Home | History | Annotate | Download | only in common

Lines Matching refs:pwe

159 	wpa_printf(MSG_DEBUG, "SAE: PWE derivation - addr1=" MACSTR
172 struct crypto_ec_point *pwe)
202 if (crypto_ec_point_solve_y_coord(sae->tmp->ec, pwe, x, y_bit) < 0) {
209 wpa_printf(MSG_DEBUG, "SAE: PWE found");
216 struct crypto_bignum *pwe)
241 /* PWE = pwd-value^((p-1)/r) modulo p */
248 * PWE = pwd-value^2 modulo p
267 res = crypto_bignum_exptmod(a, b, sae->tmp->prime, pwe);
273 wpa_printf(MSG_DEBUG, "SAE: Failed to calculate PWE");
277 /* if (PWE > 1) --> found */
278 if (crypto_bignum_is_zero(pwe) || crypto_bignum_is_one(pwe)) {
279 wpa_printf(MSG_DEBUG, "SAE: PWE <= 1");
283 wpa_printf(MSG_DEBUG, "SAE: PWE found");
334 wpa_printf(MSG_DEBUG, "SAE: Failed to derive PWE");
350 wpa_printf(MSG_DEBUG, "SAE: Ignore this PWE (one was "
353 wpa_printf(MSG_DEBUG, "SAE: Use this PWE");
401 wpa_printf(MSG_DEBUG, "SAE: Failed to derive PWE");
413 wpa_printf(MSG_DEBUG, "SAE: Use this PWE");
425 /* COMMIT-ELEMENT = inverse(scalar-op(mask, PWE)) */
448 /* COMMIT-ELEMENT = inverse(scalar-op(mask, PWE)) */
528 * K = scalar-op(rand, (elem-op(scalar-op(peer-commit-scalar, PWE),
564 * K = scalar-op(rand, (elem-op(scalar-op(peer-commit-scalar, PWE),