/external/wpa_supplicant_8/src/eap_common/ |
eap_ikev2_common.c | 23 u8 *nonces; local 31 nonces = os_malloc(nlen); 32 if (nonces == NULL) 34 os_memcpy(nonces, i_nonce, i_nonce_len); 35 os_memcpy(nonces + i_nonce_len, r_nonce, r_nonce_len); 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, 39 os_free(nonces); 42 os_free(nonces);
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 143 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces 237 u8 nonces[2 * FILS_NONCE_LEN]; local 258 os_memcpy(nonces, snonce, FILS_NONCE_LEN); 259 os_memcpy(&nonces[FILS_NONCE_LEN], anonce, FILS_NONCE_LEN); 269 res = hmac_sha384_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, 272 res = hmac_sha256_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_eke.c | 510 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; local 534 decrypt_len = sizeof(nonces); 536 nonces, &decrypt_len) < 0) { 547 nonces, 2 * data->sess.nonce_len); 548 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { 554 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_eke.c | 308 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; local 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, 332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
sme.c | 990 u8 nonces[2 * FILS_NONCE_LEN]; local 1051 os_memcpy(nonces, snonce, FILS_NONCE_LEN); 1052 os_memcpy(nonces + FILS_NONCE_LEN, anonce, FILS_NONCE_LEN); 1053 params.fils_nonces = nonces; 1054 params.fils_nonces_len = sizeof(nonces); [all...] |