HomeSort by relevance Sort by last modified time
    Searched refs:nonce_s (Results 1 - 12 of 12) sorted by null

  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_sim_common.h 90 const u8 *nonce_s, const u8 *mk, u8 *msk,
103 const u8 *nonce_s, u8 *msk, u8 *emsk);
125 const u8 *nonce_s, u8 *msk,
190 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
eap_sim_common.c 114 const u8 *nonce_s, const u8 *mk, u8 *msk,
132 addr[2] = nonce_s;
143 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s,
147 /* XKEY' = SHA1(Identity|counter|NONCE_S|MK) */
332 const u8 *nonce_s, u8 *msk, u8 *emsk)
339 * MK = PRF'(K_re,"EAP-AKA' re-auth"|Identity|counter|NONCE_S)
345 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN);
723 attr->nonce_s = apos + 2;
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.h 84 const u8 *nonce_s, const u8 *mk, u8 *msk,
97 const u8 *nonce_s, u8 *msk, u8 *emsk);
119 const u8 *nonce_s, u8 *msk,
184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
eap_sim_common.c 109 const u8 *nonce_s, const u8 *mk, u8 *msk,
127 addr[2] = nonce_s;
138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s,
142 /* XKEY' = SHA1(Identity|counter|NONCE_S|MK) */
327 const u8 *nonce_s, u8 *msk, u8 *emsk)
334 * MK = PRF'(K_re,"EAP-AKA' re-auth"|Identity|counter|NONCE_S)
340 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN);
718 attr->nonce_s = apos + 2;
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_sim.c 26 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
136 const u8 *nonce_s)
152 counter == 0 && nonce_s == NULL)
164 if (nonce_s) {
166 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
235 if (os_get_random(data->nonce_s, EAP_SIM_NONCE_S_LEN))
237 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: NONCE_S",
238 data->nonce_s, EAP_SIM_NONCE_S_LEN);
243 sm->identity_len, data->nonce_s, data->mk,
249 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
    [all...]
eap_aka.c 28 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
299 const u8 *nonce_s)
315 counter == 0 && nonce_s == NULL)
327 if (nonce_s) {
329 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
444 if (os_get_random(data->nonce_s, EAP_SIM_NONCE_S_LEN))
446 wpa_hexdump_key(MSG_MSGDUMP, "EAP-AKA: NONCE_S",
447 data->nonce_s, EAP_SIM_NONCE_S_LEN);
453 data->nonce_s,
459 sm->identity_len, data->nonce_s,
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sim.c 21 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
131 const u8 *nonce_s)
147 counter == 0 && nonce_s == NULL)
159 if (nonce_s) {
161 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
230 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
232 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: NONCE_S",
233 data->nonce_s, EAP_SIM_NONCE_S_LEN);
238 sm->identity_len, data->nonce_s, data->mk,
244 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
    [all...]
eap_server_aka.c 22 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
292 const u8 *nonce_s)
308 counter == 0 && nonce_s == NULL)
320 if (nonce_s) {
322 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
437 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
439 wpa_hexdump_key(MSG_MSGDUMP, "EAP-AKA: NONCE_S",
440 data->nonce_s, EAP_SIM_NONCE_S_LEN);
446 data->nonce_s,
452 sm->identity_len, data->nonce_s,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_aka.c 33 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
527 const u8 *nonce_s)
563 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
1068 if (eattr.nonce_s == NULL || eattr.counter < 0) {
1070 !eattr.nonce_s ? " AT_NONCE_S" : "",
1094 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s);
1101 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
1103 data->nonce_s, EAP_SIM_NONCE_S_LEN);
1109 data->nonce_s,
    [all...]
eap_sim.c 35 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
457 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s,
829 if (eattr.nonce_s == NULL || eattr.counter < 0) {
831 !eattr.nonce_s ? " AT_NONCE_S" : "",
857 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
859 data->nonce_s, EAP_SIM_NONCE_S_LEN);
863 data->nonce_s, data->mk, data->msk,
  /external/wpa_supplicant_8/src/eap_peer/
eap_aka.c 25 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
539 const u8 *nonce_s)
575 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
1080 if (eattr.nonce_s == NULL || eattr.counter < 0) {
1082 !eattr.nonce_s ? " AT_NONCE_S" : "",
1106 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s);
1113 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
1115 data->nonce_s, EAP_SIM_NONCE_S_LEN);
1121 data->nonce_s,
    [all...]
eap_sim.c 28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
470 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s,
842 if (eattr.nonce_s == NULL || eattr.counter < 0) {
844 !eattr.nonce_s ? " AT_NONCE_S" : "",
870 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
872 data->nonce_s, EAP_SIM_NONCE_S_LEN);
876 data->nonce_s, data->mk, data->msk,

Completed in 174 milliseconds