Searched refs:rand_s (Results 1 - 25 of 31) sorted by relevance

12

/external/chromium/base/
H A Drand_util_win.cc16 CHECK_EQ(rand_s(&number), 0);
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_psk_common.h41 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_1
48 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2
57 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_3
65 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_4
H A Deap_sake_common.h65 const u8 *rand_s; member in struct:eap_sake_parse_attr
91 const u8 *rand_s, const u8 *rand_p,
94 const u8 *rand_s, const u8 *rand_p,
H A Deap_sake_common.c37 attr->rand_s = pos + 2;
257 * @rand_s: 16-byte RAND_S
266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
279 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
283 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
294 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
298 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
310 * @rand_s: 16-byte RAND_S
323 const u8 *rand_s, const u8 *rand_p,
350 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LE
265 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
322 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_psk_common.h35 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_1
42 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2
51 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_3
59 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_4
H A Deap_sake_common.h59 const u8 *rand_s; member in struct:eap_sake_parse_attr
85 const u8 *rand_s, const u8 *rand_p,
88 const u8 *rand_s, const u8 *rand_p,
H A Deap_sake_common.c31 attr->rand_s = pos + 2;
251 * @rand_s: 16-byte RAND_S
260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
273 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
277 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
288 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
292 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
304 * @rand_s: 16-byte RAND_S
317 const u8 *rand_s, const u8 *rand_p,
344 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LE
259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_psk_common.h35 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_1
42 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2
51 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_3
59 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_4
H A Deap_sake_common.h59 const u8 *rand_s; member in struct:eap_sake_parse_attr
85 const u8 *rand_s, const u8 *rand_p,
88 const u8 *rand_s, const u8 *rand_p,
H A Deap_sake_common.c31 attr->rand_s = pos + 2;
251 * @rand_s: 16-byte RAND_S
260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
273 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
277 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
288 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
292 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
304 * @rand_s: 16-byte RAND_S
317 const u8 *rand_s, const u8 *rand_p,
344 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LE
259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_psk_common.h35 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_1
42 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2
51 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_3
59 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_4
H A Deap_sake_common.h59 const u8 *rand_s; member in struct:eap_sake_parse_attr
85 const u8 *rand_s, const u8 *rand_p,
88 const u8 *rand_s, const u8 *rand_p,
H A Deap_sake_common.c31 attr->rand_s = pos + 2;
251 * @rand_s: 16-byte RAND_S
260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
273 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
277 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
288 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
292 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
304 * @rand_s: 16-byte RAND_S
317 const u8 *rand_s, const u8 *rand_p,
344 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LE
259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_sake.c25 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
216 if (!attr.rand_s) {
222 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN);
224 data->rand_s, EAP_SAKE_RAND_LEN);
247 data->rand_s, data->rand_p,
274 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
318 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
347 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
H A Deap_psk.c118 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s,
146 os_memcpy(hdr2->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN);
160 os_memcpy(pos, hdr1->rand_s, EAP_PSK_RAND_LEN);
218 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s,
328 os_memcpy(hdr4->rand_s, hdr3->rand_s, EAP_PSK_RAND_LEN);
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_sake.c20 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
211 if (!attr.rand_s) {
217 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN);
219 data->rand_s, EAP_SAKE_RAND_LEN);
242 data->rand_s, data->rand_p,
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
H A Deap_psk.c113 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s,
141 os_memcpy(hdr2->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN);
155 os_memcpy(pos, hdr1->rand_s, EAP_PSK_RAND_LEN);
213 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s,
323 os_memcpy(hdr4->rand_s, hdr3->rand_s, EAP_PSK_RAND_LEN);
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_sake.c20 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
211 if (!attr.rand_s) {
217 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN);
219 data->rand_s, EAP_SAKE_RAND_LEN);
242 data->rand_s, data->rand_p,
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
H A Deap_psk.c113 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s,
141 os_memcpy(hdr2->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN);
155 os_memcpy(pos, hdr1->rand_s, EAP_PSK_RAND_LEN);
213 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s,
323 os_memcpy(hdr4->rand_s, hdr3->rand_s, EAP_PSK_RAND_LEN);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_sake.c20 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
211 if (!attr.rand_s) {
217 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN);
219 data->rand_s, EAP_SAKE_RAND_LEN);
242 data->rand_s, data->rand_p,
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
H A Deap_psk.c113 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s,
141 os_memcpy(hdr2->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN);
155 os_memcpy(pos, hdr1->rand_s, EAP_PSK_RAND_LEN);
213 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s,
323 os_memcpy(hdr4->rand_s, hdr3->rand_s, EAP_PSK_RAND_LEN);
/external/srtp/crypto/rng/
H A Drand_source.c115 errno_t err = rand_s(&val);
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
H A Deap_psk.c28 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
69 if (os_get_random(data->rand_s, EAP_PSK_RAND_LEN)) {
75 data->rand_s, EAP_PSK_RAND_LEN);
89 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
117 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
312 os_memcpy(pos, data->rand_s, EAP_PSK_RAND_LEN);
H A Deap_sake.c24 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
169 if (os_get_random(data->rand_s, EAP_SAKE_RAND_LEN)) {
175 data->rand_s, EAP_SAKE_RAND_LEN);
188 data->rand_s, EAP_SAKE_RAND_LEN);
220 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
366 data->rand_s, data->rand_p,
369 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
406 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_psk.c23 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
64 if (random_get_bytes(data->rand_s, EAP_PSK_RAND_LEN)) {
70 data->rand_s, EAP_PSK_RAND_LEN);
84 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
112 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
309 os_memcpy(pos, data->rand_s, EAP_PSK_RAND_LEN);

Completed in 322 milliseconds

12