HomeSort by relevance Sort by last modified time
    Searched refs:rand_p (Results 1 - 22 of 22) sorted by null

  /external/wpa_supplicant/
eap_sake_common.h 70 const u8 *rand_p; member in struct:eap_sake_parse_attr
95 const u8 *rand_s, const u8 *rand_p,
98 const u8 *rand_s, const u8 *rand_p,
eap_sake_common.c 45 attr->rand_p = pos + 2;
257 * @rand_p: 16-byte RAND_P
265 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
278 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
282 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
293 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
297 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
310 * @rand_p: 16-byte RAND_P
    [all...]
eap_psk_common.c 37 void eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
44 aes_128_encrypt_block(kdk, rand_p, hash);
eap_psk_common.h 66 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2
100 void eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
eap_psk.c 30 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
129 if (hostapd_get_rand(data->rand_p, EAP_PSK_RAND_LEN)) {
146 os_memcpy(hdr2->rand_p, data->rand_p, EAP_PSK_RAND_LEN);
148 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
161 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN);
164 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p,
225 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
231 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN)
    [all...]
eap_sake.c 27 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
236 if (hostapd_get_rand(data->rand_p, EAP_SAKE_RAND_LEN)) {
240 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_P (peer rand)",
241 data->rand_p, EAP_SAKE_RAND_LEN);
257 data->rand_s, data->rand_p,
273 os_memcpy(rpos, data->rand_p, EAP_SAKE_RAND_LEN);
287 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
330 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
359 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sake_common.h 66 const u8 *rand_p; member in struct:eap_sake_parse_attr
91 const u8 *rand_s, const u8 *rand_p,
94 const u8 *rand_s, const u8 *rand_p,
eap_psk_common.c 40 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
47 if (aes_128_encrypt_block(kdk, rand_p, hash))
eap_psk_common.h 49 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2
75 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
eap_sake_common.c 46 attr->rand_p = pos + 2;
258 * @rand_p: 16-byte RAND_P
266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
279 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
283 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
294 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
298 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
311 * @rand_p: 16-byte RAND_P
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sake_common.h 66 const u8 *rand_p; member in struct:eap_sake_parse_attr
91 const u8 *rand_s, const u8 *rand_p,
94 const u8 *rand_s, const u8 *rand_p,
eap_psk_common.c 40 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
47 if (aes_128_encrypt_block(kdk, rand_p, hash))
eap_psk_common.h 49 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2
75 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
eap_sake_common.c 46 attr->rand_p = pos + 2;
258 * @rand_p: 16-byte RAND_P
266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
279 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
283 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
294 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
298 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
311 * @rand_p: 16-byte RAND_P
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_psk.c 28 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
133 if (os_get_random(data->rand_p, EAP_PSK_RAND_LEN)) {
147 os_memcpy(hdr2->rand_p, data->rand_p, EAP_PSK_RAND_LEN);
149 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
162 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN);
169 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p,
231 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
237 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN)
    [all...]
eap_sake.c 26 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
226 if (os_get_random(data->rand_p, EAP_SAKE_RAND_LEN)) {
230 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_P (peer rand)",
231 data->rand_p, EAP_SAKE_RAND_LEN);
247 data->rand_s, data->rand_p,
262 data->rand_p, EAP_SAKE_RAND_LEN);
274 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
318 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
347 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 29 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
134 if (random_get_bytes(data->rand_p, EAP_PSK_RAND_LEN)) {
148 os_memcpy(hdr2->rand_p, data->rand_p, EAP_PSK_RAND_LEN);
150 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
163 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN);
170 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p,
232 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
238 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN)
    [all...]
eap_sake.c 27 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
227 if (random_get_bytes(data->rand_p, EAP_SAKE_RAND_LEN)) {
231 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_P (peer rand)",
232 data->rand_p, EAP_SAKE_RAND_LEN);
248 data->rand_s, data->rand_p,
263 data->rand_p, EAP_SAKE_RAND_LEN);
275 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
319 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
348 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sake.c 25 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
220 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
337 if (!attr.rand_p || !attr.mic_p) {
343 os_memcpy(data->rand_p, attr.rand_p, EAP_SAKE_RAND_LEN);
366 data->rand_s, data->rand_p,
369 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
406 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
eap_psk.c 29 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
119 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
126 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN);
131 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
297 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)",
298 resp->rand_p, EAP_PSK_RAND_LEN);
299 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN);
301 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
314 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN)
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sake.c 26 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
221 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
338 if (!attr.rand_p || !attr.mic_p) {
344 os_memcpy(data->rand_p, attr.rand_p, EAP_SAKE_RAND_LEN);
367 data->rand_s, data->rand_p,
370 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
407 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
eap_server_psk.c 30 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
120 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
127 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN);
132 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
298 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)",
299 resp->rand_p, EAP_PSK_RAND_LEN);
300 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN);
302 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
315 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN)
    [all...]

Completed in 61 milliseconds