Home
last modified time | relevance | path

Searched refs:nonce_mt (Results 1 – 11 of 11) sorted by relevance

/external/wpa_supplicant/
Deap_sim_common.h74 const u8 *nonce_mt, u16 selected_version,
133 const u8 *nonce_mt, *identity, *res, *auts; member
Deap_sim.c33 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member
63 if (hostapd_get_rand(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init()
285 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start()
287 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start()
547 eap_sim_derive_mk(identity, identity_len, data->nonce_mt, in eap_sim_process_challenge()
554 attr->mac, data->nonce_mt, in eap_sim_process_challenge()
901 if (hostapd_get_rand(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init_for_reauth()
Deap_sim_common.c32 const u8 *nonce_mt, u16 selected_version, in eap_sim_derive_mk() argument
44 addr[2] = nonce_mt; in eap_sim_derive_mk()
325 attr->nonce_mt = apos + 2; in eap_sim_parse_attr()
/external/wpa_supplicant_8/src/eap_server/
Deap_server_sim.c26 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN]; member
224 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_mt, in eap_sim_build_challenge()
454 if (attr->nonce_mt == NULL || attr->selected_version < 0) { in eap_sim_process_start()
497 os_memcpy(data->nonce_mt, attr->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_process_start()
499 eap_sim_derive_mk(sm->identity, identity_len, attr->nonce_mt, in eap_sim_process_start()
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
Deap_sim.c25 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN]; member
223 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_mt, in eap_sim_build_challenge()
453 if (attr->nonce_mt == NULL || attr->selected_version < 0) { in eap_sim_process_start()
496 os_memcpy(data->nonce_mt, attr->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_process_start()
498 eap_sim_derive_mk(sm->identity, identity_len, attr->nonce_mt, in eap_sim_process_start()
/external/wpa_supplicant_8/src/eap_peer/
Deap_sim.c34 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member
97 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init()
381 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start()
383 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start()
638 eap_sim_derive_mk(identity, identity_len, data->nonce_mt, in eap_sim_process_challenge()
644 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, in eap_sim_process_challenge()
999 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init_for_reauth()
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
Deap_sim.c35 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member
98 if (os_get_random(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init()
382 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start()
384 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start()
639 eap_sim_derive_mk(identity, identity_len, data->nonce_mt, in eap_sim_process_challenge()
645 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, in eap_sim_process_challenge()
1000 if (os_get_random(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init_for_reauth()
/external/wpa_supplicant_8/src/eap_common/
Deap_sim_common.h81 const u8 *nonce_mt, u16 selected_version,
192 const u8 *nonce_mt, *identity, *res, *auts; member
Deap_sim_common.c35 const u8 *nonce_mt, u16 selected_version, in eap_sim_derive_mk() argument
47 addr[2] = nonce_mt; in eap_sim_derive_mk()
596 attr->nonce_mt = apos + 2; in eap_sim_parse_attr()
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
Deap_sim_common.h81 const u8 *nonce_mt, u16 selected_version,
192 const u8 *nonce_mt, *identity, *res, *auts; member
Deap_sim_common.c34 const u8 *nonce_mt, u16 selected_version, in eap_sim_derive_mk() argument
46 addr[2] = nonce_mt; in eap_sim_derive_mk()
595 attr->nonce_mt = apos + 2; in eap_sim_parse_attr()