Home
last modified time | relevance | path

Searched refs:nonce_s (Results 1 – 10 of 10) sorted by relevance

/freebsd/contrib/wpa/src/eap_server/
H A Deap_server_sim.c23 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member
168 const u8 *nonce_s) in eap_sim_build_encr() argument
174 } else if (!nonce_s) { in eap_sim_build_encr()
197 counter == 0 && nonce_s == NULL) in eap_sim_build_encr()
209 if (nonce_s) { in eap_sim_build_encr()
211 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s, in eap_sim_build_encr()
281 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN)) in eap_sim_build_reauth()
284 data->nonce_s, EAP_SIM_NONCE_S_LEN); in eap_sim_build_reauth()
289 sm->identity_len, data->nonce_s, data->mk, in eap_sim_build_reauth()
295 if (eap_sim_build_encr(sm, data, msg, data->counter, data->nonce_s)) { in eap_sim_build_reauth()
[all …]
H A Deap_server_aka.c23 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member
433 const u8 *nonce_s) in eap_aka_build_encr() argument
439 } else if (!nonce_s) { in eap_aka_build_encr()
466 counter == 0 && nonce_s == NULL) in eap_aka_build_encr()
478 if (nonce_s) { in eap_aka_build_encr()
480 eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s, in eap_aka_build_encr()
596 if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN)) in eap_aka_build_reauth()
599 data->nonce_s, EAP_SIM_NONCE_S_LEN); in eap_aka_build_reauth()
605 data->nonce_s, in eap_aka_build_reauth()
611 sm->identity_len, data->nonce_s, in eap_aka_build_reauth()
[all …]
H A Deap_server_eke.c31 u8 nonce_s[EAP_EKE_MAX_NONCE_LEN]; member
321 if (random_get_bytes(data->nonce_s, data->sess.nonce_len)) { in eap_eke_build_confirm()
327 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm()
330 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm()
344 data->nonce_p, data->nonce_s) < 0) { in eap_eke_build_confirm()
626 if (os_memcmp(nonce, data->nonce_s, data->sess.nonce_len) != 0) { in eap_eke_process_confirm()
648 data->nonce_s, data->nonce_p, in eap_eke_process_confirm()
783 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s, in eap_eke_get_session_id()
/freebsd/contrib/wpa/src/eap_common/
H A Deap_sim_common.h84 const u8 *nonce_s, const u8 *mk, u8 *msk,
97 const u8 *nonce_s, u8 *msk, u8 *emsk);
119 const u8 *nonce_s, u8 *msk, in eap_aka_prime_derive_keys_reauth() argument
184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member
H A Deap_eke_common.h99 const u8 *nonce_p, const u8 *nonce_s);
103 const u8 *nonce_p, const u8 *nonce_s,
H A Deap_sim_common.c109 const u8 *nonce_s, const u8 *mk, u8 *msk, in eap_sim_derive_keys_reauth() argument
127 addr[2] = nonce_s; in eap_sim_derive_keys_reauth()
138 wpa_hexdump(MSG_DEBUG, "EAP-SIM: NONCE_S", nonce_s, in eap_sim_derive_keys_reauth()
326 const u8 *nonce_s, u8 *msk, u8 *emsk) in eap_aka_prime_derive_keys_reauth() argument
339 os_memcpy(seed3 + 2, nonce_s, EAP_SIM_NONCE_S_LEN); in eap_aka_prime_derive_keys_reauth()
716 attr->nonce_s = apos + 2; in eap_sim_parse_attr()
H A Deap_eke_common.c479 const u8 *nonce_p, const u8 *nonce_s) in eap_eke_derive_ka() argument
507 os_memcpy(pos, nonce_s, sess->nonce_len); in eap_eke_derive_ka()
524 const u8 *nonce_p, const u8 *nonce_s, in eap_eke_derive_msk() argument
552 os_memcpy(pos, nonce_s, sess->nonce_len); in eap_eke_derive_msk()
/freebsd/contrib/wpa/src/eap_peer/
H A Deap_sim.c30 u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN]; member
694 const u8 *nonce_s) in eap_sim_response_reauth() argument
729 return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s, in eap_sim_response_reauth()
1134 if (eattr.nonce_s == NULL || eattr.counter < 0) { in eap_sim_process_reauthentication()
1136 !eattr.nonce_s ? " AT_NONCE_S" : "", in eap_sim_process_reauthentication()
1154 res = eap_sim_response_reauth(data, id, 1, eattr.nonce_s); in eap_sim_process_reauthentication()
1161 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN); in eap_sim_process_reauthentication()
1163 data->nonce_s, EAP_SIM_NONCE_S_LEN); in eap_sim_process_reauthentication()
1167 data->nonce_s, data->mk, data->msk, in eap_sim_process_reauthentication()
1188 return eap_sim_response_reauth(data, id, 0, data->nonce_s); in eap_sim_process_reauthentication()
[all …]
H A Deap_aka.c26 u8 nonce_s[EAP_SIM_NONCE_S_LEN]; member
817 const u8 *nonce_s) in eap_aka_response_reauth() argument
853 return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, nonce_s, in eap_aka_response_reauth()
1398 if (eattr.nonce_s == NULL || eattr.counter < 0) { in eap_aka_process_reauthentication()
1400 !eattr.nonce_s ? " AT_NONCE_S" : "", in eap_aka_process_reauthentication()
1418 res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s); in eap_aka_process_reauthentication()
1425 os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN); in eap_aka_process_reauthentication()
1427 data->nonce_s, EAP_SIM_NONCE_S_LEN); in eap_aka_process_reauthentication()
1433 data->nonce_s, in eap_aka_process_reauthentication()
1438 data->nonce_s, data->mk, in eap_aka_process_reauthentication()
[all …]
H A Deap_eke.c29 u8 nonce_s[EAP_EKE_MAX_NONCE_LEN]; member
552 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, in eap_eke_process_confirm()
555 data->nonce_s, data->sess.nonce_len); in eap_eke_process_confirm()
559 data->nonce_p, data->nonce_s) < 0) { in eap_eke_process_confirm()
588 if (eap_eke_prot(&data->sess, data->nonce_s, data->sess.nonce_len, in eap_eke_process_confirm()
606 data->nonce_s, data->nonce_p, in eap_eke_process_confirm()
759 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s, in eap_eke_get_session_id()