HomeSort by relevance Sort by last modified time
    Searched defs:nonce_p (Results 1 - 3 of 3) sorted by null

  /external/wpa_supplicant_8/src/eap_peer/
eap_eke.c 28 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
466 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) {
471 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Nonce_P",
472 data->nonce_p, data->sess.nonce_len);
474 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len,
542 wpa_printf(MSG_INFO, "EAP-EKE: PNonce_PS protected data length does not match length of Nonce_P and Nonce_S");
546 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Received Nonce_P | Nonce_S",
548 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) {
549 wpa_printf(MSG_INFO, "EAP-EKE: Received Nonce_P does not match transmitted Nonce_P");
    [all...]
  /external/wpa_supplicant_8/src/eap_server/
eap_server_eke.c 30 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len);
343 data->nonce_p, data->nonce_s) < 0) {
563 decrypt_len = sizeof(data->nonce_p);
565 data->nonce_p, &decrypt_len) < 0) {
571 wpa_printf(MSG_INFO, "EAP-EKE: PNonce_P protected data too short to include Nonce_P");
575 wpa_hexdump_key(MSG_DEBUG, "EAP-EKE: Nonce_P",
576 data->nonce_p, data->sess.nonce_len);
647 data->nonce_s, data->nonce_p,
783 os_memcpy(sid + 1, data->nonce_p, data->sess.nonce_len)
    [all...]