HomeSort by relevance Sort by last modified time
    Searched defs:nonce_s (Results 1 - 7 of 7) sorted by null

  /external/wpa_supplicant_8/src/eap_peer/
eap_eke.c 29 u8 nonce_s[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
497 wpa_printf(MSG_INFO, "EAP-EKE: PNonce_PS protected data length does not match length of Nonce_P and Nonce_S");
501 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Received Nonce_P | Nonce_S",
509 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len,
511 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Nonce_S",
512 data->nonce_s, data->sess.nonce_len);
516 data->nonce_p, data->nonce_s) < 0) {
545 if (eap_eke_prot(&data->sess, data->nonce_s, data->sess.nonce_len,
563 data->nonce_s, data->nonce_p,
eap_sim.c 28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
450 const u8 *nonce_s)
485 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
857 if (eattr.nonce_s == NULL || eattr.counter < 0) {
859 !eattr.nonce_s ? " AT_NONCE_S" : "",
881 return eap_sim_response_reauth(data, id, 1, eattr.nonce_s);
885 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
887 data->nonce_s, EAP_SIM_NONCE_S_LEN);
891 data->nonce_s, data->mk, data->msk
    [all...]
eap_aka.c 25 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
554 const u8 *nonce_s)
590 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
1095 if (eattr.nonce_s == NULL || eattr.counter < 0) {
1097 !eattr.nonce_s ? " AT_NONCE_S" : "",
1121 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s);
1128 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
1130 data->nonce_s, EAP_SIM_NONCE_S_LEN);
1136 data->nonce_s,
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_eke.c 31 u8 nonce_s[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) {
325 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Nonce_S",
326 data->nonce_s, data->sess.nonce_len);
329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s,
343 data->nonce_p, data->nonce_s) < 0) {
620 wpa_printf(MSG_INFO, "EAP-EKE: PNonce_S protected data too short to include Nonce_S");
624 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Received Nonce_S",
626 if (os_memcmp(nonce, data->nonce_s, data->sess.nonce_len) != 0) {
627 wpa_printf(MSG_INFO, "EAP-EKE: Received Nonce_S does not match previously sent Nonce_S")
    [all...]
eap_server_sim.c 21 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
149 const u8 *nonce_s)
152 if (nonce_s == NULL) {
172 counter == 0 && nonce_s == NULL)
184 if (nonce_s) {
186 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
255 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
257 wpa_hexdump_key(MSG_MSGDUMP, "EAP-SIM: NONCE_S",
258 data->nonce_s, EAP_SIM_NONCE_S_LEN);
263 sm->identity_len, data->nonce_s, data->mk
    [all...]
eap_server_aka.c 22 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
392 const u8 *nonce_s)
395 if (nonce_s == NULL) {
419 counter == 0 && nonce_s == NULL)
431 if (nonce_s) {
433 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
548 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
550 wpa_hexdump_key(MSG_MSGDUMP, "EAP-AKA: NONCE_S",
551 data->nonce_s, EAP_SIM_NONCE_S_LEN);
557 data->nonce_s,
    [all...]
  /external/wpa_supplicant_8/src/eap_common/
eap_sim_common.h 84 const u8 *nonce_s, const u8 *mk, u8 *msk,
97 const u8 *nonce_s, u8 *msk, u8 *emsk);
119 const u8 *nonce_s, u8 *msk,
184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs

Completed in 94 milliseconds