| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_psk_common.h | 43 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2 69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
|
| eap_sake_common.h | 60 const u8 *rand_p; member in struct:eap_sake_parse_attr 85 const u8 *rand_s, const u8 *rand_p, 88 const u8 *rand_s, const u8 *rand_p,
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_psk.c | 23 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 129 if (random_get_bytes(data->rand_p, EAP_PSK_RAND_LEN)) { 143 os_memcpy(hdr2->rand_p, data->rand_p, EAP_PSK_RAND_LEN); 145 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 158 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN); 165 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, 227 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 233 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN) [all...] |
| eap_sake.c | 21 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 219 if (random_get_bytes(data->rand_p, EAP_SAKE_RAND_LEN)) { 223 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_P (peer rand)", 224 data->rand_p, EAP_SAKE_RAND_LEN); 239 data->rand_s, data->rand_p, 257 data->rand_p, EAP_SAKE_RAND_LEN); 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 314 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 351 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
| /src/external/bsd/wpa/dist/src/eap_server/ |
| eap_server_psk.c | 24 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 112 /* MAC_S = OMAC1-AES-128(AK, ID_S||RAND_P) */ 119 os_memcpy(buf + sm->cfg->server_id_len, data->rand_p, EAP_PSK_RAND_LEN); 126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, 291 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_P (client rand)", 292 resp->rand_p, EAP_PSK_RAND_LEN); 293 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN); 295 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 308 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN) [all...] |
| eap_server_sake.c | 20 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 317 if (!attr.rand_p || !attr.mic_p) { 323 os_memcpy(data->rand_p, attr.rand_p, EAP_SAKE_RAND_LEN); 345 data->rand_s, data->rand_p, 353 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 394 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|