Searched defs:nonce_s (Results 1 - 25 of 28) sorted by relevance

12

/external/wpa_supplicant/
H A Deap_aka.c27 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
306 const u8 *nonce_s)
338 return eap_sim_msg_finish(msg, respDataLen, data->k_aut, nonce_s,
661 if (eattr.nonce_s == NULL || eattr.counter < 0) {
663 !eattr.nonce_s ? " AT_NONCE_S" : "",
677 data->reauth_id_len, eattr.nonce_s,
692 eattr.nonce_s);
699 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
701 data->nonce_s, EAP_SIM_NONCE_S_LE
303 eap_aka_response_reauth(struct eap_aka_data *data, const struct eap_hdr *req, size_t *respDataLen, int counter_too_small, const u8 *nonce_s) argument
[all...]
H A Deap_sim.c33 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
357 return eap_sim_msg_finish(msg, respDataLen, data->k_aut, data->nonce_s,
740 if (eattr.nonce_s == NULL || eattr.counter < 0) {
742 !eattr.nonce_s ? " AT_NONCE_S" : "",
768 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
770 data->nonce_s, EAP_SIM_NONCE_S_LEN);
774 data->nonce_s, data->mk, data->msk,
H A Deap_sim_common.c112 const u8 *nonce_s, const u8 *mk, u8 *msk,
130 addr[2] = nonce_s;
141 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s,
441 attr->nonce_s = apos + 2;
110 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.h83 const u8 *nonce_s, const u8 *mk, u8 *msk,
131 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_sim.c26 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
136 const u8 *nonce_s)
152 counter == 0 && nonce_s == NULL)
164 if (nonce_s) {
166 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
235 if (os_get_random(data->nonce_s, EAP_SIM_NONCE_S_LEN))
238 data->nonce_s, EAP_SIM_NONCE_S_LEN);
243 sm->identity_len, data->nonce_s, data->mk,
249 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
569 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
134 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
H A Deap_aka.c28 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
299 const u8 *nonce_s)
315 counter == 0 && nonce_s == NULL)
327 if (nonce_s) {
329 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
444 if (os_get_random(data->nonce_s, EAP_SIM_NONCE_S_LEN))
447 data->nonce_s, EAP_SIM_NONCE_S_LEN);
453 data->nonce_s,
459 sm->identity_len, data->nonce_s,
466 if (eap_aka_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
297 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_sim.c27 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
137 const u8 *nonce_s)
153 counter == 0 && nonce_s == NULL)
165 if (nonce_s) {
167 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
236 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
239 data->nonce_s, EAP_SIM_NONCE_S_LEN);
244 sm->identity_len, data->nonce_s, data->mk,
250 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
570 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
135 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
H A Deap_server_aka.c28 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
299 const u8 *nonce_s)
315 counter == 0 && nonce_s == NULL)
327 if (nonce_s) {
329 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
444 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
447 data->nonce_s, EAP_SIM_NONCE_S_LEN);
453 data->nonce_s,
459 sm->identity_len, data->nonce_s,
466 if (eap_aka_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
297 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_sim.c27 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
137 const u8 *nonce_s)
153 counter == 0 && nonce_s == NULL)
165 if (nonce_s) {
167 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
236 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
239 data->nonce_s, EAP_SIM_NONCE_S_LEN);
244 sm->identity_len, data->nonce_s, data->mk,
250 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
570 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
135 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
H A Deap_server_aka.c28 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
299 const u8 *nonce_s)
315 counter == 0 && nonce_s == NULL)
327 if (nonce_s) {
329 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
444 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
447 data->nonce_s, EAP_SIM_NONCE_S_LEN);
453 data->nonce_s,
459 sm->identity_len, data->nonce_s,
466 if (eap_aka_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
297 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_sim.c27 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
137 const u8 *nonce_s)
153 counter == 0 && nonce_s == NULL)
165 if (nonce_s) {
167 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
236 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
239 data->nonce_s, EAP_SIM_NONCE_S_LEN);
244 sm->identity_len, data->nonce_s, data->mk,
250 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
570 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
135 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
H A Deap_server_aka.c28 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
299 const u8 *nonce_s)
315 counter == 0 && nonce_s == NULL)
327 if (nonce_s) {
329 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
444 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
447 data->nonce_s, EAP_SIM_NONCE_S_LEN);
453 data->nonce_s,
459 sm->identity_len, data->nonce_s,
466 if (eap_aka_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
297 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_sim_common.c114 const u8 *nonce_s, const u8 *mk, u8 *msk,
132 addr[2] = nonce_s;
143 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s,
332 const u8 *nonce_s, u8 *msk, u8 *emsk)
345 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN);
723 attr->nonce_s = apos + 2;
112 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
330 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.h90 const u8 *nonce_s, const u8 *mk, u8 *msk,
103 const u8 *nonce_s, u8 *msk, u8 *emsk);
125 const u8 *nonce_s, u8 *msk,
190 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
122 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_sim.c35 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
457 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s,
829 if (eattr.nonce_s == NULL || eattr.counter < 0) {
831 !eattr.nonce_s ? " AT_NONCE_S" : "",
857 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
859 data->nonce_s, EAP_SIM_NONCE_S_LEN);
863 data->nonce_s, data->mk, data->msk,
H A Deap_aka.c33 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
527 const u8 *nonce_s)
563 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
1068 if (eattr.nonce_s == NULL || eattr.counter < 0) {
1070 !eattr.nonce_s ? " AT_NONCE_S" : "",
1094 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s);
1101 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
1103 data->nonce_s, EAP_SIM_NONCE_S_LEN);
1109 data->nonce_s,
525 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.c115 const u8 *nonce_s, const u8 *mk, u8 *msk,
133 addr[2] = nonce_s;
144 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s,
333 const u8 *nonce_s, u8 *msk, u8 *emsk)
346 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN);
724 attr->nonce_s = apos + 2;
113 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
331 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.h90 const u8 *nonce_s, const u8 *mk, u8 *msk,
103 const u8 *nonce_s, u8 *msk, u8 *emsk);
125 const u8 *nonce_s, u8 *msk,
190 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
122 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_sim.c34 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
456 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s,
828 if (eattr.nonce_s == NULL || eattr.counter < 0) {
830 !eattr.nonce_s ? " AT_NONCE_S" : "",
856 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
858 data->nonce_s, EAP_SIM_NONCE_S_LEN);
862 data->nonce_s, data->mk, data->msk,
H A Deap_aka.c31 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
525 const u8 *nonce_s)
561 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
1066 if (eattr.nonce_s == NULL || eattr.counter < 0) {
1068 !eattr.nonce_s ? " AT_NONCE_S" : "",
1092 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s);
1099 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
1101 data->nonce_s, EAP_SIM_NONCE_S_LEN);
1107 data->nonce_s,
523 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.c115 const u8 *nonce_s, const u8 *mk, u8 *msk,
133 addr[2] = nonce_s;
144 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s,
333 const u8 *nonce_s, u8 *msk, u8 *emsk)
346 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN);
724 attr->nonce_s = apos + 2;
113 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
331 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.h90 const u8 *nonce_s, const u8 *mk, u8 *msk,
103 const u8 *nonce_s, u8 *msk, u8 *emsk);
125 const u8 *nonce_s, u8 *msk,
190 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
122 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_sim.c34 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
456 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s,
828 if (eattr.nonce_s == NULL || eattr.counter < 0) {
830 !eattr.nonce_s ? " AT_NONCE_S" : "",
856 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
858 data->nonce_s, EAP_SIM_NONCE_S_LEN);
862 data->nonce_s, data->mk, data->msk,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.c115 const u8 *nonce_s, const u8 *mk, u8 *msk,
133 addr[2] = nonce_s;
144 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s,
333 const u8 *nonce_s, u8 *msk, u8 *emsk)
346 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN);
724 attr->nonce_s = apos + 2;
113 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
331 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_sim.c34 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
456 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s,
828 if (eattr.nonce_s == NULL || eattr.counter < 0) {
830 !eattr.nonce_s ? " AT_NONCE_S" : "",
856 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
858 data->nonce_s, EAP_SIM_NONCE_S_LEN);
862 data->nonce_s, data->mk, data->msk,

Completed in 343 milliseconds

12