/external/wpa_supplicant_8/src/eap_common/ |
eap_eke_common.h | 99 const u8 *nonce_p, const u8 *nonce_s); 103 const u8 *nonce_p, const u8 *nonce_s,
|
eap_eke_common.c | 509 const u8 *nonce_p, const u8 *nonce_s) 517 * Ka = prf+(SharedSecret, "EAP-EKE Ka" | ID_S | ID_P | Nonce_P | 535 os_memcpy(pos, nonce_p, sess->nonce_len); 554 const u8 *nonce_p, const u8 *nonce_s, 565 * ID_P | Nonce_P | Nonce_S) 580 os_memcpy(pos, nonce_p, sess->nonce_len);
|
/external/ipsec-tools/src/racoon/ |
isakmp_quick.c | 416 if (isakmp_p2ph(&iph2->nonce_p, pa->ptr) < 0) 478 if (hash == NULL || iph2->sa_ret == NULL || iph2->nonce_p == NULL) { 539 VPTRINIT(iph2->nonce_p); 577 tmp = vmalloc(iph2->nonce->l + iph2->nonce_p->l); 584 memcpy(tmp->v + iph2->nonce->l, iph2->nonce_p->v, iph2->nonce_p->l); 922 iph2->nonce_p = NULL; 956 if (isakmp_p2ph(&iph2->nonce_p, pa->ptr) < 0) 1021 if (hash == NULL || iph2->sa == NULL || iph2->nonce_p == NULL) { 1135 VPTRINIT(iph2->nonce_p); [all...] |
handler.h | 154 vchar_t *nonce_p; /* partner's nonce value */ member in struct:ph1handle 301 vchar_t *nonce_p; /* partner's nonce value in phase 2 */ member in struct:ph2handle
|
isakmp_agg.c | 405 if (isakmp_p2ph(&iph1->nonce_p, pa->ptr) < 0) 475 if (iph1->dhpub_p == NULL || iph1->nonce_p == NULL) { 590 VPTRINIT(iph1->nonce_p); 828 if (isakmp_p2ph(&iph1->nonce_p, pa->ptr) < 0) 867 if (iph1->dhpub_p == NULL || iph1->nonce_p == NULL) { 914 VPTRINIT(iph1->nonce_p); [all...] |
isakmp_base.c | 337 if (isakmp_p2ph(&iph1->nonce_p, pa->ptr) < 0) 357 if (iph1->nonce_p == NULL || iph1->id_p == NULL) { 397 VPTRINIT(iph1->nonce_p); 831 if (isakmp_p2ph(&iph1->nonce_p, pa->ptr) < 0) 856 if (iph1->nonce_p == NULL || iph1->id_p == NULL) { 894 VPTRINIT(iph1->nonce_p); [all...] |
isakmp_ident.c | 460 if (isakmp_p2ph(&iph1->nonce_p, pa->ptr) < 0) 530 if (iph1->dhpub_p == NULL || iph1->nonce_p == NULL) { 554 VPTRINIT(iph1->nonce_p); 1154 if (isakmp_p2ph(&iph1->nonce_p, pa->ptr) < 0) 1221 if (iph1->dhpub_p == NULL || iph1->nonce_p == NULL) { 1241 VPTRINIT(iph1->nonce_p); [all...] |
oakley.c | 493 + iph2->nonce_p->l); 517 bp = (side == INITIATOR ? iph2->nonce : iph2->nonce_p); 521 bp = (side == INITIATOR ? iph2->nonce_p : iph2->nonce); 1021 len = iph1->nonce->l + iph1->nonce_p->l; 1030 bp = (sw == GENERATE ? iph1->nonce_p : iph1->nonce); 1034 bp = (sw == GENERATE ? iph1->nonce : iph1->nonce_p); 1151 len = iph1->nonce->l + iph1->nonce_p->l; 1160 bp = (sw == GENERATE ? iph1->nonce_p : iph1->nonce); 1164 bp = (sw == GENERATE ? iph1->nonce : iph1->nonce_p); [all...] |
handler.c | 340 VPTRINIT(iph1->nonce_p); 637 VPTRINIT(iph2->nonce_p);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_eke.c | 28 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data 422 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) { 427 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Nonce_P", 428 data->nonce_p, data->sess.nonce_len); 430 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len, 497 wpa_printf(MSG_INFO, "EAP-EKE: PNonce_PS protected data length does not match length of Nonce_P and Nonce_S"); 501 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Received Nonce_P | Nonce_S", 503 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { 504 wpa_printf(MSG_INFO, "EAP-EKE: Received Nonce_P does not match trnsmitted Nonce_P"); [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_eke.c | 30 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); 343 data->nonce_p, data->nonce_s) < 0) { 563 decrypt_len = sizeof(data->nonce_p); 565 data->nonce_p, &decrypt_len) < 0) { 571 wpa_printf(MSG_INFO, "EAP-EKE: PNonce_P protected data too short to include Nonce_P"); 575 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Nonce_P", 576 data->nonce_p, data->sess.nonce_len); 647 data->nonce_s, data->nonce_p,
|