/external/wpa_supplicant_8/src/eap_common/ |
D | eap_sake_common.c | 40 attr->rand_p = data; in eap_sake_parse_add_attr() 260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, in eap_sake_derive_keys() argument 273 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys() 277 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys() 288 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys() 292 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, in eap_sake_derive_keys() 317 const u8 *rand_s, const u8 *rand_p, in eap_sake_compute_mic() argument 345 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p, in eap_sake_compute_mic() 359 os_memcpy(_rand, rand_p, EAP_SAKE_RAND_LEN); in eap_sake_compute_mic()
|
D | eap_sake_common.h | 60 const u8 *rand_p; member 85 const u8 *rand_s, const u8 *rand_p, 88 const u8 *rand_s, const u8 *rand_p,
|
D | eap_psk_common.h | 43 u8 rand_p[EAP_PSK_RAND_LEN]; member 69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
|
D | eap_psk_common.c | 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, in eap_psk_derive_keys() argument 41 if (aes_128_encrypt_block(kdk, rand_p, hash)) in eap_psk_derive_keys()
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_psk.c | 23 u8 rand_p[EAP_PSK_RAND_LEN]; member 130 if (random_get_bytes(data->rand_p, EAP_PSK_RAND_LEN)) { in eap_psk_process_1() 144 os_memcpy(hdr2->rand_p, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_1() 159 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_1() 166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, in eap_psk_process_1() 234 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_3() 249 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, in eap_psk_process_3() 453 os_memcpy(id + 1, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_get_session_id()
|
D | eap_sake.c | 21 u8 rand_p[EAP_SAKE_RAND_LEN]; member 220 if (random_get_bytes(data->rand_p, EAP_SAKE_RAND_LEN)) { in eap_sake_process_challenge() 225 data->rand_p, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge() 241 data->rand_s, data->rand_p, in eap_sake_process_challenge() 255 data->rand_p, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge() 267 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge() 312 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm() 340 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_psk.c | 24 u8 rand_p[EAP_PSK_RAND_LEN]; member 119 os_memcpy(buf + sm->server_id_len, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_build_3() 126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, in eap_psk_build_3() 293 resp->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_2() 294 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_2() 309 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_process_2() 502 os_memcpy(id + 1, data->rand_p, EAP_PSK_RAND_LEN); in eap_psk_get_session_id()
|
D | eap_server_sake.c | 20 u8 rand_p[EAP_SAKE_RAND_LEN]; member 200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_build_confirm() 317 if (!attr.rand_p || !attr.mic_p) { in eap_sake_process_challenge() 323 os_memcpy(data->rand_p, attr.rand_p, EAP_SAKE_RAND_LEN); in eap_sake_process_challenge() 346 data->rand_s, data->rand_p, in eap_sake_process_challenge() 349 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_challenge() 386 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, in eap_sake_process_confirm()
|