Searched defs:nonce_s (Results 1 - 25 of 27) sorted by relevance

12

/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_eke.c29 u8 nonce_s[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
554 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len,
557 data->nonce_s, data->sess.nonce_len);
561 data->nonce_p, data->nonce_s) < 0) {
590 if (eap_eke_prot(&data->sess, data->nonce_s, data->sess.nonce_len,
608 data->nonce_s, data->nonce_p,
763 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s,
H A Deap_sim.c28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
553 const u8 *nonce_s)
588 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s,
966 if (eattr.nonce_s == NULL || eattr.counter < 0) {
968 !eattr.nonce_s ? " AT_NONCE_S" : "",
992 res = eap_sim_response_reauth(data, id, 1, eattr.nonce_s);
999 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
1001 data->nonce_s, EAP_SIM_NONCE_S_LEN);
1005 data->nonce_s, dat
551 eap_sim_response_reauth(struct eap_sim_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument
[all...]
H A Deap_aka.c25 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
665 const u8 *nonce_s)
701 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, nonce_s,
1209 if (eattr.nonce_s == NULL || eattr.counter < 0) {
1211 !eattr.nonce_s ? " AT_NONCE_S" : "",
1235 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s);
1242 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
1244 data->nonce_s, EAP_SIM_NONCE_S_LEN);
1250 data->nonce_s,
663 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_eke.c31 u8 nonce_s[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) {
326 data->nonce_s, data->sess.nonce_len);
329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s,
343 data->nonce_p, data->nonce_s) < 0) {
626 if (os_memcmp(nonce, data->nonce_s, data->sess.nonce_len) != 0) {
647 data->nonce_s, data->nonce_p,
784 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s,
H A Deap_server_sim.c21 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
149 const u8 *nonce_s)
152 if (nonce_s == NULL) {
172 counter == 0 && nonce_s == NULL)
184 if (nonce_s) {
186 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
255 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
258 data->nonce_s, EAP_SIM_NONCE_S_LEN);
263 sm->identity_len, data->nonce_s, data->mk,
269 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
147 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
H A Deap_server_aka.c22 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
392 const u8 *nonce_s)
395 if (nonce_s == NULL) {
419 counter == 0 && nonce_s == NULL)
431 if (nonce_s) {
433 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
548 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
551 data->nonce_s, EAP_SIM_NONCE_S_LEN);
557 data->nonce_s,
563 sm->identity_len, data->nonce_s,
390 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_eke.c29 u8 nonce_s[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
554 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len,
557 data->nonce_s, data->sess.nonce_len);
561 data->nonce_p, data->nonce_s) < 0) {
590 if (eap_eke_prot(&data->sess, data->nonce_s, data->sess.nonce_len,
608 data->nonce_s, data->nonce_p,
763 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s,
H A Deap_sim.c28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
553 const u8 *nonce_s)
588 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s,
966 if (eattr.nonce_s == NULL || eattr.counter < 0) {
968 !eattr.nonce_s ? " AT_NONCE_S" : "",
992 res = eap_sim_response_reauth(data, id, 1, eattr.nonce_s);
999 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
1001 data->nonce_s, EAP_SIM_NONCE_S_LEN);
1005 data->nonce_s, dat
551 eap_sim_response_reauth(struct eap_sim_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument
[all...]
H A Deap_aka.c25 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
665 const u8 *nonce_s)
701 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, nonce_s,
1209 if (eattr.nonce_s == NULL || eattr.counter < 0) {
1211 !eattr.nonce_s ? " AT_NONCE_S" : "",
1235 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s);
1242 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
1244 data->nonce_s, EAP_SIM_NONCE_S_LEN);
1250 data->nonce_s,
663 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_eke.c31 u8 nonce_s[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) {
326 data->nonce_s, data->sess.nonce_len);
329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s,
343 data->nonce_p, data->nonce_s) < 0) {
626 if (os_memcmp(nonce, data->nonce_s, data->sess.nonce_len) != 0) {
647 data->nonce_s, data->nonce_p,
784 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s,
H A Deap_server_sim.c21 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
149 const u8 *nonce_s)
152 if (nonce_s == NULL) {
172 counter == 0 && nonce_s == NULL)
184 if (nonce_s) {
186 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
255 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
258 data->nonce_s, EAP_SIM_NONCE_S_LEN);
263 sm->identity_len, data->nonce_s, data->mk,
269 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
147 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
H A Deap_server_aka.c22 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
392 const u8 *nonce_s)
395 if (nonce_s == NULL) {
419 counter == 0 && nonce_s == NULL)
431 if (nonce_s) {
433 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
548 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
551 data->nonce_s, EAP_SIM_NONCE_S_LEN);
557 data->nonce_s,
563 sm->identity_len, data->nonce_s,
390 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_eke.c29 u8 nonce_s[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
554 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len,
557 data->nonce_s, data->sess.nonce_len);
561 data->nonce_p, data->nonce_s) < 0) {
590 if (eap_eke_prot(&data->sess, data->nonce_s, data->sess.nonce_len,
608 data->nonce_s, data->nonce_p,
763 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s,
H A Deap_sim.c28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
553 const u8 *nonce_s)
588 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s,
966 if (eattr.nonce_s == NULL || eattr.counter < 0) {
968 !eattr.nonce_s ? " AT_NONCE_S" : "",
992 res = eap_sim_response_reauth(data, id, 1, eattr.nonce_s);
999 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
1001 data->nonce_s, EAP_SIM_NONCE_S_LEN);
1005 data->nonce_s, dat
551 eap_sim_response_reauth(struct eap_sim_data *data, u8 id, int counter_too_small, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_eke.c31 u8 nonce_s[EAP_EKE_MAX_NONCE_LEN]; member in struct:eap_eke_data
320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) {
326 data->nonce_s, data->sess.nonce_len);
329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s,
343 data->nonce_p, data->nonce_s) < 0) {
626 if (os_memcmp(nonce, data->nonce_s, data->sess.nonce_len) != 0) {
647 data->nonce_s, data->nonce_p,
784 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s,
H A Deap_server_sim.c21 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_sim_data
149 const u8 *nonce_s)
152 if (nonce_s == NULL) {
172 counter == 0 && nonce_s == NULL)
184 if (nonce_s) {
186 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
255 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
258 data->nonce_s, EAP_SIM_NONCE_S_LEN);
263 sm->identity_len, data->nonce_s, data->mk,
269 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
147 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
H A Deap_server_aka.c22 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member in struct:eap_aka_data
392 const u8 *nonce_s)
395 if (nonce_s == NULL) {
419 counter == 0 && nonce_s == NULL)
431 if (nonce_s) {
433 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
548 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
551 data->nonce_s, EAP_SIM_NONCE_S_LEN);
557 data->nonce_s,
563 sm->identity_len, data->nonce_s,
390 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_eke_common.c501 const u8 *nonce_p, const u8 *nonce_s)
529 os_memcpy(pos, nonce_s, sess->nonce_len);
546 const u8 *nonce_p, const u8 *nonce_s,
574 os_memcpy(pos, nonce_s, sess->nonce_len);
498 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument
543 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.c109 const u8 *nonce_s, const u8 *mk, u8 *msk,
127 addr[2] = nonce_s;
138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s,
327 const u8 *nonce_s, u8 *msk, u8 *emsk)
340 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN);
718 attr->nonce_s = apos + 2;
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.h84 const u8 *nonce_s, const u8 *mk, u8 *msk,
97 const u8 *nonce_s, u8 *msk, u8 *emsk);
119 const u8 *nonce_s, u8 *msk,
184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_eke_common.c501 const u8 *nonce_p, const u8 *nonce_s)
529 os_memcpy(pos, nonce_s, sess->nonce_len);
546 const u8 *nonce_p, const u8 *nonce_s,
574 os_memcpy(pos, nonce_s, sess->nonce_len);
498 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument
543 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.c109 const u8 *nonce_s, const u8 *mk, u8 *msk,
127 addr[2] = nonce_s;
138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s,
327 const u8 *nonce_s, u8 *msk, u8 *emsk)
340 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN);
718 attr->nonce_s = apos + 2;
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.h84 const u8 *nonce_s, const u8 *mk, u8 *msk,
97 const u8 *nonce_s, u8 *msk, u8 *emsk);
119 const u8 *nonce_s, u8 *msk,
184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_eke_common.c501 const u8 *nonce_p, const u8 *nonce_s)
529 os_memcpy(pos, nonce_s, sess->nonce_len);
546 const u8 *nonce_p, const u8 *nonce_s,
574 os_memcpy(pos, nonce_s, sess->nonce_len);
498 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) argument
543 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) argument
H A Deap_sim_common.c109 const u8 *nonce_s, const u8 *mk, u8 *msk,
127 addr[2] = nonce_s;
138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s,
327 const u8 *nonce_s, u8 *msk, u8 *emsk)
340 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN);
718 attr->nonce_s = apos + 2;
107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) argument
325 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) argument

Completed in 295 milliseconds

12