Searched defs:nonce_p (Results 1 - 10 of 10) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_eke.c28 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
464 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) {
470 data->nonce_p, data->sess.nonce_len);
472 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len,
545 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) {
558 data->nonce_p, data->nonce_s) < 0) {
605 data->nonce_s, data->nonce_p,
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_eke.c30 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len);
343 data->nonce_p, data->nonce_s) < 0) {
563 decrypt_len = sizeof(data->nonce_p);
565 data->nonce_p, &decrypt_len) < 0) {
576 data->nonce_p, data->sess.nonce_len);
647 data->nonce_s, data->nonce_p,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_eke.c28 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
464 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) {
470 data->nonce_p, data->sess.nonce_len);
472 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len,
545 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) {
558 data->nonce_p, data->nonce_s) < 0) {
605 data->nonce_s, data->nonce_p,
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_eke.c30 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len);
343 data->nonce_p, data->nonce_s) < 0) {
563 decrypt_len = sizeof(data->nonce_p);
565 data->nonce_p, &decrypt_len) < 0) {
576 data->nonce_p, data->sess.nonce_len);
647 data->nonce_s, data->nonce_p,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_eke.c28 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
464 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) {
470 data->nonce_p, data->sess.nonce_len);
472 if (eap_eke_prot(&data->sess, data->nonce_p, data->sess.nonce_len,
545 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) {
558 data->nonce_p, data->nonce_s) < 0) {
605 data->nonce_s, data->nonce_p,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_eke.c30 u8 nonce_p[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len);
343 data->nonce_p, data->nonce_s) < 0) {
563 decrypt_len = sizeof(data->nonce_p);
565 data->nonce_p, &decrypt_len) < 0) {
576 data->nonce_p, data->sess.nonce_len);
647 data->nonce_s, data->nonce_p,
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_eke_common.c509 const u8 *nonce_p, const u8 *nonce_s)
535 os_memcpy(pos, nonce_p, sess->nonce_len);
554 const u8 *nonce_p, const u8 *nonce_s,
580 os_memcpy(pos, nonce_p, sess->nonce_len);
506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument
551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_eke_common.c509 const u8 *nonce_p, const u8 *nonce_s)
535 os_memcpy(pos, nonce_p, sess->nonce_len);
554 const u8 *nonce_p, const u8 *nonce_s,
580 os_memcpy(pos, nonce_p, sess->nonce_len);
506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument
551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_eke_common.c509 const u8 *nonce_p, const u8 *nonce_s)
535 os_memcpy(pos, nonce_p, sess->nonce_len);
554 const u8 *nonce_p, const u8 *nonce_s,
580 os_memcpy(pos, nonce_p, sess->nonce_len);
506 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument
551 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/ipsec-tools/src/racoon/
H A Dhandler.h154 vchar_t *nonce_p; /* partner's nonce value */ member in struct:ph1handle
301 vchar_t *nonce_p; /* partner's nonce value in phase 2 */ member in struct:ph2handle

Completed in 794 milliseconds