/dports/devel/py-maturin/maturin-0.11.3/cargo-crates/rustls-0.19.1/src/ |
H A D | ticketer.rs | 85 let nonce_len = self.alg.nonce_len(); in decrypt() localVariable 88 if ciphertext.len() < nonce_len + tag_len { in decrypt() 93 ring::aead::Nonce::try_assume_unique_for_key(&ciphertext[0..nonce_len]).unwrap(); in decrypt() 97 out.extend_from_slice(&ciphertext[nonce_len..]); in decrypt()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/boringssl/src/crypto/hpke/ |
H A D | hpke.c | 458 size_t nonce_len) { in hpke_nonce() argument 459 assert(nonce_len >= 8); in hpke_nonce() 462 OPENSSL_memset(out_nonce, 0, nonce_len); in hpke_nonce() 465 out_nonce[nonce_len - i - 1] = seq_copy & 0xff; in hpke_nonce() 470 for (size_t i = 0; i < nonce_len; i++) { in hpke_nonce() 493 const size_t nonce_len = EVP_AEAD_nonce_length(hpke->aead_ctx.aead); in EVP_HPKE_CTX_open() local 494 hpke_nonce(hpke, nonce, nonce_len); in EVP_HPKE_CTX_open() 497 nonce_len, in, in_len, ad, ad_len)) { in EVP_HPKE_CTX_open() 517 const size_t nonce_len = EVP_AEAD_nonce_length(hpke->aead_ctx.aead); in EVP_HPKE_CTX_seal() local 518 hpke_nonce(hpke, nonce, nonce_len); in EVP_HPKE_CTX_seal() [all …]
|
/dports/net/quiche/quiche-0.9.0/deps/boringssl/src/crypto/hpke/ |
H A D | hpke.c | 447 size_t nonce_len) { in hpke_nonce() argument 448 assert(nonce_len >= 8); in hpke_nonce() 451 OPENSSL_memset(out_nonce, 0, nonce_len); in hpke_nonce() 454 out_nonce[nonce_len - i - 1] = seq_copy & 0xff; in hpke_nonce() 459 for (size_t i = 0; i < nonce_len; i++) { in hpke_nonce() 482 const size_t nonce_len = EVP_AEAD_nonce_length(hpke->aead_ctx.aead); in EVP_HPKE_CTX_open() local 483 hpke_nonce(hpke, nonce, nonce_len); in EVP_HPKE_CTX_open() 486 nonce_len, in, in_len, ad, ad_len)) { in EVP_HPKE_CTX_open() 506 const size_t nonce_len = EVP_AEAD_nonce_length(hpke->aead_ctx.aead); in EVP_HPKE_CTX_seal() local 507 hpke_nonce(hpke, nonce, nonce_len); in EVP_HPKE_CTX_seal() [all …]
|
/dports/net/quiche/quiche-0.9.0/cargo-crates/boring-sys-1.1.1/deps/boringssl/src/crypto/hpke/ |
H A D | hpke.c | 447 size_t nonce_len) { in hpke_nonce() argument 448 assert(nonce_len >= 8); in hpke_nonce() 451 OPENSSL_memset(out_nonce, 0, nonce_len); in hpke_nonce() 454 out_nonce[nonce_len - i - 1] = seq_copy & 0xff; in hpke_nonce() 459 for (size_t i = 0; i < nonce_len; i++) { in hpke_nonce() 482 const size_t nonce_len = EVP_AEAD_nonce_length(hpke->aead_ctx.aead); in EVP_HPKE_CTX_open() local 483 hpke_nonce(hpke, nonce, nonce_len); in EVP_HPKE_CTX_open() 486 nonce_len, in, in_len, ad, ad_len)) { in EVP_HPKE_CTX_open() 506 const size_t nonce_len = EVP_AEAD_nonce_length(hpke->aead_ctx.aead); in EVP_HPKE_CTX_seal() local 507 hpke_nonce(hpke, nonce, nonce_len); in EVP_HPKE_CTX_seal() [all …]
|
/dports/net/hostapd/hostapd-2.9/src/eap_server/ |
H A D | eap_server_eke.c | 326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm() 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); in eap_eke_build_confirm() 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm() 330 data->sess.nonce_len); in eap_eke_build_confirm() 569 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_commit() 575 data->nonce_p, data->sess.nonce_len); in eap_eke_process_commit() 618 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_confirm() 624 nonce, data->sess.nonce_len); in eap_eke_process_confirm() 775 sid_len = 1 + 2 * data->sess.nonce_len; in eap_eke_get_session_id() 780 os_memcpy(sid + 1, data->nonce_p, data->sess.nonce_len); in eap_eke_get_session_id() [all …]
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/eap_server/ |
H A D | eap_server_eke.c | 326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm() 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); in eap_eke_build_confirm() 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm() 330 data->sess.nonce_len); in eap_eke_build_confirm() 569 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_commit() 575 data->nonce_p, data->sess.nonce_len); in eap_eke_process_commit() 618 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_confirm() 624 nonce, data->sess.nonce_len); in eap_eke_process_confirm() 776 sid_len = 1 + 2 * data->sess.nonce_len; in eap_eke_get_session_id() 781 os_memcpy(sid + 1, data->nonce_p, data->sess.nonce_len); in eap_eke_get_session_id() [all …]
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_eke.c | 326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm() 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); in eap_eke_build_confirm() 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm() 330 data->sess.nonce_len); in eap_eke_build_confirm() 569 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_commit() 575 data->nonce_p, data->sess.nonce_len); in eap_eke_process_commit() 618 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_confirm() 624 nonce, data->sess.nonce_len); in eap_eke_process_confirm() 775 sid_len = 1 + 2 * data->sess.nonce_len; in eap_eke_get_session_id() 780 os_memcpy(sid + 1, data->nonce_p, data->sess.nonce_len); in eap_eke_get_session_id() [all …]
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_eke.c | 326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm() 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); in eap_eke_build_confirm() 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm() 330 data->sess.nonce_len); in eap_eke_build_confirm() 569 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_commit() 575 data->nonce_p, data->sess.nonce_len); in eap_eke_process_commit() 618 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_confirm() 624 nonce, data->sess.nonce_len); in eap_eke_process_confirm() 775 sid_len = 1 + 2 * data->sess.nonce_len; in eap_eke_get_session_id() 780 os_memcpy(sid + 1, data->nonce_p, data->sess.nonce_len); in eap_eke_get_session_id() [all …]
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/eap_server/ |
H A D | eap_server_eke.c | 326 data->nonce_s, data->sess.nonce_len); in eap_eke_build_confirm() 328 os_memcpy(nonces, data->nonce_p, data->sess.nonce_len); in eap_eke_build_confirm() 329 os_memcpy(nonces + data->sess.nonce_len, data->nonce_s, in eap_eke_build_confirm() 330 data->sess.nonce_len); in eap_eke_build_confirm() 569 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_commit() 575 data->nonce_p, data->sess.nonce_len); in eap_eke_process_commit() 618 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_confirm() 624 nonce, data->sess.nonce_len); in eap_eke_process_confirm() 776 sid_len = 1 + 2 * data->sess.nonce_len; in eap_eke_get_session_id() 781 os_memcpy(sid + 1, data->nonce_p, data->sess.nonce_len); in eap_eke_get_session_id() [all …]
|
/dports/security/gnutls/gnutls-3.6.16/lib/ |
H A D | crypto-api.c | 398 size_t nonce_len) in gnutls_hmac_set_nonce() argument 820 const void *nonce, size_t nonce_len, in gnutls_aead_cipher_decrypt() argument 838 nonce, nonce_len, in gnutls_aead_cipher_decrypt() 876 const void *nonce, size_t nonce_len, in gnutls_aead_cipher_encrypt() argument 894 nonce, nonce_len, in gnutls_aead_cipher_encrypt() 1004 const void *nonce, size_t nonce_len, in gnutls_aead_cipher_encryptv() argument 1044 ret = gnutls_aead_cipher_encrypt(handle, nonce, nonce_len, in gnutls_aead_cipher_encryptv() 1128 const void *nonce, size_t nonce_len, in gnutls_aead_cipher_encryptv2() argument 1178 ret = gnutls_aead_cipher_encrypt(handle, nonce, nonce_len, in gnutls_aead_cipher_encryptv2() 1275 const void *nonce, size_t nonce_len, in gnutls_aead_cipher_decryptv2() argument [all …]
|
/dports/multimedia/librist/librist-5c1f4a06ab46e16e6bba42fe7381d8353020a1fd/contrib/mbedtls/library/ |
H A D | ctr_drbg.c | 367 size_t nonce_len ) in mbedtls_ctr_drbg_reseed_internal() argument 375 if( nonce_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len ) in mbedtls_ctr_drbg_reseed_internal() 377 if( len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len - nonce_len ) in mbedtls_ctr_drbg_reseed_internal() 390 if( nonce_len != 0 ) in mbedtls_ctr_drbg_reseed_internal() 392 if( 0 != ctx->f_entropy( ctx->p_entropy, seed + seedlen, nonce_len ) ) in mbedtls_ctr_drbg_reseed_internal() 396 seedlen += nonce_len; in mbedtls_ctr_drbg_reseed_internal() 458 size_t nonce_len; in mbedtls_ctr_drbg_seed() local 478 nonce_len = ( ctx->reseed_counter >= 0 ? in mbedtls_ctr_drbg_seed() 491 nonce_len ) ) != 0 ) in mbedtls_ctr_drbg_seed()
|
/dports/emulators/citra/citra-ac98458e0/externals/libressl/ssl/ |
H A D | tls12_record_layer.c | 320 size_t nonce_len = 0; in tls12_record_layer_aead_xored_nonce() local 341 if (!CBB_finish(&cbb, &nonce, &nonce_len)) in tls12_record_layer_aead_xored_nonce() 348 *out_len = nonce_len; in tls12_record_layer_aead_xored_nonce() 354 freezero(nonce, nonce_len); in tls12_record_layer_aead_xored_nonce() 375 size_t header_len = 0, nonce_len = 0; in tls12_record_layer_seal_record_protected_aead() local 384 rl->write_seq_num, &nonce, &nonce_len)) in tls12_record_layer_seal_record_protected_aead() 388 rl->write_seq_num, &nonce, &nonce_len)) in tls12_record_layer_seal_record_protected_aead() 410 nonce, nonce_len, content, content_len, header, header_len)) in tls12_record_layer_seal_record_protected_aead() 420 freezero(nonce, nonce_len); in tls12_record_layer_seal_record_protected_aead()
|
/dports/emulators/citra-qt5/citra-ac98458e0/externals/libressl/ssl/ |
H A D | tls12_record_layer.c | 320 size_t nonce_len = 0; in tls12_record_layer_aead_xored_nonce() local 341 if (!CBB_finish(&cbb, &nonce, &nonce_len)) in tls12_record_layer_aead_xored_nonce() 348 *out_len = nonce_len; in tls12_record_layer_aead_xored_nonce() 354 freezero(nonce, nonce_len); in tls12_record_layer_aead_xored_nonce() 375 size_t header_len = 0, nonce_len = 0; in tls12_record_layer_seal_record_protected_aead() local 384 rl->write_seq_num, &nonce, &nonce_len)) in tls12_record_layer_seal_record_protected_aead() 388 rl->write_seq_num, &nonce, &nonce_len)) in tls12_record_layer_seal_record_protected_aead() 410 nonce, nonce_len, content, content_len, header, header_len)) in tls12_record_layer_seal_record_protected_aead() 420 freezero(nonce, nonce_len); in tls12_record_layer_seal_record_protected_aead()
|
/dports/devel/premake5/premake-5.0.0-alpha16-src/contrib/mbedtls/library/ |
H A D | ctr_drbg.c | 372 size_t nonce_len ) in mbedtls_ctr_drbg_reseed_internal() argument 380 if( nonce_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len ) in mbedtls_ctr_drbg_reseed_internal() 382 if( len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len - nonce_len ) in mbedtls_ctr_drbg_reseed_internal() 395 if( nonce_len != 0 ) in mbedtls_ctr_drbg_reseed_internal() 397 if( 0 != ctx->f_entropy( ctx->p_entropy, seed, nonce_len ) ) in mbedtls_ctr_drbg_reseed_internal() 401 seedlen += nonce_len; in mbedtls_ctr_drbg_reseed_internal() 463 size_t nonce_len; in mbedtls_ctr_drbg_seed() local 478 nonce_len = ( ctx->reseed_counter >= 0 ? in mbedtls_ctr_drbg_seed() 491 nonce_len ) ) != 0 ) in mbedtls_ctr_drbg_seed()
|
/dports/www/hiawatha/hiawatha-10.12/mbedtls/library/ |
H A D | ctr_drbg.c | 367 size_t nonce_len ) in mbedtls_ctr_drbg_reseed_internal() argument 375 if( nonce_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len ) in mbedtls_ctr_drbg_reseed_internal() 377 if( len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len - nonce_len ) in mbedtls_ctr_drbg_reseed_internal() 390 if( nonce_len != 0 ) in mbedtls_ctr_drbg_reseed_internal() 392 if( 0 != ctx->f_entropy( ctx->p_entropy, seed + seedlen, nonce_len ) ) in mbedtls_ctr_drbg_reseed_internal() 396 seedlen += nonce_len; in mbedtls_ctr_drbg_reseed_internal() 458 size_t nonce_len; in mbedtls_ctr_drbg_seed() local 478 nonce_len = ( ctx->reseed_counter >= 0 ? in mbedtls_ctr_drbg_seed() 491 nonce_len ) ) != 0 ) in mbedtls_ctr_drbg_seed()
|
/dports/sysutils/fluent-bit/fluent-bit-1.8.11/lib/mbedtls-2.27.0/library/ |
H A D | ctr_drbg.c | 367 size_t nonce_len ) in mbedtls_ctr_drbg_reseed_internal() argument 375 if( nonce_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len ) in mbedtls_ctr_drbg_reseed_internal() 377 if( len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len - nonce_len ) in mbedtls_ctr_drbg_reseed_internal() 390 if( nonce_len != 0 ) in mbedtls_ctr_drbg_reseed_internal() 392 if( 0 != ctx->f_entropy( ctx->p_entropy, seed + seedlen, nonce_len ) ) in mbedtls_ctr_drbg_reseed_internal() 396 seedlen += nonce_len; in mbedtls_ctr_drbg_reseed_internal() 458 size_t nonce_len; in mbedtls_ctr_drbg_seed() local 478 nonce_len = ( ctx->reseed_counter >= 0 ? in mbedtls_ctr_drbg_seed() 491 nonce_len ) ) != 0 ) in mbedtls_ctr_drbg_seed()
|
/dports/biology/sra-tools/sra-tools-2.11.0/ncbi-vdb/libs/ext/mbedtls/ |
H A D | ctr_drbg.c | 372 size_t nonce_len ) in mbedtls_ctr_drbg_reseed_internal() argument 380 if( nonce_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len ) in mbedtls_ctr_drbg_reseed_internal() 382 if( len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len - nonce_len ) in mbedtls_ctr_drbg_reseed_internal() 395 if( nonce_len != 0 ) in mbedtls_ctr_drbg_reseed_internal() 397 if( 0 != ctx->f_entropy( ctx->p_entropy, seed, nonce_len ) ) in mbedtls_ctr_drbg_reseed_internal() 401 seedlen += nonce_len; in mbedtls_ctr_drbg_reseed_internal() 463 size_t nonce_len; in vdb_mbedtls_ctr_drbg_seed() local 478 nonce_len = ( ctx->reseed_counter >= 0 ? in vdb_mbedtls_ctr_drbg_seed() 491 nonce_len ) ) != 0 ) in vdb_mbedtls_ctr_drbg_seed()
|
/dports/biology/ncbi-vdb/ncbi-vdb-2.11.0/libs/ext/mbedtls/ |
H A D | ctr_drbg.c | 372 size_t nonce_len ) in mbedtls_ctr_drbg_reseed_internal() argument 380 if( nonce_len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len ) in mbedtls_ctr_drbg_reseed_internal() 382 if( len > MBEDTLS_CTR_DRBG_MAX_SEED_INPUT - ctx->entropy_len - nonce_len ) in mbedtls_ctr_drbg_reseed_internal() 395 if( nonce_len != 0 ) in mbedtls_ctr_drbg_reseed_internal() 397 if( 0 != ctx->f_entropy( ctx->p_entropy, seed, nonce_len ) ) in mbedtls_ctr_drbg_reseed_internal() 401 seedlen += nonce_len; in mbedtls_ctr_drbg_reseed_internal() 463 size_t nonce_len; in vdb_mbedtls_ctr_drbg_seed() local 478 nonce_len = ( ctx->reseed_counter >= 0 ? in vdb_mbedtls_ctr_drbg_seed() 491 nonce_len ) ) != 0 ) in vdb_mbedtls_ctr_drbg_seed()
|
/dports/multimedia/librist/librist-5c1f4a06ab46e16e6bba42fe7381d8353020a1fd/contrib/ |
H A D | aes.c | 46 void ccm_prepare_first_ctr_blk(uint8_t counter[], const uint8_t nonce[], int nonce_len, int payload… 364 … const uint8_t nonce[], unsigned short nonce_len, uint8_t out[], uint32_t *out_len, in aes_encrypt_ccm() argument 375 if (nonce_len < 7 || nonce_len > 13) in aes_encrypt_ccm() 390 payload_len_store_size = AES_BLOCK_SIZE - 1 - nonce_len; in aes_encrypt_ccm() 401 ccm_prepare_first_ctr_blk(counter, nonce, nonce_len, payload_len_store_size); in aes_encrypt_ccm() 448 plaintext_len_store_size = AES_BLOCK_SIZE - 1 - nonce_len; in aes_decrypt_ccm() 453 ccm_prepare_first_ctr_blk(counter, nonce, nonce_len, plaintext_len_store_size); in aes_decrypt_ccm() 466 plaintext_len_store_size = AES_BLOCK_SIZE - 1 - nonce_len; in aes_decrypt_ccm() 500 memcpy(&counter[1], nonce, nonce_len); in ccm_prepare_first_ctr_blk() 510 memcpy(&buf[1], nonce, nonce_len); in ccm_prepare_first_format_blk() [all …]
|
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/mac/ |
H A D | mac.h | 67 virtual void start_msg(const uint8_t nonce[], size_t nonce_len); 85 void start(const uint8_t nonce[], size_t nonce_len) in start() argument 87 start_msg(nonce, nonce_len); in start()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/mac/ |
H A D | mac.h | 67 virtual void start_msg(const uint8_t nonce[], size_t nonce_len); 85 void start(const uint8_t nonce[], size_t nonce_len) in start() argument 87 start_msg(nonce, nonce_len); in start()
|
/dports/security/botan2/Botan-2.18.2/src/lib/mac/ |
H A D | mac.h | 67 virtual void start_msg(const uint8_t nonce[], size_t nonce_len); 85 void start(const uint8_t nonce[], size_t nonce_len) in start() argument 87 start_msg(nonce, nonce_len); in start()
|
/dports/devel/pecl-grpc/grpc-1.42.0/third_party/boringssl-with-bazel/src/crypto/hpke/ |
H A D | hpke.c | 526 size_t nonce_len) { in hpke_nonce() argument 527 assert(nonce_len >= 8); in hpke_nonce() 530 OPENSSL_memset(out_nonce, 0, nonce_len); in hpke_nonce() 533 out_nonce[nonce_len - i - 1] = seq_copy & 0xff; in hpke_nonce() 538 for (size_t i = 0; i < nonce_len; i++) { in hpke_nonce() 556 const size_t nonce_len = EVP_AEAD_nonce_length(ctx->aead_ctx.aead); in EVP_HPKE_CTX_open() local 557 hpke_nonce(ctx, nonce, nonce_len); in EVP_HPKE_CTX_open() 560 nonce_len, in, in_len, ad, ad_len)) { in EVP_HPKE_CTX_open() 580 const size_t nonce_len = EVP_AEAD_nonce_length(ctx->aead_ctx.aead); in EVP_HPKE_CTX_seal() local 581 hpke_nonce(ctx, nonce, nonce_len); in EVP_HPKE_CTX_seal() [all …]
|
/dports/devel/py-grpcio/grpcio-1.43.0/third_party/boringssl-with-bazel/src/crypto/hpke/ |
H A D | hpke.c | 526 size_t nonce_len) { in hpke_nonce() argument 527 assert(nonce_len >= 8); in hpke_nonce() 530 OPENSSL_memset(out_nonce, 0, nonce_len); in hpke_nonce() 533 out_nonce[nonce_len - i - 1] = seq_copy & 0xff; in hpke_nonce() 538 for (size_t i = 0; i < nonce_len; i++) { in hpke_nonce() 556 const size_t nonce_len = EVP_AEAD_nonce_length(ctx->aead_ctx.aead); in EVP_HPKE_CTX_open() local 557 hpke_nonce(ctx, nonce, nonce_len); in EVP_HPKE_CTX_open() 560 nonce_len, in, in_len, ad, ad_len)) { in EVP_HPKE_CTX_open() 580 const size_t nonce_len = EVP_AEAD_nonce_length(ctx->aead_ctx.aead); in EVP_HPKE_CTX_seal() local 581 hpke_nonce(ctx, nonce, nonce_len); in EVP_HPKE_CTX_seal() [all …]
|
/dports/net/hostapd/hostapd-2.9/src/eap_peer/ |
H A D | eap_eke.c | 464 if (random_get_bytes(data->nonce_p, data->sess.nonce_len)) { in eap_eke_process_commit() 470 data->nonce_p, data->sess.nonce_len); in eap_eke_process_commit() 539 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) { in eap_eke_process_confirm() 545 nonces, 2 * data->sess.nonce_len); in eap_eke_process_confirm() 552 os_memcpy(data->nonce_s, nonces + data->sess.nonce_len, in eap_eke_process_confirm() 553 data->sess.nonce_len); in eap_eke_process_confirm() 555 data->nonce_s, data->sess.nonce_len); in eap_eke_process_confirm() 753 sid_len = 1 + 2 * data->sess.nonce_len; in eap_eke_get_session_id() 758 os_memcpy(sid + 1, data->nonce_p, data->sess.nonce_len); in eap_eke_get_session_id() 759 os_memcpy(sid + 1 + data->sess.nonce_len, data->nonce_s, in eap_eke_get_session_id() [all …]
|