Searched defs:rand_p (Results 1 - 25 of 25) sorted by relevance

/external/chromium_org/third_party/smhasher/src/
H A DRandom.h72 void rand_p ( void * blob, int bytes ) function in struct:Rand
99 inline void rand_p ( void * blob, int bytes ) function
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_psk_common.c34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument
41 if (aes_128_encrypt_block(kdk, rand_p, hash))
H A Deap_psk_common.h43 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2
69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
H A Deap_sake_common.c40 attr->rand_p = pos + 2;
252 * @rand_p: 16-byte RAND_P
260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
273 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
277 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
288 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
292 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
305 * @rand_p: 16-byte RAND_P
317 const u8 *rand_s, const u8 *rand_p,
345 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p,
259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
[all...]
H A Deap_sake_common.h60 const u8 *rand_p; member in struct:eap_sake_parse_attr
85 const u8 *rand_s, const u8 *rand_p,
88 const u8 *rand_s, const u8 *rand_p,
/external/wpa_supplicant_8/src/eap_common/
H A Deap_psk_common.c34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument
41 if (aes_128_encrypt_block(kdk, rand_p, hash))
H A Deap_psk_common.h43 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2
69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
H A Deap_sake_common.c40 attr->rand_p = pos + 2;
252 * @rand_p: 16-byte RAND_P
260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
273 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
277 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
288 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
292 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
305 * @rand_p: 16-byte RAND_P
317 const u8 *rand_s, const u8 *rand_p,
345 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p,
259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
[all...]
H A Deap_sake_common.h60 const u8 *rand_p; member in struct:eap_sake_parse_attr
85 const u8 *rand_s, const u8 *rand_p,
88 const u8 *rand_s, const u8 *rand_p,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_psk_common.c34 int eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek, u8 *msk, argument
41 if (aes_128_encrypt_block(kdk, rand_p, hash))
H A Deap_psk_common.h43 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2
69 int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
H A Deap_sake_common.c40 attr->rand_p = pos + 2;
252 * @rand_p: 16-byte RAND_P
260 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
273 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
277 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
288 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
292 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
305 * @rand_p: 16-byte RAND_P
317 const u8 *rand_s, const u8 *rand_p,
345 os_memcpy(_rand + EAP_SAKE_RAND_LEN, rand_p,
259 eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk) argument
316 eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic) argument
[all...]
H A Deap_sake_common.h60 const u8 *rand_p; member in struct:eap_sake_parse_attr
85 const u8 *rand_s, const u8 *rand_p,
88 const u8 *rand_s, const u8 *rand_p,
/external/wpa_supplicant_8/hostapd/src/eap_peer/
H A Deap_psk.c23 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
130 if (random_get_bytes(data->rand_p, EAP_PSK_RAND_LEN)) {
144 os_memcpy(hdr2->rand_p, data->rand_p, EAP_PSK_RAND_LEN);
159 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN);
166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p,
234 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN);
249 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek,
453 os_memcpy(id + 1, data->rand_p, EAP_PSK_RAND_LEN);
H A Deap_sake.c21 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
221 if (random_get_bytes(data->rand_p, EAP_SAKE_RAND_LEN)) {
226 data->rand_p, EAP_SAKE_RAND_LEN);
242 data->rand_s, data->rand_p,
257 data->rand_p, EAP_SAKE_RAND_LEN);
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/hostapd/src/eap_server/
H A Deap_server_psk.c24 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
119 os_memcpy(buf + sm->server_id_len, data->rand_p, EAP_PSK_RAND_LEN);
126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
293 resp->rand_p, EAP_PSK_RAND_LEN);
294 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN);
309 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN);
H A Deap_server_sake.c20 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
317 if (!attr.rand_p || !attr.mic_p) {
323 os_memcpy(data->rand_p, attr.rand_p, EAP_SAKE_RAND_LEN);
346 data->rand_s, data->rand_p,
349 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
386 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/src/eap_peer/
H A Deap_psk.c23 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
130 if (random_get_bytes(data->rand_p, EAP_PSK_RAND_LEN)) {
144 os_memcpy(hdr2->rand_p, data->rand_p, EAP_PSK_RAND_LEN);
159 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN);
166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p,
234 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN);
249 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek,
453 os_memcpy(id + 1, data->rand_p, EAP_PSK_RAND_LEN);
H A Deap_sake.c21 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
221 if (random_get_bytes(data->rand_p, EAP_SAKE_RAND_LEN)) {
226 data->rand_p, EAP_SAKE_RAND_LEN);
242 data->rand_s, data->rand_p,
257 data->rand_p, EAP_SAKE_RAND_LEN);
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/src/eap_server/
H A Deap_server_psk.c24 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
119 os_memcpy(buf + sm->server_id_len, data->rand_p, EAP_PSK_RAND_LEN);
126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
293 resp->rand_p, EAP_PSK_RAND_LEN);
294 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN);
309 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN);
H A Deap_server_sake.c20 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
317 if (!attr.rand_p || !attr.mic_p) {
323 os_memcpy(data->rand_p, attr.rand_p, EAP_SAKE_RAND_LEN);
346 data->rand_s, data->rand_p,
349 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
386 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/
H A Deap_psk.c23 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
130 if (random_get_bytes(data->rand_p, EAP_PSK_RAND_LEN)) {
144 os_memcpy(hdr2->rand_p, data->rand_p, EAP_PSK_RAND_LEN);
159 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN);
166 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_P", hdr2->rand_p,
234 os_memcpy(buf + data->id_s_len, data->rand_p, EAP_PSK_RAND_LEN);
249 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek,
453 os_memcpy(id + 1, data->rand_p, EAP_PSK_RAND_LEN);
H A Deap_sake.c21 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
221 if (random_get_bytes(data->rand_p, EAP_SAKE_RAND_LEN)) {
226 data->rand_p, EAP_SAKE_RAND_LEN);
242 data->rand_s, data->rand_p,
257 data->rand_p, EAP_SAKE_RAND_LEN);
269 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
313 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
342 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/
H A Deap_server_psk.c24 u8 rand_p[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
119 os_memcpy(buf + sm->server_id_len, data->rand_p, EAP_PSK_RAND_LEN);
126 if (eap_psk_derive_keys(data->kdk, data->rand_p, data->tek, data->msk,
293 resp->rand_p, EAP_PSK_RAND_LEN);
294 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN);
309 os_memcpy(pos, data->rand_p, EAP_PSK_RAND_LEN);
H A Deap_server_sake.c20 u8 rand_p[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
200 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
317 if (!attr.rand_p || !attr.mic_p) {
323 os_memcpy(data->rand_p, attr.rand_p, EAP_SAKE_RAND_LEN);
346 data->rand_s, data->rand_p,
349 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
386 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,

Completed in 8442 milliseconds