HomeSort by relevance Sort by last modified time
    Searched refs:nonce_p (Results 1 - 11 of 11) sorted by null

  /external/wpa_supplicant_8/src/eap_common/
eap_eke_common.h 99 const u8 *nonce_p, const u8 *nonce_s);
103 const u8 *nonce_p, const u8 *nonce_s,
eap_eke_common.c 509 const u8 *nonce_p, const u8 *nonce_s)
517 * Ka = prf+(SharedSecret, "EAP-EKE Ka" | ID_S | ID_P | Nonce_P |
535 os_memcpy(pos, nonce_p, sess->nonce_len);
554 const u8 *nonce_p, const u8 *nonce_s,
565 * ID_P | Nonce_P | Nonce_S)
580 os_memcpy(pos, nonce_p, sess->nonce_len);
  /external/ipsec-tools/src/racoon/
isakmp_quick.c 416 if (isakmp_p2ph(&iph2->nonce_p, pa->ptr) < 0)
478 if (hash == NULL || iph2->sa_ret == NULL || iph2->nonce_p == NULL) {
539 VPTRINIT(iph2->nonce_p);
577 tmp = vmalloc(iph2->nonce->l + iph2->nonce_p->l);
584 memcpy(tmp->v + iph2->nonce->l, iph2->nonce_p->v, iph2->nonce_p->l);
922 iph2->nonce_p = NULL;
956 if (isakmp_p2ph(&iph2->nonce_p, pa->ptr) < 0)
1021 if (hash == NULL || iph2->sa == NULL || iph2->nonce_p == NULL) {
1135 VPTRINIT(iph2->nonce_p);
    [all...]
handler.h 154 vchar_t *nonce_p; /* partner's nonce value */ member in struct:ph1handle
301 vchar_t *nonce_p; /* partner's nonce value in phase 2 */ member in struct:ph2handle
isakmp_agg.c 405 if (isakmp_p2ph(&iph1->nonce_p, pa->ptr) < 0)
475 if (iph1->dhpub_p == NULL || iph1->nonce_p == NULL) {
590 VPTRINIT(iph1->nonce_p);
828 if (isakmp_p2ph(&iph1->nonce_p, pa->ptr) < 0)
867 if (iph1->dhpub_p == NULL || iph1->nonce_p == NULL) {
914 VPTRINIT(iph1->nonce_p);
    [all...]
isakmp_base.c 337 if (isakmp_p2ph(&iph1->nonce_p, pa->ptr) < 0)
357 if (iph1->nonce_p == NULL || iph1->id_p == NULL) {
397 VPTRINIT(iph1->nonce_p);
831 if (isakmp_p2ph(&iph1->nonce_p, pa->ptr) < 0)
856 if (iph1->nonce_p == NULL || iph1->id_p == NULL) {
894 VPTRINIT(iph1->nonce_p);
    [all...]
isakmp_ident.c 460 if (isakmp_p2ph(&iph1->nonce_p, pa->ptr) < 0)
530 if (iph1->dhpub_p == NULL || iph1->nonce_p == NULL) {
554 VPTRINIT(iph1->nonce_p);
1154 if (isakmp_p2ph(&iph1->nonce_p, pa->ptr) < 0)
1221 if (iph1->dhpub_p == NULL || iph1->nonce_p == NULL) {
1241 VPTRINIT(iph1->nonce_p);
    [all...]
oakley.c 493 + iph2->nonce_p->l);
517 bp = (side == INITIATOR ? iph2->nonce : iph2->nonce_p);
521 bp = (side == INITIATOR ? iph2->nonce_p : iph2->nonce);
1021 len = iph1->nonce->l + iph1->nonce_p->l;
1030 bp = (sw == GENERATE ? iph1->nonce_p : iph1->nonce);
1034 bp = (sw == GENERATE ? iph1->nonce : iph1->nonce_p);
1151 len = iph1->nonce->l + iph1->nonce_p->l;
1160 bp = (sw == GENERATE ? iph1->nonce_p : iph1->nonce);
1164 bp = (sw == GENERATE ? iph1->nonce : iph1->nonce_p);
    [all...]
handler.c 340 VPTRINIT(iph1->nonce_p);
637 VPTRINIT(iph2->nonce_p);
  /external/wpa_supplicant_8/src/eap_peer/
eap_eke.c 28 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
464 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) {
469 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Nonce_P",
470 data->nonce_p, data->sess.nonce_len);
472 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len,
539 wpa_printf(MSG_INFO, "EAP-EKE: PNonce_PS protected data length does not match length of Nonce_P and Nonce_S");
543 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Received Nonce_P | Nonce_S",
545 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) {
546 wpa_printf(MSG_INFO, "EAP-EKE: Received Nonce_P does not match transmitted Nonce_P");
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_eke.c 30 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len);
343 data->nonce_p, data->nonce_s) < 0) {
563 decrypt_len = sizeof(data->nonce_p);
565 data->nonce_p, &decrypt_len) < 0) {
571 wpa_printf(MSG_INFO, "EAP-EKE: PNonce_P protected data too short to include Nonce_P");
575 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Nonce_P",
576 data->nonce_p, data->sess.nonce_len);
647 data->nonce_s, data->nonce_p,

Completed in 625 milliseconds