/external/wpa_supplicant_8/src/eap_peer/ |
eap_eke.c | 28 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data 422 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) { 427 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Nonce_P", 428 data->nonce_p, data->sess.nonce_len); 430 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len, 497 wpa_printf(MSG_INFO, "EAP-EKE: PNonce_PS protected data length does not match length of Nonce_P and Nonce_S"); 501 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Received Nonce_P | Nonce_S", 503 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { 504 wpa_printf(MSG_INFO, "EAP-EKE: Received Nonce_P does not match trnsmitted Nonce_P"); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_eke.c | 30 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); 343 data->nonce_p, data->nonce_s) < 0) { 563 decrypt_len = sizeof(data->nonce_p); 565 data->nonce_p, &decrypt_len) < 0) { 571 wpa_printf(MSG_INFO, "EAP-EKE: PNonce_P protected data too short to include Nonce_P"); 575 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Nonce_P", 576 data->nonce_p, data->sess.nonce_len); 647 data->nonce_s, data->nonce_p,
|
/external/ipsec-tools/src/racoon/ |
handler.h | 154 vchar_t *nonce_p; /* partner's nonce value */ member in struct:ph1handle 301 vchar_t *nonce_p; /* partner's nonce value in phase 2 */ member in struct:ph2handle
|