/external/wpa_supplicant_8/src/eap_common/ |
eap_psk_common.h | 35 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_1 42 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2 51 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_3 59 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_4
|
eap_sake_common.h | 59 const u8 *rand_s; member in struct:eap_sake_parse_attr 85 const u8 *rand_s, const u8 *rand_p, 88 const u8 *rand_s, const u8 *rand_p,
|
/external/wpa_supplicant_8/src/eap_peer/ |
eap_psk.c | 24 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s, 116 os_memcpy(data->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN); 142 os_memcpy(hdr2->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN); 145 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 156 os_memcpy(pos, hdr1->rand_s, EAP_PSK_RAND_LEN); 214 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s [all...] |
eap_sake.c | 20 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 209 if (!attr.rand_s) { 215 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN); 216 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)", 217 data->rand_s, EAP_SAKE_RAND_LEN); 239 data->rand_s, data->rand_p, 265 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 310 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 347 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_psk.c | 23 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 62 if (random_get_bytes(data->rand_s, EAP_PSK_RAND_LEN)) { 67 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 68 data->rand_s, EAP_PSK_RAND_LEN); 82 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 110 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 295 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 306 os_memcpy(pos, data->rand_s, EAP_PSK_RAND_LEN) [all...] |
eap_server_sake.c | 19 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 153 if (random_get_bytes(data->rand_s, EAP_SAKE_RAND_LEN)) { 158 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)", 159 data->rand_s, EAP_SAKE_RAND_LEN); 170 data->rand_s, EAP_SAKE_RAND_LEN); 200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 345 data->rand_s, data->rand_p, 348 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 385 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 509 os_memcpy(id + 1, data->rand_s, EAP_SAKE_RAND_LEN) [all...] |