/freebsd-10-stable/contrib/wpa/src/eap_common/ |
H A D | eap_sake_common.h | 60 const u8 *rand_p; member in struct:eap_sake_parse_attr 85 const u8 *rand_s, const u8 *rand_p, 88 const u8 *rand_s, const u8 *rand_p,
|
H A D | eap_psk_common.c | 34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument 41 if (aes_128_encrypt_block(kdk, rand_p, hash))
|
H A D | eap_psk_common.h | 43 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2 69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
|
H A D | eap_sake_common.c | 40 attr->rand_p = pos + 2; 252 * @rand_p: 16-byte RAND_P 260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 273 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 277 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 288 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 292 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 305 * @rand_p: 16-byte RAND_P 317 const u8 *rand_s, const u8 *rand_p, 345 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p, 259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument 316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument [all...] |
/freebsd-10-stable/contrib/wpa/src/eap_peer/ |
H A D | eap_psk.c | 23 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 128 if (random_get_bytes(data->rand_p, EAP_PSK_RAND_LEN)) { 142 os_memcpy(hdr2->rand_p, data->rand_p, EAP_PSK_RAND_LEN); 157 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN); 164 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p, 232 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN); 247 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek,
|
H A D | eap_sake.c | 21 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 221 if (random_get_bytes(data->rand_p, EAP_SAKE_RAND_LEN)) { 226 data->rand_p, EAP_SAKE_RAND_LEN); 242 data->rand_s, data->rand_p, 257 data->rand_p, EAP_SAKE_RAND_LEN); 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/freebsd-10-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_sake.c | 20 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 215 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 332 if (!attr.rand_p || !attr.mic_p) { 338 os_memcpy(data->rand_p, attr.rand_p, EAP_SAKE_RAND_LEN); 361 data->rand_s, data->rand_p, 364 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 401 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
H A D | eap_server_psk.c | 24 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 121 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN); 128 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk, 295 resp->rand_p, EAP_PSK_RAND_LEN); 296 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN); 311 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN);
|