/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_aka.c | 32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data 168 pos += wpa_snprintf_hex(pos, end - pos, data->rand, EAP_AKA_RAND_LEN); 205 wpa_hexdump(MSG_DEBUG, "EAP-AKA: RAND", data->rand, EAP_AKA_RAND_LEN); 260 return scard_umts_auth(sm->scard_ctx, data->rand, 294 return milenage_check(opc, k, sqn, data->rand, data->autn, 949 if (!attr->mac || !attr->rand || !attr->autn) { 953 !attr->rand ? " AT_RAND" : "", 958 os_memcpy(data->rand, attr->rand, EAP_AKA_RAND_LEN); 1465 os_memcpy(id + 1, data->rand, EAP_AKA_RAND_LE [all...] |
H A D | eap_pax.c | 31 u8 x[EAP_PAX_RAND_LEN]; /* server rand */ 32 u8 y[EAP_PAX_RAND_LEN]; /* client rand */ 34 } rand; member in struct:eap_pax_data 161 os_memcpy(data->rand.r.x, pos, EAP_PAX_RAND_LEN); 162 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)", 163 data->rand.r.x, EAP_PAX_RAND_LEN); 172 if (random_get_bytes(data->rand.r.y, EAP_PAX_RAND_LEN)) { 177 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", 178 data->rand.r.y, EAP_PAX_RAND_LEN); 180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand [all...] |
H A D | eap_sim.c | 34 u8 rand[3][GSM_RAND_LEN]; member in struct:eap_sim_data 172 pos += wpa_snprintf_hex(pos, end - pos, data->rand[i], 202 data->rand[i], GSM_RAND_LEN); 253 if (scard_gsm_auth(sm->scard_ctx, data->rand[0], 255 scard_gsm_auth(sm->scard_ctx, data->rand[1], 258 scard_gsm_auth(sm->scard_ctx, data->rand[2], 291 if (gsm_milenage(opc, k, data->rand[i], 299 data->rand[i], GSM_RAND_LEN); 321 if (data->rand[i][0] == 0xaa) { 327 } else if (data->rand[ [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server.c | 1036 id = rand() & 0xff;
|
H A D | eap_server_aka.c | 28 u8 rand[EAP_AKA_RAND_LEN]; member in struct:eap_aka_data 475 eap_sim_msg_add(msg, EAP_SIM_AT_RAND, 0, data->rand, EAP_AKA_RAND_LEN); 790 data->rand, data->autn, data->ik, 1034 attr->auts, data->rand)) {
|
H A D | eap_server_pax.c | 31 u8 x[EAP_PAX_RAND_LEN]; /* server rand */ 32 u8 y[EAP_PAX_RAND_LEN]; /* client rand */ 34 } rand; member in struct:eap_pax_data 80 if (random_get_bytes(data->rand.r.x, EAP_PAX_RAND_LEN)) { 104 wpabuf_put_data(req, data->rand.r.x, EAP_PAX_RAND_LEN); 105 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: A = X (server rand)", 106 data->rand.r.x, EAP_PAX_RAND_LEN); 147 data->rand.r.y, EAP_PAX_RAND_LEN, 313 os_memcpy(data->rand.r.y, pos, EAP_PAX_RAND_LEN); 314 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", [all...] |
H A D | eap_server_sim.c | 28 u8 rand[EAP_SIM_MAX_CHAL][GSM_RAND_LEN]; member in struct:eap_sim_data 228 eap_sim_msg_add(msg, EAP_SIM_AT_RAND, 0, (u8 *) data->rand, 525 (u8 *) data->rand, (u8 *) data->kc, (u8 *) data->sres, sm);
|
H A D | eap_sim_db.c | 46 u8 rand[EAP_SIM_MAX_CHAL][GSM_RAND_LEN]; member in struct:eap_sim_db_pending::__anon33956::__anon33957 50 u8 rand[EAP_AKA_RAND_LEN]; member in struct:eap_sim_db_pending::__anon33956::__anon33958 454 if (hexstr2bin(start, entry->u.sim.rand[num_chal], 512 if (hexstr2bin(start, entry->u.aka.rand, EAP_AKA_RAND_LEN)) 912 os_memcpy(_rand, entry->u.sim.rand, num_chal * GSM_RAND_LEN); 1373 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN);
|
/external/wpa_supplicant_8/src/utils/ |
H A D | os_win32.c | 149 return rand();
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_openssl.c | 18 #include <openssl/rand.h>
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_ndis.c | 715 ssid[i] = rand() & 0xff;
|
H A D | driver_wext.c | 1896 ssid[i] = rand() & 0xFF;
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 544 attr->rand = apos;
|
H A D | eap_sim_common.h | 184 const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s; member in struct:eap_sim_attrs
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_aka.c | 32 u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN]; member in struct:eap_aka_data 168 pos += wpa_snprintf_hex(pos, end - pos, data->rand, EAP_AKA_RAND_LEN); 205 wpa_hexdump(MSG_DEBUG, "EAP-AKA: RAND", data->rand, EAP_AKA_RAND_LEN); 260 return scard_umts_auth(sm->scard_ctx, data->rand, 294 return milenage_check(opc, k, sqn, data->rand, data->autn, 949 if (!attr->mac || !attr->rand || !attr->autn) { 953 !attr->rand ? " AT_RAND" : "", 958 os_memcpy(data->rand, attr->rand, EAP_AKA_RAND_LEN); 1465 os_memcpy(id + 1, data->rand, EAP_AKA_RAND_LE [all...] |
H A D | eap_pax.c | 31 u8 x[EAP_PAX_RAND_LEN]; /* server rand */ 32 u8 y[EAP_PAX_RAND_LEN]; /* client rand */ 34 } rand; member in struct:eap_pax_data 161 os_memcpy(data->rand.r.x, pos, EAP_PAX_RAND_LEN); 162 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)", 163 data->rand.r.x, EAP_PAX_RAND_LEN); 172 if (random_get_bytes(data->rand.r.y, EAP_PAX_RAND_LEN)) { 177 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", 178 data->rand.r.y, EAP_PAX_RAND_LEN); 180 if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand [all...] |
H A D | eap_sim.c | 34 u8 rand[3][GSM_RAND_LEN]; member in struct:eap_sim_data 172 pos += wpa_snprintf_hex(pos, end - pos, data->rand[i], 202 data->rand[i], GSM_RAND_LEN); 253 if (scard_gsm_auth(sm->scard_ctx, data->rand[0], 255 scard_gsm_auth(sm->scard_ctx, data->rand[1], 258 scard_gsm_auth(sm->scard_ctx, data->rand[2], 291 if (gsm_milenage(opc, k, data->rand[i], 299 data->rand[i], GSM_RAND_LEN); 321 if (data->rand[i][0] == 0xaa) { 327 } else if (data->rand[ [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server.c | 1036 id = rand() & 0xff;
|
H A D | eap_server_aka.c | 28 u8 rand[EAP_AKA_RAND_LEN]; member in struct:eap_aka_data 475 eap_sim_msg_add(msg, EAP_SIM_AT_RAND, 0, data->rand, EAP_AKA_RAND_LEN); 790 data->rand, data->autn, data->ik, 1034 attr->auts, data->rand)) {
|
H A D | eap_server_pax.c | 31 u8 x[EAP_PAX_RAND_LEN]; /* server rand */ 32 u8 y[EAP_PAX_RAND_LEN]; /* client rand */ 34 } rand; member in struct:eap_pax_data 80 if (random_get_bytes(data->rand.r.x, EAP_PAX_RAND_LEN)) { 104 wpabuf_put_data(req, data->rand.r.x, EAP_PAX_RAND_LEN); 105 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: A = X (server rand)", 106 data->rand.r.x, EAP_PAX_RAND_LEN); 147 data->rand.r.y, EAP_PAX_RAND_LEN, 313 os_memcpy(data->rand.r.y, pos, EAP_PAX_RAND_LEN); 314 wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", [all...] |
H A D | eap_server_sim.c | 28 u8 rand[EAP_SIM_MAX_CHAL][GSM_RAND_LEN]; member in struct:eap_sim_data 228 eap_sim_msg_add(msg, EAP_SIM_AT_RAND, 0, (u8 *) data->rand, 525 (u8 *) data->rand, (u8 *) data->kc, (u8 *) data->sres, sm);
|
H A D | eap_sim_db.c | 46 u8 rand[EAP_SIM_MAX_CHAL][GSM_RAND_LEN]; member in struct:eap_sim_db_pending::__anon34207::__anon34208 50 u8 rand[EAP_AKA_RAND_LEN]; member in struct:eap_sim_db_pending::__anon34207::__anon34209 454 if (hexstr2bin(start, entry->u.sim.rand[num_chal], 512 if (hexstr2bin(start, entry->u.aka.rand, EAP_AKA_RAND_LEN)) 912 os_memcpy(_rand, entry->u.sim.rand, num_chal * GSM_RAND_LEN); 1373 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN);
|
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | os_win32.c | 149 return rand();
|
/external/valgrind/main/perf/ |
H A D | test_input_for_tinycc.c | 596 extern int rand (void) __attribute__ ((__nothrow__));
|
/external/valgrind/main/drd/tests/ |
H A D | circular_buffer.c | 170 usleep(rand() % MAXSLEEP);
|