/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_sim.c | 20 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN]; member 251 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_build_challenge() 525 if (attr->nonce_mt == NULL || attr->selected_version < 0) { in eap_sim_process_start() 567 os_memcpy(data->nonce_mt, attr->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_process_start() 569 eap_sim_derive_mk(sm->identity, identity_len, attr->nonce_mt, in eap_sim_process_start() 861 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_sim.c | 20 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN]; member 251 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_build_challenge() 525 if (attr->nonce_mt == NULL || attr->selected_version < 0) { in eap_sim_process_start() 567 os_memcpy(data->nonce_mt, attr->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_process_start() 569 eap_sim_derive_mk(sm->identity, identity_len, attr->nonce_mt, in eap_sim_process_start() 863 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
H A D | eap_sim.c | 28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member 92 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init() 522 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start() 524 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start() 797 eap_sim_derive_mk(identity, identity_len, data->nonce_mt, in eap_sim_process_challenge() 803 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, in eap_sim_process_challenge() 1189 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init_for_reauth() 1266 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
H A D | eap_sim.c | 28 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member 94 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init() 531 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start() 533 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_response_start() 809 eap_sim_derive_mk(identity, identity_len, data->nonce_mt, in eap_sim_process_challenge() 815 if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt, in eap_sim_process_challenge() 1201 if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) { in eap_sim_init_for_reauth() 1278 data->nonce_mt, EAP_SIM_NONCE_MT_LEN); in eap_sim_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_sim_common.h | 75 const u8 *nonce_mt, u16 selected_version, 186 const u8 *nonce_mt, *identity, *res, *auts; member
|
H A D | eap_sim_common.c | 29 const u8 *nonce_mt, u16 selected_version, in eap_sim_derive_mk() 41 addr[2] = nonce_mt; in eap_sim_derive_mk() 588 attr->nonce_mt = apos + 2; in eap_sim_parse_attr() 28 eap_sim_derive_mk(const u8 *identity, size_t identity_len, const u8 *nonce_mt, u16 selected_version, const u8 *ver_list, size_t ver_list_len, int num_chal, const u8 *kc, u8 *mk) eap_sim_derive_mk() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_sim_common.h | 79 const u8 *nonce_mt, u16 selected_version, 190 const u8 *nonce_mt, *identity, *res, *auts; member
|
H A D | eap_sim_common.c | 33 const u8 *nonce_mt, u16 selected_version, in eap_sim_derive_mk() 45 addr[2] = nonce_mt; in eap_sim_derive_mk() 598 attr->nonce_mt = apos + 2; in eap_sim_parse_attr() 32 eap_sim_derive_mk(const u8 *identity, size_t identity_len, const u8 *nonce_mt, u16 selected_version, const u8 *ver_list, size_t ver_list_len, int num_chal, const u8 *kc, u8 *mk) eap_sim_derive_mk() argument
|