/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | milenage.c | 29 * @_rand: RAND = 128-bit random challenge 36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, argument 44 tmp1[i] = _rand[i] ^ opc[i]; 80 * @_rand: RAND = 128-bit random challenge 88 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, argument 96 tmp1[i] = _rand[i] ^ opc[i]; 166 * @_rand: RAND = 128-bit random challenge 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) || 185 milenage_f2345(opc, k, _rand, re 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 208 milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, u8 *sqn) argument 235 gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | milenage.c | 29 * @_rand: RAND = 128-bit random challenge 36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, argument 44 tmp1[i] = _rand[i] ^ opc[i]; 80 * @_rand: RAND = 128-bit random challenge 88 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, argument 96 tmp1[i] = _rand[i] ^ opc[i]; 166 * @_rand: RAND = 128-bit random challenge 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) || 185 milenage_f2345(opc, k, _rand, re 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 208 milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, u8 *sqn) argument 235 gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | milenage.c | 29 * @_rand: RAND = 128-bit random challenge 36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, argument 44 tmp1[i] = _rand[i] ^ opc[i]; 80 * @_rand: RAND = 128-bit random challenge 88 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, argument 96 tmp1[i] = _rand[i] ^ opc[i]; 166 * @_rand: RAND = 128-bit random challenge 174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) || 185 milenage_f2345(opc, k, _rand, re 173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 208 milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, u8 *sqn) argument 235 gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) argument 270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_sake_common.c | 329 u8 _rand[2 * EAP_SAKE_RAND_LEN]; local 350 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LEN); 351 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p, 365 os_memcpy(_rand, rand_p, EAP_SAKE_RAND_LEN); 366 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_s, 375 _rand, 2 * EAP_SAKE_RAND_LEN, tmp, tmplen,
|
/external/wpa_supplicant_6/wpa_supplicant/src/hlr_auc_gw/ |
H A D | milenage.c | 35 * @_rand: RAND = 128-bit random challenge 42 static int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, argument 50 tmp1[i] = _rand[i] ^ opc[i]; 86 * @_rand: RAND = 128-bit random challenge 94 static int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, argument 102 tmp1[i] = _rand[i] ^ opc[i]; 172 * @_rand: RAND = 128-bit random challenge 180 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, 190 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) || 191 milenage_f2345(opc, k, _rand, re 179 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument 214 milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, u8 *sqn) argument 241 gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) argument 276 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument 1026 u8 auts[14], sqn[6], _rand[16]; local [all...] |
H A D | hlr_auc_gw.c | 62 u8 _rand[16]; member in struct:gsm_triplet 206 if (strlen(pos) != 32 || hexstr2bin(pos, g->_rand, 16)) { 419 u8 _rand[16], sres[4], kc[8]; local 421 if (os_get_random(_rand, 16) < 0) 423 gsm_milenage(m->opc, m->ki, _rand, sres, kc); 429 rpos += wpa_snprintf_hex(rpos, rend - rpos, _rand, 16); 448 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->_rand, 16); 473 u8 _rand[EAP_AKA_RAND_LEN]; local 484 if (os_get_random(_rand, EAP_AKA_RAND_LEN) < 0) 491 milenage_generate(m->opc, m->amf, m->ki, m->sqn, _rand, 536 u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6]; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sake_common.c | 323 u8 _rand[2 * EAP_SAKE_RAND_LEN]; local 344 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LEN); 345 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p, 359 os_memcpy(_rand, rand_p, EAP_SAKE_RAND_LEN); 360 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_s, 369 _rand, 2 * EAP_SAKE_RAND_LEN, tmp, tmplen,
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sake_common.c | 323 u8 _rand[2 * EAP_SAKE_RAND_LEN]; local 344 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LEN); 345 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p, 359 os_memcpy(_rand, rand_p, EAP_SAKE_RAND_LEN); 360 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_s, 369 _rand, 2 * EAP_SAKE_RAND_LEN, tmp, tmplen,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sake_common.c | 323 u8 _rand[2 * EAP_SAKE_RAND_LEN]; local 344 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LEN); 345 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p, 359 os_memcpy(_rand, rand_p, EAP_SAKE_RAND_LEN); 360 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_s, 369 _rand, 2 * EAP_SAKE_RAND_LEN, tmp, tmplen,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.c | 526 * @_rand: Buffer for RAND values 549 u8 *_rand, u8 *kc, u8 *sres, 601 os_memcpy(_rand, entry->u.sim.rand, num_chal * GSM_RAND_LEN); 1151 * @_rand: Buffer for RAND value 1175 size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, 1223 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN); 1272 * @_rand: RAND value used in the rejected message 1283 const u8 *_rand) 1329 _rand, EAP_AKA_RAND_LEN); 547 eap_sim_db_get_gsm_triplets(void *priv, const u8 *identity, size_t identity_len, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument 1174 eap_sim_db_get_aka_auth(void *priv, const u8 *identity, size_t identity_len, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1281 eap_sim_db_resynchronize(void *priv, const u8 *identity, size_t identity_len, const u8 *auts, const u8 *_rand) argument
|
/external/wpa_supplicant_8/hostapd/ |
H A D | hlr_auc_gw.c | 68 u8 _rand[16]; member in struct:gsm_triplet 351 if (strlen(pos) != 32 || hexstr2bin(pos, g->_rand, 16)) { 643 u8 _rand[16], sres[4], kc[8]; local 645 if (random_get_bytes(_rand, 16) < 0) 647 gsm_milenage(m->opc, m->ki, _rand, sres, kc); 653 rpos += wpa_snprintf_hex(rpos, rend - rpos, _rand, 16); 672 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->_rand, 16); 719 u8 _rand[EAP_AKA_RAND_LEN]; local 731 if (random_get_bytes(_rand, EAP_AKA_RAND_LEN) < 0) 742 milenage_generate(m->opc, m->amf, m->ki, m->sqn, _rand, 795 u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6]; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/ |
H A D | eapol_test.c | 793 unsigned char _rand[16]; local 834 os_memset(_rand, 0, sizeof(_rand)); 835 if (scard_gsm_auth(scard, _rand, sres, kc)) 838 os_memset(_rand, 0xff, sizeof(_rand)); 839 if (scard_gsm_auth(scard, _rand, sres, kc)) 899 unsigned char _rand[16]; local 934 os_memset(_rand, i, sizeof(_rand)); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/utils/ |
H A D | pcsc_funcs.c | 1029 * @_rand: 16-byte RAND value from HLR/AuC 1041 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, argument 1054 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - RAND", _rand, 16); 1057 os_memcpy(cmd + 5, _rand, 16); 1064 os_memcpy(cmd + 6, _rand, 16); 1122 * @_rand: 16-byte RAND value from HLR/AuC 1139 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, argument 1160 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - RAND", _rand, AKA_RAND_LEN); 1163 os_memcpy(cmd + 6, _rand, AKA_RAND_LEN);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_sim_db.c | 841 * @_rand: Buffer for RAND values 861 u8 *_rand, u8 *kc, u8 *sres, 902 os_memcpy(_rand, entry->u.sim.rand, num_chal * GSM_RAND_LEN); 1306 * @_rand: Buffer for RAND value 1327 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, 1364 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN); 1412 * @_rand: RAND value used in the rejected message 1423 const u8 *auts, const u8 *_rand) 1462 _rand, EAP_AKA_RAND_LEN); 859 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument 1326 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1421 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | pcsc_funcs.c | 1212 * @_rand: 16-byte RAND value from HLR/AuC 1224 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, argument 1237 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - RAND", _rand, 16); 1240 os_memcpy(cmd + 5, _rand, 16); 1247 os_memcpy(cmd + 6, _rand, 16); 1305 * @_rand: 16-byte RAND value from HLR/AuC 1322 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, argument 1343 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - RAND", _rand, AKA_RAND_LEN); 1346 os_memcpy(cmd + 6, _rand, AKA_RAND_LEN);
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_sim_db.c | 841 * @_rand: Buffer for RAND values 861 u8 *_rand, u8 *kc, u8 *sres, 902 os_memcpy(_rand, entry->u.sim.rand, num_chal * GSM_RAND_LEN); 1306 * @_rand: Buffer for RAND value 1327 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, 1364 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN); 1412 * @_rand: RAND value used in the rejected message 1423 const u8 *auts, const u8 *_rand) 1462 _rand, EAP_AKA_RAND_LEN); 859 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument 1326 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1421 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
|
/external/wpa_supplicant_8/src/utils/ |
H A D | pcsc_funcs.c | 1212 * @_rand: 16-byte RAND value from HLR/AuC 1224 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, argument 1237 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - RAND", _rand, 16); 1240 os_memcpy(cmd + 5, _rand, 16); 1247 os_memcpy(cmd + 6, _rand, 16); 1305 * @_rand: 16-byte RAND value from HLR/AuC 1322 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, argument 1343 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - RAND", _rand, AKA_RAND_LEN); 1346 os_memcpy(cmd + 6, _rand, AKA_RAND_LEN);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | eapol_test.c | 870 unsigned char _rand[16]; local 914 os_memset(_rand, 0, sizeof(_rand)); 915 if (scard_gsm_auth(scard, _rand, sres, kc)) 918 os_memset(_rand, 0xff, sizeof(_rand)); 919 if (scard_gsm_auth(scard, _rand, sres, kc)) 979 unsigned char _rand[16]; local 1014 os_memset(_rand, i, sizeof(_rand)); [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_sim_db.c | 841 * @_rand: Buffer for RAND values 861 u8 *_rand, u8 *kc, u8 *sres, 902 os_memcpy(_rand, entry->u.sim.rand, num_chal * GSM_RAND_LEN); 1306 * @_rand: Buffer for RAND value 1327 u8 *_rand, u8 *autn, u8 *ik, u8 *ck, 1364 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN); 1412 * @_rand: RAND value used in the rejected message 1423 const u8 *auts, const u8 *_rand) 1462 _rand, EAP_AKA_RAND_LEN); 859 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument 1326 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument 1421 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | pcsc_funcs.c | 1212 * @_rand: 16-byte RAND value from HLR/AuC 1224 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, argument 1237 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - RAND", _rand, 16); 1240 os_memcpy(cmd + 5, _rand, 16); 1247 os_memcpy(cmd + 6, _rand, 16); 1305 * @_rand: 16-byte RAND value from HLR/AuC 1322 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, argument 1343 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - RAND", _rand, AKA_RAND_LEN); 1346 os_memcpy(cmd + 6, _rand, AKA_RAND_LEN);
|