/external/wpa_supplicant_8/src/eap_common/ |
eap_ikev2_common.c | 23 u8 *nonces; local 31 nonces = os_malloc(nlen); 32 if (nonces == NULL) 34 os_memcpy(nonces, i_nonce, i_nonce_len); 35 os_memcpy(nonces + i_nonce_len, r_nonce, r_nonce_len); 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, 39 os_free(nonces); 42 os_free(nonces);
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_eke.c | 510 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; local 534 decrypt_len = sizeof(nonces); 536 nonces, &decrypt_len) < 0) { 547 nonces, 2 * data->sess.nonce_len); 548 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { 554 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len,
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_eke.c | 308 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; local 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, 332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len,
|
/prebuilts/go/darwin-x86/src/crypto/cipher/ |
gcm.go | 86 // Counter Mode, which accepts nonces of the given length. 353 // state: a "fast path" for 96-bit (12-byte) nonces, and a "slow path" 354 // for nonces of other lengths. For a 96-bit nonce, the nonce, along
|
example_test.go | 28 // Never use more than 2^32 random nonces with a given key because of the risk of a repeat.
|
/prebuilts/go/linux-x86/src/crypto/cipher/ |
gcm.go | 86 // Counter Mode, which accepts nonces of the given length. 353 // state: a "fast path" for 96-bit (12-byte) nonces, and a "slow path" 354 // for nonces of other lengths. For a 96-bit nonce, the nonce, along
|
example_test.go | 28 // Never use more than 2^32 random nonces with a given key because of the risk of a repeat.
|
/prebuilts/go/darwin-x86/src/crypto/aes/ |
gcm_s390x.go | 172 // state: a "fast path" for 96-bit (12-byte) nonces, and a "slow path" 173 // for nonces of other lengths. For a 96-bit nonce, the nonce, along
|
/prebuilts/go/linux-x86/src/crypto/aes/ |
gcm_s390x.go | 172 // state: a "fast path" for 96-bit (12-byte) nonces, and a "slow path" 173 // for nonces of other lengths. For a 96-bit nonce, the nonce, along
|
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 143 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces 237 u8 nonces[2 * FILS_NONCE_LEN]; local 258 os_memcpy(nonces, snonce, FILS_NONCE_LEN); 259 os_memcpy(&nonces[FILS_NONCE_LEN], anonce, FILS_NONCE_LEN); 269 res = hmac_sha384_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, 272 res = hmac_sha256_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, [all...] |
/external/wpa_supplicant_8/wpa_supplicant/ |
sme.c | 990 u8 nonces[2 * FILS_NONCE_LEN]; local 1051 os_memcpy(nonces, snonce, FILS_NONCE_LEN); 1052 os_memcpy(nonces + FILS_NONCE_LEN, anonce, FILS_NONCE_LEN); 1053 params.fils_nonces = nonces; 1054 params.fils_nonces_len = sizeof(nonces); [all...] |
/external/tpm2/ |
SessionProcess.c | 578 // session that uses an HMAC, then check if additional session nonces are to be [all...] |
/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_server.go | 579 return errors.New("tls: could not validate signature of connection nonces: " + err.Error())
|
common.go | 337 // Rand provides the source of entropy for nonces and RSA blinding. [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_server.go | 579 return errors.New("tls: could not validate signature of connection nonces: " + err.Error())
|
common.go | 337 // Rand provides the source of entropy for nonces and RSA blinding. [all...] |
/external/boringssl/src/ssl/test/runner/ |
common.go | 322 // Rand provides the source of entropy for nonces and RSA blinding. [all...] |
handshake_server.go | [all...] |