HomeSort by relevance Sort by last modified time
    Searched refs:nonces (Results 1 - 18 of 18) sorted by null

  /external/wpa_supplicant_8/src/eap_common/
eap_ikev2_common.c 23 u8 *nonces; local
31 nonces = os_malloc(nlen);
32 if (nonces == NULL)
34 os_memcpy(nonces, i_nonce, i_nonce_len);
35 os_memcpy(nonces + i_nonce_len, r_nonce, r_nonce_len);
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen,
39 os_free(nonces);
42 os_free(nonces);
  /external/wpa_supplicant_8/src/eap_peer/
eap_eke.c 510 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; local
534 decrypt_len = sizeof(nonces);
536 nonces, &decrypt_len) < 0) {
547 nonces, 2 * data->sess.nonce_len);
548 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) {
554 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len,
  /external/wpa_supplicant_8/src/eap_server/
eap_server_eke.c 308 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; local
328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len);
329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s,
332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len,
  /prebuilts/go/darwin-x86/src/crypto/cipher/
gcm.go 86 // Counter Mode, which accepts nonces of the given length.
353 // state: a "fast path" for 96-bit (12-byte) nonces, and a "slow path"
354 // for nonces of other lengths. For a 96-bit nonce, the nonce, along
example_test.go 28 // Never use more than 2^32 random nonces with a given key because of the risk of a repeat.
  /prebuilts/go/linux-x86/src/crypto/cipher/
gcm.go 86 // Counter Mode, which accepts nonces of the given length.
353 // state: a "fast path" for 96-bit (12-byte) nonces, and a "slow path"
354 // for nonces of other lengths. For a 96-bit nonce, the nonce, along
example_test.go 28 // Never use more than 2^32 random nonces with a given key because of the risk of a repeat.
  /prebuilts/go/darwin-x86/src/crypto/aes/
gcm_s390x.go 172 // state: a "fast path" for 96-bit (12-byte) nonces, and a "slow path"
173 // for nonces of other lengths. For a 96-bit nonce, the nonce, along
  /prebuilts/go/linux-x86/src/crypto/aes/
gcm_s390x.go 172 // state: a "fast path" for 96-bit (12-byte) nonces, and a "slow path"
173 // for nonces of other lengths. For a 96-bit nonce, the nonce, along
  /external/wpa_supplicant_8/src/common/
wpa_common.c 143 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces
237 u8 nonces[2 * FILS_NONCE_LEN]; local
258 os_memcpy(nonces, snonce, FILS_NONCE_LEN);
259 os_memcpy(&nonces[FILS_NONCE_LEN], anonce, FILS_NONCE_LEN);
269 res = hmac_sha384_vector(nonces, 2 * FILS_NONCE_LEN, num_elem,
272 res = hmac_sha256_vector(nonces, 2 * FILS_NONCE_LEN, num_elem,
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/
sme.c 990 u8 nonces[2 * FILS_NONCE_LEN]; local
1051 os_memcpy(nonces, snonce, FILS_NONCE_LEN);
1052 os_memcpy(nonces + FILS_NONCE_LEN, anonce, FILS_NONCE_LEN);
1053 params.fils_nonces = nonces;
1054 params.fils_nonces_len = sizeof(nonces);
    [all...]
  /external/tpm2/
SessionProcess.c 578 // session that uses an HMAC, then check if additional session nonces are to be
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/tls/
handshake_server.go 579 return errors.New("tls: could not validate signature of connection nonces: " + err.Error())
common.go 337 // Rand provides the source of entropy for nonces and RSA blinding.
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
handshake_server.go 579 return errors.New("tls: could not validate signature of connection nonces: " + err.Error())
common.go 337 // Rand provides the source of entropy for nonces and RSA blinding.
    [all...]
  /external/boringssl/src/ssl/test/runner/
common.go 322 // Rand provides the source of entropy for nonces and RSA blinding.
    [all...]
handshake_server.go     [all...]

Completed in 612 milliseconds