HomeSort by relevance Sort by last modified time
    Searched refs:rand_p (Results 1 - 8 of 8) sorted by null

  /external/wpa_supplicant_8/src/eap_common/
eap_sake_common.h 60 const u8 *rand_p; member in struct:eap_sake_parse_attr
85 const u8 *rand_s, const u8 *rand_p,
88 const u8 *rand_s, const u8 *rand_p,
eap_psk_common.c 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk,
41 if (aes_128_encrypt_block(kdk, rand_p, hash))
eap_psk_common.h 43 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2
69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
eap_sake_common.c 40 attr->rand_p = pos + 2;
252 * @rand_p: 16-byte RAND_P
260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
273 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
277 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
288 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
292 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
305 * @rand_p: 16-byte RAND_P
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_psk.c 23 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
130 if (random_get_bytes(data->rand_p, EAP_PSK_RAND_LEN)) {
144 os_memcpy(hdr2->rand_p, data->rand_p, EAP_PSK_RAND_LEN);
146 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
159 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN);
166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p,
228 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
234 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN)
    [all...]
eap_sake.c 21 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
221 if (random_get_bytes(data->rand_p, EAP_SAKE_RAND_LEN)) {
225 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_P (peer rand)",
226 data->rand_p, EAP_SAKE_RAND_LEN);
242 data->rand_s, data->rand_p,
257 data->rand_p, EAP_SAKE_RAND_LEN);
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
  /external/wpa_supplicant_8/src/eap_server/
eap_server_sake.c 20 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
215 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
332 if (!attr.rand_p || !attr.mic_p) {
338 os_memcpy(data->rand_p, attr.rand_p, EAP_SAKE_RAND_LEN);
361 data->rand_s, data->rand_p,
364 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
401 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
eap_server_psk.c 24 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
114 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */
121 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN);
128 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
294 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)",
295 resp->rand_p, EAP_PSK_RAND_LEN);
296 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN);
298 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
311 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN)
    [all...]

Completed in 245 milliseconds