/external/wpa_supplicant_8/src/crypto/ |
aes-eax.c | 20 * @nonce_len: Nonce length in bytes 28 int aes_128_eax_encrypt(const u8 *key, const u8 *nonce, size_t nonce_len, 38 if (nonce_len > data_len) 39 buf_len = nonce_len; 53 os_memcpy(buf + 16, nonce, nonce_len); 54 if (omac1_aes_128(key, buf, 16 + nonce_len, nonce_mac)) 84 * @nonce_len: Nonce length in bytes 92 int aes_128_eax_decrypt(const u8 *key, const u8 *nonce, size_t nonce_len, 102 if (nonce_len > data_len) 103 buf_len = nonce_len; [all...] |
aes_wrap.h | 32 const u8 *nonce, size_t nonce_len, 36 const u8 *nonce, size_t nonce_len,
|
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ie.h | 26 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
peerkey_auth.c | 270 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN) {
|
wpa_auth_ie.c | 683 ie->nonce_len = pos[1] - RSN_SELECTOR_LEN;
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ie.h | 28 size_t nonce_len; member in struct:wpa_eapol_ie_parse
|
wpa_ie.c | 316 ie->nonce_len = pos[1] - RSN_SELECTOR_LEN;
|
peerkey.c | 534 kde.nonce == NULL || kde.nonce_len < WPA_NONCE_LEN || [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
ikev2_common.h | 294 const u8 *nonce, size_t nonce_len, 313 size_t nonce_len; member in struct:ikev2_payloads
|
ikev2_common.c | 380 payloads->nonce_len = pdatalen; 435 const u8 *nonce, size_t nonce_len, 464 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 471 os_memcpy(pos, nonce, nonce_len); 472 pos += nonce_len;
|
/external/wpa_supplicant_8/src/eap_peer/ |
ikev2.c | 482 ikev2_process_ni(data, pl->nonce, pl->nonce_len) < 0) [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
ikev2.c | 487 ikev2_process_nr(data, pl->nonce, pl->nonce_len) < 0)
|