/external/wpa_supplicant/ |
eap_psk_common.h | 54 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_1 65 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2 78 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_3 90 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_4
|
eap_sake_common.h | 69 const u8 *rand_s; member in struct:eap_sake_parse_attr 95 const u8 *rand_s, const u8 *rand_p, 98 const u8 *rand_s, const u8 *rand_p,
|
eap_sake_common.c | 36 attr->rand_s = pos + 2; 256 * @rand_s: 16-byte RAND_S 265 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 278 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 282 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 293 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 297 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 309 * @rand_s: 16-byte RAND_S [all...] |
eap_psk.c | 114 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s, 145 os_memcpy(hdr2->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN); 148 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 159 os_memcpy(pos, hdr1->rand_s, EAP_PSK_RAND_LEN); 212 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s, 311 os_memcpy(hdr4->rand_s, hdr3->rand_s, EAP_PSK_RAND_LEN) [all...] |
eap_sake.c | 26 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 226 if (!attr.rand_s) { 232 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN); 233 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)", 234 data->rand_s, EAP_SAKE_RAND_LEN); 257 data->rand_s, data->rand_p, 287 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 330 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 359 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
eap_psk_common.h | 41 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_1 48 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_2 57 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_3 65 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_hdr_4
|
eap_sake_common.h | 65 const u8 *rand_s; member in struct:eap_sake_parse_attr 91 const u8 *rand_s, const u8 *rand_p, 94 const u8 *rand_s, const u8 *rand_p,
|
eap_sake_common.c | 37 attr->rand_s = pos + 2; 257 * @rand_s: 16-byte RAND_S 266 const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, 279 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 283 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 294 rand_p, EAP_SAKE_RAND_LEN, rand_s, EAP_SAKE_RAND_LEN, 298 rand_s, EAP_SAKE_RAND_LEN, rand_p, EAP_SAKE_RAND_LEN, 310 * @rand_s: 16-byte RAND_S [all...] |
/external/webkit/JavaScriptCore/wtf/ |
RandomNumberSeed.h | 66 // On Windows we use rand_s which initialises itself 82 rand_s(&seed);
|
RandomNumber.cpp | 54 // rand_s is incredibly slow on windows so we fall back on rand for Math.random 77 rand_s(&bits);
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
eap_sake.c | 25 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 216 if (!attr.rand_s) { 222 os_memcpy(data->rand_s, attr.rand_s, EAP_SAKE_RAND_LEN); 223 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)", 224 data->rand_s, EAP_SAKE_RAND_LEN); 247 data->rand_s, data->rand_p, 274 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 318 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 347 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p [all...] |
eap_psk.c | 118 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr1->rand_s, 146 os_memcpy(hdr2->rand_s, hdr1->rand_s, EAP_PSK_RAND_LEN); 149 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 160 os_memcpy(pos, hdr1->rand_s, EAP_PSK_RAND_LEN); 218 wpa_hexdump(MSG_DEBUG, "EAP-PSK: RAND_S", hdr3->rand_s, 328 os_memcpy(hdr4->rand_s, hdr3->rand_s, EAP_PSK_RAND_LEN) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
eap_psk.c | 28 u8 rand_s[EAP_PSK_RAND_LEN]; member in struct:eap_psk_data 69 if (os_get_random(data->rand_s, EAP_PSK_RAND_LEN)) { 74 wpa_hexdump(MSG_MSGDUMP, "EAP-PSK: RAND_S (server rand)", 75 data->rand_s, EAP_PSK_RAND_LEN); 89 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 117 os_memcpy(psk->rand_s, data->rand_s, EAP_PSK_RAND_LEN); 301 /* MAC_P = OMAC1-AES-128(AK, ID_P||ID_S||RAND_S||RAND_P) */ 312 os_memcpy(pos, data->rand_s, EAP_PSK_RAND_LEN) [all...] |
eap_sake.c | 24 u8 rand_s[EAP_SAKE_RAND_LEN]; member in struct:eap_sake_data 169 if (os_get_random(data->rand_s, EAP_SAKE_RAND_LEN)) { 174 wpa_hexdump(MSG_MSGDUMP, "EAP-SAKE: RAND_S (server rand)", 175 data->rand_s, EAP_SAKE_RAND_LEN); 188 data->rand_s, EAP_SAKE_RAND_LEN); 220 if (eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 366 data->rand_s, data->rand_p, 369 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p, 406 eap_sake_compute_mic(data->tek.auth, data->rand_s, data->rand_p,
|