/external/chromium/base/ |
H A D | rand_util_win.cc | 16 CHECK_EQ(rand_s(&number), 0);
|
H A D | sync_socket_win.cc | 53 if (rand_s(&rnd_name) != 0)
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_psk_common.h | 35 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_1 42 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2 51 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_3 59 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_4
|
H A D | eap_sake_common.h | 59 const u8 *rand_s; member in struct:eap_sake_parse_attr 85 const u8 *rand_s, const u8 *rand_p, 88 const u8 *rand_s, const u8 *rand_p,
|
H A D | eap_sake_common.c | 31 attr->rand_s = pos + 2; 251 * @rand_s: 16-byte RAND_S 260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 273 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 277 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 288 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 292 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 304 * @rand_s: 16-byte RAND_S 317 const u8 *rand_s, const u8 *rand_p, 344 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LE 259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument 316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_psk_common.h | 35 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_1 42 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2 51 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_3 59 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_4
|
H A D | eap_sake_common.h | 59 const u8 *rand_s; member in struct:eap_sake_parse_attr 85 const u8 *rand_s, const u8 *rand_p, 88 const u8 *rand_s, const u8 *rand_p,
|
H A D | eap_sake_common.c | 31 attr->rand_s = pos + 2; 251 * @rand_s: 16-byte RAND_S 260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 273 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 277 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 288 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 292 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 304 * @rand_s: 16-byte RAND_S 317 const u8 *rand_s, const u8 *rand_p, 344 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LE 259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument 316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_psk_common.h | 35 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_1 42 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2 51 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_3 59 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_4
|
H A D | eap_sake_common.h | 59 const u8 *rand_s; member in struct:eap_sake_parse_attr 85 const u8 *rand_s, const u8 *rand_p, 88 const u8 *rand_s, const u8 *rand_p,
|
H A D | eap_sake_common.c | 31 attr->rand_s = pos + 2; 251 * @rand_s: 16-byte RAND_S 260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 273 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 277 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 288 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 292 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 304 * @rand_s: 16-byte RAND_S 317 const u8 *rand_s, const u8 *rand_p, 344 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LE 259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument 316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_psk.c | 24 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s, 116 os_memcpy(data->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN); 143 os_memcpy(hdr2->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN); 157 os_memcpy(pos, hdr1->rand_s, EAP_PSK_RAND_LEN); 215 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s, 325 os_memcpy(hdr4->rand_s, hdr3->rand_s, EAP_PSK_RAND_LE [all...] |
H A D | eap_sake.c | 20 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 211 if (!attr.rand_s) { 217 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN); 219 data->rand_s, EAP_SAKE_RAND_LEN); 242 data->rand_s, data->rand_p, 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 469 os_memcpy(id + 1, data->rand_s, EAP_SAKE_RAND_LE [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_psk.c | 24 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s, 116 os_memcpy(data->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN); 143 os_memcpy(hdr2->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN); 157 os_memcpy(pos, hdr1->rand_s, EAP_PSK_RAND_LEN); 215 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s, 325 os_memcpy(hdr4->rand_s, hdr3->rand_s, EAP_PSK_RAND_LE [all...] |
H A D | eap_sake.c | 20 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 211 if (!attr.rand_s) { 217 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN); 219 data->rand_s, EAP_SAKE_RAND_LEN); 242 data->rand_s, data->rand_p, 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 469 os_memcpy(id + 1, data->rand_s, EAP_SAKE_RAND_LE [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_psk.c | 24 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s, 116 os_memcpy(data->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN); 143 os_memcpy(hdr2->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN); 157 os_memcpy(pos, hdr1->rand_s, EAP_PSK_RAND_LEN); 215 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s, 325 os_memcpy(hdr4->rand_s, hdr3->rand_s, EAP_PSK_RAND_LE [all...] |
H A D | eap_sake.c | 20 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 211 if (!attr.rand_s) { 217 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN); 219 data->rand_s, EAP_SAKE_RAND_LEN); 242 data->rand_s, data->rand_p, 269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 469 os_memcpy(id + 1, data->rand_s, EAP_SAKE_RAND_LE [all...] |
/external/srtp/crypto/rng/ |
H A D | rand_source.c | 115 errno_t err = rand_s(&val);
|
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_psk.c | 23 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 64 if (random_get_bytes(data->rand_s, EAP_PSK_RAND_LEN)) { 70 data->rand_s, EAP_PSK_RAND_LEN); 84 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 112 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 309 os_memcpy(pos, data->rand_s, EAP_PSK_RAND_LEN);
|
H A D | eap_server_sake.c | 19 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 164 if (random_get_bytes(data->rand_s, EAP_SAKE_RAND_LEN)) { 170 data->rand_s, EAP_SAKE_RAND_LEN); 183 data->rand_s, EAP_SAKE_RAND_LEN); 215 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 361 data->rand_s, data->rand_p, 364 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 401 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_psk.c | 23 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 64 if (random_get_bytes(data->rand_s, EAP_PSK_RAND_LEN)) { 70 data->rand_s, EAP_PSK_RAND_LEN); 84 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 112 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 309 os_memcpy(pos, data->rand_s, EAP_PSK_RAND_LEN);
|
H A D | eap_server_sake.c | 19 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 164 if (random_get_bytes(data->rand_s, EAP_SAKE_RAND_LEN)) { 170 data->rand_s, EAP_SAKE_RAND_LEN); 183 data->rand_s, EAP_SAKE_RAND_LEN); 215 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 361 data->rand_s, data->rand_p, 364 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 401 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_psk.c | 23 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 64 if (random_get_bytes(data->rand_s, EAP_PSK_RAND_LEN)) { 70 data->rand_s, EAP_PSK_RAND_LEN); 84 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 112 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 309 os_memcpy(pos, data->rand_s, EAP_PSK_RAND_LEN);
|
H A D | eap_server_sake.c | 19 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 164 if (random_get_bytes(data->rand_s, EAP_SAKE_RAND_LEN)) { 170 data->rand_s, EAP_SAKE_RAND_LEN); 183 data->rand_s, EAP_SAKE_RAND_LEN); 215 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 361 data->rand_s, data->rand_p, 364 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 401 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|