Home | History | Annotate | Download | only in common

Lines Matching full:prime_len

33 		tmp->prime_len = crypto_ec_prime_len(tmp->ec);
43 tmp->prime_len = tmp->dh->prime_len;
44 if (tmp->prime_len > SAE_MAX_PRIME_LEN) {
50 tmp->prime_len);
173 get_rand_1_to_p_1(const u8 *prime, size_t prime_len, size_t prime_bits,
180 if (random_get_bytes(tmp, prime_len) < 0)
183 buf_shift_right(tmp, prime_len, 8 - prime_bits % 8);
184 if (os_memcmp(tmp, prime, prime_len) >= 0)
186 r = crypto_bignum_init_set(tmp, prime_len);
194 *r_odd = tmp[prime_len - 1] & 0x01;
220 r = get_rand_1_to_p_1(prime, sae->tmp->prime_len, bits, &r_odd);
279 prime, sae->tmp->prime_len, pwd_value, bits) < 0)
284 pwd_value, sae->tmp->prime_len);
286 if (os_memcmp(pwd_value, prime, sae->tmp->prime_len) >= 0)
289 x_cand = crypto_bignum_init_set(pwd_value, sae->tmp->prime_len);
314 size_t bits = sae->tmp->prime_len * 8;
323 sae->tmp->dh->prime, sae->tmp->prime_len, pwd_value,
327 sae->tmp->prime_len);
329 if (os_memcmp(pwd_value, sae->tmp->dh->prime, sae->tmp->prime_len) >= 0)
337 a = crypto_bignum_init_set(pwd_value, sae->tmp->prime_len);
382 static int get_random_qr_qnr(const u8 *prime, size_t prime_len,
395 if (random_get_bytes(tmp, prime_len) < 0)
398 buf_shift_right(tmp, prime_len, 8 - prime_bits % 8);
399 if (os_memcmp(tmp, prime, prime_len) >= 0)
401 q = crypto_bignum_init_set(tmp, prime_len);
430 size_t prime_len;
441 prime_len = sae->tmp->prime_len;
443 prime_len) < 0)
451 if (get_random_qr_qnr(prime, prime_len, sae->tmp->prime, bits,
739 wpa_hexdump_key(MSG_DEBUG, "SAE: k", k, sae->tmp->prime_len);
771 crypto_bignum_to_bin(K, k, SAE_MAX_PRIME_LEN, sae->tmp->prime_len) <
777 wpa_hexdump_key(MSG_DEBUG, "SAE: k", k, sae->tmp->prime_len);
805 hmac_sha256(null_key, sizeof(null_key), k, sae->tmp->prime_len,
812 crypto_bignum_to_bin(tmp, val, sizeof(val), sae->tmp->prime_len);
815 val, sae->tmp->prime_len, keys, sizeof(keys)) < 0)
858 pos = wpabuf_put(buf, sae->tmp->prime_len);
860 sae->tmp->prime_len, sae->tmp->prime_len);
862 pos, sae->tmp->prime_len);
864 pos = wpabuf_put(buf, 2 * sae->tmp->prime_len);
867 pos, pos + sae->tmp->prime_len);
869 pos, sae->tmp->prime_len);
871 pos + sae->tmp->prime_len, sae->tmp->prime_len);
873 pos = wpabuf_put(buf, sae->tmp->prime_len);
875 sae->tmp->prime_len, sae->tmp->prime_len);
877 pos, sae->tmp->prime_len);
928 if ((sae->tmp->ec ? 3 : 2) * sae->tmp->prime_len < end - *pos) {
930 sae->tmp->prime_len);
951 if (sae->tmp->prime_len > end - *pos) {
956 peer_scalar = crypto_bignum_init_set(*pos, sae->tmp->prime_len);
987 *pos, sae->tmp->prime_len);
988 *pos += sae->tmp->prime_len;
999 if (2 * sae->tmp->prime_len > end - pos) {
1006 sae->tmp->prime_len) < 0)
1010 if (os_memcmp(pos, prime, sae->tmp->prime_len) >= 0 ||
1011 os_memcmp(pos + sae->tmp->prime_len, prime,
1012 sae->tmp->prime_len) >= 0) {
1019 pos, sae->tmp->prime_len);
1021 pos + sae->tmp->prime_len, sae->tmp->prime_len);
1045 if (sae->tmp->prime_len > end - pos) {
1051 sae->tmp->prime_len);
1055 crypto_bignum_init_set(pos, sae->tmp->prime_len);
1172 sae->tmp->prime_len);
1174 len[1] = sae->tmp->prime_len;
1178 sae->tmp->prime_len);
1180 len[3] = sae->tmp->prime_len;
1199 element_b1 + sae->tmp->prime_len);
1201 element_b2 + sae->tmp->prime_len);
1203 sae_cn_confirm(sae, sc, scalar1, element_b1, 2 * sae->tmp->prime_len,
1204 scalar2, element_b2, 2 * sae->tmp->prime_len, confirm);
1219 sae->tmp->prime_len);
1221 sae->tmp->prime_len);
1223 sae_cn_confirm(sae, sc, scalar1, element_b1, sae->tmp->prime_len,
1224 scalar2, element_b2, sae->tmp->prime_len, confirm);