/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_sim.c | 26 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data 136 const u8 *nonce_s) 152 counter == 0 && nonce_s == NULL) 164 if (nonce_s) { 166 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s, 235 if (os_get_random(data->nonce_s, EAP_SIM_NONCE_S_LEN)) 238 data->nonce_s, EAP_SIM_NONCE_S_LEN); 243 sm->identity_len, data->nonce_s, data->mk, 249 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) { 569 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s, 134 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument [all...] |
H A D | eap_aka.c | 28 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data 299 const u8 *nonce_s) 315 counter == 0 && nonce_s == NULL) 327 if (nonce_s) { 329 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s, 444 if (os_get_random(data->nonce_s, EAP_SIM_NONCE_S_LEN)) 447 data->nonce_s, EAP_SIM_NONCE_S_LEN); 453 data->nonce_s, 459 sm->identity_len, data->nonce_s, 466 if (eap_aka_build_encr(sm, data, msg, data->counter, data->nonce_s)) { 297 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_sim.c | 21 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data 131 const u8 *nonce_s) 147 counter == 0 && nonce_s == NULL) 159 if (nonce_s) { 161 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s, 230 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN)) 233 data->nonce_s, EAP_SIM_NONCE_S_LEN); 238 sm->identity_len, data->nonce_s, data->mk, 244 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) { 564 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s, 129 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument [all...] |
H A D | eap_server_aka.c | 22 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data 292 const u8 *nonce_s) 308 counter == 0 && nonce_s == NULL) 320 if (nonce_s) { 322 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s, 437 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN)) 440 data->nonce_s, EAP_SIM_NONCE_S_LEN); 446 data->nonce_s, 452 sm->identity_len, data->nonce_s, 459 if (eap_aka_build_encr(sm, data, msg, data->counter, data->nonce_s)) { 290 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_sim.c | 21 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data 131 const u8 *nonce_s) 147 counter == 0 && nonce_s == NULL) 159 if (nonce_s) { 161 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s, 230 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN)) 233 data->nonce_s, EAP_SIM_NONCE_S_LEN); 238 sm->identity_len, data->nonce_s, data->mk, 244 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) { 564 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s, 129 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument [all...] |
H A D | eap_server_aka.c | 22 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data 292 const u8 *nonce_s) 308 counter == 0 && nonce_s == NULL) 320 if (nonce_s) { 322 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s, 437 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN)) 440 data->nonce_s, EAP_SIM_NONCE_S_LEN); 446 data->nonce_s, 452 sm->identity_len, data->nonce_s, 459 if (eap_aka_build_encr(sm, data, msg, data->counter, data->nonce_s)) { 290 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_sim.c | 21 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data 131 const u8 *nonce_s) 147 counter == 0 && nonce_s == NULL) 159 if (nonce_s) { 161 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s, 230 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN)) 233 data->nonce_s, EAP_SIM_NONCE_S_LEN); 238 sm->identity_len, data->nonce_s, data->mk, 244 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) { 564 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s, 129 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument [all...] |
H A D | eap_server_aka.c | 22 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data 292 const u8 *nonce_s) 308 counter == 0 && nonce_s == NULL) 320 if (nonce_s) { 322 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s, 437 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN)) 440 data->nonce_s, EAP_SIM_NONCE_S_LEN); 446 data->nonce_s, 452 sm->identity_len, data->nonce_s, 459 if (eap_aka_build_encr(sm, data, msg, data->counter, data->nonce_s)) { 290 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 114 const u8 *nonce_s, const u8 *mk, u8 *msk, 132 addr[2] = nonce_s; 143 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s, 332 const u8 *nonce_s, u8 *msk, u8 *emsk) 345 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN); 723 attr->nonce_s = apos + 2; 112 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 330 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.h | 90 const u8 *nonce_s, const u8 *mk, u8 *msk, 103 const u8 *nonce_s, u8 *msk, u8 *emsk); 125 const u8 *nonce_s, u8 *msk, 190 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs 122 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_sim.c | 35 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data 457 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s, 829 if (eattr.nonce_s == NULL || eattr.counter < 0) { 831 !eattr.nonce_s ? " AT_NONCE_S" : "", 857 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN); 859 data->nonce_s, EAP_SIM_NONCE_S_LEN); 863 data->nonce_s, data->mk, data->msk,
|
H A D | eap_aka.c | 33 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data 527 const u8 *nonce_s) 563 return eap_sim_msg_finish(msg, data->k_aut, nonce_s, 1068 if (eattr.nonce_s == NULL || eattr.counter < 0) { 1070 !eattr.nonce_s ? " AT_NONCE_S" : "", 1094 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s); 1101 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN); 1103 data->nonce_s, EAP_SIM_NONCE_S_LEN); 1109 data->nonce_s, 525 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 109 const u8 *nonce_s, const u8 *mk, u8 *msk, 127 addr[2] = nonce_s; 138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s, 327 const u8 *nonce_s, u8 *msk, u8 *emsk) 340 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN); 718 attr->nonce_s = apos + 2; 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.h | 84 const u8 *nonce_s, const u8 *mk, u8 *msk, 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 119 const u8 *nonce_s, u8 *msk, 184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_sim.c | 28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data 470 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s, 842 if (eattr.nonce_s == NULL || eattr.counter < 0) { 844 !eattr.nonce_s ? " AT_NONCE_S" : "", 870 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN); 872 data->nonce_s, EAP_SIM_NONCE_S_LEN); 876 data->nonce_s, data->mk, data->msk,
|
H A D | eap_aka.c | 25 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data 539 const u8 *nonce_s) 575 return eap_sim_msg_finish(msg, data->k_aut, nonce_s, 1080 if (eattr.nonce_s == NULL || eattr.counter < 0) { 1082 !eattr.nonce_s ? " AT_NONCE_S" : "", 1106 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s); 1113 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN); 1115 data->nonce_s, EAP_SIM_NONCE_S_LEN); 1121 data->nonce_s, 537 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.c | 109 const u8 *nonce_s, const u8 *mk, u8 *msk, 127 addr[2] = nonce_s; 138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s, 327 const u8 *nonce_s, u8 *msk, u8 *emsk) 340 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN); 718 attr->nonce_s = apos + 2; 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.h | 84 const u8 *nonce_s, const u8 *mk, u8 *msk, 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 119 const u8 *nonce_s, u8 *msk, 184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_sim.c | 28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data 470 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s, 842 if (eattr.nonce_s == NULL || eattr.counter < 0) { 844 !eattr.nonce_s ? " AT_NONCE_S" : "", 870 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN); 872 data->nonce_s, EAP_SIM_NONCE_S_LEN); 876 data->nonce_s, data->mk, data->msk,
|
H A D | eap_aka.c | 25 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data 539 const u8 *nonce_s) 575 return eap_sim_msg_finish(msg, data->k_aut, nonce_s, 1080 if (eattr.nonce_s == NULL || eattr.counter < 0) { 1082 !eattr.nonce_s ? " AT_NONCE_S" : "", 1106 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s); 1113 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN); 1115 data->nonce_s, EAP_SIM_NONCE_S_LEN); 1121 data->nonce_s, 537 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 109 const u8 *nonce_s, const u8 *mk, u8 *msk, 127 addr[2] = nonce_s; 138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s, 327 const u8 *nonce_s, u8 *msk, u8 *emsk) 340 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN); 718 attr->nonce_s = apos + 2; 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument 325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
H A D | eap_sim_common.h | 84 const u8 *nonce_s, const u8 *mk, u8 *msk, 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 119 const u8 *nonce_s, u8 *msk, 184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_sim.c | 28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data 470 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s, 842 if (eattr.nonce_s == NULL || eattr.counter < 0) { 844 !eattr.nonce_s ? " AT_NONCE_S" : "", 870 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN); 872 data->nonce_s, EAP_SIM_NONCE_S_LEN); 876 data->nonce_s, data->mk, data->msk,
|
H A D | eap_aka.c | 25 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data 539 const u8 *nonce_s) 575 return eap_sim_msg_finish(msg, data->k_aut, nonce_s, 1080 if (eattr.nonce_s == NULL || eattr.counter < 0) { 1082 !eattr.nonce_s ? " AT_NONCE_S" : "", 1106 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s); 1113 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN); 1115 data->nonce_s, EAP_SIM_NONCE_S_LEN); 1121 data->nonce_s, 537 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument [all...] |