/external/wpa_supplicant/ |
eap_sake_common.h | 70 const u8 *rand_p; member in struct:eap_sake_parse_attr 95 const u8 *rand_s, const u8 *rand_p, 98 const u8 *rand_s, const u8 *rand_p,
|
eap_sake_common.c | 45 attr->rand_p = pos + 2; 257 * @rand_p: 16-byte RAND_P 265 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 278 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 282 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 293 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 297 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 310 * @rand_p: 16-byte RAND_P [all...] |
eap_psk_common.c | 37 void eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, 44 aes_128_encrypt_block(kdk, rand_p, hash);
|
eap_psk_common.h | 66 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2 100 void eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
|
eap_psk.c | 30 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 129 if (hostapd_get_rand(data->rand_p, EAP_PSK_RAND_LEN)) { 146 os_memcpy(hdr2->rand_p, data->rand_p, EAP_PSK_RAND_LEN); 148 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 161 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN); 164 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, 225 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 231 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN) [all...] |
eap_sake.c | 27 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 236 if (hostapd_get_rand(data->rand_p, EAP_SAKE_RAND_LEN)) { 240 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_P (peer rand)", 241 data->rand_p, EAP_SAKE_RAND_LEN); 257 data->rand_s, data->rand_p, 273 os_memcpy(rpos, data->rand_p, EAP_SAKE_RAND_LEN); 287 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 330 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 359 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_sake_common.h | 66 const u8 *rand_p; member in struct:eap_sake_parse_attr 91 const u8 *rand_s, const u8 *rand_p, 94 const u8 *rand_s, const u8 *rand_p,
|
eap_psk_common.c | 40 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, 47 if (aes_128_encrypt_block(kdk, rand_p, hash))
|
eap_psk_common.h | 49 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2 75 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
|
eap_sake_common.c | 46 attr->rand_p = pos + 2; 258 * @rand_p: 16-byte RAND_P 266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 279 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 283 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 294 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 298 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 311 * @rand_p: 16-byte RAND_P [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sake_common.h | 66 const u8 *rand_p; member in struct:eap_sake_parse_attr 91 const u8 *rand_s, const u8 *rand_p, 94 const u8 *rand_s, const u8 *rand_p,
|
eap_psk_common.c | 40 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, 47 if (aes_128_encrypt_block(kdk, rand_p, hash))
|
eap_psk_common.h | 49 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2 75 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
|
eap_sake_common.c | 46 attr->rand_p = pos + 2; 258 * @rand_p: 16-byte RAND_P 266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 279 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 283 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 294 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 298 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 311 * @rand_p: 16-byte RAND_P [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_psk.c | 28 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 133 if (os_get_random(data->rand_p, EAP_PSK_RAND_LEN)) { 147 os_memcpy(hdr2->rand_p, data->rand_p, EAP_PSK_RAND_LEN); 149 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 162 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN); 169 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, 231 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 237 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN) [all...] |
eap_sake.c | 26 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 226 if (os_get_random(data->rand_p, EAP_SAKE_RAND_LEN)) { 230 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_P (peer rand)", 231 data->rand_p, EAP_SAKE_RAND_LEN); 247 data->rand_s, data->rand_p, 262 data->rand_p, EAP_SAKE_RAND_LEN); 274 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 318 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 347 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 29 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 134 if (random_get_bytes(data->rand_p, EAP_PSK_RAND_LEN)) { 148 os_memcpy(hdr2->rand_p, data->rand_p, EAP_PSK_RAND_LEN); 150 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 163 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN); 170 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, 232 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 238 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN) [all...] |
eap_sake.c | 27 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 227 if (random_get_bytes(data->rand_p, EAP_SAKE_RAND_LEN)) { 231 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_P (peer rand)", 232 data->rand_p, EAP_SAKE_RAND_LEN); 248 data->rand_s, data->rand_p, 263 data->rand_p, EAP_SAKE_RAND_LEN); 275 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 319 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 348 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_sake.c | 25 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 220 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 337 if (!attr.rand_p || !attr.mic_p) { 343 os_memcpy(data->rand_p, attr.rand_p, EAP_SAKE_RAND_LEN); 366 data->rand_s, data->rand_p, 369 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 406 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
eap_psk.c | 29 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 119 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 126 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN); 131 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, 297 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)", 298 resp->rand_p, EAP_PSK_RAND_LEN); 299 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN); 301 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 314 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN) [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_sake.c | 26 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 221 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 338 if (!attr.rand_p || !attr.mic_p) { 344 os_memcpy(data->rand_p, attr.rand_p, EAP_SAKE_RAND_LEN); 367 data->rand_s, data->rand_p, 370 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 407 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
eap_server_psk.c | 30 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 120 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 127 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN); 132 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, 298 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)", 299 resp->rand_p, EAP_PSK_RAND_LEN); 300 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN); 302 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 315 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN) [all...] |