/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_ikev2_common.c | 23 u8 *nonces; in eap_ikev2_derive_keymat() local 31 nonces = os_malloc(nlen); in eap_ikev2_derive_keymat() 32 if (nonces == NULL) in eap_ikev2_derive_keymat() 34 os_memcpy(nonces, i_nonce, i_nonce_len); in eap_ikev2_derive_keymat() 35 os_memcpy(nonces + i_nonce_len, r_nonce, r_nonce_len); in eap_ikev2_derive_keymat() 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat() 39 os_free(nonces); in eap_ikev2_derive_keymat() 42 os_free(nonces); in eap_ikev2_derive_keymat()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_ikev2_common.c | 23 u8 *nonces; in eap_ikev2_derive_keymat() local 31 nonces = os_malloc(nlen); in eap_ikev2_derive_keymat() 32 if (nonces == NULL) in eap_ikev2_derive_keymat() 34 os_memcpy(nonces, i_nonce, i_nonce_len); in eap_ikev2_derive_keymat() 35 os_memcpy(nonces + i_nonce_len, r_nonce, r_nonce_len); in eap_ikev2_derive_keymat() 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat() 39 os_free(nonces); in eap_ikev2_derive_keymat() 42 os_free(nonces); in eap_ikev2_derive_keymat()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_eke.c | 508 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; in eap_eke_process_confirm() local 532 decrypt_len = sizeof(nonces); in eap_eke_process_confirm() 534 nonces, &decrypt_len) < 0) { in eap_eke_process_confirm() 545 nonces, 2 * data->sess.nonce_len); in eap_eke_process_confirm() 546 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { in eap_eke_process_confirm() 552 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, in eap_eke_process_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_eke.c | 508 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; in eap_eke_process_confirm() local 532 decrypt_len = sizeof(nonces); in eap_eke_process_confirm() 534 nonces, &decrypt_len) < 0) { in eap_eke_process_confirm() 545 nonces, 2 * data->sess.nonce_len); in eap_eke_process_confirm() 546 if (os_memcmp(data->nonce_p, nonces, data->sess.nonce_len) != 0) { in eap_eke_process_confirm() 552 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, in eap_eke_process_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | dpp_crypto.c | 427 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_derive_bk_ke() local 441 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_bk_ke() 442 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_bk_ke() 459 res = dpp_hmac_vector(hash_len, nonces, 2 * nonce_len, in dpp_derive_bk_ke() 1673 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_reconfig_derive_ke_responder() local 1728 os_memcpy(nonces, auth->c_nonce, curve->nonce_len); in dpp_reconfig_derive_ke_responder() 1729 os_memcpy(&nonces[curve->nonce_len], auth->e_nonce, curve->nonce_len); in dpp_reconfig_derive_ke_responder() 1730 if (dpp_hmac(curve->hash_len, nonces, 2 * curve->nonce_len, in dpp_reconfig_derive_ke_responder() 1772 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_reconfig_derive_ke_initiator() local 1819 os_memcpy(nonces, aut in dpp_reconfig_derive_ke_initiator() [all...] |
H A D | wpa_common.c | 361 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces 587 u8 nonces[2 * FILS_NONCE_LEN]; in fils_rmsk_to_pmk() local 608 os_memcpy(nonces, snonce, FILS_NONCE_LEN); in fils_rmsk_to_pmk() 609 os_memcpy(&nonces[FILS_NONCE_LEN], anonce, FILS_NONCE_LEN); in fils_rmsk_to_pmk() 619 res = hmac_sha384_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, in fils_rmsk_to_pmk() 622 res = hmac_sha256_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, in fils_rmsk_to_pmk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_eke.c | 308 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; in eap_eke_build_confirm() local 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); in eap_eke_build_confirm() 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm() 332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len, in eap_eke_build_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_eke.c | 308 u8 nonces[2 * EAP_EKE_MAX_NONCE_LEN]; in eap_eke_build_confirm() local 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); in eap_eke_build_confirm() 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm() 332 if (eap_eke_prot(&data->sess, nonces, 2 * data->sess.nonce_len, in eap_eke_build_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/common/ |
H A D | wpa_common.c | 327 * wpa_pmk_to_ptk - Calculate PTK from PMK, addresses, and nonces 481 u8 nonces[2 * FILS_NONCE_LEN]; in fils_rmsk_to_pmk() local 502 os_memcpy(nonces, snonce, FILS_NONCE_LEN); in fils_rmsk_to_pmk() 503 os_memcpy(&nonces[FILS_NONCE_LEN], anonce, FILS_NONCE_LEN); in fils_rmsk_to_pmk() 513 res = hmac_sha384_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, in fils_rmsk_to_pmk() 516 res = hmac_sha256_vector(nonces, 2 * FILS_NONCE_LEN, num_elem, in fils_rmsk_to_pmk()
|
H A D | dpp.c | 1580 u8 nonces[2 * DPP_MAX_NONCE_LEN]; in dpp_derive_ke() local 1598 os_memcpy(nonces, auth->i_nonce, nonce_len); in dpp_derive_ke() 1599 os_memcpy(&nonces[nonce_len], auth->r_nonce, nonce_len); in dpp_derive_ke() 1616 res = dpp_hmac_vector(hash_len, nonces, 2 * nonce_len, in dpp_derive_ke()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | sme.c | 1446 u8 nonces[2 * FILS_NONCE_LEN]; in sme_associate() local 1535 os_memcpy(nonces, snonce, FILS_NONCE_LEN); in sme_associate() 1536 os_memcpy(nonces + FILS_NONCE_LEN, anonce, FILS_NONCE_LEN); in sme_associate() 1537 params.fils_nonces = nonces; in sme_associate() 1538 params.fils_nonces_len = sizeof(nonces); in sme_associate()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | sme.c | 2323 u8 nonces[2 * FILS_NONCE_LEN]; local 2412 os_memcpy(nonces, snonce, FILS_NONCE_LEN); 2413 os_memcpy(nonces + FILS_NONCE_LEN, anonce, FILS_NONCE_LEN); 2414 params.fils_nonces = nonces; 2415 params.fils_nonces_len = sizeof(nonces);
|