/external/wpa_supplicant_8/src/eap_peer/ |
eap_eke.c | 29 u8 nonce_s[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data 497 wpa_printf(MSG_INFO, "EAP-EKE: PNonce_PS protected data length does not match length of Nonce_P and Nonce_S"); 501 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Received Nonce_P | Nonce_S", 509 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, 511 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Nonce_S", 512 data->nonce_s, data->sess.nonce_len); 516 data->nonce_p, data->nonce_s) < 0) { 545 if (eap_eke_prot(&data->sess, data->nonce_s, data->sess.nonce_len, 563 data->nonce_s, data->nonce_p,
|
eap_sim.c | 28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data 450 const u8 *nonce_s) 485 return eap_sim_msg_finish(msg, data->k_aut, nonce_s, 857 if (eattr.nonce_s == NULL || eattr.counter < 0) { 859 !eattr.nonce_s ? " AT_NONCE_S" : "", 881 return eap_sim_response_reauth(data, id, 1, eattr.nonce_s); 885 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN); 887 data->nonce_s, EAP_SIM_NONCE_S_LEN); 891 data->nonce_s, data->mk, data->msk [all...] |
eap_aka.c | 25 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data 554 const u8 *nonce_s) 590 return eap_sim_msg_finish(msg, data->k_aut, nonce_s, 1095 if (eattr.nonce_s == NULL || eattr.counter < 0) { 1097 !eattr.nonce_s ? " AT_NONCE_S" : "", 1121 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s); 1128 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN); 1130 data->nonce_s, EAP_SIM_NONCE_S_LEN); 1136 data->nonce_s, [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_eke.c | 31 u8 nonce_s[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { 325 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Nonce_S", 326 data->nonce_s, data->sess.nonce_len); 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, 343 data->nonce_p, data->nonce_s) < 0) { 620 wpa_printf(MSG_INFO, "EAP-EKE: PNonce_S protected data too short to include Nonce_S"); 624 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Received Nonce_S", 626 if (os_memcmp(nonce, data->nonce_s, data->sess.nonce_len) != 0) { 627 wpa_printf(MSG_INFO, "EAP-EKE: Received Nonce_S does not match previously sent Nonce_S") [all...] |
eap_server_sim.c | 21 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data 149 const u8 *nonce_s) 152 if (nonce_s == NULL) { 172 counter == 0 && nonce_s == NULL) 184 if (nonce_s) { 186 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s, 255 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN)) 257 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: NONCE_S", 258 data->nonce_s, EAP_SIM_NONCE_S_LEN); 263 sm->identity_len, data->nonce_s, data->mk [all...] |
eap_server_aka.c | 22 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data 392 const u8 *nonce_s) 395 if (nonce_s == NULL) { 419 counter == 0 && nonce_s == NULL) 431 if (nonce_s) { 433 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s, 548 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN)) 550 wpa_hexdump_key(MSG_MSGDUMP, "EAP-AKA: NONCE_S", 551 data->nonce_s, EAP_SIM_NONCE_S_LEN); 557 data->nonce_s, [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
eap_sim_common.h | 84 const u8 *nonce_s, const u8 *mk, u8 *msk, 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 119 const u8 *nonce_s, u8 *msk, 184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
|