/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_sim.c | 21 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member 150 const u8 *nonce_s) in eap_sim_build_encr() 156 } else if (!nonce_s) { in eap_sim_build_encr() 179 counter == 0 && nonce_s == NULL) in eap_sim_build_encr() 191 if (nonce_s) { in eap_sim_build_encr() 193 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s, in eap_sim_build_encr() 263 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN)) in eap_sim_build_reauth() 266 data->nonce_s, EAP_SIM_NONCE_S_LEN); in eap_sim_build_reauth() 271 sm->identity_len, data->nonce_s, data->mk, in eap_sim_build_reauth() 277 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) { in eap_sim_build_reauth() 148 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) eap_sim_build_encr() argument [all...] |
H A D | eap_server_aka.c | 22 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member 393 const u8 *nonce_s) in eap_aka_build_encr() 399 } else if (!nonce_s) { in eap_aka_build_encr() 426 counter == 0 && nonce_s == NULL) in eap_aka_build_encr() 438 if (nonce_s) { in eap_aka_build_encr() 440 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s, in eap_aka_build_encr() 556 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN)) in eap_aka_build_reauth() 559 data->nonce_s, EAP_SIM_NONCE_S_LEN); in eap_aka_build_reauth() 565 data->nonce_s, in eap_aka_build_reauth() 571 sm->identity_len, data->nonce_s, in eap_aka_build_reauth() 391 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) eap_aka_build_encr() argument [all...] |
H A D | eap_server_eke.c | 31 u8 nonce_s[EAP_EKE_MAX_NONCE_LEN]; member 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { in eap_eke_build_confirm() 326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm() 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm() 343 data->nonce_p, data->nonce_s) < 0) { in eap_eke_build_confirm() 625 if (os_memcmp(nonce, data->nonce_s, data->sess.nonce_len) != 0) { in eap_eke_process_confirm() 646 data->nonce_s, data->nonce_p, in eap_eke_process_confirm() 781 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s, in eap_eke_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_sim.c | 21 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member 150 const u8 *nonce_s) in eap_sim_build_encr() 156 } else if (!nonce_s) { in eap_sim_build_encr() 179 counter == 0 && nonce_s == NULL) in eap_sim_build_encr() 191 if (nonce_s) { in eap_sim_build_encr() 193 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s, in eap_sim_build_encr() 263 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN)) in eap_sim_build_reauth() 266 data->nonce_s, EAP_SIM_NONCE_S_LEN); in eap_sim_build_reauth() 271 sm->identity_len, data->nonce_s, data->mk, in eap_sim_build_reauth() 277 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) { in eap_sim_build_reauth() 148 eap_sim_build_encr(struct eap_sm *sm, struct eap_sim_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) eap_sim_build_encr() argument [all...] |
H A D | eap_server_aka.c | 22 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member 393 const u8 *nonce_s) in eap_aka_build_encr() 399 } else if (!nonce_s) { in eap_aka_build_encr() 426 counter == 0 && nonce_s == NULL) in eap_aka_build_encr() 438 if (nonce_s) { in eap_aka_build_encr() 440 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s, in eap_aka_build_encr() 556 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN)) in eap_aka_build_reauth() 559 data->nonce_s, EAP_SIM_NONCE_S_LEN); in eap_aka_build_reauth() 565 data->nonce_s, in eap_aka_build_reauth() 571 sm->identity_len, data->nonce_s, in eap_aka_build_reauth() 391 eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data, struct eap_sim_msg *msg, u16 counter, const u8 *nonce_s) eap_aka_build_encr() argument [all...] |
H A D | eap_server_eke.c | 31 u8 nonce_s[EAP_EKE_MAX_NONCE_LEN]; member 320 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { in eap_eke_build_confirm() 326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm() 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm() 343 data->nonce_p, data->nonce_s) < 0) { in eap_eke_build_confirm() 625 if (os_memcmp(nonce, data->nonce_s, data->sess.nonce_len) != 0) { in eap_eke_process_confirm() 647 data->nonce_s, data->nonce_p, in eap_eke_process_confirm() 782 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s, in eap_eke_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_sim_common.h | 84 const u8 *nonce_s, const u8 *mk, u8 *msk, 97 const u8 *nonce_s, u8 *msk, u8 *emsk); 119 const u8 *nonce_s, u8 *msk, in eap_aka_prime_derive_keys_reauth() 184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member 116 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys_reauth() argument
|
H A D | eap_eke_common.h | 99 const u8 *nonce_p, const u8 *nonce_s); 103 const u8 *nonce_p, const u8 *nonce_s,
|
H A D | eap_eke_common.c | 479 const u8 *nonce_p, const u8 *nonce_s) in eap_eke_derive_ka() 507 os_memcpy(pos, nonce_s, sess->nonce_len); in eap_eke_derive_ka() 524 const u8 *nonce_p, const u8 *nonce_s, in eap_eke_derive_msk() 552 os_memcpy(pos, nonce_s, sess->nonce_len); in eap_eke_derive_msk() 476 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) eap_eke_derive_ka() argument 521 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_eke_derive_msk() argument
|
H A D | eap_sim_common.c | 109 const u8 *nonce_s, const u8 *mk, u8 *msk, in eap_sim_derive_keys_reauth() 127 addr[2] = nonce_s; in eap_sim_derive_keys_reauth() 138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s, in eap_sim_derive_keys_reauth() 326 const u8 *nonce_s, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys_reauth() 339 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN); in eap_aka_prime_derive_keys_reauth() 716 attr->nonce_s = apos + 2; in eap_sim_parse_attr() 107 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) eap_sim_derive_keys_reauth() argument 324 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys_reauth() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_sim_common.h | 88 const u8 *nonce_s, const u8 *mk, u8 *msk, 101 const u8 *nonce_s, u8 *msk, u8 *emsk); 123 const u8 *nonce_s, u8 *msk, in eap_aka_prime_derive_keys_reauth() 188 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member 120 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys_reauth() argument
|
H A D | eap_eke_common.h | 99 const u8 *nonce_p, const u8 *nonce_s); 103 const u8 *nonce_p, const u8 *nonce_s,
|
H A D | eap_eke_common.c | 479 const u8 *nonce_p, const u8 *nonce_s) in eap_eke_derive_ka() 507 os_memcpy(pos, nonce_s, sess->nonce_len); in eap_eke_derive_ka() 524 const u8 *nonce_p, const u8 *nonce_s, in eap_eke_derive_msk() 552 os_memcpy(pos, nonce_s, sess->nonce_len); in eap_eke_derive_msk() 476 eap_eke_derive_ka(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s) eap_eke_derive_ka() argument 521 eap_eke_derive_msk(struct eap_eke_session *sess, const u8 *id_s, size_t id_s_len, const u8 *id_p, size_t id_p_len, const u8 *nonce_p, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_eke_derive_msk() argument
|
H A D | eap_sim_common.c | 113 const u8 *nonce_s, const u8 *mk, u8 *msk, in eap_sim_derive_keys_reauth() 131 addr[2] = nonce_s; in eap_sim_derive_keys_reauth() 142 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s, in eap_sim_derive_keys_reauth() 330 const u8 *nonce_s, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys_reauth() 343 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN); in eap_aka_prime_derive_keys_reauth() 726 attr->nonce_s = apos + 2; in eap_sim_parse_attr() 111 eap_sim_derive_keys_reauth(u16 _counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, const u8 *mk, u8 *msk, u8 *emsk) eap_sim_derive_keys_reauth() argument 328 eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter, const u8 *identity, size_t identity_len, const u8 *nonce_s, u8 *msk, u8 *emsk) eap_aka_prime_derive_keys_reauth() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_sim.c | 28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member 564 const u8 *nonce_s) in eap_sim_response_reauth() 599 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s, in eap_sim_response_reauth() 1013 if (eattr.nonce_s == NULL || eattr.counter < 0) { in eap_sim_process_reauthentication() 1015 !eattr.nonce_s ? " AT_NONCE_S" : "", in eap_sim_process_reauthentication() 1039 res = eap_sim_response_reauth(data, id, 1, eattr.nonce_s); in eap_sim_process_reauthentication() 1046 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN); in eap_sim_process_reauthentication() 1048 data->nonce_s, EAP_SIM_NONCE_S_LEN); in eap_sim_process_reauthentication() 1052 data->nonce_s, dat in eap_sim_process_reauthentication() 562 eap_sim_response_reauth(struct eap_sim_data *data, u8 id, int counter_too_small, const u8 *nonce_s) eap_sim_response_reauth() argument [all...] |
H A D | eap_eke.c | 29 u8 nonce_s[EAP_EKE_MAX_NONCE_LEN]; member 552 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, in eap_eke_process_confirm() 555 data->nonce_s, data->sess.nonce_len); in eap_eke_process_confirm() 559 data->nonce_p, data->nonce_s) < 0) { in eap_eke_process_confirm() 588 if (eap_eke_prot(&data->sess, data->nonce_s, data->sess.nonce_len, in eap_eke_process_confirm() 606 data->nonce_s, data->nonce_p, in eap_eke_process_confirm() 759 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s, in eap_eke_get_session_id()
|
H A D | eap_aka.c | 25 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member 687 const u8 *nonce_s) in eap_aka_response_reauth() 723 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, nonce_s, in eap_aka_response_reauth() 1279 if (eattr.nonce_s == NULL || eattr.counter < 0) { in eap_aka_process_reauthentication() 1281 !eattr.nonce_s ? " AT_NONCE_S" : "", in eap_aka_process_reauthentication() 1305 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s); in eap_aka_process_reauthentication() 1312 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN); in eap_aka_process_reauthentication() 1314 data->nonce_s, EAP_SIM_NONCE_S_LEN); in eap_aka_process_reauthentication() 1320 data->nonce_s, in eap_aka_process_reauthentication() 685 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) eap_aka_response_reauth() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_sim.c | 28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member 569 const u8 *nonce_s) in eap_sim_response_reauth() 604 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s, in eap_sim_response_reauth() 1025 if (eattr.nonce_s == NULL || eattr.counter < 0) { in eap_sim_process_reauthentication() 1027 !eattr.nonce_s ? " AT_NONCE_S" : "", in eap_sim_process_reauthentication() 1051 res = eap_sim_response_reauth(data, id, 1, eattr.nonce_s); in eap_sim_process_reauthentication() 1058 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN); in eap_sim_process_reauthentication() 1060 data->nonce_s, EAP_SIM_NONCE_S_LEN); in eap_sim_process_reauthentication() 1064 data->nonce_s, dat in eap_sim_process_reauthentication() 567 eap_sim_response_reauth(struct eap_sim_data *data, u8 id, int counter_too_small, const u8 *nonce_s) eap_sim_response_reauth() argument [all...] |
H A D | eap_eke.c | 29 u8 nonce_s[EAP_EKE_MAX_NONCE_LEN]; member 552 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, in eap_eke_process_confirm() 555 data->nonce_s, data->sess.nonce_len); in eap_eke_process_confirm() 559 data->nonce_p, data->nonce_s) < 0) { in eap_eke_process_confirm() 588 if (eap_eke_prot(&data->sess, data->nonce_s, data->sess.nonce_len, in eap_eke_process_confirm() 606 data->nonce_s, data->nonce_p, in eap_eke_process_confirm() 759 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s, in eap_eke_get_session_id()
|
H A D | eap_aka.c | 25 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member 696 const u8 *nonce_s) in eap_aka_response_reauth() 732 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, nonce_s, in eap_aka_response_reauth() 1293 if (eattr.nonce_s == NULL || eattr.counter < 0) { in eap_aka_process_reauthentication() 1295 !eattr.nonce_s ? " AT_NONCE_S" : "", in eap_aka_process_reauthentication() 1319 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s); in eap_aka_process_reauthentication() 1326 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN); in eap_aka_process_reauthentication() 1328 data->nonce_s, EAP_SIM_NONCE_S_LEN); in eap_aka_process_reauthentication() 1334 data->nonce_s, in eap_aka_process_reauthentication() 694 eap_aka_response_reauth(struct eap_aka_data *data, u8 id, int counter_too_small, const u8 *nonce_s) eap_aka_response_reauth() argument [all...] |