Home
last modified time | relevance | path

Searched refs:nonce_mt (Results 1 – 8 of 8) sorted by relevance

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_sim.c20 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN]; member
251 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_build_challenge()
525 if (attr->nonce_mt == NULL || attr->selected_version < 0) { in eap_sim_process_start()
567 os_memcpy(data->nonce_mt, attr->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_process_start()
569 eap_sim_derive_mk(sm->identity, identity_len, attr->nonce_mt, in eap_sim_process_start()
863 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_get_session_id()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_sim.c20 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN]; member
251 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_build_challenge()
525 if (attr->nonce_mt == NULL || attr->selected_version < 0) { in eap_sim_process_start()
567 os_memcpy(data->nonce_mt, attr->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_process_start()
569 eap_sim_derive_mk(sm->identity, identity_len, attr->nonce_mt, in eap_sim_process_start()
861 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_get_session_id()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_sim.c28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member
92 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init()
522 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start()
524 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start()
797 eap_sim_derive_mk(identity, identity_len, data->nonce_mt, in eap_sim_process_challenge()
803 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, in eap_sim_process_challenge()
1189 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init_for_reauth()
1266 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_get_session_id()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_sim.c28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member
94 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init()
531 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start()
533 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start()
809 eap_sim_derive_mk(identity, identity_len, data->nonce_mt, in eap_sim_process_challenge()
815 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, in eap_sim_process_challenge()
1201 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init_for_reauth()
1278 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_get_session_id()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
Deap_sim_common.h79 const u8 *nonce_mt, u16 selected_version,
190 const u8 *nonce_mt, *identity, *res, *auts; member
Deap_sim_common.c33 const u8 *nonce_mt, u16 selected_version, in eap_sim_derive_mk() argument
45 addr[2] = nonce_mt; in eap_sim_derive_mk()
598 attr->nonce_mt = apos + 2; in eap_sim_parse_attr()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
Deap_sim_common.h75 const u8 *nonce_mt, u16 selected_version,
186 const u8 *nonce_mt, *identity, *res, *auts; member
Deap_sim_common.c29 const u8 *nonce_mt, u16 selected_version, in eap_sim_derive_mk() argument
41 addr[2] = nonce_mt; in eap_sim_derive_mk()
588 attr->nonce_mt = apos + 2; in eap_sim_parse_attr()