/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_sim.c | 20 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN]; member 251 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_build_challenge() 525 if (attr->nonce_mt == NULL || attr->selected_version < 0) { in eap_sim_process_start() 567 os_memcpy(data->nonce_mt, attr->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_process_start() 569 eap_sim_derive_mk(sm->identity, identity_len, attr->nonce_mt, in eap_sim_process_start() 863 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_sim.c | 20 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN]; member 251 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_build_challenge() 525 if (attr->nonce_mt == NULL || attr->selected_version < 0) { in eap_sim_process_start() 567 os_memcpy(data->nonce_mt, attr->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_process_start() 569 eap_sim_derive_mk(sm->identity, identity_len, attr->nonce_mt, in eap_sim_process_start() 861 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_sim.c | 28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member 92 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init() 522 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start() 524 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start() 797 eap_sim_derive_mk(identity, identity_len, data->nonce_mt, in eap_sim_process_challenge() 803 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, in eap_sim_process_challenge() 1189 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init_for_reauth() 1266 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_sim.c | 28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member 94 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init() 531 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start() 533 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start() 809 eap_sim_derive_mk(identity, identity_len, data->nonce_mt, in eap_sim_process_challenge() 815 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, in eap_sim_process_challenge() 1201 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init_for_reauth() 1278 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_sim_common.h | 79 const u8 *nonce_mt, u16 selected_version, 190 const u8 *nonce_mt, *identity, *res, *auts; member
|
D | eap_sim_common.c | 33 const u8 *nonce_mt, u16 selected_version, in eap_sim_derive_mk() argument 45 addr[2] = nonce_mt; in eap_sim_derive_mk() 598 attr->nonce_mt = apos + 2; in eap_sim_parse_attr()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_sim_common.h | 75 const u8 *nonce_mt, u16 selected_version, 186 const u8 *nonce_mt, *identity, *res, *auts; member
|
D | eap_sim_common.c | 29 const u8 *nonce_mt, u16 selected_version, in eap_sim_derive_mk() argument 41 addr[2] = nonce_mt; in eap_sim_derive_mk() 588 attr->nonce_mt = apos + 2; in eap_sim_parse_attr()
|