/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_ikev2_common.c | 23 u8 *nonces; local 31 nonces = os_malloc(nlen); 32 if (nonces == NULL) 34 os_memcpy(nonces, i_nonce, i_nonce_len); 35 os_memcpy(nonces + i_nonce_len, r_nonce, r_nonce_len); 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, 39 os_free(nonces); 42 os_free(nonces);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_ikev2_common.c | 23 u8 *nonces; local 31 nonces = os_malloc(nlen); 32 if (nonces == NULL) 34 os_memcpy(nonces, i_nonce, i_nonce_len); 35 os_memcpy(nonces + i_nonce_len, r_nonce, r_nonce_len); 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, 39 os_free(nonces); 42 os_free(nonces);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_ikev2_common.c | 23 u8 *nonces; local 31 nonces = os_malloc(nlen); 32 if (nonces == NULL) 34 os_memcpy(nonces, i_nonce, i_nonce_len); 35 os_memcpy(nonces + i_nonce_len, r_nonce, r_nonce_len); 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, 39 os_free(nonces); 42 os_free(nonces);
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_eke.c | 510 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; local 534 decrypt_len = sizeof(nonces); 536 nonces, &decrypt_len) < 0) { 547 nonces, 2 * data->sess.nonce_len); 548 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { 554 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len,
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_eke.c | 308 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; local 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, 332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len,
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_eke.c | 510 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; local 534 decrypt_len = sizeof(nonces); 536 nonces, &decrypt_len) < 0) { 547 nonces, 2 * data->sess.nonce_len); 548 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { 554 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len,
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_eke.c | 308 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; local 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, 332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_eke.c | 510 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; local 534 decrypt_len = sizeof(nonces); 536 nonces, &decrypt_len) < 0) { 547 nonces, 2 * data->sess.nonce_len); 548 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { 554 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_eke.c | 308 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; local 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, 332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len,
|