Searched defs:nonce_s (Results 1 - 24 of 24) sorted by relevance

/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_sim.c26 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
136 const u8 *nonce_s)
152 counter == 0 && nonce_s == NULL)
164 if (nonce_s) {
166 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
235 if (os_get_random(data->nonce_s, EAP_SIM_NONCE_S_LEN))
238 data->nonce_s, EAP_SIM_NONCE_S_LEN);
243 sm->identity_len, data->nonce_s, data->mk,
249 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
569 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
134 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
H A Deap_aka.c28 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
299 const u8 *nonce_s)
315 counter == 0 && nonce_s == NULL)
327 if (nonce_s) {
329 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
444 if (os_get_random(data->nonce_s, EAP_SIM_NONCE_S_LEN))
447 data->nonce_s, EAP_SIM_NONCE_S_LEN);
453 data->nonce_s,
459 sm->identity_len, data->nonce_s,
466 if (eap_aka_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
297 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_sim.c21 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
131 const u8 *nonce_s)
147 counter == 0 && nonce_s == NULL)
159 if (nonce_s) {
161 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
230 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
233 data->nonce_s, EAP_SIM_NONCE_S_LEN);
238 sm->identity_len, data->nonce_s, data->mk,
244 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
564 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
129 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
H A Deap_server_aka.c22 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
292 const u8 *nonce_s)
308 counter == 0 && nonce_s == NULL)
320 if (nonce_s) {
322 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
437 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
440 data->nonce_s, EAP_SIM_NONCE_S_LEN);
446 data->nonce_s,
452 sm->identity_len, data->nonce_s,
459 if (eap_aka_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
290 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_sim.c21 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
131 const u8 *nonce_s)
147 counter == 0 && nonce_s == NULL)
159 if (nonce_s) {
161 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
230 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
233 data->nonce_s, EAP_SIM_NONCE_S_LEN);
238 sm->identity_len, data->nonce_s, data->mk,
244 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
564 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
129 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
H A Deap_server_aka.c22 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
292 const u8 *nonce_s)
308 counter == 0 && nonce_s == NULL)
320 if (nonce_s) {
322 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
437 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
440 data->nonce_s, EAP_SIM_NONCE_S_LEN);
446 data->nonce_s,
452 sm->identity_len, data->nonce_s,
459 if (eap_aka_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
290 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_sim.c21 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
131 const u8 *nonce_s)
147 counter == 0 && nonce_s == NULL)
159 if (nonce_s) {
161 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
230 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
233 data->nonce_s, EAP_SIM_NONCE_S_LEN);
238 sm->identity_len, data->nonce_s, data->mk,
244 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
564 eap_sim_verify_mac(data->k_aut, respData, attr->mac, data->nonce_s,
129 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
H A Deap_server_aka.c22 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
292 const u8 *nonce_s)
308 counter == 0 && nonce_s == NULL)
320 if (nonce_s) {
322 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
437 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
440 data->nonce_s, EAP_SIM_NONCE_S_LEN);
446 data->nonce_s,
452 sm->identity_len, data->nonce_s,
459 if (eap_aka_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
290 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_sim_common.c114 const u8 *nonce_s, const u8 *mk, u8 *msk,
132 addr[2] = nonce_s;
143 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s,
332 const u8 *nonce_s, u8 *msk, u8 *emsk)
345 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN);
723 attr->nonce_s = apos + 2;
112 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
330 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.h90 const u8 *nonce_s, const u8 *mk, u8 *msk,
103 const u8 *nonce_s, u8 *msk, u8 *emsk);
125 const u8 *nonce_s, u8 *msk,
190 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
122 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_sim.c35 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
457 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s,
829 if (eattr.nonce_s == NULL || eattr.counter < 0) {
831 !eattr.nonce_s ? " AT_NONCE_S" : "",
857 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
859 data->nonce_s, EAP_SIM_NONCE_S_LEN);
863 data->nonce_s, data->mk, data->msk,
H A Deap_aka.c33 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
527 const u8 *nonce_s)
563 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
1068 if (eattr.nonce_s == NULL || eattr.counter < 0) {
1070 !eattr.nonce_s ? " AT_NONCE_S" : "",
1094 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s);
1101 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
1103 data->nonce_s, EAP_SIM_NONCE_S_LEN);
1109 data->nonce_s,
525 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sim_common.c109 const u8 *nonce_s, const u8 *mk, u8 *msk,
127 addr[2] = nonce_s;
138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s,
327 const u8 *nonce_s, u8 *msk, u8 *emsk)
340 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN);
718 attr->nonce_s = apos + 2;
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.h84 const u8 *nonce_s, const u8 *mk, u8 *msk,
97 const u8 *nonce_s, u8 *msk, u8 *emsk);
119 const u8 *nonce_s, u8 *msk,
184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_sim.c28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
470 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s,
842 if (eattr.nonce_s == NULL || eattr.counter < 0) {
844 !eattr.nonce_s ? " AT_NONCE_S" : "",
870 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
872 data->nonce_s, EAP_SIM_NONCE_S_LEN);
876 data->nonce_s, data->mk, data->msk,
H A Deap_aka.c25 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
539 const u8 *nonce_s)
575 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
1080 if (eattr.nonce_s == NULL || eattr.counter < 0) {
1082 !eattr.nonce_s ? " AT_NONCE_S" : "",
1106 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s);
1113 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
1115 data->nonce_s, EAP_SIM_NONCE_S_LEN);
1121 data->nonce_s,
537 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sim_common.c109 const u8 *nonce_s, const u8 *mk, u8 *msk,
127 addr[2] = nonce_s;
138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s,
327 const u8 *nonce_s, u8 *msk, u8 *emsk)
340 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN);
718 attr->nonce_s = apos + 2;
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.h84 const u8 *nonce_s, const u8 *mk, u8 *msk,
97 const u8 *nonce_s, u8 *msk, u8 *emsk);
119 const u8 *nonce_s, u8 *msk,
184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_sim.c28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
470 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s,
842 if (eattr.nonce_s == NULL || eattr.counter < 0) {
844 !eattr.nonce_s ? " AT_NONCE_S" : "",
870 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
872 data->nonce_s, EAP_SIM_NONCE_S_LEN);
876 data->nonce_s, data->mk, data->msk,
H A Deap_aka.c25 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
539 const u8 *nonce_s)
575 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
1080 if (eattr.nonce_s == NULL || eattr.counter < 0) {
1082 !eattr.nonce_s ? " AT_NONCE_S" : "",
1106 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s);
1113 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
1115 data->nonce_s, EAP_SIM_NONCE_S_LEN);
1121 data->nonce_s,
537 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sim_common.c109 const u8 *nonce_s, const u8 *mk, u8 *msk,
127 addr[2] = nonce_s;
138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s,
327 const u8 *nonce_s, u8 *msk, u8 *emsk)
340 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN);
718 attr->nonce_s = apos + 2;
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.h84 const u8 *nonce_s, const u8 *mk, u8 *msk,
97 const u8 *nonce_s, u8 *msk, u8 *emsk);
119 const u8 *nonce_s, u8 *msk,
184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_sim.c28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
470 return eap_sim_msg_finish(msg, data->k_aut, data->nonce_s,
842 if (eattr.nonce_s == NULL || eattr.counter < 0) {
844 !eattr.nonce_s ? " AT_NONCE_S" : "",
870 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
872 data->nonce_s, EAP_SIM_NONCE_S_LEN);
876 data->nonce_s, data->mk, data->msk,
H A Deap_aka.c25 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
539 const u8 *nonce_s)
575 return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
1080 if (eattr.nonce_s == NULL || eattr.counter < 0) {
1082 !eattr.nonce_s ? " AT_NONCE_S" : "",
1106 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s);
1113 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
1115 data->nonce_s, EAP_SIM_NONCE_S_LEN);
1121 data->nonce_s,
537 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument
[all...]

Completed in 396 milliseconds