, auth->c_nonce, curve->nonce_len); in dpp_reconfig_derive_ke_initiator()
[all …]
Dwpa_common.c521 u8 nonces[2 * FILS_NONCE_LEN]; in fils_rmsk_to_pmk() local
542 os_memcpy(nonces, snonce, FILS_NONCE_LEN); in fils_rmsk_to_pmk()
543 os_memcpy(&nonces[FILS_NONCE_LEN], anonce, FILS_NONCE_LEN); in fils_rmsk_to_pmk()
553 res = hmac_sha384_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, in fils_rmsk_to_pmk()
556 res = hmac_sha256_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, in fils_rmsk_to_pmk()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_eke.c308 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; in eap_eke_build_confirm() local
328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); in eap_eke_build_confirm()
329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm()
332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len, in eap_eke_build_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_eke.c308 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; in eap_eke_build_confirm() local
328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); in eap_eke_build_confirm()
329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm()
332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len, in eap_eke_build_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/
Dwpa_common.c481 u8 nonces[2 * FILS_NONCE_LEN]; in fils_rmsk_to_pmk() local
502 os_memcpy(nonces, snonce, FILS_NONCE_LEN); in fils_rmsk_to_pmk()
503 os_memcpy(&nonces[FILS_NONCE_LEN], anonce, FILS_NONCE_LEN); in fils_rmsk_to_pmk()
513 res = hmac_sha384_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, in fils_rmsk_to_pmk()
516 res = hmac_sha256_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, in fils_rmsk_to_pmk()
Ddpp.c1580 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_derive_ke() local
1598 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_ke()
1599 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_ke()
1616 res = dpp_hmac_vector(hash_len, nonces, 2 * nonce_len, in dpp_derive_ke()
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Dsme.c1446 u8 nonces[2 * FILS_NONCE_LEN]; in sme_associate() local
1535 os_memcpy(nonces, snonce, FILS_NONCE_LEN); in sme_associate()
1536 os_memcpy(nonces + FILS_NONCE_LEN, anonce, FILS_NONCE_LEN); in sme_associate()
1537 params.fils_nonces = nonces; in sme_associate()
1538 params.fils_nonces_len = sizeof(nonces); in sme_associate()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Dsme.c1777 u8 nonces[2 * FILS_NONCE_LEN]; in sme_associate() local
1866 os_memcpy(nonces, snonce, FILS_NONCE_LEN); in sme_associate()
1867 os_memcpy(nonces + FILS_NONCE_LEN, anonce, FILS_NONCE_LEN); in sme_associate()
1868 params.fils_nonces = nonces; in sme_associate()
1869 params.fils_nonces_len = sizeof(nonces); in sme_associate()
/third_party/node/deps/openssl/openssl/
DNEWS.md242 * Prevent over long nonces in ChaCha20-Poly1305 ([CVE-2019-1543])
321 * Prevent over long nonces in ChaCha20-Poly1305 ([CVE-2019-1543])
DCHANGES.md2674 * Prevent over long nonces in ChaCha20-Poly1305.
3365 * Prevent over long nonces in ChaCha20-Poly1305.
12173 copies and compares OCSP nonces as opaque blobs without any attempt at
/third_party/openssl/
DNEWS.md236 * Prevent over long nonces in ChaCha20-Poly1305 ([CVE-2019-1543])
315 * Prevent over long nonces in ChaCha20-Poly1305 ([CVE-2019-1543])
DCHANGES.md2612 * Prevent over long nonces in ChaCha20-Poly1305.
3303 * Prevent over long nonces in ChaCha20-Poly1305.
12111 copies and compares OCSP nonces as opaque blobs without any attempt at
/third_party/mbedtls/
DChangeLog4124 * Use deterministic nonces for AEAD ciphers in TLS by default (possible to