/external/wpa_supplicant/ |
D | eap_sim_common.h | 74 const u8 *nonce_mt, u16 selected_version, 133 const u8 *nonce_mt, *identity, *res, *auts; member
|
D | eap_sim.c | 33 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member 63 if (hostapd_get_rand(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init() 285 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start() 287 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start() 547 eap_sim_derive_mk(identity, identity_len, data->nonce_mt, in eap_sim_process_challenge() 554 attr->mac, data->nonce_mt, in eap_sim_process_challenge() 901 if (hostapd_get_rand(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init_for_reauth()
|
D | eap_sim_common.c | 32 const u8 *nonce_mt, u16 selected_version, in eap_sim_derive_mk() argument 44 addr[2] = nonce_mt; in eap_sim_derive_mk() 325 attr->nonce_mt = apos + 2; in eap_sim_parse_attr()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_sim.c | 26 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN]; member 224 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_mt, in eap_sim_build_challenge() 454 if (attr->nonce_mt == NULL || attr->selected_version < 0) { in eap_sim_process_start() 497 os_memcpy(data->nonce_mt, attr->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_process_start() 499 eap_sim_derive_mk(sm->identity, identity_len, attr->nonce_mt, in eap_sim_process_start()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
D | eap_sim.c | 25 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN]; member 223 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_mt, in eap_sim_build_challenge() 453 if (attr->nonce_mt == NULL || attr->selected_version < 0) { in eap_sim_process_start() 496 os_memcpy(data->nonce_mt, attr->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_process_start() 498 eap_sim_derive_mk(sm->identity, identity_len, attr->nonce_mt, in eap_sim_process_start()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_sim.c | 34 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member 97 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init() 381 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start() 383 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start() 638 eap_sim_derive_mk(identity, identity_len, data->nonce_mt, in eap_sim_process_challenge() 644 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, in eap_sim_process_challenge() 999 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init_for_reauth()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
D | eap_sim.c | 35 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member 98 if (os_get_random(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init() 382 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start() 384 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start() 639 eap_sim_derive_mk(identity, identity_len, data->nonce_mt, in eap_sim_process_challenge() 645 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, in eap_sim_process_challenge() 1000 if (os_get_random(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init_for_reauth()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sim_common.h | 81 const u8 *nonce_mt, u16 selected_version, 192 const u8 *nonce_mt, *identity, *res, *auts; member
|
D | eap_sim_common.c | 35 const u8 *nonce_mt, u16 selected_version, in eap_sim_derive_mk() argument 47 addr[2] = nonce_mt; in eap_sim_derive_mk() 596 attr->nonce_mt = apos + 2; in eap_sim_parse_attr()
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | eap_sim_common.h | 81 const u8 *nonce_mt, u16 selected_version, 192 const u8 *nonce_mt, *identity, *res, *auts; member
|
D | eap_sim_common.c | 34 const u8 *nonce_mt, u16 selected_version, in eap_sim_derive_mk() argument 46 addr[2] = nonce_mt; in eap_sim_derive_mk() 595 attr->nonce_mt = apos + 2; in eap_sim_parse_attr()
|