Searched defs:_rand (Results 1 - 18 of 18) sorted by relevance

/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dmilenage.c29 * @_rand: RAND = 128-bit random challenge
36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, argument
44 tmp1[i] = _rand[i] ^ opc[i];
80 * @_rand: RAND = 128-bit random challenge
88 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, argument
96 tmp1[i] = _rand[i] ^ opc[i];
166 * @_rand: RAND = 128-bit random challenge
174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) ||
185 milenage_f2345(opc, k, _rand, re
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
208 milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, u8 *sqn) argument
235 gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dmilenage.c29 * @_rand: RAND = 128-bit random challenge
36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, argument
44 tmp1[i] = _rand[i] ^ opc[i];
80 * @_rand: RAND = 128-bit random challenge
88 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, argument
96 tmp1[i] = _rand[i] ^ opc[i];
166 * @_rand: RAND = 128-bit random challenge
174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) ||
185 milenage_f2345(opc, k, _rand, re
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
208 milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, u8 *sqn) argument
235 gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dmilenage.c29 * @_rand: RAND = 128-bit random challenge
36 int milenage_f1(const u8 *opc, const u8 *k, const u8 *_rand, argument
44 tmp1[i] = _rand[i] ^ opc[i];
80 * @_rand: RAND = 128-bit random challenge
88 int milenage_f2345(const u8 *opc, const u8 *k, const u8 *_rand, argument
96 tmp1[i] = _rand[i] ^ opc[i];
166 * @_rand: RAND = 128-bit random challenge
174 const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik,
184 if (milenage_f1(opc, k, _rand, sqn, amf, mac_a, NULL) ||
185 milenage_f2345(opc, k, _rand, re
173 milenage_generate(const u8 *opc, const u8 *amf, const u8 *k, const u8 *sqn, const u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len) argument
208 milenage_auts(const u8 *opc, const u8 *k, const u8 *_rand, const u8 *auts, u8 *sqn) argument
235 gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) argument
270 milenage_check(const u8 *opc, const u8 *k, const u8 *sqn, const u8 *_rand, const u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, u8 *auts) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_sake_common.c323 u8 _rand[2 * EAP_SAKE_RAND_LEN]; local
344 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LEN);
345 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p,
359 os_memcpy(_rand, rand_p, EAP_SAKE_RAND_LEN);
360 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_s,
369 _rand, 2 * EAP_SAKE_RAND_LEN, tmp, tmplen,
/external/wpa_supplicant_8/src/eap_common/
H A Deap_sake_common.c323 u8 _rand[2 * EAP_SAKE_RAND_LEN]; local
344 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LEN);
345 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p,
359 os_memcpy(_rand, rand_p, EAP_SAKE_RAND_LEN);
360 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_s,
369 _rand, 2 * EAP_SAKE_RAND_LEN, tmp, tmplen,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_sake_common.c323 u8 _rand[2 * EAP_SAKE_RAND_LEN]; local
344 os_memcpy(_rand, rand_s, EAP_SAKE_RAND_LEN);
345 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p,
359 os_memcpy(_rand, rand_p, EAP_SAKE_RAND_LEN);
360 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_s,
369 _rand, 2 * EAP_SAKE_RAND_LEN, tmp, tmplen,
/external/wpa_supplicant_8/hostapd/src/ap/
H A Ddfs.c424 u32 _rand; local
443 os_get_random((u8 *) &_rand, sizeof(_rand));
444 chan_idx = _rand % num_available_chandefs;
/external/wpa_supplicant_8/src/ap/
H A Ddfs.c424 u32 _rand; local
443 os_get_random((u8 *) &_rand, sizeof(_rand));
444 chan_idx = _rand % num_available_chandefs;
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Ddfs.c424 u32 _rand; local
443 os_get_random((u8 *) &_rand, sizeof(_rand));
444 chan_idx = _rand % num_available_chandefs;
/external/wpa_supplicant_8/hostapd/
H A Dhlr_auc_gw.c76 u8 _rand[16]; member in struct:gsm_triplet
362 if (strlen(pos) != 32 || hexstr2bin(pos, g->_rand, 16)) {
653 u8 _rand[16], sres[4], kc[8]; local
655 if (random_get_bytes(_rand, 16) < 0)
657 gsm_milenage(m->opc, m->ki, _rand, sres, kc);
663 rpos += wpa_snprintf_hex(rpos, rend - rpos, _rand, 16);
682 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->_rand, 16);
720 u8 _rand[16], sres[4], kc[8]; local
722 if (hexstr2bin(pos, _rand, 16) != 0)
724 gsm_milenage(m->opc, m->ki, _rand, sre
774 u8 _rand[EAP_AKA_RAND_LEN]; local
846 u8 _auts[EAP_AKA_AUTS_LEN], _rand[EAP_AKA_RAND_LEN], sqn[6]; local
[all...]
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_sim_db.c851 * @_rand: Buffer for RAND values
871 u8 *_rand, u8 *kc, u8 *sres,
912 os_memcpy(_rand, entry->u.sim.rand, num_chal * GSM_RAND_LEN);
1315 * @_rand: Buffer for RAND value
1336 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
1373 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN);
1420 * @_rand: RAND value used in the rejected message
1431 const u8 *auts, const u8 *_rand)
1470 _rand, EAP_AKA_RAND_LEN);
869 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument
1335 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
1429 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dpcsc_funcs.c1204 * @_rand: 16-byte RAND value from HLR/AuC
1216 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, argument
1229 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - RAND", _rand, 16);
1232 os_memcpy(cmd + 5, _rand, 16);
1239 os_memcpy(cmd + 6, _rand, 16);
1298 * @_rand: 16-byte RAND value from HLR/AuC
1315 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, argument
1336 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - RAND", _rand, AKA_RAND_LEN);
1339 os_memcpy(cmd + 6, _rand, AKA_RAND_LEN);
/external/wpa_supplicant_8/src/eap_server/
H A Deap_sim_db.c851 * @_rand: Buffer for RAND values
871 u8 *_rand, u8 *kc, u8 *sres,
912 os_memcpy(_rand, entry->u.sim.rand, num_chal * GSM_RAND_LEN);
1315 * @_rand: Buffer for RAND value
1336 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
1373 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN);
1420 * @_rand: RAND value used in the rejected message
1431 const u8 *auts, const u8 *_rand)
1470 _rand, EAP_AKA_RAND_LEN);
869 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument
1335 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
1429 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
/external/wpa_supplicant_8/src/utils/
H A Dpcsc_funcs.c1204 * @_rand: 16-byte RAND value from HLR/AuC
1216 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, argument
1229 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - RAND", _rand, 16);
1232 os_memcpy(cmd + 5, _rand, 16);
1239 os_memcpy(cmd + 6, _rand, 16);
1298 * @_rand: 16-byte RAND value from HLR/AuC
1315 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, argument
1336 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - RAND", _rand, AKA_RAND_LEN);
1339 os_memcpy(cmd + 6, _rand, AKA_RAND_LEN);
/external/wpa_supplicant_8/wpa_supplicant/
H A Deapol_test.c965 unsigned char _rand[16]; local
1009 os_memset(_rand, 0, sizeof(_rand));
1010 if (scard_gsm_auth(scard, _rand, sres, kc))
1013 os_memset(_rand, 0xff, sizeof(_rand));
1014 if (scard_gsm_auth(scard, _rand, sres, kc))
1074 unsigned char _rand[16]; local
1109 os_memset(_rand, i, sizeof(_rand));
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_sim_db.c851 * @_rand: Buffer for RAND values
871 u8 *_rand, u8 *kc, u8 *sres,
912 os_memcpy(_rand, entry->u.sim.rand, num_chal * GSM_RAND_LEN);
1315 * @_rand: Buffer for RAND value
1336 u8 *_rand, u8 *autn, u8 *ik, u8 *ck,
1373 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN);
1420 * @_rand: RAND value used in the rejected message
1431 const u8 *auts, const u8 *_rand)
1470 _rand, EAP_AKA_RAND_LEN);
869 eap_sim_db_get_gsm_triplets(struct eap_sim_db_data *data, const char *username, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument
1335 eap_sim_db_get_aka_auth(struct eap_sim_db_data *data, const char *username, u8 *_rand, u8 *autn, u8 *ik, u8 *ck, u8 *res, size_t *res_len, void *cb_session_ctx) argument
1429 eap_sim_db_resynchronize(struct eap_sim_db_data *data, const char *username, const u8 *auts, const u8 *_rand) argument
/external/wpa_supplicant_8/wpa_supplicant/src/utils/
H A Dpcsc_funcs.c1204 * @_rand: 16-byte RAND value from HLR/AuC
1216 int scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, argument
1229 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - RAND", _rand, 16);
1232 os_memcpy(cmd + 5, _rand, 16);
1239 os_memcpy(cmd + 6, _rand, 16);
1298 * @_rand: 16-byte RAND value from HLR/AuC
1315 int scard_umts_auth(struct scard_data *scard, const unsigned char *_rand, argument
1336 wpa_hexdump(MSG_DEBUG, "SCARD: UMTS auth - RAND", _rand, AKA_RAND_LEN);
1339 os_memcpy(cmd + 6, _rand, AKA_RAND_LEN);
/external/chromium_org/tools/win/split_link/viz.js/
H A Dviz.js2405 function _rand() {
3740 var _rand=env._rand;
[all...]

Completed in 2997 milliseconds