HomeSort by relevance Sort by last modified time
    Searched refs:rand_s (Results 1 - 14 of 14) sorted by null

  /external/wpa_supplicant/
eap_psk_common.h 54 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_1
65 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2
78 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_3
90 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_4
eap_sake_common.h 69 const u8 *rand_s; member in struct:eap_sake_parse_attr
95 const u8 *rand_s, const u8 *rand_p,
98 const u8 *rand_s, const u8 *rand_p,
eap_sake_common.c 36 attr->rand_s = pos + 2;
256 * @rand_s: 16-byte RAND_S
265 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
278 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
282 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
293 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
297 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
309 * @rand_s: 16-byte RAND_S
    [all...]
eap_psk.c 114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s,
145 os_memcpy(hdr2->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN);
148 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
159 os_memcpy(pos, hdr1->rand_s, EAP_PSK_RAND_LEN);
212 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s,
311 os_memcpy(hdr4->rand_s, hdr3->rand_s, EAP_PSK_RAND_LEN)
    [all...]
eap_sake.c 26 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
226 if (!attr.rand_s) {
232 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN);
233 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)",
234 data->rand_s, EAP_SAKE_RAND_LEN);
257 data->rand_s, data->rand_p,
287 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
330 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
359 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
eap_psk_common.h 41 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_1
48 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2
57 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_3
65 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_4
eap_sake_common.h 65 const u8 *rand_s; member in struct:eap_sake_parse_attr
91 const u8 *rand_s, const u8 *rand_p,
94 const u8 *rand_s, const u8 *rand_p,
eap_sake_common.c 37 attr->rand_s = pos + 2;
257 * @rand_s: 16-byte RAND_S
266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk,
279 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
283 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
294 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN,
298 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN,
310 * @rand_s: 16-byte RAND_S
    [all...]
  /external/webkit/JavaScriptCore/wtf/
RandomNumberSeed.h 66 // On Windows we use rand_s which initialises itself
82 rand_s(&seed);
RandomNumber.cpp 54 // rand_s is incredibly slow on windows so we fall back on rand for Math.random
77 rand_s(&bits);
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_sake.c 25 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
216 if (!attr.rand_s) {
222 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN);
223 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)",
224 data->rand_s, EAP_SAKE_RAND_LEN);
247 data->rand_s, data->rand_p,
274 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
318 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
347 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p
    [all...]
eap_psk.c 118 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s,
146 os_memcpy(hdr2->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN);
149 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
160 os_memcpy(pos, hdr1->rand_s, EAP_PSK_RAND_LEN);
218 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s,
328 os_memcpy(hdr4->rand_s, hdr3->rand_s, EAP_PSK_RAND_LEN)
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_server/
eap_psk.c 28 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data
69 if (os_get_random(data->rand_s, EAP_PSK_RAND_LEN)) {
74 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)",
75 data->rand_s, EAP_PSK_RAND_LEN);
89 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
117 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN);
301 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */
312 os_memcpy(pos, data->rand_s, EAP_PSK_RAND_LEN)
    [all...]
eap_sake.c 24 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data
169 if (os_get_random(data->rand_s, EAP_SAKE_RAND_LEN)) {
174 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)",
175 data->rand_s, EAP_SAKE_RAND_LEN);
188 data->rand_s, EAP_SAKE_RAND_LEN);
220 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
366 data->rand_s, data->rand_p,
369 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
406 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,

Completed in 83 milliseconds